WorldWideScience

Sample records for based hydrogeological vulnerability

  1. Index-based groundwater vulnerability mapping models using hydrogeological settings: A critical evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Kumar, Prashant, E-mail: prashantkumar@csio.res.in [CSIR-Central Scientific Instruments Organisation, Chandigarh 160030 (India); Academy of Scientific and Innovative Research—CSIO, Chandigarh 160030 (India); Bansod, Baban K.S.; Debnath, Sanjit K. [CSIR-Central Scientific Instruments Organisation, Chandigarh 160030 (India); Academy of Scientific and Innovative Research—CSIO, Chandigarh 160030 (India); Thakur, Praveen Kumar [Indian Institute of Remote Sensing (ISRO), Dehradun 248001 (India); Ghanshyam, C. [CSIR-Central Scientific Instruments Organisation, Chandigarh 160030 (India); Academy of Scientific and Innovative Research—CSIO, Chandigarh 160030 (India)

    2015-02-15

    Groundwater vulnerability maps are useful for decision making in land use planning and water resource management. This paper reviews the various groundwater vulnerability assessment models developed across the world. Each model has been evaluated in terms of its pros and cons and the environmental conditions of its application. The paper further discusses the validation techniques used for the generated vulnerability maps by various models. Implicit challenges associated with the development of the groundwater vulnerability assessment models have also been identified with scientific considerations to the parameter relations and their selections. - Highlights: • Various index-based groundwater vulnerability assessment models have been discussed. • A comparative analysis of the models and its applicability in different hydrogeological settings has been discussed. • Research problems of underlying vulnerability assessment models are also reported in this review paper.

  2. GIS based Hydrogeological Vulnerability Mapping of Groundwater Resources in Jerash Area-Jordan

    Energy Technology Data Exchange (ETDEWEB)

    Hammouri, N [Department of Earth and Environmental Sciences, Faculty of Natural Resources and Environment, Hashemite University, Zarqa (Jordan); El-Naqa, A [Department of Water Management and Environment, Faculty of Natural Resources and Environment, Hashemite University, Zarqa (Jordan)

    2008-04-15

    This paper presents groundwater vulnerability mapping for Jerash area, north Jordan generated using EPIK and DRASTIC models. These models have been implemented using GIS to delineate groundwater protection zones and to suggest a protection plan to improve groundwater quality of the major springs and wells. Most of the groundwater resources in the study area are polluted and bacteria and nitrate levels are high. Different sources of groundwater pollution have been identified. Domestic wastewater is considered as a major source of pollution. Urban runoff, fertilizers from agricultural return flows and solid waste disposal appear to be secondary sources. The most relevant vulnerability class of EPIK map is very high which accounts for about 41 % of the total area. While in the DRASTIC vulnerability map, areas with high vulnerability were only about 23 % of the total area. There is a good correlation between vulnerability maps obtained from both models with microbiological and chemical pollution evidences. There is also a good agreement between the areas classified as highly vulnerable and those that have high levels of pollution. [Spanish] El estudio de vulnerabilidad de aguas subterraneas en la region de Yerash, Jordania fue obtenido mediante las metodologias de EPIK y DRASTIC. Se uso GIS para mapear las zonas protegidas y para sugerir un plan de proteccion para mejorar la calidad del agua subterranea en los principales manantiales y pozos. Los niveles de contaminacion bacteriana y de nitratos son elevados. El efluente domestico es la fuente mas importante de contaminacion; vienen en segundo lugar la precipitacion en zonas urbanas, los fertilizantes agricolas y los desechos solidos. En el mapa de EPIK, la vulnerabilidad extrema abarca hasta 41% del area total; en cambio, en el mapa de DRASTIC las areas de alta vulnerabilidad ocupan solo un 23% del area. La correlacion de los datos de contaminacion microbiana y quimica con ambos mapas der vulnerabilidad es buena

  3. Evaluation of intrinsic groundwater vulnerability to pollution: COP method for pilot area of Carrara hydrogeological system (Northern Tuscany, Italy)

    Science.gov (United States)

    Baldi, B.; Guastaldi, E.; Rossetto, R.

    2009-04-01

    During the characterization of the Apuan Alps groundwater body ( "Corpo Idrico Sotterraneo Significativo", briefly CISS) (Regione Toscana, 2007) the intrinsic vulnerability has been evaluated for Carrara hydrogeological system (Northern Tuscany, Italy) by means of COP method, developed within COST 620 European Action (Zwalhlen, 2003). This system is both characterized by large data availability and it is considered an highly risky zone since groundwater protection problems (turbidity of the tapped spring waters and hydrocarbons contamination) and anthropic activity (marble quarries). The study area, 20 Km2large, has high relief energy, with elevations ranging from 5 to 1700 m amsl in almost 5 km. Runoff is scarce except during heavy rainfall; due to the presence of carbonate rocks infiltration is high: groundwater discharge at 155-255 m amsl. The area is located in the north-western part of Apuan Alps Metamorphic Complex, characterized by carbonate and non-carbonate rocks belonging to the non-metamorphic Tuscan Units (Carnic-Oligocene), Mesozoic Succession, Middle-Triassic Succession, and metamorphic Paleozoic rocks. The main geological structure of the area is the Carrara Syncline, constituted prevalently by dolostones, marbles and cherty limestones. These carbonate formations define several moderately to highly productive hydrogeological units, characterized by fissured and karst flow. Hydrogeological system may be subdivided in two different subsets, because of both geo-structural set up and area conformation. However, these are hydrogeologically connected since anisotropy and fractures of karst groundwater. The southern boundary of Carrara hydrogeological system shows important dammed springs, defined by low productive units of Massa Unit (Cambriano?-Carnic). COP methodology for evaluating intrinsic vulnerability of karst groundwater is based on three main factors for the definition of vulnerability itself: COPIndex = C (flow Concentration) *O (Overlying layers

  4. HYDROGEOLOGY

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    <正>20111225 Chen Luwang(School of Resource and Environmental Engineering,Hefei University of Technology,Hefei 230009,China);Gui Herong The Standard Type Trace Elements and the Discriminant Model of Water Bursting Source in the Linhuan Coal District(Hydrogeology and Engineering Geology,ISSN1000-3665,CN11-2202/P,37(3),2010,p.17-22,2 illus.,2 tables,11 refs.)Key words:mine environment,water gushing,Anhui It is of great academic and practical significance that hydrogeological information during the sign time of water bursting is captured by means of standard type trace elements which can trace hydrogeological features of different aquifers.On the basis of these standard type trace elements,a Bayes linear discriminant model of water bursting source is built.

  5. HYDROGEOLOGY

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    <正>20080542 Cao Wenbing(School of Water Resources and Environment,China University of Geosciences,Beijing 100083,China);Wan Li Experiments on Osmosis through Clayey Soil under the Condition of Variable Water Levels(Hydrogeology & Engineering Geology,ISSN1000-3665,CN11-2202/P,33(2),2006,p.118-122,6 illus.,1 table,3 refs.,with English abstract)

  6. HYDROGEOLOGY

    Institute of Scientific and Technical Information of China (English)

    2015-01-01

    20150507Gao Dongdong(State Key Laboratory of Geohazard Prevention and Geoenvironment Protection,Chengdu University of Technology,Chengdu 610059,China);Wu Yong Water Cycle and Groundwater Recharge of Small Watershed Rainfall Process in a Mountain Forest System(Hydrogeology and Engineering Geology,ISSN1000-3665,CN11-2202/P,41(1),2014,p.7-14,4illus.,9tables,32refs.)Key words:hydrologic cycle,groundwater recharge,Sichuan Province

  7. An holistic view on aquifer vulnerability based on a distinction of different types of vulnerability

    Science.gov (United States)

    De Luca, Domenico Antonio; Lasagna, Manuela; Franchino, Elisa

    2016-04-01

    AN HOLISTIC VIEW ON AQUIFER VULNERABILITY BASED ON A DISTINCTION OF DIFFERENT TYPES OF VULNERABILITY D.A. De Luca1 , M. Lasagna1, E. Franchino1 1Department of Earth Sciences, University of Turin The concept of vulnerability is certainly useful in the field of groundwater protection. Nevertheless, within the scientific community, the definition of groundwater vulnerability is still debatable and not clear and conclusive. This is probably due to the fact that researchers often have very different experiences and education. A positive effect of it is a constant exchange of ideas, but there are also negative consequences and difficulties in deepening the issue. The different approaches are very important but they are usable only if the concept of vulnerability is standardized: thus, for the sake of clarity, a number of definitions should be laid down, based on the different types of vulnerability. These definitions can then provide the necessary holistic view for the aquifer vulnerability assessment. Nowadays vulnerability methods focus on the degree of vulnerability and the parameters needed for its evaluation, often neglecting to clarify what is the type of vulnerability the proposed methods are referred. The type of vulnerability, indeed, is both logically and hierarchically superior to the degree of vulnerability. More specifically the type of vulnerability represents the evaluation of the hydrogeological conditions considered in the vulnerability assessment and able to influence the way in which the contamination can take place. Currently the only distinction, based on of the type of vulnerability, is referred to intrinsic and specific vulnerability. Intrinsic vulnerability assesses the susceptibility of the receptor based on the natural properties of the land and subsurface; specific vulnerability also includes properties of the analyzed contaminant. This distinction is useful but not exhaustive. In addition to this, e.g., a distinction of vertical vulnerability

  8. Python-Based Applications for Hydrogeological Modeling

    Science.gov (United States)

    Khambhammettu, P.

    2013-12-01

    Python is a general-purpose, high-level programming language whose design philosophy emphasizes code readability. Add-on packages supporting fast array computation (numpy), plotting (matplotlib), scientific /mathematical Functions (scipy), have resulted in a powerful ecosystem for scientists interested in exploratory data analysis, high-performance computing and data visualization. Three examples are provided to demonstrate the applicability of the Python environment in hydrogeological applications. Python programs were used to model an aquifer test and estimate aquifer parameters at a Superfund site. The aquifer test conducted at a Groundwater Circulation Well was modeled with the Python/FORTRAN-based TTIM Analytic Element Code. The aquifer parameters were estimated with PEST such that a good match was produced between the simulated and observed drawdowns. Python scripts were written to interface with PEST and visualize the results. A convolution-based approach was used to estimate source concentration histories based on observed concentrations at receptor locations. Unit Response Functions (URFs) that relate the receptor concentrations to a unit release at the source were derived with the ATRANS code. The impact of any releases at the source could then be estimated by convolving the source release history with the URFs. Python scripts were written to compute and visualize receptor concentrations for user-specified source histories. The framework provided a simple and elegant way to test various hypotheses about the site. A Python/FORTRAN-based program TYPECURVEGRID-Py was developed to compute and visualize groundwater elevations and drawdown through time in response to a regional uniform hydraulic gradient and the influence of pumping wells using either the Theis solution for a fully-confined aquifer or the Hantush-Jacob solution for a leaky confined aquifer. The program supports an arbitrary number of wells that can operate according to arbitrary schedules. The

  9. GIS-based hydrogeological databases and groundwater modelling

    Science.gov (United States)

    Gogu, Radu Constantin; Carabin, Guy; Hallet, Vincent; Peters, Valerie; Dassargues, Alain

    2001-12-01

    Reliability and validity of groundwater analysis strongly depend on the availability of large volumes of high-quality data. Putting all data into a coherent and logical structure supported by a computing environment helps ensure validity and availability and provides a powerful tool for hydrogeological studies. A hydrogeological geographic information system (GIS) database that offers facilities for groundwater-vulnerability analysis and hydrogeological modelling has been designed in Belgium for the Walloon region. Data from five river basins, chosen for their contrasting hydrogeological characteristics, have been included in the database, and a set of applications that have been developed now allow further advances. Interest is growing in the potential for integrating GIS technology and groundwater simulation models. A "loose-coupling" tool was created between the spatial-database scheme and the groundwater numerical model interface GMS (Groundwater Modelling System). Following time and spatial queries, the hydrogeological data stored in the database can be easily used within different groundwater numerical models. Résumé. La validité et la reproductibilité de l'analyse d'un aquifère dépend étroitement de la disponibilité de grandes quantités de données de très bonne qualité. Le fait de mettre toutes les données dans une structure cohérente et logique soutenue par les logiciels nécessaires aide à assurer la validité et la disponibilité et fournit un outil puissant pour les études hydrogéologiques. Une base de données pour un système d'information géographique (SIG) hydrogéologique qui offre toutes les facilités pour l'analyse de la vulnérabilité des eaux souterraines et la modélisation hydrogéologique a été établi en Belgique pour la région Wallonne. Les données de cinq bassins de rivières, choisis pour leurs caractéristiques hydrogéologiques différentes, ont été introduites dans la base de données, et un ensemble d

  10. Developing Hydrogeological Site Characterization Strategies based on Human Health Risk

    Science.gov (United States)

    de Barros, F.; Rubin, Y.; Maxwell, R. M.

    2013-12-01

    In order to provide better sustainable groundwater quality management and minimize the impact of contamination in humans, improved understanding and quantification of the interaction between hydrogeological models, geological site information and human health are needed. Considering the joint influence of these components in the overall human health risk assessment and the corresponding sources of uncertainty aid decision makers to better allocate resources in data acquisition campaigns. This is important to (1) achieve remediation goals in a cost-effective manner, (2) protect human health and (3) keep water supplies clean in order to keep with quality standards. Such task is challenging since a full characterization of the subsurface is unfeasible due to financial and technological constraints. In addition, human exposure and physiological response to contamination are subject to uncertainty and variability. Normally, sampling strategies are developed with the goal of reducing uncertainty, but less often they are developed in the context of their impacts on the overall system uncertainty. Therefore, quantifying the impact from each of these components (hydrogeological, behavioral and physiological) in final human health risk prediction can provide guidance for decision makers to best allocate resources towards minimal prediction uncertainty. In this presentation, a multi-component human health risk-based framework is presented which allows decision makers to set priorities through an information entropy-based visualization tool. Results highlight the role of characteristic length-scales characterizing flow and transport in determining data needs within an integrated hydrogeological-health framework. Conditions where uncertainty reduction in human health risk predictions may benefit from better understanding of the health component, as opposed to a more detailed hydrogeological characterization, are also discussed. Finally, results illustrate how different dose

  11. GIS-Based Hydrogeological-Parameter Modeling

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    A regression model is proposed to relate the variation of water well depth with topographic properties (area and slope), the variation of hydraulic conductivity and vertical decay factor. The implementation of this model in GIS environment (ARC/TNFO) based on known water data and DEM is used to estimate the variation of hydraulic conductivity and decay factor of different lithoiogy units in watershed context.

  12. Secure Web Development Based on Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Ms. Daljit Kaur Dr. Parminder Kaur

    2012-02-01

    Full Text Available This paper is an effort to develop secure web applications based on known vulnerabilities. It has been seen that in the rapid race of developing web applications in minimum time and budget, security is given least importance as consequence of which web applications are developed and hosted with number of vulnerabilities in them. And in this race, one thing is constant that attackers take advantage of weaknesses existing in technology for financial gain and theft of intellectual property. In this proposed method of secure web development, most common vulnerabilities and their occurrence in development process is discussed. Mapping vulnerabilities to the actions needed to take during development process may help developers to understand vulnerability and avoid vulnerabilities in application.

  13. Teaching and learning hydrogeology using a physically-based modelling framework

    Science.gov (United States)

    Frampton, Andrew; Dessirier, Benoit; Pannetier, Romain

    2014-05-01

    Hydrogeology involves studying the occurrence, distribution, movement and quality of water in geological formations. Hydrogeology typically enters in the curriculum of physical geography as well as civil and environmental engineering courses, is a multidisciplinary subject which encompasses several scientific areas including mathematics, physics, geology, geochemistry and numerical analysis. For applications such as resource management, decision and policy making, and an understanding and interpretation of uncertainty and risk assessment is also necessary. Teaching hydrogeology is not only challenged by its multidisciplinary nature, but also since groundwater occurrence and movement is hidden from view in the subsurface, and is generally inaccessible to direct observation. Field experiments are often costly and time consuming, and laboratory experiments limited in scale. However, suitably designed computational systems can help address such issues by providing numerical modelling investigations of field conditions. This contribution presents results from a recent project dedicated to develop an open-source, interactive, visual numerical modelling tool for teaching/learning hydrogeology, based on current pedagogical understanding of learning in higher education. It provides physically-based groundwater flow solutions within an intuitive user-friendly interface, which does not require advanced technical skills to operate. The aim is to be able to improve student's learning by providing immediate and visual feedback on groundwater flow and contaminant transport problems. The development and implementation of the tool as part of a teaching framework to address subsurface flow concepts and phenomena is presented, discussed and evaluated. By linking theoretical problem-solving exercises with modelling tasks in a learn-by-doing approach, we further discuss how student's learning experiences can be enhanced.

  14. Environmental Groundwater Vulnerability Assessment in Urban Water Mines (Porto, NW Portugal

    Directory of Open Access Journals (Sweden)

    Maria José Afonso

    2016-11-01

    Full Text Available A multidisciplinary approach was developed to estimate urban groundwater vulnerability to contamination combining hydrogeology, hydrogeochemistry, subterranean hydrogeotechnics, groundwater ecotoxicology and isotope tracers. Paranhos and Salgueiros spring waters in Porto City were used as a case study. Historical and current vulnerability scenarios were compared using hydrogeological GIS-based modelling. Potential contamination sources were mapped around the spring galleries. Most of these were point sources and their potential contamination load was moderate. The ecotoxicological assessment indicated a low acute toxicity potential. Groundwater radionuclides appeared to be mainly controlled by geological factors and biomineralisation. Vulnerability maps suggest that most of the area has a moderate to low vulnerability to contamination. However, some surface sources such as sewage systems cause contamination and contribute to increased vulnerability. This integrated approach was demonstrated to be adequate for a better knowledge of urban hydrogeological processes and their dynamics, and highlighted the importance of a vulnerability assessment in urban areas.

  15. Vulnerability curves vs. vulnerability indicators: application of an indicator-based methodology for debris-flow hazards

    Science.gov (United States)

    Papathoma-Köhle, Maria

    2016-08-01

    The assessment of the physical vulnerability of elements at risk as part of the risk analysis is an essential aspect for the development of strategies and structural measures for risk reduction. Understanding, analysing and, if possible, quantifying physical vulnerability is a prerequisite for designing strategies and adopting tools for its reduction. The most common methods for assessing physical vulnerability are vulnerability matrices, vulnerability curves and vulnerability indicators; however, in most of the cases, these methods are used in a conflicting way rather than in combination. The article focuses on two of these methods: vulnerability curves and vulnerability indicators. Vulnerability curves express physical vulnerability as a function of the intensity of the process and the degree of loss, considering, in individual cases only, some structural characteristics of the affected buildings. However, a considerable amount of studies argue that vulnerability assessment should focus on the identification of these variables that influence the vulnerability of an element at risk (vulnerability indicators). In this study, an indicator-based methodology (IBM) for mountain hazards including debris flow (Kappes et al., 2012) is applied to a case study for debris flows in South Tyrol, where in the past a vulnerability curve has been developed. The relatively "new" indicator-based method is being scrutinised and recommendations for its improvement are outlined. The comparison of the two methodological approaches and their results is challenging since both methodological approaches deal with vulnerability in a different way. However, it is still possible to highlight their weaknesses and strengths, show clearly that both methodologies are necessary for the assessment of physical vulnerability and provide a preliminary "holistic methodological framework" for physical vulnerability assessment showing how the two approaches may be used in combination in the future.

  16. Scenario-based Storm Surge Vulnerability Assessment of Catanduanes

    Science.gov (United States)

    Suarez, J. K. B.

    2015-12-01

    After the devastating storm surge effect of Typhoon Haiyan, the public recognized an improved communication about risks, vulnerabilities and what is threatened by storm surge. This can be provided by vulnerability maps which allow better visual presentations and understanding of the risks and vulnerabilities. Local implementers can direct the resources needed for protection of these areas. Moreover, vulnerability and hazard maps are relevant in all phases of disaster management designed by the National Disaster Risk Reduction Council (NDRRMC) - disaster preparedness, prevention and mitigation and response and recovery and rehabilitation. This paper aims to analyze the vulnerability of Catanduanes, a coastal province in the Philippines, to storm surges in terms of four parameters: population, built environment, natural environment and agricultural production. The vulnerability study relies on the storm surge inundation maps based on the Department of Science and Technology Nationwide Operational Assessment of Hazards' (DOST-Project NOAH) proposed four Storm Surge Advisory (SSA) scenarios (1-2, 3, 4, and 5 meters) for predicting storm surge heights. To determine total percent affected for each parameter elements, an overlay analysis was performed in ArcGIS Desktop. Moreover, vulnerability and hazard maps are generated as a final output and a tool for visualizing the impacts of storm surge event at different surge heights. The result of this study would help the selected province to know their present condition and adapt strategies to strengthen areas where they are found to be most vulnerable in order to prepare better for the future.

  17. GIS Based Measurement and Regulatory Zoning of Urban Ecological Vulnerability

    Directory of Open Access Journals (Sweden)

    Xiaorui Zhang

    2015-07-01

    Full Text Available Urban ecological vulnerability is measured on the basis of ecological sensitivity and resilience based on the concept analysis of vulnerability. GIS-based multicriteria decision analysis (GIS-MCDA methods are used, supported by the spatial analysis tools of GIS, to define different levels of vulnerability for areas of the urban ecology. These areas are further classified into different types of regulatory zones. Taking the city of Hefei in China as the empirical research site, this study uses GIS-MCDA, including the index system, index weights and overlay rules, to measure the degree of its ecological vulnerability on the GIS platform. There are eight indices in the system. Raking and analytical hierarchy process (AHP methods are used to calculate index weights according to the characteristics of the index system. The integrated overlay rule, including selection of the maximum value, and weighted linear combination (WLC are applied as the overlay rules. In this way, five types of vulnerability areas have been classified as follows: very low vulnerability, low vulnerability, medium vulnerability, high vulnerability and very high vulnerability. They can be further grouped into three types of regulatory zone of ecological green line, ecological grey line and ecological red line. The study demonstrates that ecological green line areas are the largest (53.61% of the total study area and can be intensively developed; ecological grey line areas (19.59% of the total area can serve as the ecological buffer zone, and ecological red line areas (26.80% cannot be developed and must be protected. The results indicate that ecological green line areas may provide sufficient room for future urban development in Hefei city. Finally, the respective regulatory countermeasures are put forward. This research provides a scientific basis for decision-making around urban ecological protection, construction and sustainable development. It also provides theoretical method

  18. Road Network Vulnerability Analysis Based on Improved Ant Colony Algorithm

    Directory of Open Access Journals (Sweden)

    Yunpeng Wang

    2014-01-01

    Full Text Available We present an improved ant colony algorithm-based approach to assess the vulnerability of a road network and identify the critical infrastructures. This approach improves computational efficiency and allows for its applications in large-scale road networks. This research involves defining the vulnerability conception, modeling the traffic utility index and the vulnerability of the road network, and identifying the critical infrastructures of the road network. We apply the approach to a simple test road network and a real road network to verify the methodology. The results show that vulnerability is directly related to traffic demand and increases significantly when the demand approaches capacity. The proposed approach reduces the computational burden and may be applied in large-scale road network analysis. It can be used as a decision-supporting tool for identifying critical infrastructures in transportation planning and management.

  19. Hydrogeologic Provinces for California based upon established groundwater basins and watershed polygons.

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Ten hydrogeologic provinces of California are represented by a region- class feature called "provinces" within this digital data set. These provinces were identified...

  20. Vulnerable Genders, Vulnerable Loves

    DEFF Research Database (Denmark)

    Schleicher, Marianne

    2015-01-01

    on gathering knowledge and its often unpremeditated effect of recognition and inclusion, and Judith Butler on cultural intelligibility and subversion from within. With these theories as a departing point for the analysis, the chapter links the vulnerability of complex identities with the vulnerability...... in the 20th and 21st century, including Judith Butler, who consider human vulnerability an ideal platform for co-existence. Given Butler’s own point that subversion has to come from within, a culture cannot acknowledge the vulnerability of others, if these others constitute a threat. Instead, and based...

  1. Spatial vulnerability units - expert-based spatial modelling of socio-economic vulnerability in the Salzach catchment, Austria

    Science.gov (United States)

    Kienberger, S.; Lang, S.; Zeil, P.

    2009-05-01

    The assessment of vulnerability has moved to centre-stage of the debate between different scientific disciplines related to climate change and disaster risk management. Composed by a combination of social, economical, physical and environmental factors the assessment implies combining different domains as well as quantitative with qualitative data and makes it therefore a challenge to identify an integrated metric for vulnerability. In this paper we define vulnerability in the context of climate change, targeting the hazard "flood". The developed methodology is being tested in the Salzach river catchment in Austria, which is largely prone to floods. The proposed methodology allows the spatial quantification of vulnerability and the identification of vulnerability units. These units build upon the geon concept which acts as a framework for the regionalization of continuous spatial information according to defined parameters of homogeneity. Using geons, we are capable of transforming singular domains of information on specific systemic components to policy-relevant, conditioned information. Considering the fact that vulnerability is not directly measurable and due to its complex dimension and social construction an expert-based approach has been chosen. Established methodologies such as Multicriteria Decision Analysis, Delphi exercises and regionalization approaches are being integrated. The method not only enables the assessment of vulnerability independent from administrative boundaries, but also applies an aggregation mode which reflects homogenous vulnerability units. This supports decision makers to reflect on complex issues such as vulnerability. Next to that, the advantage is to decompose the units to their underlying domains. Feedback from disaster management experts indicates that the approach helps to improve the design of measures aimed at strengthening preparedness and mitigation. From this point of view, we reach a step closer towards validation of the

  2. Spatial vulnerability units – expert-based spatial modelling of socio-economic vulnerability in the Salzach catchment, Austria

    Directory of Open Access Journals (Sweden)

    S. Kienberger

    2009-05-01

    Full Text Available The assessment of vulnerability has moved to centre-stage of the debate between different scientific disciplines related to climate change and disaster risk management. Composed by a combination of social, economical, physical and environmental factors the assessment implies combining different domains as well as quantitative with qualitative data and makes it therefore a challenge to identify an integrated metric for vulnerability. In this paper we define vulnerability in the context of climate change, targeting the hazard "flood". The developed methodology is being tested in the Salzach river catchment in Austria, which is largely prone to floods. The proposed methodology allows the spatial quantification of vulnerability and the identification of vulnerability units. These units build upon the geon concept which acts as a framework for the regionalization of continuous spatial information according to defined parameters of homogeneity. Using geons, we are capable of transforming singular domains of information on specific systemic components to policy-relevant, conditioned information. Considering the fact that vulnerability is not directly measurable and due to its complex dimension and social construction an expert-based approach has been chosen. Established methodologies such as Multicriteria Decision Analysis, Delphi exercises and regionalization approaches are being integrated. The method not only enables the assessment of vulnerability independent from administrative boundaries, but also applies an aggregation mode which reflects homogenous vulnerability units. This supports decision makers to reflect on complex issues such as vulnerability. Next to that, the advantage is to decompose the units to their underlying domains. Feedback from disaster management experts indicates that the approach helps to improve the design of measures aimed at strengthening preparedness and mitigation. From this point of view, we reach a step closer towards

  3. VuWiki: An Ontology-Based Semantic Wiki for Vulnerability Assessments

    Science.gov (United States)

    Khazai, Bijan; Kunz-Plapp, Tina; Büscher, Christian; Wegner, Antje

    2014-05-01

    The concept of vulnerability, as well as its implementation in vulnerability assessments, is used in various disciplines and contexts ranging from disaster management and reduction to ecology, public health or climate change and adaptation, and a corresponding multitude of ideas about how to conceptualize and measure vulnerability exists. Three decades of research in vulnerability have generated a complex and growing body of knowledge that challenges newcomers, practitioners and even experienced researchers. To provide a structured representation of the knowledge field "vulnerability assessment", we have set up an ontology-based semantic wiki for reviewing and representing vulnerability assessments: VuWiki, www.vuwiki.org. Based on a survey of 55 vulnerability assessment studies, we first developed an ontology as an explicit reference system for describing vulnerability assessments. We developed the ontology in a theoretically controlled manner based on general systems theory and guided by principles for ontology development in the field of earth and environment (Raskin and Pan 2005). Four key questions form the first level "branches" or categories of the developed ontology: (1) Vulnerability of what? (2) Vulnerability to what? (3) What reference framework was used in the vulnerability assessment?, and (4) What methodological approach was used in the vulnerability assessment? These questions correspond to the basic, abstract structure of the knowledge domain of vulnerability assessments and have been deduced from theories and concepts of various disciplines. The ontology was then implemented in a semantic wiki which allows for the classification and annotation of vulnerability assessments. As a semantic wiki, VuWiki does not aim at "synthesizing" a holistic and overarching model of vulnerability. Instead, it provides both scientists and practitioners with a uniform ontology as a reference system and offers easy and structured access to the knowledge field of

  4. Hydrogeology of Nevada

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — This data set consists of hydrogeology for the State of Nevada. Consolidated rocks and unconsolidated sediments are the two major hydrogeologic units. Consolidated...

  5. SRS Geology/Hydrogeology Environmental Information Document

    Energy Technology Data Exchange (ETDEWEB)

    Denham, M.E.

    1999-08-31

    The purpose of the Savannah River Site Geology and Hydrogeology Environmental Information Document (EID) is to provide geologic and hydrogeologic information to serve as a baseline to evaluate potential environmental impacts. This EID is based on a summary of knowledge accumulated from research conducted at the Savannah River Site (SRS) and surrounding areas.

  6. A power flow based model for the analysis of vulnerability in power networks

    Science.gov (United States)

    Wang, Zhuoyang; Chen, Guo; Hill, David J.; Dong, Zhao Yang

    2016-10-01

    An innovative model which considers power flow, one of the most important characteristics in a power system, is proposed for the analysis of power grid vulnerability. Moreover, based on the complex network theory and the Max-Flow theorem, a new vulnerability index is presented to identify the vulnerable lines in a power grid. In addition, comparative simulations between the power flow based model and existing models are investigated on the IEEE 118-bus system. The simulation results demonstrate that the proposed model and the index are more effective in power grid vulnerability analysis.

  7. Hydrogeological characterization based on the results of long term monitoring in the Mizunami Underground Research Laboratory Project

    Science.gov (United States)

    Takeuchi, R.; Ohyama, T.; Matsuoka, T.; Saegusa, H.; Takeuchi, S.

    2009-12-01

    The Mizunami Underground Research Laboratory (MIU) is now under construction by the Japan Atomic Energy Agency in the Cretaceous Toki granite in the Tono area of central Japan. Conceptual design of the MIU consists of two 1,000 m shafts (the Main Shaft and the Ventilation Shaft) and horizontal research galleries. The MIU project is a broad scientific study of the deep geological environment as a base for the research and development for geological disposal of nuclear wastes. One of the main goals is to establish comprehensive techniques for investigation, analysis and assessment of the deep geological environment in fractured crystalline rock. The project is being implemented in three overlapping phases: Surface-based Investigation (Phase I), Construction (Phase II) and Operation (Phase III), with a total duration of 20 years. In Phase I, surface investigations were carried out in a stepwise manner in order to obtain information of the geological environment at the site scale (about 2km square). Geological modeling and simulations of various kinds had been carried out in order to synthesize these investigation results. Two NNW-trending faults, which are important for hydrogeological characterization, are included in the model. One of the faults (fault A) strikes through the site in the immediate vicinity of the Main Shaft and another fault (fault B) strikes through the southern part of the MIU construction site. In Phase II, field investigations have been carried out in and around the MIU construction site. For hydrogeological characterization, long term monitoring of hydraulic pressure, surface tilt and self-potential have been carried out on surface and in the research galleries to obtain information on changes of groundwater flow due to shaft excavation. The results of the long term monitoring focused on fault A are as follows: - The hydraulic pressure responses are observed in surface boreholes in and around the MIU construction site and the galleries. The

  8. Comprehensive Assessment of Eco-environment Vulnerability in Hebei Province Based on ArcGIS

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    [Objective] This study aimed to assess the vulnerability of ecological environment in Hebei Province.[Method] Based on ArcGIS,by using the dominant factor and maximum limits factor method,we established the sensitivity-reality indicator system and assessment model of the eco-environment vulnerability in Hebei Province to quantitatively evaluate its eco-environment vulnerability,and analyzed its spatial distribution.[Result] The status quo of environmental degradation was inconsistent with the sensitivity of...

  9. Numerical modelling of levee stability based on coupled mechanical, thermal and hydrogeological processes

    Directory of Open Access Journals (Sweden)

    Dwornik Maciej

    2016-01-01

    Full Text Available The numerical modelling of coupled mechanical, thermal and hydrogeological processes for a soil levee is presented in the paper. The modelling was performed for a real levee that was built in Poland as a part of the ISMOP project. Only four parameters were changed to build different flood waves: the water level, period of water increase, period of water decrease, and period of low water level after the experiment. Results of numerical modelling shows that it is possible and advisable to calculate simultaneously changes of thermal and hydro-mechanical fields. The presented results show that it is also possible to use thermal sensors in place of more expensive pore pressure sensors, with some limitations. The results of stability analysis show that the levee is less stable when the water level decreases, after which factor of safety decreases significantly. For all flooding wave parameters described in the paper, the levee is very stable and factor of safety variations for any particular stage were not very large.

  10. Wi-Fi Protocol Vulnerability Discovery Based on Fuzzy Testing

    Directory of Open Access Journals (Sweden)

    Kunhua Zhu

    2013-08-01

    Full Text Available To detect the wireless network equipment whether there is protocol vulnerability, using the method of modular design and implementation of a new suitable for Wi-Fi protocol vulnerability discovery fuzzy test framework. It can be independent of its transmission medium, produce deformity packet and implementation of the attack on the target system. The author firstly describes the wireless network protocol vulnerability discovery and fuzzy test in this paper,then focused on the test frame technical scheme, detailed technical realization and so on, and its application are analyzed. In the experimental stage the fuzzy test is applied to a wireless networks gateway, the test results show that the fuzzy test framework can be well applied to the wireless network equipment agreement loophole mining work.  

  11. AVQS: attack route-based vulnerability quantification scheme for smart grid.

    Science.gov (United States)

    Ko, Jongbin; Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik

    2014-01-01

    A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification.

  12. AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid

    Directory of Open Access Journals (Sweden)

    Jongbin Ko

    2014-01-01

    Full Text Available A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification.

  13. Groundwater vulnerability mapping of Qatar aquifers

    Science.gov (United States)

    Baalousha, Husam Musa

    2016-12-01

    Qatar is one of the most arid countries in the world with limited water resources. With little rainfall and no surface water, groundwater is the only natural source of fresh water in the country. Whilst the country relies mainly on desalination of seawater to secure water supply, groundwater has extensively been used for irrigation over the last three decades, which caused adverse environmental impact. Vulnerability assessment is a widely used tool for groundwater protection and land-use management. Aquifers in Qatar are carbonate with lots of fractures, depressions and cavities. Karst aquifers are generally more vulnerable to contamination than other aquifers as any anthropogenic-sourced contaminant, especially above a highly fractured zone, can infiltrate quickly into the aquifer and spread over a wide area. The vulnerability assessment method presented in this study is based on two approaches: DRASTIC and EPIK, within the framework of Geographical Information System (GIS). Results of this study show that DRASTIC vulnerability method suits Qatar hydrogeological settings more than EPIK. The produced vulnerability map using DRASTIC shows coastal and karst areas have the highest vulnerability class. The southern part of the country is located in the low vulnerability class due to occurrence of shale formation within aquifer media, which averts downward movement of contaminants.

  14. Vulnerability Assessment Using a Fuzzy Logic Based Method

    Science.gov (United States)

    1993-12-01

    Statistics for Engineers" by Scheaffer and McClave (Scheaffer86: 1). For each vulnerability, eight values are given. The first value, ’vuln-inf luence...and Zadeh, L. A. ed. Approximate Reasoning in Intelligent Systems. Decision and Control. Oxford, England: Pergamon Press, 1987. Scheaffer , Richard L

  15. Aircraft vulnerability modeling and computation methods based on product structure and CATIA

    Institute of Scientific and Technical Information of China (English)

    Li Jun; Yang Wei; Zhang Yugang; Pei Yang; Ren Yunsong; Wang Wei

    2013-01-01

    Survivability strengthening/vulnerability reduction designs have become one of the most important design disciplines of military aircraft now.Due to progressiveness and complexity of modern combat aircraft,the existing vulnerability modeling and computation methods cannot meet the current engineering application requirements.Therefore,a vulnerability modeling and computation method based on product structure and CATIA is proposed in sufficient consideration of the design characteristics of modern combat aircraft.This method directly constructs the aircraft vulnerability model by CATIA or the digital model database,and manages all the product components of the vulnerability model via aircraft product structure.Using CAA second development,the detailed operations and computation methods of vulnerability analysis are integrated into CATIA software environment.Comprehensive assessment data and visual kill probability Iso-contours can also be presented,which meet the vulnerability analysis requirements of modern combat aircraft effectively.The intact vulnerability model of one hypothetical aircraft is constructed,and the effects of redundant technology to the aircraft vulnerability are assessed,which validate the engineering practicality of the method.

  16. Temperature-based Instanton Analysis: Identifying Vulnerability in Transmission Networks

    Energy Technology Data Exchange (ETDEWEB)

    Kersulis, Jonas [Univ. of Michigan, Ann Arbor, MI (United States); Hiskens, Ian [Univ. of Michigan, Ann Arbor, MI (United States); Chertkov, Michael [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Backhaus, Scott N. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bienstock, Daniel [Columbia Univ., New York, NY (United States)

    2015-04-08

    A time-coupled instanton method for characterizing transmission network vulnerability to wind generation fluctuation is presented. To extend prior instanton work to multiple-time-step analysis, line constraints are specified in terms of temperature rather than current. An optimization formulation is developed to express the minimum wind forecast deviation such that at least one line is driven to its thermal limit. Results are shown for an IEEE RTS-96 system with several wind-farms.

  17. An Assessment of Vulnerabilities for Ship-based Control Systems

    Science.gov (United States)

    2009-09-01

    gain debug -level access on a system process. Named Pipes Over RPC Issue A vulnerability exists in the way Windows NT 4.0 handles named pipes over...objects Assign to: No one Allows a user to shut down a computer from a remote location on the network. Debug programs Assign to: Trusted users...Systems to Military for Deployable Power Plants,” October 2004. Available at http://www.automation.com/store/ pdetails12460. php ?x=1&pagePath

  18. Development of vulnerability curves to typhoon hazards based on insurance policy and claim dataset

    Science.gov (United States)

    Mo, Wanmei; Fang, Weihua; li, Xinze; Wu, Peng; Tong, Xingwei

    2016-04-01

    Vulnerability refers to the characteristics and circumstances of an exposure that make it vulnerable to the effects of some certain hazards. It can be divided into physical vulnerability, social vulnerability, economic vulnerabilities and environmental vulnerability. Physical vulnerability indicates the potential physical damage of exposure caused by natural hazards. Vulnerability curves, quantifying the loss ratio against hazard intensity with a horizontal axis for the intensity and a vertical axis for the Mean Damage Ratio (MDR), is essential to the vulnerability assessment and quantitative evaluation of disasters. Fragility refers to the probability of diverse damage states under different hazard intensity, revealing a kind of characteristic of the exposure. Fragility curves are often used to quantify the probability of a given set of exposure at or exceeding a certain damage state. The development of quantitative fragility and vulnerability curves is the basis of catastrophe modeling. Generally, methods for quantitative fragility and vulnerability assessment can be categorized into empirical, analytical and expert opinion or judgment-based ones. Empirical method is one of the most popular methods and it relies heavily on the availability and quality of historical hazard and loss dataset, which has always been a great challenge. Analytical method is usually based on the engineering experiments and it is time-consuming and lacks built-in validation, so its credibility is also sometimes criticized widely. Expert opinion or judgment-based method is quite effective in the absence of data but the results could be too subjective so that the uncertainty is likely to be underestimated. In this study, we will present the fragility and vulnerability curves developed with empirical method based on simulated historical typhoon wind, rainfall and induced flood, and insurance policy and claim datasets of more than 100 historical typhoon events. Firstly, an insurance exposure

  19. Evaluation of social vulnerability to floods in Huaihe River basin: a methodology based on catastrophe theory

    Science.gov (United States)

    You, W. J.; Zhang, Y. L.

    2015-08-01

    Huaihe River is one of the seven largest rivers in China, in which floods occurred frequently. Disasters cause huge casualties and property losses to the basin, and also make it famous for high social vulnerability to floods. Based on the latest social-economic data, the index system of social vulnerability to floods was constructed, and Catastrophe theory method was used in the assessment process. The conclusion shows that social vulnerability as a basic attribute attached to urban environment, with significant changes from city to city across the Huaihe River basin. Different distribution characteristics are present in population, economy, flood prevention vulnerability. It is important to make further development of social vulnerability, which will play a positive role in disaster prevention, improvement of comprehensive ability to respond to disasters.

  20. GIS-based modeling of a complex hydrogeological setting in the younger Pleistocene of NE-Germany

    Science.gov (United States)

    Brüning, Torben; Merz, Christoph; van Gasselt, Stephan; Steidl, Jörg

    2016-04-01

    The water balance of the young pleistocene landscape in northeastern Germany is exposed to strong threats by changing climate conditions. During the last two decades the landscape with its many lakes has been impacted by increasing periodic fluctuations of the climate. In addition, anthropogenic influence has been causing significant changes in the landscape in order to improve agriculture and forestry but with negative impact on the groundwater hydrology. For a sustainable ecological and economical water management it is therefore paramount to build precise groundwater data models allowing a complex spatial and multi-temporal data processing. Such models could potentially be used as sources of consistent data providing improved data sets for numerical groundwater modeling and quantitative assessments to avoid unrecoverable damage (e.g. intrusion of highly mineralised groundwater intrusion. Such assessments are cost intensive if data source are heterogeneous and not well-integrated. To allow an hydrogeologically elaborated examination of data, an effective geodata management is needed to homogenize and combine available digital and thematic map information. This work reports on a project conducted for the catchments of two streams, Quillow and Strom, located in the Uckermark, a region in northeastern Germany. The database comprises current geodatasets consisting of hydrological and hydrogeological content and old thematic maps of Quaternary geology. Available geodata, measurements and digitized map series data of this region from environmental agencies of the states Mecklenburg Western Pomerania and Brandenburg were included and homogenized considering publications and technical reports. As a result, a newly developed spatial data basis has been compiled as geodatabase using vector feature classes, raster data, TINs and relationship classes. The resulting three-dimensional image of aquifers and aquitards of the Quaternary deposits exhibit potential interfaces

  1. Development of a summer field-based hydrogeology research experience for undergraduates

    Science.gov (United States)

    Singha, K.

    2011-12-01

    A critical problem in motivating and training the next generation of environmental scientists is providing them with an integrated scientific experience that fosters a depth of understanding and helps them build a network of colleagues for their future. As the education part of an NSF-funded CAREER proposal, I have developed a three-week summer research experience for undergraduate students that links their classroom education with field campaigns aiming to make partial differential equations come "alive" in a practical, applied setting focused on hydrogeologic processes. This course has been offered to freshman- to junior-level undergraduate students from Penn State and also the three co-operating Historically Black Universities (HBUs)--Jackson State University, Fort Valley State University, and Elizabeth City State University-since 2009. Broad learning objectives include applying their knowledge of mathematics, science, and engineering to flow and transport processes in the field and communicating science effectively in poster and oral format. In conjunction with ongoing research about solute transport, students collected field data in the Shale Hills Critical Zone Observatory in Central Pennsylvania, including slug and pumping tests, ground-penetrating radar, electrical resistivity imaging, wireline logging, and optical televiewers, among other instruments. Students conducted tracer tests, where conservative solutes are introduced into a local stream and monitored. Students also constructed numerical models using COMSOL Multiphysics, a research-grade code that can be used to model any physical system; with COMSOL, students create models without needing to be trained in computer coding. With guidance, students built basic models of fluid flow and transport to visualize how heterogeneity of hydraulic and transport properties or variations in forcing functions impact their results. The development of numerical models promoted confidence in predicting flow and

  2. HYDROGEOLOGY & ENGINEERING GEOLOGY

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    <正>(1) HYDROGEOLOGY 20051014 Duan Yonghou (China Institute of Geo - Environment Monitoring, Beijing ) ; Wang Jiabin Groundwater Resources and Its Sustainable Development in Tianjin, China ( Hydrogeology & Engineering Geology, ISSN 1000-3665, CN11-2202/P, 31(3), 2004, p. 29 -39, 8 illus. , 7 tables, 8 refs. , with English abstract) Key words: water supply, groundwater resources, Tianjin

  3. Combining ground-based and airborne EM through Artificial Neural Networks for modelling hydrogeological units under saline groundwater conditions

    Directory of Open Access Journals (Sweden)

    J. L. Gunnink

    2012-03-01

    Full Text Available Airborne Electro Magnetic (EM methods supply data over large areas in a cost-effective way. We used Artificial Neural Networks (ANN to classify the geophysical signal into a meaningful geological parameter. By using examples of known relations between ground-based geophysical data (in this case electrical conductivity, EC, from Electrical Cone Penetration Tests and geological parameters (presence of glacial till, we extracted learning rules that could be applied to map the presence of a glacial till using the EC profiles from the airborne EM data. The saline groundwater in the area was obscuring the EC signal from the till but by using ANN we were able to extract subtle and often non-linear, relations in EC that were representative for the presence of the till. The ANN results were interpreted as the probability of having till and showed a good agreement with drilling data. The glacial till is acting as a layer that inhibits groundwater flow, due to its high clay-content, and is therefore an important layer in hydrogeological modelling and for predicting the effects of climate change on groundwater quantity and quality.

  4. Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning

    Directory of Open Access Journals (Sweden)

    Jingsha He

    2016-11-01

    Full Text Available As the Internet becomes larger in scale, more complex in structure and more diversified in traffic, the number of crimes that utilize computer technologies is also increasing at a phenomenal rate. To react to the increasing number of computer crimes, the field of computer and network forensics has emerged. The general purpose of network forensics is to find malicious users or activities by gathering and dissecting firm evidences about computer crimes, e.g., hacking. However, due to the large volume of Internet traffic, not all the traffic captured and analyzed is valuable for investigation or confirmation. After analyzing some existing network forensics methods to identify common shortcomings, we propose in this paper a new network forensics method that uses a combination of network vulnerability and network evidence graph. In our proposed method, we use vulnerability evidence and reasoning algorithm to reconstruct attack scenarios and then backtrack the network packets to find the original evidences. Our proposed method can reconstruct attack scenarios effectively and then identify multi-staged attacks through evidential reasoning. Results of experiments show that the evidence graph constructed using our method is more complete and credible while possessing the reasoning capability.

  5. Implementation of Similarity Based Kriging in Open Source Software and Application to Uncertainty Quantification and Reduction in Hydrogeological Inversion

    Science.gov (United States)

    Komara, R.; Ginsbourger, D.

    2014-12-01

    We present the implementation of Similarity Based Kriging (SBK). This approach extends Gaussian process regression (GPR) methods, typically restricted to Euclidean spaces, to spaces that are non-Euclidean or perhaps even non-metric. SBK was inspired by problems in aquifer modeling, where inputs of numerical simulations are typically curves and parameter fields, and predicting scalar or vector outputs by Kriging with such very high-dimensional inputs may seem not feasible at first. SBK combines ideas from the distance-based set-up of Scheidt and Caers (2009) with GPR and allows calculating Kriging predictions based only on similarities between inputs rather than on their high-dimensional representation. Written in open source code, this proposed approach includes automated construction of SBK models and provides diagnostics to assess model quality both in terms of covariance fitting and internal/external prediction validation. Covariance hyperparameters can be estimated both by maximum likelihood and leave-one-out cross validation relying in both cases on efficient formulas and a hybrid genetic optimization algorithm using derivatives. The determination of the best dimension for Classical multidimensional scaling (MDS) and non-metric MDS of the data will be investigated. Application of this software to real life data examples in Euclidean and non-Euclidean (dis)similarity settings will be covered and touch on aquifer modeling, hydrogeological forecasting, and sequential inverse problem solving. In the last case, a novel approach where a variant of the expected improvement criterion is used for choosing several points at a time will be presented. This part of the method and the previous covariance hyperparameter estimation parallelize naturally and we demonstrate how to save computation time by optimally distributing function evaluations over multiple cores or processors.

  6. Hydrogeology and simulation of ground-water flow at Arnold Air Force Base, Coffee and Franklin counties, Tennessee

    Science.gov (United States)

    Haugh, C.J.; Mahoney, E.N.

    1994-01-01

    The U.S. Air Force at Arnold Air Force Base (AAFB), in Coffee and Franklin Counties, Tennessee, is investigating ground-water contamination in selected areas of the base. This report documents the results of a comprehensive investigation of the regional hydrogeology of the AAFB area. Three aquifers within the Highland Rim aquifer system, the shallow aquifer, the Manchester aquifer, and the Fort Payne aquifer, have been identified in the study area. Of these, the Manchester aquifer is the primary source of water for domestic use. Drilling and water- quality data indicate that the Chattanooga Shale is an effective confining unit, isolating the Highland Rim aquifer system from the deeper, upper Central Basin aquifer system. A regional ground-water divide, approximately coinciding with the Duck River-Elk River drainage divide, underlies AAFB and runs from southwest to northeast. The general direction of most ground-water flow is to the north- west or to the northwest or to the southeast from the divide towards tributary streams that drain the area. Recharge estimates range from 4 to 11 inches per year. Digital computer modeling was used to simulate and provide a better understanding of the ground-water flow system. The model indicates that most of the ground-water flow occurs in the shallow and Manchester aquifers. The model was most sensitive to increases in hydraulic conductivity and changes in recharge rates. Particle-tracking analysis from selected sites of ground-water contamination indicates a potential for contami- nants to be transported beyond the boundary of AAFB.

  7. [Integrated assessment of eco-environmental vulnerability in Pearl River Delta based on RS and GIS].

    Science.gov (United States)

    Xu, Qing-Yong; Huang, Mei; Liu, Hong-Sheng; Yan, Hui-Min

    2011-11-01

    Based on the remote sensing data and with the help of geographic information system, an integrated assessment was conducted on the eco-environmental vulnerability of Pearl River Delta in 2004-2008. Spatial principal component analysis was used to generate the evaluation indicators, and analytic hierarchy process (AHP) was applied to determine the weights of the evaluation factors. The reasons causing the vulnerability of the eco- environment in Pearl River Delta were discussed. In the study area, its middle part was the most vulnerable region, occupying 34.0% of the total, eastern part was the moderately vulnerable region, accounting for 25.5%, and western part was the lightly and slightly vulnerable areas, accounting for 28.7 and 11.8%, respectively. Totally, the moderately and lightly vulnerable areas occupied 54.2%, indicating that a majority of the Delta was under moderate and light vulnerability. The natural factors affecting the eco-environmental vulnerability of the Delta were altitude, heavy rain days, water and soil erosion rate, flooded infield rate, normalized difference vegetation index (ND VI) and landscape diversity index, whereas the human factors were population density, waste discharge per unit area, exhaust emission per unit area, land use change, chemical fertilization intensity, pesticide application intensity, amount of motor vehicles possessed by ten thousands people, and index of environmental protection investment. The main characteristics of the extremely and heavily vulnerable regions were low altitude, high frequency of flood disaster, large flooded infield, serious vegetation degradation, high pollution level and low environment protection investment index.

  8. The Assessment of Comprehensive Vulnerability of Chemical Industrial Park Based on Entropy Method and Matter-element Extension Model

    Directory of Open Access Journals (Sweden)

    Yan Jingyi

    2016-01-01

    Full Text Available The paper focuses on studying connotative meaning, evaluation methods and models for chemical industry park based on in-depth analysis of relevant research results in China and abroad, it summarizes and states the feature of menacing vulnerability and structural vulnerability and submits detailed influence factors such as personnel vulnerability, infrastructural vulnerability, environmental vulnerability and the vulnerability of safety managerial defeat. Using vulnerability scoping diagram establishes 21 evaluation indexes and an index system for the vulnerability evaluation of chemical industrial park. The comprehensive weights are calculated with entropy method, combining matter-element extension model to make the quantitative evaluation, then apply to evaluate some chemical industrial park successfully. This method provides a new ideas and ways for enhancing overall safety of the chemical industrial park.

  9. A method proposal for cumulative environmental impact assessment based on the landscape vulnerability evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Pavlickova, Katarina; Vyskupova, Monika, E-mail: vyskupova@fns.uniba.sk

    2015-01-15

    Cumulative environmental impact assessment deals with the occasional use in practical application of environmental impact assessment process. The main reasons are the difficulty of cumulative impact identification caused by lack of data, inability to measure the intensity and spatial effect of all types of impacts and the uncertainty of their future evolution. This work presents a method proposal to predict cumulative impacts on the basis of landscape vulnerability evaluation. For this purpose, qualitative assessment of landscape ecological stability is conducted and major vulnerability indicators of environmental and socio-economic receptors are specified and valuated. Potential cumulative impacts and the overall impact significance are predicted quantitatively in modified Argonne multiple matrixes while considering the vulnerability of affected landscape receptors and the significance of impacts identified individually. The method was employed in the concrete environmental impact assessment process conducted in Slovakia. The results obtained in this case study reflect that this methodology is simple to apply, valid for all types of impacts and projects, inexpensive and not time-consuming. The objectivity of the partial methods used in this procedure is improved by quantitative landscape ecological stability evaluation, assignment of weights to vulnerability indicators based on the detailed characteristics of affected factors, and grading impact significance. - Highlights: • This paper suggests a method proposal for cumulative impact prediction. • The method includes landscape vulnerability evaluation. • The vulnerability of affected receptors is determined by their sensitivity. • This method can increase the objectivity of impact prediction in the EIA process.

  10. ESB-Based Sensor Web Integration for the Prediction of Electric Power Supply System Vulnerability

    Directory of Open Access Journals (Sweden)

    Milos Bogdanovic

    2013-08-01

    Full Text Available Electric power supply companies increasingly rely on enterprise IT systems to provide them with a comprehensive view of the state of the distribution network. Within a utility-wide network, enterprise IT systems collect data from various metering devices. Such data can be effectively used for the prediction of power supply network vulnerability. The purpose of this paper is to present the Enterprise Service Bus (ESB-based Sensor Web integration solution that we have developed with the purpose of enabling prediction of power supply network vulnerability, in terms of a prediction of defect probability for a particular network element. We will give an example of its usage and demonstrate our vulnerability prediction model on data collected from two different power supply companies. The proposed solution is an extension of the GinisSense Sensor Web-based architecture for collecting, processing, analyzing, decision making and alerting based on the data received from heterogeneous data sources. In this case, GinisSense has been upgraded to be capable of operating in an ESB environment and combine Sensor Web and GIS technologies to enable prediction of electric power supply system vulnerability. Aside from electrical values, the proposed solution gathers ambient values from additional sensors installed in the existing power supply network infrastructure. GinisSense aggregates gathered data according to an adapted Omnibus data fusion model and applies decision-making logic on the aggregated data. Detected vulnerabilities are visualized to end-users through means of a specialized Web GIS application.

  11. ESB-based Sensor Web integration for the prediction of electric power supply system vulnerability.

    Science.gov (United States)

    Stoimenov, Leonid; Bogdanovic, Milos; Bogdanovic-Dinic, Sanja

    2013-08-15

    Electric power supply companies increasingly rely on enterprise IT systems to provide them with a comprehensive view of the state of the distribution network. Within a utility-wide network, enterprise IT systems collect data from various metering devices. Such data can be effectively used for the prediction of power supply network vulnerability. The purpose of this paper is to present the Enterprise Service Bus (ESB)-based Sensor Web integration solution that we have developed with the purpose of enabling prediction of power supply network vulnerability, in terms of a prediction of defect probability for a particular network element. We will give an example of its usage and demonstrate our vulnerability prediction model on data collected from two different power supply companies. The proposed solution is an extension of the GinisSense Sensor Web-based architecture for collecting, processing, analyzing, decision making and alerting based on the data received from heterogeneous data sources. In this case, GinisSense has been upgraded to be capable of operating in an ESB environment and combine Sensor Web and GIS technologies to enable prediction of electric power supply system vulnerability. Aside from electrical values, the proposed solution gathers ambient values from additional sensors installed in the existing power supply network infrastructure. GinisSense aggregates gathered data according to an adapted Omnibus data fusion model and applies decision-making logic on the aggregated data. Detected vulnerabilities are visualized to end-users through means of a specialized Web GIS application.

  12. Hydrogeology and Water Quality of the Pepacton Reservoir Watershed in Southeastern New York. Part 3. Responses of Stream Base-Flow Chemistry to Hydrogeologic Factors and Nonpoint-Sources of Contamination

    Science.gov (United States)

    Heisig, Paul M.; Phillips, Patrick J.

    2004-01-01

    Base-flow samples were collected seasonally from 20 small streams in the 372-square-mile Pepacton Reservoir watershed to evaluate the effects of hydrogeologic factors and nonpoint sources of contamination on the chemical composition of ground-water discharge. The reservoir provides part of New York City?s water supply. The subbasins represented one of three general types of land use, each with at least 45 percent forested area (mostly on the hillsides): farmed (dairy) land, formerly farmed land with low-density residential development, or forested land with little or no development. The subbasin areas ranged from 0.38 to 10.23 square miles. All streams were sampled in December 2000 and in May, July, and October 2001. Three of the sites were designated as landuse- index sites and were sampled as many as five additional times during the study. No samples exceeded state or federal drinking-water standards for chloride, sodium, nitrate, orthophosphate, herbicides, or herbicide degradates. The chemical composition of base-flow samples was classified into major-ion water types, which were broadly defined as naturally occurring and road-salt-affected water types. About one-third of the base-flow samples were roadsalt- affected types. Natural water types were differentiated as dilute or evolved. Dilute waters have bicarbonate and sulfate as dominant anions and evolved waters have only bicarbonate as a dominant anion. Dilute water types indicate relatively short ground-water residence times or contact with unreactive aquifer material. Evolved waters have either longer ground-water residence time or contact with more reactive aquifer material than dilute ground waters. The larger subbasins with wider valley-bottom areas were more likely to have evolved water types than small subbasins with little floodplain development. Positive correlations between selected constituents and the intensity of nonpoint sources emphasize the connection between land use, shallow ground

  13. Connecting Vulnerable Children and Families to Community-Based Programs Strengthens Parents' Perceptions of Protective Factors

    Science.gov (United States)

    Hughes, Marcia; Joslyn, Allison; Wojton, Morella; O'Reilly, Mairead; Dworkin, Paul H.

    2016-01-01

    We employed principles from a nationally recognized prevention model on family support to investigate whether connecting vulnerable children to community-based programs and services through a statewide intervention system, the "Help Me Grow" program, strengthens parents' perceptions of protective factors. We used a parent survey modeled…

  14. Goat-based aid programme in Central Java: An effective intervention for the poor and vulnerable?

    NARCIS (Netherlands)

    Budisatria, I.G.S.; Udo, H.M.J.

    2013-01-01

    This study evaluated a goat-based aid programme developed to facilitate the recovery of vulnerable people in an earthquake affected area in Central Java, Indonesia. Farmers, organised in farmers’ groups, received a package of one male and four female goats. In total, 72 farmers from 6 farmers’ group

  15. A Real-Life Based Evaluation Method of Deployable Vulnerable Road User Protection Systems

    NARCIS (Netherlands)

    Fredriksson, R.; Dahlgren, M.; Schijndel-de Nooij, M. van; Hair-Buijssen, S.H.H.M. de; Montfort, S. van

    2014-01-01

    Objective: The aim of this study was to develop a real-life-based evaluation method, incorporating vulnerable road user (VRU) full-body loading to a vehicle with a deployable protection system in relevant test setups, and use this method to evaluate a prototype pedestrian and cyclist protection syst

  16. A landscape-based assessment of climate change vulnerability for all native Hawaiian plants

    Science.gov (United States)

    Fortini, Lucas; Price, Jonathan; Jacobi, James; Vorsino, Adam; Burgett, Jeff; Brinck, Kevin W.; Amidon, Fred; Miller, Steve; `Ohukani`ohi`a Gon, Sam; Koob, Gregory; Paxton, Eben

    2013-01-01

    In Hawaiʽi and elsewhere, research efforts have focused on two main approaches to determine the potential impacts of climate change on individual species: estimating species vulnerabilities and projecting responses of species to expected changes. We integrated these approaches by defining vulnerability as the inability of species to exhibit any of the responses necessary for persistence under climate change (i.e., tolerate projected changes, endure in microrefugia, or migrate to new climate-compatible areas, but excluding evolutionary adaptation). To operationalize this response-based definition of species vulnerability within a landscape-based analysis, we used current and future climate envelopes for each species to define zones across the landscape: the toleration zone; the microrefugia zone; and the migration zone. Using these response zones we calculated a diverse set of factors related to habitat area, quality, and distribution for each species, including the amount of habitat protection and fragmentation and areas projected to be lost to sea-level rise. We then calculated the probabilities of each species exhibiting these responses using a Bayesian network model and determined the overall climate change vulnerability of each species by using a vulnerability index. As a first iteration of a response-based species vulnerability assessment (VA), our landscape-based analysis effectively integrates species-distribution models into a Bayesian network-based VA that can be updated with improved models and data for more refined analyses in the future. Our results show that the species most vulnerable to climate change also tend to be species of conservation concern due to non-climatic threats (e.g., competition and predation from invasive species, land-use change). Also, many of Hawaiʽi’s taxa that are most vulnerable to climate change share characteristics with species that in the past were found to be at risk of extinction due to non-climatic threats (e

  17. Web based remote monitoring and controlling system for vulnerable environments

    Science.gov (United States)

    Thomas, Aparna; George, Minu

    2016-03-01

    The two major areas of concern in industrial establishments are monitoring and security. The remote monitoring and controlling can be established with the help of Web technology. Managers can monitor and control the equipment in the remote area through a web browser. The targeted area includes all type of susceptible environment like gas filling station, research and development laboratories. The environmental parameters like temperature, light intensity, gas etc. can be monitored. Security is a very important factor in an industrial setup. So motion detection feature is added to the system to ensure the security. The remote monitoring and controlling system makes use of the latest, less power consumptive and fast working microcontroller like S3C2440. This system is based on ARM9 and Linux operating system. The ARM9 will collect the sensor data and establish real time video monitoring along with motion detection feature. These captured video data as well as environmental data is transmitted over internet using embedded web server which is integrated within the ARM9 board.

  18. Teaching hydrogeology: a review of current practice

    Science.gov (United States)

    Gleeson, T.; Allen, D. M.; Ferguson, G.

    2012-07-01

    Hydrogeology is now taught in a broad spectrum of departments and institutions to students with diverse backgrounds. Successful instruction in hydrogeology thus requires a variety of pedagogical approaches depending on desired learning outcomes and the background of students. We review the pedagogical literature in hydrogeology to highlight recent advances and analyze a 2005 survey among 68 hydrogeology instructors. The literature and survey results suggest there are only ~ 15 topics that are considered crucial by most hydrogeologists and > 100 other topics that are considered crucial by some hydrogeologists. The crucial topics focus on properties of aquifers and fundamentals of groundwater flow, and should likely be part of all undergraduate hydrogeology courses. Other topics can supplement and support these crucial topics, depending on desired learning outcomes. Classroom settings continue to provide a venue for emphasizing fundamental knowledge. However, recent pedagogical advances are biased towards field and laboratory instruction with a goal of bolstering experiential learning. Field methods build on the fundamentals taught in the classroom and emphasize the collection of data, data uncertainty, and the development of vocational skills. Laboratory and computer-based exercises similarly build on theory, and offer an opportunity for data analysis and integration. The literature suggests curricula at all levels should ideally balance field, laboratory, and classroom pedagogy into an iterative and integrative whole. An integrated, iterative and balanced approach leads to greater student motivation and advancement of theoretical and vocational knowledge.

  19. Teaching hydrogeology: a review of current practice

    Directory of Open Access Journals (Sweden)

    T. Gleeson

    2012-07-01

    Full Text Available Hydrogeology is now taught in a broad spectrum of departments and institutions to students with diverse backgrounds. Successful instruction in hydrogeology thus requires a variety of pedagogical approaches depending on desired learning outcomes and the background of students. We review the pedagogical literature in hydrogeology to highlight recent advances and analyze a 2005 survey among 68 hydrogeology instructors. The literature and survey results suggest there are only ~ 15 topics that are considered crucial by most hydrogeologists and > 100 other topics that are considered crucial by some hydrogeologists. The crucial topics focus on properties of aquifers and fundamentals of groundwater flow, and should likely be part of all undergraduate hydrogeology courses. Other topics can supplement and support these crucial topics, depending on desired learning outcomes. Classroom settings continue to provide a venue for emphasizing fundamental knowledge. However, recent pedagogical advances are biased towards field and laboratory instruction with a goal of bolstering experiential learning. Field methods build on the fundamentals taught in the classroom and emphasize the collection of data, data uncertainty, and the development of vocational skills. Laboratory and computer-based exercises similarly build on theory, and offer an opportunity for data analysis and integration. The literature suggests curricula at all levels should ideally balance field, laboratory, and classroom pedagogy into an iterative and integrative whole. An integrated, iterative and balanced approach leads to greater student motivation and advancement of theoretical and vocational knowledge.

  20. HYDROGEOLOGY & ENGINEERING GEOLOGY

    Institute of Scientific and Technical Information of China (English)

    2004-01-01

    <正>(1) HYDROGEOLOGY20041696 Bian Jinyu (Department of Earth Sciences, Nanjing University, Nanjing, Jiangsu); Fang Rui Analysis of Controlling Factors of Ground water Quality in Yancheng Area, Jiangsu Province, China (Hydrogeolo gy & Engineering Geology, ISSN 1000 -3665, CN11-2202/P, 30(5), 2003, p. 56 - 60, 1 illus. , 4 tables, 5 refs. ) Key words: groundwater quality evaluation, Jiangsu Province

  1. Health Risk Assessment for Uranium in Groundwater - An Integrated Case Study Based on Hydrogeological Characterization and Dose Calculation

    Science.gov (United States)

    Franklin, M. R.; Veiga, L. H.; Py, D. A., Jr.; Fernandes, H. M.

    2010-12-01

    The uranium mining and milling facilities of Caetité (URA) is the only active uranium production center in Brazil. Operations take place at a very sensitive semi-arid region in the country where water resources are very scarce. Therefore, any contamination of the existing water bodies may trigger critical consequences to local communities because their sustainability is closely related to the availability of the groundwater resources. Due to the existence of several uranium anomalies in the region, groundwater can present radionuclide concentrations above the world average. The radiological risk associated to the ingestion of these waters have been questioned by members of the local communities, NGO’s and even regulatory bodies that suspected that the observed levels of radionuclide concentrations (specially Unat) could be related to the uranium mining and milling operations. Regardless the origin of these concentrations the fear that undesired health effects were taking place (e.g. increase in cancer incidence) remain despite the fact that no evidence - based on epidemiological studies - is available. This paper intends to present the connections between the local hydrogeology and the radiological characterization of groundwater in the neighboring areas of the uranium production center to understand the implications to the human health risk due to the ingestion of groundwater. The risk assessment was performed, taking into account the radiological and the toxicological risks. Samples from 12 wells have been collected and determinations of Unat, Thnat, 226Ra, 228Ra and 210Pb were performed. The radiation-related risks were estimated for adults and children by the calculation of the annual effective doses. The potential non-carcinogenic effects due to the ingestion of uranium were evaluated by the estimation of the hazard index (HI). Monte Carlo simulations were used to calculate the uncertainty associated with these estimates, i.e. the 95% confidence interval

  2. Vulnerability Assessment of Snow Disaster Based on Traffic System: A Case Study of Chenzhou City in Hunan Province, China

    Institute of Scientific and Technical Information of China (English)

    Xu Xiaoge; Wang Jingai

    2009-01-01

    The article establishes the patterns of urban snow di-saster system and disaster chain based on the theory of regional disaster system. The patterns indicate that urban snow disaster is exacerbated mainly through the traffic system. In addition, the paper sets up the vulnerability assessment index system and synthetically vulnerability assessment model of urban snow disaster which are mainly based on traffic system, and applies them in Chenzhou City. The results of assessment indicate that obvious geographical differences exist in the vulnerability of snow disaster bearing bodies: vulnerability of Chenzhou section of the Beijing-Zhuhai expressway is the highest in Chenzhou City, and the southeastern counties are more vulnerable than the northwest region. Furthermore, according to the snow disaster vulnerability dynamic process analysis, the vulnerability of Chenzhou City obviously increased in 2008 winter compared with that in 2007. Finally, the paper presents some suggestions for the locations of the emergency commands and the reserves of relief materials based on the evaluation results, and points out that disaster monitoring and relevant technical level should be strengthened for the minimization of traffic system's vulner-ability.

  3. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    Science.gov (United States)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  4. Studies on Some Nitramine based Low Vulnerability Ammunition Propellants with Cellulose Acetate as a Binder

    Directory of Open Access Journals (Sweden)

    A.G.A. Pillai

    1996-04-01

    Full Text Available Several formulations of propellants based on RDX as an energetic solid ingredients and cellulose acetate (CA as a binder were processed using either dioctyl pthalate(DOP or tracetin(TA as plastisizer and a small amount of nitrocellulose(NC. The Performance of these propellants was evaluated on the basis of closed vessel firing data. The vulnerability aspects of these formulations were compared with those of conventional picrite propellant, NQ on the basis of their ignition temperatures and sensitivity to friction and impact. Triacetin was found to be better plasticizer than DOP for CA binder. Some RDX/CA/TA/NC/-based propellants were found to have energy levels comparable with NQ propellant and had less sensitivity to heat, impact and friction, and therefore have the potential for being used as low-vulnerability ammunition propellants for gun applications.

  5. HYDROGEOLOGICAL AND HYDROCHEMICAL FEATURES OF KALNIK MASSIF

    Directory of Open Access Journals (Sweden)

    Vinko Mraz

    2008-12-01

    Full Text Available Kalničko gorje consists of Cretaceous – Holocene sediments, which can be in hydrogeological sense classified in three hydrogeological units: (1 northern area from central massive of Kalnik, consists of Cretaceous and low Miocene impermeable and low permeable sediments which are hydrogeological barrier and low permeable Cretaceous eruptive sediments ; (2 Kalnik massive consists of Paleogen and Baden permeable carbonate – clastic sediments, which are aquifer; (3 southern Kalnik area consists of Neogene low permeable sediments and Quaternary medium permeable unconsolidated deposits. In the hydrogelogical units are several aquifers types: (i Paleogen carbonate aquifer consists of limestone – dolomite breccia and this is the most important aquifer in the Kalnik area; (ii Baden carbonate aquifer consists of lithothamnium, lithothamnium limestone, sandstone and breccia-conglomerate and it has high permeability, especially through the karst morphological features; (iii Quaternary alluvial aquifers – the most important is in the valley of the Kamešnica river and it’s permeability varies from poor to good depending on granulometric properties; (iv Cretaceous eruptive aquifer from which in the Apatovac area is abstraction of mineral water. The aquifers of the Kalnik area are very vulnerable considering the hydrogeological properties of the area. Nevertheless, physical, physicalchemical, and chemical properties of groundwater in the Kalnik area are showing that waters are of very good quality. The reasons of good quality of waters are that the area is poorly populated and there is no potential pollutant. The area is very valuable and important natural resource for water supply of whole region. In the future it is necessary to provide good protection and sustainable water management to obtain today’s good quality and quantity of groundwater (the paper is published in Croatian.

  6. Studies on Some Nitramine based Low Vulnerability Ammunition Propellants with Cellulose Acetate as a Binder

    OpenAIRE

    A.G.A. Pillai; C. R. Dayanandan; B. R. Gandhe; J. S. Karir

    1996-01-01

    Several formulations of propellants based on RDX as an energetic solid ingredients and cellulose acetate (CA) as a binder were processed using either dioctyl pthalate(DOP) or tracetin(TA) as plastisizer and a small amount of nitrocellulose(NC). The Performance of these propellants was evaluated on the basis of closed vessel firing data. The vulnerability aspects of these formulations were compared with those of conventional picrite propellant, NQ on the basis of their ignition temperat...

  7. Estimation of groundwater vulnerability to pollution based on DRASTIC in the Niipele sub-basin of the Cuvelai Etosha Basin, Namibia

    Science.gov (United States)

    Hamutoko, J. T.; Wanke, H.; Voigt, H. J.

    2016-06-01

    Surface water is a scarce resource in Namibia with about sixty percent of Namibia's population dependent on groundwater for drinking purposes. With increasing population, the country faces water challenges and thus groundwater resources need to be managed properly. One important aspect of Integrated Water Resources Management is the protection of water resources, including protection of groundwater from contamination and over-exploitation. This study explores vulnerability mapping as a basic tool for protecting groundwater resources from pollution. It estimates groundwater vulnerability to pollution in the upper Niipele sub-basin of the Cuvelai-Etosha in Northern Namibia using the DRASTIC index. The DRASTIC index uses GIS to estimate groundwater vulnerability by overlaying different spatially referenced hydrogeological parameters that affect groundwater contamination. The study assesses the discontinuous perched aquifer (KDP) and the Ohangwena multi-layered aquifer 1 (KOH-1). For perched aquifers, point data was regionalized by a hydrotope approach whereas for KOH-1 aquifer, inverse distance weighting was used. The hydrotope approach categorized different parts of the hydrogeological system with similar properties into five hydrotopes. The result suggests that the discontinuous perched aquifers are more vulnerable than Ohangwena multi-layered aquifer 1. This implies that vulnerability increases with decreasing depth to water table because contaminants have short travel time to reach the aquifer when they are introduced on land surface. The nitrate concentration ranges between 2 and 288 mg/l in perched aquifers while in Ohangwena multi-layered aquifer 1, it ranges between 1 and 133 mg/l. It was observed that perched aquifers have high nitrate concentrations than Ohangwena 1 aquifer, which correlates well with the vulnerability results.

  8. Assessment of groundwater vulnerability and risk to pollution in Kathmandu Valley, Nepal.

    Science.gov (United States)

    Shrestha, Sangam; Semkuyu, Dickson John; Pandey, Vishnu P

    2016-06-15

    Groundwater vulnerability and risk assessment is a useful tool for groundwater pollution prevention and control. In this study, GIS based DRASTIC model have been used to assess intrinsic aquifer vulnerability to pollution whereas Groundwater Risk Assessment Model (GRAM) was used to assess the risk to groundwater pollution in the groundwater basin of Kathmandu Valley. Seven hydrogeological factors were used in DRASTIC model to produce DRASTIC Index (DI) map which represent intrinsic groundwater vulnerability to pollution of the area. The seven hydrogeological factors used were depth to water, net recharge, aquifer media, soil media, topography, impact of vadose zone, and hydraulic conductivity of aquifer. GIS based GRAM was used to produce likelihood of release of hazards, likelihood of detection of hazards, consequence of hazards and residual risk of groundwater contamination in terms of nitrate in the groundwater basin. It was found that more than 50% of the groundwater basin area in the valley is susceptible to groundwater pollution and these areas are mostly in Northern groundwater district Low and very low vulnerable areas account for only 13% and are located in Central and Southern groundwater districts. However after taking into account the barriers to groundwater pollution and likelihood of hazards release and detection, it was observed that most areas i.e. about 87% of the groundwater basin are at moderate residual risk to groundwater pollution. The resultant groundwater vulnerability and risk map provides a basis for policy makers and planner's ability to use information effectively for decision making at protecting the groundwater from pollutants.

  9. Delineating Groundwater Vulnerability and Protection Zone Mapping in Fractured Rock Masses: Focus on the DISCO Index

    Directory of Open Access Journals (Sweden)

    Helen Meerkhan

    2016-10-01

    Full Text Available Hard-rock catchments are considered to be source of valuable water resources for water supply to inhabitants and ecosystems. The present work aims to develop a groundwater vulnerability approach in the Caldas da Cavaca hydromineral system (Aguiar da Beira, Central Portugal in order to improve the hydrogeological conceptual site model. Different types of information were overlaid, generating several thematic maps to achieve an integrated framework of key sectors in the study site. Thus, a multi-technical approach was used, encompassing field and laboratory techniques, whereby different types of data were collected from fields such as geology, hydrogeology, applied geomorphology and geophysics and hydrogeomechanics, with the fundamental aim of applying the so-called DISCO index method. All of these techniques were successfully performed and an intrinsic groundwater vulnerability to contamination assessment, based on the multicriteria methodology of GOD-S, DRASTIC-Fm, SINTACS, SI and DISCO indexes, was delineated. Geographic Information Systems (GIS provided the basis on which to organize and integrate the databases and to produce all the thematic maps. This multi-technical approach highlights the importance of groundwater vulnerability to contamination mapping as a tool to support hydrogeological conceptualization, contributing to improving the decision-making process regarding water resources management and sustainability.

  10. HYDROGEOLOGY & ENGINEERING GEOLOGY

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    <正>(1) HYDROGEOLOGY 20072166 Chen Liqun(Institute of Geographical Sciences and Natural Resources Research,CAS,Beijing 100101,China);Liu Changming Impact of Climate on Runoff in the Source Regions of the Yellow River(Earth Science Frontiers,ISSN1005-2321,CN11-3370,13(5),2006,p.321-329,14 illus.,3 tables,10 refs.,with English abstract)

  11. The Structured Assessment Approach: A microcomputer-based insider-vulnerability analysis tool

    Energy Technology Data Exchange (ETDEWEB)

    Patenaude, C.J.; Sicherman, A.; Sacks, I.J.

    1986-01-01

    The Structured Assessment Approach (SAA) was developed to help assess the vulnerability of safeguards systems to insiders in a staged manner. For physical security systems, the SAA identifies possible diversion paths which are not safeguarded under various facility operating conditions and insiders who could defeat the system via direct access, collusion or indirect tampering. For material control and accounting systems, the SAA identifies those who could block the detection of a material loss or diversion via data falsification or equipment tampering. The SAA, originally designed to run on a mainframe computer, has been converted to run on a personal computer. Many features have been added to simplify and facilitate its use for conducting vulnerability analysis. The SAA microcomputer based approach is discussed in this paper.

  12. Household-based cash transfer targeting strategies in Zimbabwe: are we reaching the most vulnerable children?

    Science.gov (United States)

    Robertson, Laura; Mushati, Phyllis; Eaton, Jeffrey W; Sherr, Lorraine; Makoni, Jeremiah C; Skovdal, Morten; Crea, Tom; Mavise, Gideon; Dumba, Lovemore; Schumacher, Christina; Munyati, Shungu; Nyamukapa, Constance; Gregson, Simon

    2012-12-01

    Census data, collected in July 2009, from 27,672 children were used to compare the effectiveness, coverage and efficacy of three household-based methods for targeting cash transfers to vulnerable children in eastern Zimbabwe: targeting the poorest households using a wealth index; targeting HIV-affected households using socio-demographic information (households caring for orphans, chronically-ill or disabled members; child-headed households); and targeting labour-constrained households using dependency ratios. All three methods failed to identify large numbers of children with poor social and educational outcomes. The wealth index approach was the most efficient at reaching children with poor outcomes whilst socio-demographic targeting reached more vulnerable children but was less efficient.

  13. The drought risk of maize in the farming-pastoral ecotone in Northern China based on physical vulnerability assessment

    Science.gov (United States)

    Wang, Zhiqiang; Jiang, Jingyi; Ma, Qing

    2016-12-01

    Climate change is affecting every aspect of human activities, especially the agriculture. In China, extreme drought events caused by climate change have posed a great threat to food safety. In this work we aimed to study the drought risk of maize in the farming-pastoral ecotone in Northern China based on physical vulnerability assessment. The physical vulnerability curve was constructed from the relationship between drought hazard intensity index and yield loss rate. The risk assessment of agricultural drought was conducted from the drought hazard intensity index and physical vulnerability curve. The probability distribution of drought hazard intensity index decreased from south-west to north-east and increased from south-east to north-west along the rainfall isoline. The physical vulnerability curve had a reduction effect in three parts of the farming-pastoral ecotone in Northern China, which helped to reduce drought hazard vulnerability on spring maize. The risk of yield loss ratio calculated based on physical vulnerability curve was lower compared with the drought hazard intensity index, which suggested that the capacity of spring maize to resist and adapt to drought is increasing. In conclusion, the farming-pastoral ecotone in Northern China is greatly sensitive to climate change and has a high probability of severe drought hazard. Risk assessment of physical vulnerability can help better understand the physical vulnerability to agricultural drought and can also promote measurements to adapt to climate change.

  14. Tsunami damages assessment: vulnerability functions on buildings based on field and earth observation survey.

    Science.gov (United States)

    Gauraz, A. L.; Valencia, N.; Koscielny, M.; Guillande, R.; Gardi, A.; Leone, F.; Salaun, T.

    2009-04-01

    The assessment of damages caused by tsunami scenarios on coastal buildings requires using vulnerability matrixes or functions to carry out a relation between the magnitude of the phenomena and the damage expected. These functions represent the probability for a building belonging to a class of vulnerability to suffer from a mean damage level. The physical vulnerability of buildings depends on two parameters: the solicitation level applied by the tsunami on buildings and their resistance capacity. According to the authors after post-tsunami observations (Reese et al. 2007; Ruangrassamee et al. 2006; Leone et al. 2006; Peiris 2006), the level of damage is clearly linked to the water elevation of the inundated areas and the type of observed buildings. Very few works propose relations based on velocity or hydrodynamic pressure of the waves. An approach developed for the estimation of the building vulnerability consists in deriving empirical damage functions starting from field observations. As part of the SCHEMA European Project on the vulnerability assessment for tsunami hazards in the Atlantic and Mediterranean area, vulnerability functions have been elaborated for different classes of buildings in order to produce vulnerability maps for exposed areas with emphasis on extraction of building characteristics using remote sensing data. The damage detection has been carried out by field data collected after the 24 December 2006 tsunami event on the southwest area of Banda Aceh (Sumatra, Thailand) completed by photo-interpretation of satellite images to get representative functions with large population of samples. The building classes consist in several categories depending mainly on the type of construction material (timber/bamboo, traditional brick, reinforced concrete …), the type of structure (beam, pillars, etc) and the number of storeys. The level of damage has been also classified in five categories, from D0 (no damage) to D5 (total destruction). Vulnerability

  15. Remote Sensing Based Vulnerability Assessment of Desertification in Mongolia and Myanmar

    Science.gov (United States)

    Lim, C. H.; Lee, E. J.; Song, C.; Lee, W. K.; Jeon, S. W.

    2015-12-01

    Desertification is one of the global threatening problems in respect of society, economy, and environment, and the assessment of desertification is essential for land planning and management. However desertification is a process that encompasses various factors in various aspects, having difficulties to assess qualitatively. The main purpose of the research is to qualitatively assess sensitivity of land to desertification, and detect the most vulnerable land to desertification in Mongolia and Myanmar using the Mediterranean Desertification and Land Use (MEDALUS) approach. MEDALUS approach aims to provide a manual on key indicators of desertification and mapping environmentally sensitive areas to desertification in the Mediterranean countries. However in this research, MEDALUS approach is implemented and reviewed on the countries located in the Middle Asia; Mongolia and Myanmar. MEDALUS approach identifies regions with the highest risk of desertification with 4 quality index; climate, soil, vegetation, management. Within the four quality index are several regional scale indicators for Mongolia and Myanmar, which gives effect with increasing or decreasing risk of desertification. MODIS satellite images, Digital Elevation Model (DEM), and climatic and geographical data were used to calculate the indicators. The weighting of each indicator ranged from 1 to 2; the higher weight the more vulnerable to desertification. The weighted indicators were allocated to 4 quality index, and the four quality index was summed to calculate Environmentally Sensitive Area Index (ESAI) representing the vulnerability of land degradation to desertification. As a result, the Middle East region of Mongolia showed the highest sensitivity, thus the most vulnerable to desertification. Based on the result of this study, it is useful to identify the current state of affairs and the necessity of land planning in Mongolia and Myanmar, one tool that can be utilized for combating desertification. The

  16. Vulnerability analysis for airport networks based on fuzzy soft sets: From the structural and functional perspective

    Directory of Open Access Journals (Sweden)

    Li Shanmei

    2015-06-01

    Full Text Available Recently, much attention has been paid to the reliability and vulnerability of critical infrastructure. In air traffic systems, the vulnerability analysis for airport networks can be used to guide air traffic administrations in their prioritization of the maintenance and repair of airports, as well as to avoid unnecessary disturbances in the planning of flight schedules. In this paper, the evaluation methods of airport importance and network efficiency are established. Firstly, the evaluation indices of airport importance are proposed from both the topological and functional perspectives. The topological characteristics come from the structure of airport network and the functional features stem from the traffic flow distribution taking place inside the network. Secondly, an integrated evaluation method based on fuzzy soft set theory is proposed to identify the key airports, which can fuse together importance indices over different time intervals. Thirdly, an airport network efficiency method is established for the purpose of assessing the accuracy of the evaluation method. Finally, empirical studies using real traffic data of US and China’s airport networks show that the evaluation method proposed in this paper is the most accurate. The vulnerability of US and China’s airport networks is compared. The similarities and differences between airport geography distribution and airport importance distribution are discussed here and the dynamics of airport importance is studied as well.

  17. Bedrock hydrogeology Forsmark. Site descriptive modelling, SDM-Site Forsmark

    Energy Technology Data Exchange (ETDEWEB)

    Follin, Sven (SF GeoLogic AB, Taeby (Sweden))

    2008-12-15

    The Swedish Nuclear Fuel and Waste Management Company (SKB) has conducted site investigations at two different locations, the Forsmark and Laxemar-Simpevarp areas, with the objective of siting a final repository for spent nuclear fuel according to the KBS-3 concept. Site characterisation should provide all data required for an integrated evaluation of the suitability of the investigated site and an important component in the characterisation work is the development of a hydrogeological model. The hydrogeological model is used by repository engineering to design the underground facility and to develop a repository layout adapted to the site. It also provides input to the safety assessment. Another important use of the hydrogeological model is in the environmental impact assessment. This report presents the understanding of the hydrogeological conditions of the bedrock at Forsmark reached following the completion of the surface-based investigations and provides a summary of the bedrock hydrogeological model and the underlying data supporting its development. It constitutes the main reference on bedrock hydrogeology for the site descriptive model concluding the surface-based investigations at Forsmark, SDM-site, and is intended to describe the hydraulic properties and hydrogeological conditions of the bedrock at the site and to give the information essential for demonstrating understanding

  18. Tsunami population-vulnerability index based on pedestrian-evacuation modeling

    Science.gov (United States)

    Wood, N. J.; Schmidtlein, M.

    2011-12-01

    To understand the potential for tsunami-related losses in coastal communities, one must understand population dynamics relative to predicted tsunami threats. Past assessments of population vulnerability to tsunamis have been simple inventories of the number of various populations in tsunami-hazard zones. Potential life loss has been based solely on the presence of individuals in a tsunami-hazard zone with no regard to the distance to high ground or the likelihood of evacuation before tsunami-wave arrival. However, by ignoring distance and travel time to safety, communities with high numbers of populations in the tsunami zone but short distances to safety would rank higher in societal vulnerability than communities with smaller numbers in the zone but longer distances to safety. Although this approach provides an estimate of population exposure, it lacks insight into other important elements of societal vulnerability, including the sensitivity and adaptive capacity of at-risk populations. To provide a more-complete picture of population vulnerability to tsunamis, we have developed a least-cost-distance analytical approach using geographic-information-system (GIS) tools that incorporates pedestrian-evacuation potential into traditional exposure assessments. The time needed to reach high ground from various locations in tsunami-hazard zones is calculated using an anisotropic approach that uses path-distance algorithms and accounts for variations in land cover and directionality in slope. Travel-time maps are integrated with population grids to determine the distribution of at-risk individuals (including residents, employees, public venues, and dependent-care facilities) at various travel times to safety within a tsunami-hazard zone. Communities are then ranked based on exposure indices that are weighted by pedestrian travel times. We demonstrate this new approach by focusing on the southwest coast of the State of Washington (USA), specifically Pacific and Grays Harbor

  19. Software Vulnerability Taxonomy Consolidation

    Energy Technology Data Exchange (ETDEWEB)

    Polepeddi, Sriram S. [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2004-12-07

    In today's environment, computers and networks are increasing exposed to a number of software vulnerabilities. Information about these vulnerabilities is collected and disseminated via various large publicly available databases such as BugTraq, OSVDB and ICAT. Each of these databases, individually, do not cover all aspects of a vulnerability and lack a standard format among them, making it difficult for end-users to easily compare various vulnerabilities. A central database of vulnerabilities has not been available until today for a number of reasons, such as the non-uniform methods by which current vulnerability database providers receive information, disagreement over which features of a particular vulnerability are important and how best to present them, and the non-utility of the information presented in many databases. The goal of this software vulnerability taxonomy consolidation project is to address the need for a universally accepted vulnerability taxonomy that classifies vulnerabilities in an unambiguous manner. A consolidated vulnerability database (CVDB) was implemented that coalesces and organizes vulnerability data from disparate data sources. Based on the work done in this paper, there is strong evidence that a consolidated taxonomy encompassing and organizing all relevant data can be achieved. However, three primary obstacles remain: lack of referencing a common ''primary key'', un-structured and free-form descriptions of necessary vulnerability data, and lack of data on all aspects of a vulnerability. This work has only considered data that can be unambiguously extracted from various data sources by straightforward parsers. It is felt that even with the use of more advanced, information mining tools, which can wade through the sea of unstructured vulnerability data, this current integration methodology would still provide repeatable, unambiguous, and exhaustive results. Though the goal of coalescing all available data

  20. A New Method for Reclamation Planning in Coastal Areas Based on Vulnerability Assessment to Typhoon Storm Surge Inundation

    Science.gov (United States)

    Dong, S.

    2015-12-01

    Rapid urban expansion in mega-cities (cities with populations over 10 million) leads to increased land demand and vulnerability to hazards as often significant numbers of people are economically and social disadvantaged. An effective way to create new flat land for further development is land reclamation and this has reached 511.71 km2 in the period of 1990 - 2009 along the Shanghai coast. This, in turn, leads to a potential increase in the vulnerability of the new coastal area to natural hazards. This is typically represented by typhoon storms that have the potential to be the most destructive natural hazard and therefore pose a significant threat to both infrastructure and livelihood in Shanghai. Due to insufficient knowledge of vulnerability of land use to typhoon storms and current planning, the reclaimed land is becoming one of the most vulnerable parts of the coastal low-land. While it is tempting to claim there is an increasing vulnerability to typhoon-inundation in Shanghai, this must be weighed against the socio-political response, where it is likely that city authorities will undertake rational land use planning to protect the reclamation from the inundation, sea level rise, and ground subsidence. Therefore, this research present a new method for reclamation planning based on vulnerability assessment to typhoon- inundation. First, MIKE21 was used to simulate the inundation scenario of two typhoon events in 1997 and 2007 respectively. Then, the vulnerability of 7 land use types with a set of hazard-proxies to these two typhoon inundations was assessed and verified by a new stage-damage curve system. Based on the above vulnerability assessment, this research will provide a planning tool for reclamation along Shanghai coastal area. This work is part of a larger study on the response of vulnerability to land use and land cover change.

  1. Social Adversity in Adolescence Increases the Physiological Vulnerability to Job Strain in Adulthood : A Prospective Population-Based Study

    OpenAIRE

    Hugo Westerlund; Gustafsson, Per E.; Töres Theorell; Urban Janlert; Anne Hammarström

    2012-01-01

    Background: It has been argued that the association between job strain and health could be confounded by early life exposures, and studies have shown early adversity to increase individual vulnerability to later stress. We therefore investigated if early life exposure to adversity increases the individual's physiological vulnerability job strain in adulthood. Methodology/Principal Findings: In a population-based cohort (343 women and 330 men, 83% of the eligible participants), we examined the...

  2. Community-based organisations for vulnerable children in South Africa: Reach, psychosocial correlates, and potential mechanisms.

    Science.gov (United States)

    Yakubovich, A R; Sherr, L; Cluver, L D; Skeen, S; Hensels, I S; Macedo, A; Tomlinson, M

    2016-03-01

    Community-based organisations (CBOs) have the potential to provide high quality services for orphaned and vulnerable children in resource-limited settings. However, evidence is lacking as to whether CBOs are reaching those who are most vulnerable, whether attending these organisations is associated with greater psychosocial wellbeing, and how they might work. This study addressed these three questions using cross-sectional data from 1848 South African children aged 9-13. Data were obtained from the Young Carers and Child Community Care studies, which both investigated child wellbeing in South Africa using standardised self-report measures. Children from the Child Community Care study were all CBO attenders, whereas children from Young Carers were not receiving any CBO services, thereby serving as a comparison group. Multivariable regression analyses were used to test whether children attending CBOs were more deprived on socio-demographic variables (e.g., housing), and whether CBO attendance was in turn associated with better psychosocial outcomes (e.g., child depression). Mediation analysis was conducted to test whether more positive home environments mediated the association between CBO attendance and significantly higher psychological wellbeing. Overall, children attending CBOs did show greater vulnerability on most socio-demographic variables. For example, compared to children not attending any CBO, CBO-attending children tended to live in more crowded households (OR 1.22) and have been exposed to more community violence (OR 2.06). Despite their heightened vulnerability, however, children attending CBOs tended to perform better on psychosocial measures: for instance, showing fewer depressive symptoms (B=-0.33) and lower odds of experiencing physical (OR 0.07) or emotional abuse (OR 0.22). Indirect effects of CBO attendance on significantly higher child psychological wellbeing (lower depressive symptoms) was observed via lower rates of child abuse (B=-0.07) and

  3. Potential of the Reliability-Resilience-Vulnerability (RRV) Based Drought Management Index (DMI)

    Science.gov (United States)

    Maity, R.; Chanda, K.; D, N. K.; Sharma, A.; Mehrotra, R.

    2014-12-01

    This paper highlights the findings from a couple of recent investigations aimed at characterizing and predicting the long-term drought propensity at a region for effective water management. A probabilistic index, named as Drought Management Index (DMI), was proposed for assessing the drought propensity on a multi-year scale at the chosen study area. The novelty of this index lay in the fact that it employed the Reliability-Resilience-Vulnerability (RRV) rationale, commonly used in water resources systems analysis, with the assumption that depletion of soil moisture across a vertical soil column is analogous to the operation of a water supply reservoir. This was the very first attempt to incorporate into a drought index the resilience of soil moisture series, which denotes the readiness of soil moisture to bounce back from drought to normal state. Further, the predictability of DMI was explored to assess the future drought propensity, which is essential for adopting suitable drought management policies at any location. For computing DMI, the intermediate measures i.e., RRV were obtained using the Permanent Wilting Point (PWP) as the threshold, indicative of transition into water stress. The joint distribution of resilience and vulnerability of soil moisture series was subsequently determined using Plackett copula. The DMI was designed such that it increases with increase in vulnerability as well as with decrease in resilience and vice versa. Thus, it was expressed as the joint probability of exceedence of resilience and non-exceedence of vulnerability of a soil moisture series. An assessment of the sensitivity of the DMI to the length of the data segments indicated that a 5-year temporal scale is optimum to obtain stable estimates of DMI. The ability of the DMI to reflect the spatio-temporal variation of drought propensity was illustrated using India as a test bed. Based on the observed behaviour of DMI series across India, on a climatological time scale, a DMI

  4. Geomatics Based Landslide Vulnerability Zonation Mapping - Parts Of Nilgiri District, Tamil Nadu, India.

    Directory of Open Access Journals (Sweden)

    T. Subramani

    2014-12-01

    Full Text Available Landslide includes a wide range of ground movements, such as rock falls, deep failure of slope, and shallow debris flows. Although gravity acting on an over steepened slope is the primary reason for a landslide. The Nilgiri Hills (Mountains of Tamil Nadu, India are prone to landslides, which often result in considerable damage to private property, public infrastructure, and loss of life. The mapping of LVZ includes, the preparation of various thematic layers from different data sources, such as Survey of India topographic sheets, Satellite data, Geological Survey of India maps etc. These landslides are typically the result of the structural failure of thick laterite soils that have been saturated by heavy rains during the monsoon season. . GIS have proved to be useful tools for analyzing and managing landslide related data. GIS has been widely used in quantitative estimation landslide susceptibility. The methodology adopted for the identification of landslide vulnerable zones, and suggestion of remedial measures based on the vulnerability of landslides on different terrain parameters per unit area. Through this study, it is evinced again that the geomatics technology is a proven tool for landslide studies in order to properly understand, identify and suggest remedial measures.

  5. Identifying the world's most climate change vulnerable species: a systematic trait-based assessment of all birds, amphibians and corals.

    Directory of Open Access Journals (Sweden)

    Wendy B Foden

    Full Text Available Climate change will have far-reaching impacts on biodiversity, including increasing extinction rates. Current approaches to quantifying such impacts focus on measuring exposure to climatic change and largely ignore the biological differences between species that may significantly increase or reduce their vulnerability. To address this, we present a framework for assessing three dimensions of climate change vulnerability, namely sensitivity, exposure and adaptive capacity; this draws on species' biological traits and their modeled exposure to projected climatic changes. In the largest such assessment to date, we applied this approach to each of the world's birds, amphibians and corals (16,857 species. The resulting assessments identify the species with greatest relative vulnerability to climate change and the geographic areas in which they are concentrated, including the Amazon basin for amphibians and birds, and the central Indo-west Pacific (Coral Triangle for corals. We found that high concentration areas for species with traits conferring highest sensitivity and lowest adaptive capacity differ from those of highly exposed species, and we identify areas where exposure-based assessments alone may over or under-estimate climate change impacts. We found that 608-851 bird (6-9%, 670-933 amphibian (11-15%, and 47-73 coral species (6-9% are both highly climate change vulnerable and already threatened with extinction on the IUCN Red List. The remaining highly climate change vulnerable species represent new priorities for conservation. Fewer species are highly climate change vulnerable under lower IPCC SRES emissions scenarios, indicating that reducing greenhouse emissions will reduce climate change driven extinctions. Our study answers the growing call for a more biologically and ecologically inclusive approach to assessing climate change vulnerability. By facilitating independent assessment of the three dimensions of climate change vulnerability

  6. Identifying the world's most climate change vulnerable species: a systematic trait-based assessment of all birds, amphibians and corals.

    Science.gov (United States)

    Foden, Wendy B; Butchart, Stuart H M; Stuart, Simon N; Vié, Jean-Christophe; Akçakaya, H Resit; Angulo, Ariadne; DeVantier, Lyndon M; Gutsche, Alexander; Turak, Emre; Cao, Long; Donner, Simon D; Katariya, Vineet; Bernard, Rodolphe; Holland, Robert A; Hughes, Adrian F; O'Hanlon, Susannah E; Garnett, Stephen T; Sekercioğlu, Cagan H; Mace, Georgina M

    2013-01-01

    Climate change will have far-reaching impacts on biodiversity, including increasing extinction rates. Current approaches to quantifying such impacts focus on measuring exposure to climatic change and largely ignore the biological differences between species that may significantly increase or reduce their vulnerability. To address this, we present a framework for assessing three dimensions of climate change vulnerability, namely sensitivity, exposure and adaptive capacity; this draws on species' biological traits and their modeled exposure to projected climatic changes. In the largest such assessment to date, we applied this approach to each of the world's birds, amphibians and corals (16,857 species). The resulting assessments identify the species with greatest relative vulnerability to climate change and the geographic areas in which they are concentrated, including the Amazon basin for amphibians and birds, and the central Indo-west Pacific (Coral Triangle) for corals. We found that high concentration areas for species with traits conferring highest sensitivity and lowest adaptive capacity differ from those of highly exposed species, and we identify areas where exposure-based assessments alone may over or under-estimate climate change impacts. We found that 608-851 bird (6-9%), 670-933 amphibian (11-15%), and 47-73 coral species (6-9%) are both highly climate change vulnerable and already threatened with extinction on the IUCN Red List. The remaining highly climate change vulnerable species represent new priorities for conservation. Fewer species are highly climate change vulnerable under lower IPCC SRES emissions scenarios, indicating that reducing greenhouse emissions will reduce climate change driven extinctions. Our study answers the growing call for a more biologically and ecologically inclusive approach to assessing climate change vulnerability. By facilitating independent assessment of the three dimensions of climate change vulnerability, our approach can

  7. Hydrogeologic Case Studies (Seattle, WA)

    Science.gov (United States)

    Hydrogeology is the foundation of subsurface site characterization for evaluations of monitored natural attenuation (MNA). Three case studies are presented. Examples of the potentially detrimental effects of drilling additives on ground-water samples from monitoring wells are d...

  8. Integrating indicator-based geostatistical estimation and aquifer vulnerability of nitrate-N for establishing groundwater protection zones

    Science.gov (United States)

    Jang, Cheng-Shin; Chen, Shih-Kai

    2015-04-01

    Groundwater nitrate-N contamination occurs frequently in agricultural regions, primarily resulting from surface agricultural activities. The focus of this study is to establish groundwater protection zones based on indicator-based geostatistical estimation and aquifer vulnerability of nitrate-N in the Choushui River alluvial fan in Taiwan. The groundwater protection zones are determined by univariate indicator kriging (IK) estimation, aquifer vulnerability assessment using logistic regression (LR), and integration of the IK estimation and aquifer vulnerability using simple IK with local prior means (sIKlpm). First, according to the statistical significance of source, transport, and attenuation factors dominating the occurrence of nitrate-N pollution, a LR model was adopted to evaluate aquifer vulnerability and to characterize occurrence probability of nitrate-N exceeding 0.5 mg/L. Moreover, the probabilities estimated using LR were regarded as local prior means. IK was then used to estimate the actual extent of nitrate-N pollution. The integration of the IK estimation and aquifer vulnerability was obtained using sIKlpm. Finally, groundwater protection zones were probabilistically determined using the three aforementioned methods, and the estimated accuracy of the delineated groundwater protection zones was gauged using a cross-validation procedure based on observed nitrate-N data. The results reveal that the integration of the IK estimation and aquifer vulnerability using sIKlpm is more robust than univariate IK estimation and aquifer vulnerability assessment using LR for establishing groundwater protection zones. Rigorous management practices for fertilizer use should be implemented in orchards situated in the determined groundwater protection zones.

  9. Bedrock Hydrogeology - Groundwater flow modelling. Site investigation SFR

    Energy Technology Data Exchange (ETDEWEB)

    Oehman, Johan [Geosigma AB, Uppsala (Sweden); Follin, Sven [SF GeoLogic AB, Taeby (Sweden); Oden, Magnus [SKB, Stockholm (Sweden)

    2013-05-15

    The hydrogeological model developed for the SFR extension project (PSU) consists of 40 geologically modelled deformation zones (DZ) and 8 sub-horizontal structural-hydraulic features, called SBAstructures, not defined in the geological model. However, some of the SBA-structures coincide with what is defined as unresolved possible deformation zones (Unresolved PDZ) in the geological modelling. In addition, the hydrogeological model consists of a stochastic discrete fracture network (DFN) model intended for the less fractured rock mass volumes (fracture domains) between the zones and the SBA-structures, and a stochastic fracture model intended to handle remaining Unresolved PDZs in the geological modelling not modelled as SBA-structures in the hydrogeological modelling. The four structural components of the bedrock in the hydrogeological model, i.e. DZ, SBA, Unresolved PDZ and DFN, are assigned hydraulic properties in the hydrogeological model based on the transmissivities interpreted from single-hole hydraulic tests. The main objective of the present work is to present the characteristics of the hydrogeological model with regard to the needs of the forthcoming safety assessment SR-PSU. In concrete words, simulated data are compared with measured data, i.e. hydraulic heads in boreholes and tunnel inflow to the existing repository (SFR). The calculations suggest that the available data for flow model calibration cannot be used to motivate a substantial adjustment of the initial hydraulic parameterisation (assignment of hydraulic properties) of the hydrogeological model. It is suggested that uncertainties in the hydrogeological model are studied in the safety assessment SR-PSU by means of a large number of calculation cases. These should address hydraulic heterogeneity of deterministic structures (DZ and SBA) and realisations of stochastic fractures/fracture networks (Unresolved PDZ and DFN) within the entire SFR Regional model domain.

  10. DRASTIC-based vulnerability evaluation for groundwater environment in Kunming City

    Institute of Scientific and Technical Information of China (English)

    Changming WANG; Jianping CHEN; Pulin LI; Hao ZHANG; Lijian YANG

    2006-01-01

    Groundwater pollution has serious influences on programming and development for a city. So it has a special importance to assess reasonably the vulnerability to pollution for urban groundwater. DRASTIC is an effective method for groundwater vulnerability assessment, which has been adapted in USA and Europe countries. In this paper, DRASTIC method is applied in vulnerability assessment of shallow groundwater environment in Kunming. A total of 1 339 units are divided in this area and the grade of each unit for seven indexes is determined. Then vulnerability zones are divided in the area by DRASTIC value, which has an important meaning to city programming.

  11. How Nature-Based Tourism Might Increase Prey Vulnerability to Predators.

    Science.gov (United States)

    Geffroy, Benjamin; Samia, Diogo S M; Bessa, Eduardo; Blumstein, Daniel T

    2015-12-01

    Tourism can be deleterious for wildlife because it triggers behavioral changes in individuals with cascading effects on populations and communities. Among these behavioral changes, animals around humans often reduce their fearfulness and antipredator responses towards humans. A straightforward prediction is that habituation to humans associated with tourism would negatively influence reaction to predators. This could happen indirectly, where human presence decreases the number of natural predators and thus prey become less wary, or directly, where human-habituated individuals become bolder and thus more vulnerable to predation. Building on ideas from the study of traits associated with domestication and urbanization, we develop a framework to understand how behavioral changes associated with nature-based tourism can impact individual fitness, and thus the demographic trajectory of a population.

  12. Social media and gamification: Engaging vulnerable parents in an online evidence-based parenting program.

    Science.gov (United States)

    Love, Susan M; Sanders, Matthew R; Turner, Karen M T; Maurange, Marianne; Knott, Theresa; Prinz, Ronald; Metzler, Carol; Ainsworth, Andrew T

    2016-03-01

    The aim of this study was to examine the feasibility (accessibility, engagement and impact) of adding social media and gaming features (e.g., social sharing with anonymity, badges to incentivize skills practice, an accredited facilitator for support) and access via smartphones to an evidenced-based parenting program, Triple P Online. The highly vulnerable population included 155 disadvantaged, high-risk parents (e.g., 76% had a family annual income of less than $15,000; 41% had been incarcerated; 38% were in drug/alcohol treatment; and 24% had had a child removed due to maltreatment). The ethnic groups most commonly identified were African American (24%) and Hispanic (66%). Respondents were primarily mothers (86%) from five community programs in Los Angeles. The study used a single group repeated measures design (pre, post, 6-month follow-up). Data collected included standardized self-report measures, post-intervention focus groups and interviews, website usage reports, and Google Analytics. Significant multivariate ANOVA time effects were found, demonstrating reductions in child behavioral problems, reduced lax/permissive and over-reactive parenting, and decreased parental stress. No effects were found for parental confidence, attributions, or depression and anxiety (which were in the normal range at baseline). Positive effects were maintained or improved at 6-month follow-up. The participants engaged in the online community and valued its flexibility, anonymity, and shared learning. This foundational implementation trial provides support for future rigorous evaluation of social media and gaming features as a medium for increasing parental engagement in evidence-based parenting programs online--a public health approach to protect and improve the development of vulnerable children.

  13. Hydrogeology, DRASTIC for the Surficial Aquifer. DRASTIC coverage for the Surficial Aquifer System. Drastic maps are most useful as a generalized tool to assess regional potential aquifer vulnerability., Published in 1990, 1:24000 (1in=2000ft) scale, Florida Department of Environmental Protection.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This Hydrogeology dataset, published at 1:24000 (1in=2000ft) scale, was produced all or in part from Other information as of 1990. It is described as 'DRASTIC for...

  14. Easier surveillance of climate-related health vulnerabilities through a Web-based spatial OLAP application

    Directory of Open Access Journals (Sweden)

    Gosselin Pierre

    2009-04-01

    Full Text Available Abstract Background Climate change has a significant impact on population health. Population vulnerabilities depend on several determinants of different types, including biological, psychological, environmental, social and economic ones. Surveillance of climate-related health vulnerabilities must take into account these different factors, their interdependence, as well as their inherent spatial and temporal aspects on several scales, for informed analyses. Currently used technology includes commercial off-the-shelf Geographic Information Systems (GIS and Database Management Systems with spatial extensions. It has been widely recognized that such OLTP (On-Line Transaction Processing systems were not designed to support complex, multi-temporal and multi-scale analysis as required above. On-Line Analytical Processing (OLAP is central to the field known as BI (Business Intelligence, a key field for such decision-support systems. In the last few years, we have seen a few projects that combine OLAP and GIS to improve spatio-temporal analysis and geographic knowledge discovery. This has given rise to SOLAP (Spatial OLAP and a new research area. This paper presents how SOLAP and climate-related health vulnerability data were investigated and combined to facilitate surveillance. Results Based on recent spatial decision-support technologies, this paper presents a spatio-temporal web-based application that goes beyond GIS applications with regard to speed, ease of use, and interactive analysis capabilities. It supports the multi-scale exploration and analysis of integrated socio-economic, health and environmental geospatial data over several periods. This project was meant to validate the potential of recent technologies to contribute to a better understanding of the interactions between public health and climate change, and to facilitate future decision-making by public health agencies and municipalities in Canada and elsewhere. The project also aimed at

  15. Vulnerability before, during, and after a major depressive episode - A 3-wave population-based study

    NARCIS (Netherlands)

    Ormel, J; Oldehinkel, AJ; Vollebergh, W

    2004-01-01

    Background: Vulnerability as defined by high levels of neuroticism, low self-esteem, and poor coping skills characterizes individuals with a history of major depressive episodes (MDEs). Objective: To separate postmorbid vulnerability into (1) trait effects (ie, the continuation of premorbid vulnerab

  16. Vulnerability and resilience of competing land-based livelihoods in south eastern Zimbabwe

    NARCIS (Netherlands)

    Murungweni, C.

    2011-01-01

    Key words: vulnerability; resilience; livelihood; drought; Great Limpopo Transfrontier Conservation Area; south eastern Zimbabwe. Vulnerability and resilience have emerged as powerful analytical concepts in the study of socio-ecological systems. In this research these concepts are used to enhance o

  17. Assessment of urban vulnerability towards floods using an indicator-based approach – a case study for Santiago de Chile

    Directory of Open Access Journals (Sweden)

    A. Müller

    2011-08-01

    Full Text Available Regularly occurring flood events do have a history in Santiago de Chile, the capital city of Chile and study area for this research. The analysis of flood events, the resulting damage and its causes are crucial prerequisites for the development of risk prevention measures. The goal of this research is to empirically investigate the vulnerability towards floods in Santiago de Chile as one component of flood risk. The analysis and assessment of vulnerability is based on the application of a multi-scale (individual, household, municipal level set of indicators and the use of a broad range of data. The case-specific set of indicators developed in this study shows the relevant variables and their interrelations influencing the flood vulnerability in the study area. It provides a decision support tool for stakeholders and allows for monitoring and evaluating changes over time. The paper outlines how GIS, census, and remote sensing data as well as household surveys and expert interviews are used as an information base for the derivation of a vulnerability map for two municipalities located in the eastern part of Santiago de Chile. The generation of vulnerability maps representing the two different perspectives of local decision makers (experts and affected households is exemplified and discussed using the developed methodology.

  18. Rice Production Vulnerability to Climate Change in Indonesia: An Overview on Community-based Adaptation

    Science.gov (United States)

    Komaladara, A. A. S. P.; Budiasa, I. W.; Ambarawati, I. G. A. A.

    2015-12-01

    Rice remains to be a major crop and staple food in Indonesia. The task to ensure that rice production meets the demand of a growing population continues to engage the attention of national planners and policy makers. However, the adverse effects of climate change on agriculture production have presented Indonesia with yet another significant challenge. The exposure of rice crops to climate-related hazards such as temperature stress, floods, and drought, may lead to lower yield and self-sufficiency rate. This study explores the vulnerability of rice production to the effects of climate change in Indonesia. Considering the vast geographical span of the country and varying exposure, sensitivity, and adaptive capacity to climate change at regional level, this study emphasize the importance of community-based adaptation. Results from a simulation based on production and climate data from 1984 to 2014 indicates that rice production is sensitive to variation in growing season temperature and precipitation. A projection of these climate factors in 2050 has a significant impact on the major rice crop. To manage the impact of climate change, this study turns to the potential roles of farmer organizations, such as Subak, in adaptation strategies. The Subak in Bali is recognized for its cultural and organizational framework that highlights the sharing of knowledge and local wisdom in rice production. This is demonstrated by its efficient community-based irrigation management system, leading to sustainable rice production. Keywords: rice production, climate change, community-based adaptation, Indonesia

  19. Waterborne toxoplasmosis investigated and analyzed under hydrogeological assessment: new data and perspectives for further research

    Science.gov (United States)

    We present a set of data on human and chicken Toxoplasma gondii seroprevalence that was investigated and analyzed in light of groundwater vulnerability information in an area of endemic waterborne toxoplasmosis in Brazil. Hydrogeological assessment was undertaken to conduct water collection from wel...

  20. Hydrogeologic barriers to the infiltration of treated wastewater at the Joint Base McGuire-Dix-Lakehurst Land Application Site, Burlington County, New Jersey

    Science.gov (United States)

    Fiore, Alex R.

    2016-09-02

    For the final phase of wastewater treatment operations at Joint Base McGuire-Dix-Lakehurst in Burlington County, New Jersey, treated effluent is pumped to 12 infiltration basins on a Land Application Site to recharge the unconfined Kirkwood-Cohansey aquifer system. Two of the 12 infiltration basins are operationally ineffective because discharged effluent fails to percolate and remains ponded on the basin surfaces. A study conducted by the U.S. Geological Survey, in cooperation with the U.S. Department of Defense, investigated the potential hydrogeologic conditions preventing infiltration in these basins by testing the geophysical, lithological, and hydraulic characteristics of the aquifer material underlying the site. Saturated sand, sandy clay, and unsaturated sand were encountered in succession through the upper 4 feet of sediment below land surface at the two ineffective basins. Water levels in auger borings penetrating the clay and underlying dry sand were measured as deeper than water levels in nested auger borings in the saturated sand overlying the clay, which indicates a downward vertical gradient was established after removal of the clay in the deeper borings created a conduit for drainage from the surficial saturated sands. Ground-penetrating radar surveys and additional water levels measured in piezometer wells adjacent to the infiltration basins indicated a lack of connectivity between the ponded basin water and the regional water table, and demonstrated that perched conditions were not present in native formation materials outside the inoperable basins. Therefore, the near-surface low permeability clay is likely preventing infiltration from the basin surface and causes the ineffectiveness of the two basins for wastewater land application operations.

  1. DS926 Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system in Florida and parts of Georgia, Alabama, and South Carolina -- Geologic units forming the base of the Floridan aquifer system

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system were developed to define an updated hydrogeologic framework as part...

  2. DS926 Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system in Florida and parts of Georgia, Alabama, and South Carolina -- Raster surface depicting the base of the Floridan aquifer system

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system were developed to define an updated hydrogeologic framework as part...

  3. DS926 Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system in Florida and parts of Georgia, Alabama, and South Carolina -- Point features used for the base of the Floridan aquifer system

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system were developed to define an updated hydrogeologic framework as part...

  4. Structure Refinement for Vulnerability Estimation Models using Genetic Algorithm Based Model Generators

    Directory of Open Access Journals (Sweden)

    2009-01-01

    Full Text Available In this paper, a method for model structure refinement is proposed and applied in estimation of cumulative number of vulnerabilities according to time. Security as a quality characteristic is presented and defined. Vulnerabilities are defined and their importance is assessed. Existing models used for number of vulnerabilities estimation are enumerated, inspecting their structure. The principles of genetic model generators are inspected. Model structure refinement is defined in comparison with model refinement and a method for model structure refinement is proposed. A case study shows how the method is applied and the obtained results.

  5. Evaluating Aquatic invertebrate vulnerability to insecticides based on intrinsic sensitivuty, biological traits, and toxic mode of action

    NARCIS (Netherlands)

    Rico, A.; Brink, van den P.J.

    2015-01-01

    In the present study, the authors evaluated the vulnerability of aquatic invertebrates to insecticides based on their intrinsic sensitivity and their population-level recovery potential. The relative sensitivity of invertebrates to 5 different classes of insecticides was calculated at the genus, fam

  6. Are individual based models a suitable approach to estimate population vulnerability? - a case study

    Directory of Open Access Journals (Sweden)

    Eva Maria Griebeler

    2011-04-01

    Full Text Available European populations of the Large Blue Butterfly Maculinea arion have experienced severe declines in the last decades, especially in the northern part of the species range. This endangered lycaenid butterfly needs two resources for development: flower buds of specific plants (Thymus spp., Origanum vulgare, on which young caterpillars briefly feed, and red ants of the genus Myrmica, whose nests support caterpillars during a prolonged final instar. I present an analytically solvable deterministic model to estimate the vulnerability of populations of M. arion. Results obtained from the sensitivity analysis of this mathematical model (MM are contrasted to the respective results that had been derived from a spatially explicit individual based model (IBM for this butterfly. I demonstrate that details in landscape configuration which are neglected by the MM but are easily taken into consideration by the IBM result in a different degree of intraspecific competition of caterpillars on flower buds and within host ant nests. The resulting differences in mortalities of caterpillars lead to erroneous estimates of the extinction risk of a butterfly population living in habitat with low food plant coverage and low abundance in host ant nests. This observation favors the use of an individual based modeling approach over the deterministic approach at least for the management of this threatened butterfly.

  7. Climate vulnerability of drinking water supplies

    Science.gov (United States)

    Selmeczi, Pál; Homolya, Emese; Rotárné Szalkai, Ágnes

    2016-04-01

    Extreme weather conditions in Hungary led to difficulties in drinking water management on diverse occasions in the past. Due to reduced water resources and the coexisting high demand for drinking water in dry summer periods the availability of a number of water supplies became insufficient therefore causing limitations in water access. In some other cases, as a result of floods and flash floods over karstic areas evolving in consequence of excessive precipitation, several water supplies had to be excluded in order to avoid the risk of infections. More frequent occurrence of extreme weather conditions and further possible changes in the future induce the necessity for an analysis of the vulnerability of drinking water resources to climate change. Since 95% of the total drinking water supply in Hungary originates from subsurface layers, significance of groundwater resources is outstanding. The aim of our work carried out in the frames of the NAGiS (National Adaptation Geo-information System) project was to build up a methodology for the study and determination of the vulnerability of drinking water supplies to climate. The task covered analyses of climatic parameters influencing drinking water supplies principally and hydrogeological characteristics of the geological media that significantly determines vulnerability. Effects on drinking water resources and their reduction or exclusion may imply societal and economic consequences therefore we extended the analyses to the investigation of possibilities concerning the adaptation capacity to changed conditions. We applied the CIVAS (Climate Impact and Vulnerability Assessment Scheme) model developed in the frames of the international climate research project CLAVIER (Climate Change and Variability: Impact on Central and Eastern Europe) to characterize climate vulnerability of drinking water supplies. The CIVAS model, being based on the combined evaluation of exposure, sensitivity and adaptability, provides a unified

  8. Social Vulnerability Index (SoVI) for Alabama based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Alabama census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  9. Social Vulnerability Index (SoVI) for Alaska based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Alaska census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  10. Social Vulnerability Index (SoVI) for Illinois based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Illinois census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  11. Social Vulnerability Index (SoVI) for Maryland based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Maryland census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  12. Social Vulnerability Index (SoVI) for Mississippi based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Mississippi census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  13. Social Vulnerability Index (SoVI) for Delaware based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Delaware census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  14. Social Vulnerability Index (SoVI) for New Jersey based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of New Jersey census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  15. Social Vulnerability Index (SoVI) for Hawaii based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Hawaii census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  16. Social Vulnerability Index (SoVI) for New Hampshire based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of New Hampshire census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  17. Social Vulnerability Index (SoVI) for Massachusetts based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Massachusetts census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  18. Social Vulnerability Index (SoVI) for Rhode Island based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Rhode Island census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  19. Social Vulnerability Index (SoVI) for Coastal States based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of coastal states census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  20. Social Vulnerability Index (SoVI) for Ohio based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Ohio census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  1. Social Vulnerability Index (SoVI) for California based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of California census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  2. A landscape-based assessment of climate change vulnerability for native Hawaiian plants

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — One common way to conduct species vulnerability assessments (VA) to climate change (CC) is to model species distributions and predict CC-related range shifts....

  3. Social Vulnerability Index (SoVI) for North Carolina based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of North Carolina census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  4. Social Vulnerability Index (SoVI) for Texas based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Texas census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  5. Social Vulnerability Index (SoVI) for Connecticut based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Connecticut census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  6. Social Vulnerability Index (SoVI) for Virginia based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Virginia census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  7. Exploring drought vulnerability in Africa: an indicator based analysis to inform early warning systems

    Science.gov (United States)

    Naumann, G.; Barbosa, P.; Garrote, L.; Iglesias, A.; Vogt, J.

    2013-10-01

    Drought vulnerability is a complex concept that includes both biophysical and socio-economic drivers of drought impact that determine capacity to cope with drought. In order to develop an efficient drought early warning system and to be prepared to mitigate upcoming drought events it is important to understand the drought vulnerability of the affected regions. We propose a composite Drought Vulnerability Indicator (DVI) that reflects different aspects of drought vulnerability evaluated at Pan-African level in four components: the renewable natural capital, the economic capacity, the human and civic resources, and the infrastructure and technology. The selection of variables and weights reflects the assumption that a society with institutional capacity and coordination, as well as with mechanisms for public participation is less vulnerable to drought; furthermore we consider that agriculture is only one of the many sectors affected by drought. The quality and accuracy of a composite indicator depends on the theoretical framework, on the data collection and quality, and on how the different components are aggregated. This kind of approach can lead to some degree of scepticism; to overcome this problem a sensitivity analysis was done in order to measure the degree of uncertainty associated with the construction of the composite indicator. Although the proposed drought vulnerability indicator relies on a number of theoretical assumptions and some degree of subjectivity, the sensitivity analysis showed that it is a robust indicator and hence able of representing the complex processes that lead to drought vulnerability. According to the DVI computed at country level, the African countries classified with higher relative vulnerability are Somalia, Burundi, Niger, Ethiopia, Mali and Chad. The analysis of the renewable natural capital component at sub-basin level shows that the basins with high to moderate drought vulnerability can be subdivided in three main different

  8. Exploring drought vulnerability in Africa: an indicator based analysis to inform early warning systems

    Directory of Open Access Journals (Sweden)

    G. Naumann

    2013-10-01

    Full Text Available Drought vulnerability is a complex concept that includes both biophysical and socio-economic drivers of drought impact that determine capacity to cope with drought. In order to develop an efficient drought early warning system and to be prepared to mitigate upcoming drought events it is important to understand the drought vulnerability of the affected regions. We propose a composite Drought Vulnerability Indicator (DVI that reflects different aspects of drought vulnerability evaluated at Pan-African level in four components: the renewable natural capital, the economic capacity, the human and civic resources, and the infrastructure and technology. The selection of variables and weights reflects the assumption that a society with institutional capacity and coordination, as well as with mechanisms for public participation is less vulnerable to drought; furthermore we consider that agriculture is only one of the many sectors affected by drought. The quality and accuracy of a composite indicator depends on the theoretical framework, on the data collection and quality, and on how the different components are aggregated. This kind of approach can lead to some degree of scepticism; to overcome this problem a sensitivity analysis was done in order to measure the degree of uncertainty associated with the construction of the composite indicator. Although the proposed drought vulnerability indicator relies on a number of theoretical assumptions and some degree of subjectivity, the sensitivity analysis showed that it is a robust indicator and hence able of representing the complex processes that lead to drought vulnerability. According to the DVI computed at country level, the African countries classified with higher relative vulnerability are Somalia, Burundi, Niger, Ethiopia, Mali and Chad. The analysis of the renewable natural capital component at sub-basin level shows that the basins with high to moderate drought vulnerability can be subdivided in three

  9. Vulnerability and resilience of competing land-based livelihoods in south eastern Zimbabwe

    OpenAIRE

    Murungweni, C.

    2011-01-01

    Key words: vulnerability; resilience; livelihood; drought; Great Limpopo Transfrontier Conservation Area; south eastern Zimbabwe. Vulnerability and resilience have emerged as powerful analytical concepts in the study of socio-ecological systems. In this research these concepts are used to enhance our understanding of heterogeneous rural livelihoods in a semi-arid area on the western border of protected wildlife areas in Zimbabwe’s southeast lowveld. The purpose of this thesis is to deve...

  10. Assessment of aquifer intrinsic vulnerability using GIS based Drastic model in Sialkot area, Pakistan

    Directory of Open Access Journals (Sweden)

    Muhammad Saqib Khan

    2016-06-01

    Full Text Available The intrinsic vulnerability of a shallow aquifer of Sialkot is assessed using DRASTIC index method. The information required as input for all seven parameters, i.e. depth to water table, net recharge, aquifer media, soil media, topography, the impact of vadose zone and hydraulic conductivity data were collected from literature surveys and on field surveys. A cumulative vulnerability map was developed using the indices obtained as a result of DRASTIC methodology. The values obtained from DRASTIC model for the study area were between 112 and 151. The area was dominated by medium and moderate vulnerable zones covering an area of 446 km2 and 442 km2 respectively. An area of 79 km2 was covered by the low vulnerable zone while the high vulnerable zone encompassed a total area of 38 km2. Least covered area i-e., 09 km2 was found in the vicinity of the very high vulnerable zone. The validation of the DRASTIC model using the nitrate distribution revealed that very high and high indices have the lower percentage of reliability than of the low to moderate zones as compared with the nitrate distribution in the groundwater.

  11. Assessment of intrinsic vulnerability of an alluvial aquifer under anthropogenic pressure: cross comparison of 4 index-based groundwater vulnerability mapping models within the Biguglia lagoon watershed (Corsica, France).

    Science.gov (United States)

    Jaunat, Jessy; Huneau, Frédéric; Garel, Emilie; Devos, Alain; Lejeune, Olivier

    2016-04-01

    KEYWORDS: Alluvial aquifer, Vulnerability mapping, Index-based methods, DRASTIC, SINTACS, SI, GOD The geographical position of the Biguglia lagoon watershed south of the Bastia city (80 000 inhabitants), lead to a highly vulnerable hydrosystem setting. This littoral plain is the unique territory available for the urbanisation and for the agriculture activities (cattle breeding). All the activities developed are likely to have a qualitative impact on water infiltration and therefore on groundwater, which is in hydraulic connection with the lagoon system. Beyond this ecological issue, groundwater of this watershed is intensively used as drinking water supply. It appears essential to control the long-term groundwater quality of the Biguglia plain which is the major economic zone of Corsica. Achievement of this issue requires the identification of the areas where the alluvial aquifer is mostly vulnerable to anthropogenic activities. The results given by 4 of the most popular index-based vulnerability mapping methods (DRASTIC, SI, SINTACS and GOD) are compared. The water table, net recharge, aquifer and soils properties, topography, vadose zone and land uses have been precisely mapped and numerically translated in GIS with a 25m precision. 4 final maps were finally compiled according to the weighting factors of each methods. Hydrochemical investigations were also carried out on 30 sampling points (major ions and anthropogenic tracers) to evaluate the effect of anthropogenic activities on groundwater quality and also to validate the results of the vulnerability mapping. A comparison between the parametric models shows a significant agreement between the DRASTIC, SINTACS and SI results (2% to 5% of the total area in very low vulnerability class, 10% to 13% in low vulnerability, 16% to 23% in medium vulnerability, 31% to 53% in high vulnerability and 14% to 23% in very high vulnerability). The two first methods are quite similar, which explains the proximity of the

  12. Aquifer Vulnerability Assessment Based on Sequence Stratigraphic and ³⁹Ar Transport Modeling.

    Science.gov (United States)

    Sonnenborg, Torben O; Scharling, Peter B; Hinsby, Klaus; Rasmussen, Erik S; Engesgaard, Peter

    2016-03-01

    A large-scale groundwater flow and transport model is developed for a deep-seated (100 to 300 m below ground surface) sedimentary aquifer system. The model is based on a three-dimensional (3D) hydrostratigraphic model, building on a sequence stratigraphic approach. The flow model is calibrated against observations of hydraulic head and stream discharge while the credibility of the transport model is evaluated against measurements of (39)Ar from deep wells using alternative parameterizations of dispersivity and effective porosity. The directly simulated 3D mean age distributions and vertical fluxes are used to visualize the two-dimensional (2D)/3D age and flux distribution along transects and at the top plane of individual aquifers. The simulation results are used to assess the vulnerability of the aquifer system that generally has been assumed to be protected by thick overlaying clayey units and therefore proposed as future reservoirs for drinking water supply. The results indicate that on a regional scale these deep-seated aquifers are not as protected from modern surface water contamination as expected because significant leakage to the deeper aquifers occurs. The complex distribution of local and intermediate groundwater flow systems controlled by the distribution of the river network as well as the topographical variation (Tóth 1963) provides the possibility for modern water to be found in even the deepest aquifers.

  13. Model Based Threat and Vulnerability Analysis of E-Governance Systems

    Directory of Open Access Journals (Sweden)

    Shilpi Saha

    2010-06-01

    Full Text Available The strategic and contemporary importance of e-governance has been recognized across the world. In India too, various ministries of Govt. of India and State Governments have taken e-governance initiatives to provide e-services to citizens and the business they serve. To achieve the mission objectives, and make such e-governance initiatives successful it would be necessary to improve the trust and confidence of the stakeholders. It is assumed that the delivery of government services will share the same public network information that is being used in the community at large. In particular, the Internet will be the principal means by which public access to government and government services will be achieved. To provide the security measures main aim is to identify all possible threats and vulnerabilities according to the data locations and then according to the models of Nath’s approach. Based on this analysis, the security requirements of the data and the applications have been formulated in the form of security parameters like confidentiality, integrity and availability. This analysis leads to the security architecture of the specific G2C application.

  14. Hydrogeology, simulated ground-water flow, and ground-water quality, Wright-Patterson Air Force Base, Ohio

    Science.gov (United States)

    Dumouchelle, D.H.; Schalk, C.W.; Rowe, G.L.; De Roche, J.T.

    1993-01-01

    Ground water is the primary source of water in the Wright-Patterson Air Force Base area. The aquifer consists of glacial sands and gravels that fill a buried bedrock-valley system. Consolidated rocks in the area consist of poorly permeable Ordovician shale of the Richmondian stage, in the upland areas, the Brassfield Limestone of Silurian age. The valleys are filled with glacial sediments of Wisconsinan age consisting of clay-rich tills and coarse-grained outwash deposits. Estimates of hydraulic conductivity of the shales based on results of displacement/recovery tests range from 0.0016 to 12 feet per day; estimates for the glacial sediments range from less than 1 foot per day to more than 1,000 feet per day. Ground water flow from the uplands towards the valleys and the major rivers in the region, the Great Miami and the Mad Rivers. Hydraulic-head data indicate that ground water flows between the bedrock and unconsolidated deposits. Data from a gain/loss study of the Mad River System and hydrographs from nearby wells reveal that the reach of the river next to Wright-Patterson Air Force Base is a ground-water discharge area. A steady-state, three-dimensional ground-water-flow model was developed to simulate ground-water flow in the region. The model contains three layers and encompasses about 100 square miles centered on Wright-Patterson Air Force Base. Ground water enters the modeled area primarily by river leakage and underflow at the model boundary. Ground water exits the modeled area primarily by flow through the valleys at the model boundaries and through production wells. A model sensitivity analysis involving systematic changes in values of hydrologic parameters in the model indicates that the model is most sensitive to decreases in riverbed conductance and vertical conductance between the upper two layers. The analysis also indicates that the contribution of water to the buried-valley aquifer from the bedrock that forms the valley walls is about 2 to 4

  15. Simulate speleogenesis processes with an approach based on fracturing and hydrogeological processes: effect of various hydraulic boundary conditions

    Science.gov (United States)

    Lafare, A.; Jourde, H.; Leonardi, V.; Pistre, S.; Dörfliger, N.

    2012-04-01

    Several numerical modeling approaches attempted to simulate the processes of karst conduit genesis. These existing methods are mainly based on the physical and chemical laws driving the carbonate dissolution processes (taking account of calcite saturation of the water and the partial pressure of carbon dioxide). As a consequence, these works bring a well-documented knowledge on the kinetics of the carbonate dissolution processes in karst systems. Nevertheless, these models are mainly applied on simplified initial void networks, which do not match the fracturing and geological reality. Considering that the initial geometry of the void network (fractures, bedding planes) would have an influence on the final pattern of the speleological network, taking account of it could improve the understanding of speleogenesis. In the aim to take into account the geometry of the initial void network (fracture networks of several orders), a numerical model is developed, which involves a pseudo-statistic fracturing generator (REZO3D, Jourde 1999, Josnin et al. 2002, Jourde et al. 2002) coupled to a finite element groundwater simulator (GROUNDWATER, F. Cornaton, CHYN, University of Neuchâtel). The principle of the modeling of the genesis of the karst drainage system is based on an analogical empirical polynomial equation considering the pore velocity and the mean age of the water as main parameters. The computation is carried out on the basis of a time step, whose duration depends on the simulated scenario (from 100 to 5000 years). The mean age of the water is used in order to simulate the decrease of the chemical dissolving potential of the water within the aquifer, in contact with the carbonate rock. The first simulator -REZO3D- allows producing three-dimensional discrete fracture networks constituted by plane fractures, whose spatial distribution respects mechanical and statistical laws. These networks are then processed in order to write finite element meshes which constitute

  16. Exploring drought vulnerability in Africa: an indicator based analysis to be used in early warning systems

    Science.gov (United States)

    Naumann, G.; Barbosa, P.; Garrote, L.; Iglesias, A.; Vogt, J.

    2014-05-01

    We propose a composite drought vulnerability indicator (DVI) that reflects different aspects of drought vulnerability evaluated at Pan-African level for four components: the renewable natural capital, the economic capacity, the human and civic resources, and the infrastructure and technology. The selection of variables and weights reflects the assumption that a society with institutional capacity and coordination, as well as with mechanisms for public participation, is less vulnerable to drought; furthermore, we consider that agriculture is only one of the many sectors affected by drought. The quality and accuracy of a composite indicator depends on the theoretical framework, on the data collection and quality, and on how the different components are aggregated. This kind of approach can lead to some degree of scepticism; to overcome this problem a sensitivity analysis was done in order to measure the degree of uncertainty associated with the construction of the composite indicator. Although the proposed drought vulnerability indicator relies on a number of theoretical assumptions and some degree of subjectivity, the sensitivity analysis showed that it is a robust indicator and hence able of representing the complex processes that lead to drought vulnerability. According to the DVI computed at country level, the African countries classified with higher relative vulnerability are Somalia, Burundi, Niger, Ethiopia, Mali and Chad. The analysis of the renewable natural capital component at sub-basin level shows that the basins with high to moderate drought vulnerability can be subdivided into the following geographical regions: the Mediterranean coast of Africa; the Sahel region and the Horn of Africa; the Serengeti and the Eastern Miombo woodlands in eastern Africa; the western part of the Zambezi Basin, the southeastern border of the Congo Basin, and the belt of Fynbos in the Western Cape province of South Africa. The results of the DVI at the country level were

  17. Aespoe Hard Rock Laboratory. Analysis of fracture networks based on the integration of structural and hydrogeological observations on different scales

    Energy Technology Data Exchange (ETDEWEB)

    Bossart, P. [Geotechnical Inst. Ltd., Bern (Switzerland); Hermanson, Jan [Golder Associates, Stockholm (Sweden); Mazurek, M. [Univ. of Bern (Switzerland)

    2001-05-01

    Fracture networks at Aespoe have been studied for several rock types exhibiting different degrees of ductile and brittle deformation, as well as on different scales. Mesoscopic fault systems have been characterised and classified in an earlier report, this report focuses mainly on fracture networks derived on smaller scales, but also includes mesoscopic and larger scales. The TRUE-1 block has been selected for detailed structural analysis on a small scale due to the high density of relevant information. In addition to the data obtained from core materials, structural maps, BIP data and the results of hydro tests were synthesised to derive a conceptual structural model. The approach used to derive this conceptual model is based on the integration of deterministic structural evidence, probabilistic information and both upscaling and downscaling of observations and concepts derived on different scales. Twelve fracture networks mapped at different sites and scales and exhibiting various styles of tectonic deformation were analysed for fractal properties and structural and hydraulic interconnectedness. It was shown that these analysed fracture networks are not self-similar. An important result is the structural and hydraulic interconnectedness of fracture networks on all scales in the Aespoe rocks, which is further corroborated by geochemical evidence. Due to the structural and hydraulic interconnectedness of fracture systems on all scales at Aespoe, contaminants from waste canisters placed in tectonically low deformation environments would be transported - after having passed through the engineered barriers -from low-permeability fractures towards higher permeability fractures and may thus eventually reach high-permeability features.

  18. Identifying Vulnerable Nodes of Complex Networks in Cascading Failures Induced by Node-Based Attacks

    Directory of Open Access Journals (Sweden)

    Shudong Li

    2013-01-01

    Full Text Available In the research on network security, distinguishing the vulnerable components of networks is very important for protecting infrastructures systems. Here, we probe how to identify the vulnerable nodes of complex networks in cascading failures, which was ignored before. Concerned with random attack (RA and highest load attack (HL on nodes, we model cascading dynamics of complex networks. Then, we introduce four kinds of weighting methods to characterize the nodes of networks including Barabási-Albert scale-free networks (SF, Watts-Strogatz small-world networks (WS, Erdos-Renyi random networks (ER, and two real-world networks. The simulations show that, for SF networks under HL attack, the nodes with small value of the fourth kind of weight are the most vulnerable and the ones with small value of the third weight are also vulnerable. Also, the real-world autonomous system with power-law distribution verifies these findings. Moreover, for WS and ER networks under both RA and HL attack, when the nodes have low tolerant ability, the ones with small value of the fourth kind of weight are more vulnerable and also the ones with high degree are easier to break down. The results give us important theoretical basis for digging the potential safety loophole and making protection strategy.

  19. Flowing with the changing needs of hydrogeology instruction

    Science.gov (United States)

    Gleeson, T.; Allen, D. M.; Ferguson, G.

    2012-01-01

    Hydrogeology is now taught in a broad spectrum of departments and institutions to students with diverse backgrounds. Successful instruction in hydrogeology thus requires a variety of pedagogical approaches depending on desired learning outcomes and the diverse background of students. We review the pedagogical literature in hydrogeology to highlight recent advances and analyze a 2005 survey of 68 hydrogeology instructors. The literature and survey results suggest there are ~15 topics that are considered crucial by most hydrogeologists and >100 other topics that are considered crucial by some hydrogeologists. The crucial topics focus on properties of aquifers and fundamentals of groundwater flow, and should likely be part of all undergraduate hydrogeology courses. Other topics can supplement and support these crucial topics, depending on desired learning outcomes. Classroom settings continue to provide a venue for emphasizing fundamental knowledge. However, recent pedagogical advances are biased towards field and laboratory instruction with a goal of bolstering experiential learning. Field methods build on the fundamentals taught in the classroom and emphasize the collection of data, data uncertainty, and the development of vocational skills. Laboratory and computer-based exercises similarly build on theory, and offer an opportunity for data analysis and integration. The literature suggests curricula at all levels should ideally balance field, laboratory, and classroom pedagogy into an iterative and integrative whole. An integrated approach leads to greater student motivation and advancement of theoretical and vocational knowledge.

  20. Flowing with the changing needs of hydrogeology instruction

    Directory of Open Access Journals (Sweden)

    T. Gleeson

    2012-01-01

    Full Text Available Hydrogeology is now taught in a broad spectrum of departments and institutions to students with diverse backgrounds. Successful instruction in hydrogeology thus requires a variety of pedagogical approaches depending on desired learning outcomes and the diverse background of students. We review the pedagogical literature in hydrogeology to highlight recent advances and analyze a 2005 survey of 68 hydrogeology instructors. The literature and survey results suggest there are ~15 topics that are considered crucial by most hydrogeologists and >100 other topics that are considered crucial by some hydrogeologists. The crucial topics focus on properties of aquifers and fundamentals of groundwater flow, and should likely be part of all undergraduate hydrogeology courses. Other topics can supplement and support these crucial topics, depending on desired learning outcomes. Classroom settings continue to provide a venue for emphasizing fundamental knowledge. However, recent pedagogical advances are biased towards field and laboratory instruction with a goal of bolstering experiential learning. Field methods build on the fundamentals taught in the classroom and emphasize the collection of data, data uncertainty, and the development of vocational skills. Laboratory and computer-based exercises similarly build on theory, and offer an opportunity for data analysis and integration. The literature suggests curricula at all levels should ideally balance field, laboratory, and classroom pedagogy into an iterative and integrative whole. An integrated approach leads to greater student motivation and advancement of theoretical and vocational knowledge.

  1. A GIS-based vulnerability assessment tool for the quantification of natural risk in mountain and coastal areas

    Science.gov (United States)

    Puissant, A.; Schlosser, A.; Gazo, A.; -P., Malet J.; Lissak, C.; Goutiere, M.; Peltier, A.; Houet, T.

    2015-04-01

    Decision-makers need friendly tools for estimating natural risk for different future scenarios and for designing risk reduction strategies. In this work, a flexible GIS-based tool is presented in order to estimate vulnerability indicators (physical, economical, social) over territories of different size and at different scales. The tool has been designed in order to meet the requests of several categories of users (e.g. risk managers, decision planners, scientists). The tool is dedicated to the assessment of the vulnerability from several natural hazards (rock fall, landslide, flood, coastal erosion). On the basis of a database on the elements at risk, the user first selects the analysis scale (micro at the scale of the element at risk; meso at the scale of the municipality; macro at the scale of the catchment). Then, the calculation of vulnerability indicators is performed from this selection. The functionalities of the tool will be presented, and example of vulnerability indicators for some communities exposed will be discussed. The tool is developed within the ANR Project SAMCO.

  2. Community-based mental health support for orphans and vulnerable children in South Africa: A triangulation study.

    Science.gov (United States)

    Marais, Lochner; Sharp, Carla; Pappin, Michelle; Rani, Kholisa; Skinner, Donald; Lenka, Molefi; Cloete, Jan; Serekoane, Joe

    2014-01-01

    Community-based care is receiving increasing global attention as a way to support children who are orphaned or vulnerable due to the HIV/AIDS pandemic. Using both qualitative and quantitative methodology, this study assesses community-based responses to the well-being of orphans and vulnerable children (OVC) and compares these responses with the actual mental health of OVC in order to evaluate the South African government's approach of funding community-based organisations (CBOs) that support and care for OVC. The study results show that the activities of CBOs mainly extend government services and address poverty. Although this should not be seen as insignificant, the paper argues that CBOs give very little attention to the mental health of OVC.

  3. Topological Vulnerability Evaluation Model Based on Fractal Dimension of Complex Networks.

    Science.gov (United States)

    Gou, Li; Wei, Bo; Sadiq, Rehan; Sadiq, Yong; Deng, Yong

    2016-01-01

    With an increasing emphasis on network security, much more attentions have been attracted to the vulnerability of complex networks. In this paper, the fractal dimension, which can reflect space-filling capacity of networks, is redefined as the origin moment of the edge betweenness to obtain a more reasonable evaluation of vulnerability. The proposed model combining multiple evaluation indexes not only overcomes the shortage of average edge betweenness's failing to evaluate vulnerability of some special networks, but also characterizes the topological structure and highlights the space-filling capacity of networks. The applications to six US airline networks illustrate the practicality and effectiveness of our proposed method, and the comparisons with three other commonly used methods further validate the superiority of our proposed method.

  4. Topological Vulnerability Evaluation Model Based on Fractal Dimension of Complex Networks.

    Directory of Open Access Journals (Sweden)

    Li Gou

    Full Text Available With an increasing emphasis on network security, much more attentions have been attracted to the vulnerability of complex networks. In this paper, the fractal dimension, which can reflect space-filling capacity of networks, is redefined as the origin moment of the edge betweenness to obtain a more reasonable evaluation of vulnerability. The proposed model combining multiple evaluation indexes not only overcomes the shortage of average edge betweenness's failing to evaluate vulnerability of some special networks, but also characterizes the topological structure and highlights the space-filling capacity of networks. The applications to six US airline networks illustrate the practicality and effectiveness of our proposed method, and the comparisons with three other commonly used methods further validate the superiority of our proposed method.

  5. Assessment of groundwater vulnerability to nitrates from agricultural sources using a GIS-compatible logic multicriteria model.

    Science.gov (United States)

    Rebolledo, Boris; Gil, Antonia; Flotats, Xavier; Sánchez, José Ángel

    2016-04-15

    In the present study an overlay method to assess groundwater vulnerability is proposed. This new method based on multicriteria decision analysis (MCDA) was developed and validated using an appropriate case study in Aragon area (NE Spain). The Vulnerability Index to Nitrates from Agricultural Sources (VINAS) incorporates a novel Logic Scoring of Preferences (LSP) approach, and it has been developed using public geographic information from the European Union. VINAS-LSP identifies areas with five categories of vulnerability, taking into account the hydrogeological and environmental characteristics of the territory as a whole. The resulting LSP map is a regional screening tool that can provide guidance on the potential risk of nitrate pollution, as well as highlight areas where specific research and farming planning policies are required.

  6. Indicator-based model to assess vulnerability to landslides in urban areas. Case study of Husi city (Eastern Romania)

    Science.gov (United States)

    Grozavu, Adrian; Ciprian Margarint, Mihai; Catalin Stanga, Iulian

    2013-04-01

    In the last three or four decades, vulnerability evolved from physical fragility meanings to a more complex concept, being a key element of risk assessment. In landslide risk assessment, there are a large series of studies regarding landslide hazard, but far fewer researches focusing on vulnerability measurement. Furthermore, there is still no unitary understanding on the methodological framework, neither any internationally agreed standard for landslide vulnerability measurements. The omnipresent common element is the existence of elements at risk, but while some approaches are limited to exposure, other focus on the degree of losses (human injuries, material damages and monetary losses, structural dysfunctions etc.). These losses are differently assessed using both absolute and relative values on qualitative or quantitative scales and they are differently integrated to provide a final vulnerability value. This study aims to assess vulnerability to landslides at local level using an indicator-based model applied to urban areas and tested for Husi town (Eastern Romania). The study region is characterized by permeable and impermeable alternating sedimentary rocks, monoclinal geological structure and hilly relief with impressive cuestas, continental temperate climate, and precipitation of about 500 mm/year, rising to 700 m and even more in some rainy years. The town is a middle size one (25000 inhabitants) and it had an ascending evolution in the last centuries, followed by an increasing human pressure on lands. Methodologically, the first step was to assess the landslide susceptibility and to identify in this way those regions within which any asset would be exposed to landslide hazards. Landslide susceptibility was assessed using the logistic regression approach, taking into account several quantitative and qualitative factors (elements of geology, morphometry, rainfall, land use etc.). The spatial background consisted in the Digital Elevation Model and all derived

  7. 基于保护脆弱度加权拓扑模型下的电网脆弱性评估%The Vulnerability Evaluation Model of Power Grid Based on the Protection-vulnerability-weighted Topological Model

    Institute of Scientific and Technical Information of China (English)

    张海翔; 吕飞鹏

    2014-01-01

    电网中存在的某些脆弱环节对系统大停电事故有着重要的影响。为了有效辨识出这些脆弱环节,提出了基于保护脆弱度加权拓扑模型下的脆弱性评估方法。定义了保护配合度、保护故障严重度和保护脆弱度,并以此提出了单元保护脆弱强度的概念,量化了保护装置的脆弱度对电网中单元脆弱性的贡献程度;建立了基于保护脆弱度的拓扑模型,并给出了加权后相应复杂网络参数的定义;由此,提出了结合单元保护脆弱强度与介数的电网脆弱性评估方法。算例结果验证了所提方法在保持复杂网络理论对结构脆弱性有较好辨识效果的基础上,有效地计及了保护装置脆弱性因素对电网脆弱性的影响,提高了脆弱辨识效果和精度,表明该方法简单有效,具有一定的应用前景。%Certain vulnerable links in the power grid have serious impacts on large-scale blackouts. To identify these vulnerable links effectively, a vulnerability evaluation method of power grid based on the protection-vulnerability-weighted topological model was proposed in this paper. Coordination degree of protections, fault severity of protections and protection vulnerability were defined, which were used to propose the concept of protection vulnerability of units in order to quantify the contribution of protection vulnerability to the fragility of units. Weighted topological model based on the protection vulnerability was established, and definitions of corresponding characteristic indices of the weighted topological model were given. Based upon all, an vulnerability evaluation method combining betweenness and protection vulnerability of units was presented. Results of a numerical example verified that the proposed method keeps a good effect of complex network theory in structural vulnerability identification, effectively considers the impact of the factor of vulnerability of protections on the

  8. Numerical modeling of ADA system for vulnerable road users protection based on radar and vision sensing

    NARCIS (Netherlands)

    Garate, V.R.; Bours, R.C.H.; Kietlinski, K.

    2012-01-01

    The protection of vulnerable road users (VRU) remains one of the most challenging problems for our society and several governmental and consumer organization has set targets to reduce the VRU fatality and injury rates. The automotive industry is, therefore, developing pedestrian and cyclist detectio

  9. Detection of vulnerable relays and sensitive controllers under cascading events based on performance indices

    DEFF Research Database (Denmark)

    Liu, Zhou; Chen, Zhe; Hu, Yanting

    2014-01-01

    The unexpected relay operations have been regarded as one of main reasons to propagate and induce the cascaded blackouts. It is significant to timely detect vulnerable relays to be blocked, and locate sensitive controllers to regulate the emergency states. In this paper, a multi agent system (MAS...

  10. Applying the Flood Vulnerability Index as a Knowledge base for flood risk assessment

    NARCIS (Netherlands)

    Balica, S-F.

    2012-01-01

    Floods are one of the most common and widely distributed natural risks to life and property worldwide. An important part of modern flood risk management is to evaluate vulnerability to floods. This evaluation can be done only by using a parametric approach. Worldwide there is a need to enhance our

  11. The KINDRA H2020 Project: a knowledge inventory for hydrogeology research

    Science.gov (United States)

    Petitta, Marco; Bodo, Balazs; Caschetto, Mariachiara; Correia, Victor; Cseko, Adrienn; Fernandez, Isabel; Hartai, Eva; Hinsby, Klaus; Madarasz, Tamas; Garcia Padilla, Mercedes; Szucs, Peter

    2015-04-01

    Hydrogeology-related research activities cover a wide spectrum of research areas at EU and national levels. This fact is due to the intrinsic nature of the "water" topic, representing a key-aspect of the modern society: water is not only necessary for human, biological and environmental requirements, but it is one basic "engine" of several interconnected research topics, including energy, health, climate, food, security and others as exemplified by the water-food-energy-climate nexus described by e.g. the World Economic Forum. With respect to the water cycle, the management of groundwater brings additional challenges to the implementation of the Water Framework Directive (WFD) and climate change adaptation (such as integrated transboundary management of groundwater resources). This fact is related to the nature of groundwater, which represents the "hidden" part of the water cycle, difficult to evaluate, communicate and appreciate, although it sustains the health of both humans and ecosystems as well as industrial and agricultural production. In general, groundwater has been considered mainly for its relationships with surface waters, influencing river flow, e-flows, GDE (groundwater-dependent ecosystems), pollutant fate, agricultural practices, water scarcity and others. In this framework, the importance of groundwater inside the WFD has been reinforced by the daughter directive on groundwater. In the last years, particular insights have been developed on surface waters/groundwater interactions and several related research projects have been carried out. Nevertheless, a specific focus on hydrogeology, the science branch studying groundwater, has not looked into until now, despite of its utmost importance as renewable, high-quality, naturally protected (but still vulnerable) resource. At the same time the European knowledge-base that has been acquired on this important topic is widespread into several projects, plans, actions, realized at national and fragmented

  12. Early-life stress is associated with gender-based vulnerability to epileptogenesis in rat pups.

    Directory of Open Access Journals (Sweden)

    Sébastien Desgent

    Full Text Available During development, the risk of developing mesial temporal lobe epilepsy (MTLE increases when the developing brain is exposed to more than one insult in early life. Early life insults include abnormalities of cortical development, hypoxic-ischemic injury and prolonged febrile seizures. To study epileptogenesis, we have developed a two-hit model of MTLE characterized by two early-life insults: a freeze lesion-induced cortical malformation at post-natal day 1 (P1, and a prolonged hyperthermic seizure (HS at P10. As early life stressors lead to sexual dimorphism in both acute response and long-term outcome, we hypothesized that our model could lead to gender-based differences in acute stress response and long-term risk of developing MTLE. Male and female pups underwent a freeze-lesion induced cortical microgyrus at P1 and were exposed to HS at P10. Animals were monitored by video-EEG from P90 to P120. Pre and post-procedure plasma corticosterone levels were used to measure stress response at P1 and P10. To confirm the role of sex steroids, androgenized female pups received daily testosterone injections to the mother pre-natally and post-natally for nine days while undergoing both insults. We demonstrated that after both insults females did not develop MTLE while all males did. This correlated with a rise in corticosterone levels at P1 following the lesion in males only. Interestingly, all androgenized females showed a similar rise in corticosterone at P1, and also developed MTLE. Moreover, we found that the cortical lesion significantly decreased the latency to generalized convulsion during hyperthermia at P10 in both genders. The cortical dysplasia volumes at adulthood were also similar between male and female individuals. Our data demonstrate sexual dimorphism in long-term vulnerability to develop epilepsy in the lesion + hyperthermia animal model of MTLE and suggest that the response to early-life stress at P1 contributes significantly to

  13. Structured Assessment Approach: a microcomputer-based insider-vulnerability analysis tool

    Energy Technology Data Exchange (ETDEWEB)

    Patenaude, C.J.; Sicherman, A.; Sacks, I.J.

    1986-01-01

    The Structured Assessment Approach (SAA) was developed to help assess the vulnerability of safeguards systems to insiders in a staged manner. For physical security systems, the SAA identifies possible diversion paths which are not safeguarded under various facility operating conditions and insiders who could defeat the system via direct access, collusion or indirect tampering. For material control and accounting systems, the SAA identifies those who could block the detection of a material loss or diversion via data falsification or equipment tampering. The SAA, originally desinged to run on a mainframe computer, has been converted to run on a personal computer. Many features have been added to simplify and facilitate its use for conducting vulnerability analysis. For example, the SAA input, which is a text-like data file, is easily readable and can provide documentation of facility safeguards and assumptions used for the analysis.

  14. A method for detecting code security vulnerability based on variables tracking with validated-tree

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    SQL injection poses a major threat to the application level security of the database and there is no systematic solution to these attacks.Different from traditional run time security strategies such as IDS and fire wall,this paper focuses on the solution at the outset;it presents a method to find vulnerabilities by analyzing the source codes.The concept of validated tree is developed to track variables referenced by database operations in scripts.By checking whether these variables are influenced by outside inputs,the database operations are proved to be secure or not.This method has advantages of high accuracy and efficiency as well as low costs,and it is universal to any type of web application platforms.It is implemented by the SOftware code vulnerabilities of SQL injection detector(CVSID).The validity and efficiency are demonstrated with an example.

  15. Intravascular photoacoustic detection of vulnerable plaque based on constituent selected imaging

    Energy Technology Data Exchange (ETDEWEB)

    Zhang Jian; Xing Da, E-mail: xingda@scnu.edu.cn [MOE Key Laboratory of Laser Life Science and Institute of Laser Life Science, College of Biophotonics, South China Normal University, Guangzhou 510631 (China)

    2011-01-01

    Atherosclerosis, a disease of the large arteries, is the primary cause of heart disease and stroke. Over decades, atherosclerosis is characterized by thickening of the walls of the arteries, only advanced atherosclerotic disease could be observed. Photoacoustic imaging is a hybrid imaging technique that combines the advantages of high spatial resolution of ultrasound with contrast of optical absorption. In this paper, we present an intravascular photoacoustic (IVPA) imaging system to characterize vulnerable plaques by using the optical absorption contrast between different constituents. Epidemiological studies have revealed several important plaque constituents associated with early atherosclerosis, such as macrophage, cholesterol, lipid, calcification, and so on. We chose a section of lipid rich atherosclerosis artery and a section of normal artery as the phantom. Two IVPA images of them are given to show the difference between sick and normal. As a new method of detecting vulnerable plaque, IVPA constituents imaging will provide more details for diagnosis that offer an enticing prospect in early detecting of atherosclerosis.

  16. A spatial DB model to simulate the road network efficiency in hydrogeological emergency

    Science.gov (United States)

    Michele, Mangiameli; Giuseppe, Mussumeci

    2015-12-01

    We deal with the theme of the simulation of risk analysis using a technological approach based on the integration of exclusively free and open source tools: PostgreSQL as Database Management System (DBMS) and Quantum GIS-GRASS as Geographic Information System (GIS) platform. The case study is represented by a seismic land in Sicily characterized by steep slopes and frequent instability phenomena. This area includes a city of about 30.000 inhabitants (Enna) that lies on the top of a mountain at about 990 m a.s.l.. The access to the city is assured by few and very winding roads that are also highly vulnerable to seismic and hydrogeological hazards. When exceptional rainfall events occur, the loss of efficiency of these roads should compromise timeliness and effectiveness of rescue operations. The data of the sample area have been structured into the adopted DBMS, and the connection to the GIS functionalities allows simulating the exceptional events. We analyzed the hazard, vulnerability and exposure related to these events and calculated the final risk defining three classes for each scenario: low (L), medium (M) and high (H). This study can be a valuable tool to prioritize risk levels and set priorities for intervention to the main road networks..

  17. A spatial DB model to simulate the road network efficiency in hydrogeological emergency

    Energy Technology Data Exchange (ETDEWEB)

    Michele, Mangiameli, E-mail: michele.mangiameli@dica.unict.it; Giuseppe, Mussumeci [Dept. of Civil Engineering and Architecture, University of Catania, Catania (Italy)

    2015-12-31

    We deal with the theme of the simulation of risk analysis using a technological approach based on the integration of exclusively free and open source tools: PostgreSQL as Database Management System (DBMS) and Quantum GIS-GRASS as Geographic Information System (GIS) platform. The case study is represented by a seismic land in Sicily characterized by steep slopes and frequent instability phenomena. This area includes a city of about 30.000 inhabitants (Enna) that lies on the top of a mountain at about 990 m a.s.l.. The access to the city is assured by few and very winding roads that are also highly vulnerable to seismic and hydrogeological hazards. When exceptional rainfall events occur, the loss of efficiency of these roads should compromise timeliness and effectiveness of rescue operations. The data of the sample area have been structured into the adopted DBMS, and the connection to the GIS functionalities allows simulating the exceptional events. We analyzed the hazard, vulnerability and exposure related to these events and calculated the final risk defining three classes for each scenario: low (L), medium (M) and high (H). This study can be a valuable tool to prioritize risk levels and set priorities for intervention to the main road networks.

  18. A population-based study of cognitive impairment in socially vulnerable adults in Argentina. The Matanza Riachuelo Study. Preliminary Results

    Directory of Open Access Journals (Sweden)

    Leonardo Bartoloni

    Full Text Available Population aging has taken place intensively worldwide, even in developing countries. These countries have population groups with low resources and basic unmet needs that are frequently omitted from epidemiological studies. OBJECTIVE: The purpose of this study was to determine the prevalence of cognitive impairment (CI and dementia in an economic and socially vulnerable population from Argentina. METHODS: A door-to-door observational population-based survey among adults over 60 years of cognitive impairment and dementia in the social vulnerable area of the Matanza Riachuelo Basin, in the suburban area of Buenos Aires, Argentina was conducted. Trained psychologists interviewed subjects and a proxy informant. A standardized protocol including a socio-demographic questionnaire, the Mini-Mental State Examination, the Geriatric Depression Scale and a functional inventory for IADL and ADL was administered. Diagnoses were divided into three general categories: normal cognitive function, cognitive impairment-no dementia (CIND and dementia. RESULTS AND CONCLUSIONS: A total of 2437 elderly persons were assessed, of which 73.6% fulfilled inclusion criteria. The prevalence of CI among those over 60 was 26.4% (18.1% CIND and 8.3% dementia with higher prevalence of dementia in younger individuals than rates reported in developed counties, probably due to low control of vascular risk factors. This information can help inform health public decisions in the generation of programs and plans for the prevention, diagnosis and treatment of cognitive impairment in this type of socially vulnerable population.

  19. Methodology for sodium fire vulnerability assessment of sodium cooled fast reactor based on the Monte-Carlo principle

    Energy Technology Data Exchange (ETDEWEB)

    Song, Wei [Nuclear and Radiation Safety Center, P. O. Box 8088, Beijing (China); Wu, Yuanyu [ITER Organization, Route de Vinon-sur-Verdon, 13115 Saint-Paul-lès-Durance (France); Hu, Wenjun [China Institute of Atomic Energy, P. O. Box 275(34), Beijing (China); Zuo, Jiaxu, E-mail: zuojiaxu@chinansc.cn [Nuclear and Radiation Safety Center, P. O. Box 8088, Beijing (China)

    2015-11-15

    Highlights: • Monte-Carlo principle coupling with fire dynamic code is adopted to perform sodium fire vulnerability assessment. • The method can be used to calculate the failure probability of sodium fire scenarios. • A calculation example and results are given to illustrate the feasibility of the methodology. • Some critical parameters and experience are shared. - Abstract: Sodium fire is a typical and distinctive hazard in sodium cooled fast reactors, which is significant for nuclear safety. In this paper, a method of sodium fire vulnerability assessment based on the Monte-Carlo principle was introduced, which could be used to calculate the probabilities of every failure mode in sodium fire scenarios. After that, the sodium fire scenario vulnerability assessment of primary cold trap room of China Experimental Fast Reactor was performed to illustrate the feasibility of the methodology. The calculation result of the example shows that the conditional failure probability of key cable is 23.6% in the sodium fire scenario which is caused by continuous sodium leakage because of the isolation device failure, but the wall temperature, the room pressure and the aerosol discharge mass are all lower than the safety limits.

  20. Social adversity in adolescence increases the physiological vulnerability to job strain in adulthood: a prospective population-based study.

    Directory of Open Access Journals (Sweden)

    Hugo Westerlund

    Full Text Available BACKGROUND: It has been argued that the association between job strain and health could be confounded by early life exposures, and studies have shown early adversity to increase individual vulnerability to later stress. We therefore investigated if early life exposure to adversity increases the individual's physiological vulnerability job strain in adulthood. METHODOLOGY/PRINCIPAL FINDINGS: In a population-based cohort (343 women and 330 men, 83% of the eligible participants, we examined the association between on the one hand exposure to adversity in adolescence, measured at age 16, and job strain measured at age 43, and on the other hand allostatic load at age 43. Adversity was operationalised as an index comprising residential mobility and crowding, parental loss, parental unemployment, and parental physical and mental illness (including substance abuse. Allostatic load summarised body fat, blood pressure, inflammatory markers, glucose, blood lipids, and cortisol regulation. There was an interaction between adversity in adolescence and job strain (B = 0.09, 95% CI 0.02 to 0.16 after adjustment for socioeconomic status, particularly psychological demands, indicating that job strain was associated with increased allostatic load only among participants with adversity in adolescence. Job strain was associated with lower allostatic load in men (β = -0.20, 95% CI -0.35 to -0.06. CONCLUSIONS/SIGNIFICANCE: Exposure to adversity in adolescence was associated with increased levels of biological stress among those reporting job strain in mid-life, indicating increased vulnerability to environmental stressors.

  1. Assessment of groundwater vulnerability to anthropogenic pollution and seawater intrusion in a small tropical island using index-based methods.

    Science.gov (United States)

    Kura, Nura Umar; Ramli, Mohammad Firuz; Ibrahim, Shaharin; Sulaiman, Wan Nor Azmin; Aris, Ahmad Zaharin; Tanko, Adamu Idris; Zaudi, Muhammad Amar

    2015-01-01

    In this work, the DRASTIC and GALDIT models were employed to determine the groundwater vulnerability to contamination from anthropogenic activities and seawater intrusion in Kapas Island. In addition, the work also utilized sensitivity analysis to evaluate the influence of each individual parameter used in developing the final models. Based on these effects and variation indices of the said parameters, new effective weights were determined and were used to create modified DRASTIC and GALDIT models. The final DRASTIC model classified the island into five vulnerability classes: no risk (110-140), low (140-160), moderate (160-180), high (180-200), and very high (>200), covering 4, 26, 59, 4, and 7 % of the island, respectively. Likewise, for seawater intrusion, the modified GALDIT model delineates the island into four vulnerability classes: very low (130) covering 39, 33, 18, and 9 % of the island, respectively. Both models show that the areas that are likely to be affected by anthropogenic pollution and seawater intrusion are within the alluvial deposit at the western part of the island. Pearson correlation was used to verify the reliability of the two models in predicting their respective contaminants. The correlation matrix showed a good relationship between DRASTIC model and nitrate (r = 0.58). In a similar development, the correlation also reveals a very strong negative relationship between GALDIT model and seawater contaminant indicator (resistivity Ωm) values (r = -0.86) suggesting that the model predicts more than 86 % of seawater intrusion. In order to facilitate management strategy, suitable areas for artificial recharge were identified through modeling. The result suggested some areas within the alluvial deposit at the western part of the island as suitable for artificial recharge. This work can serve as a guide for a full vulnerability assessment to anthropogenic pollution and seawater intrusion in small islands and will help policy maker and

  2. Climate change, impacts and vulnerability in Europe 2012. An indicator-based report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-11-15

    This European Environment Agency (EEA) report presents information on past and projected climate change and related impacts in Europe, based on a range of indicators. The report also assesses the vulnerability of society, human health and ecosystems in Europe and identifies those regions in Europe most at risk from climate change. Furthermore, the report discusses the principle sources of uncertainty for the indicators and notes how monitoring and scenario development can improve our understanding of climate change, its impacts and related vulnerabilities. Some key findings: The last decade (2002-2011) was the warmest on record in Europe, with European land temperature 1.3 deg. C warmer than the pre-industrial average. Various model projections show that Europe could be 2.5-4 deg. C warmer in the later part of the 21st Century, compared to the 1961-1990 average. Heat waves have increased in frequency and length, causing tens of thousands of deaths over the last decade. The projected increase in heat waves could increase the number of related deaths over the next decades, unless societies adapt, the report says. However, cold-related deaths are projected to decrease in many countries. While precipitation is decreasing in southern regions, it is increasing in northern Europe, the report says. These trends are projected to continue. Climate change is projected to increase river flooding, particularly in northern Europe, as higher temperatures intensify the water cycle. However, it is difficult to discern the influence of climate change in flooding data records for the past. River flow droughts appear to have become more severe and frequent in southern Europe. Minimum river flows are projected to decrease significantly in summer in southern Europe but also in many other parts of Europe to varying degrees. The Arctic is warming faster than other regions. Record low sea ice was observed in the Arctic in 2007, 2011 and 2012, falling to roughly half the minimum extent seen

  3. Redistributing vulnerabilities

    DEFF Research Database (Denmark)

    Seeberg, Jens; Padmawati, Retna Siwi

    2015-01-01

    It is widely accepted that the social distribution of vulnerability in a given society may turn hazardous events into disasters. This distributional approach draws attention to continuities that explain catastrophes by virtue of the workings of society prior to the event. In this paper, we draw a...

  4. Assessing vulnerability

    NARCIS (Netherlands)

    Hellmuth, M.; Kabat, P.

    2003-01-01

    It is in the shantytowns and rural villages of the Third World that floods and droughts strike hardest and deepest. Vulnerability to the vagaries of climate depends not only on location, but, crucially, on the capacity of the victims to cope with the impacts of extreme weather. So, where are the peo

  5. Incorporating Fuzzy Systems Modeling and Possibility Theory in Hydrogeological Uncertainty Analysis

    Science.gov (United States)

    Faybishenko, B.

    2008-12-01

    Hydrogeological predictions are subject to numerous uncertainties, including the development of conceptual, mathematical, and numerical models, as well as determination of their parameters. Stochastic simulations of hydrogeological systems and the associated uncertainty analysis are usually based on the assumption that the data characterizing spatial and temporal variations of hydrogeological processes are random, and the output uncertainty is quantified using a probability distribution. However, hydrogeological systems are often characterized by imprecise, vague, inconsistent, incomplete or subjective information. One of the modern approaches to modeling and uncertainty quantification of such systems is based on using a combination of statistical and fuzzy-logic uncertainty analyses. The aims of this presentation are to: (1) present evidence of fuzziness in developing conceptual hydrogeological models, and (2) give examples of the integration of the statistical and fuzzy-logic analyses in modeling and assessing both aleatoric uncertainties (e.g., caused by vagueness in assessing the subsurface system heterogeneities of fractured-porous media) and epistemic uncertainties (e.g., caused by the selection of different simulation models) involved in hydrogeological modeling. The author will discuss several case studies illustrating the application of fuzzy modeling for assessing the water balance and water travel time in unsaturated-saturated media. These examples will include the evaluation of associated uncertainties using the main concepts of possibility theory, a comparison between the uncertainty evaluation using probabilistic and possibility theories, and a transformation of the probabilities into possibilities distributions (and vice versa) for modeling hydrogeological processes.

  6. Assessment of well vulnerability for groundwater source protection based on a solute transport model: a case study from Jilin City, northeast China

    Science.gov (United States)

    Huan, Huan; Wang, Jinsheng; Lai, Desheng; Teng, Yanguo; Zhai, Yuanzheng

    2015-05-01

    Well vulnerability assessment is essential for groundwater source protection. A quantitative approach to assess well vulnerability in a well capture zone is presented, based on forward solute transport modeling. This method was applied to three groundwater source areas (Jiuzhan, Hadawan and Songyuanhada) in Jilin City, northeast China. The ratio of the maximum contaminant concentration at the well to the released concentration at the contamination source ( c max/ c 0) was determined as the well vulnerability indicator. The results indicated that well vulnerability was higher close to the pumping well. The well vulnerability in each groundwater source area was low. Compared with the other two source areas, the cone of depression at Jiuzhan resulted in higher spatial variability of c max/ c 0 and lower minimum c max/ c 0 by three orders of magnitude. Furthermore, a sensitivity analysis indicated that the denitrification rate in the aquifer was the most sensitive with respect to well vulnerability. A process to derive a NO3-N concentration at the pumping well is presented, based on determining the maximum nitrate loading limit to satisfy China's drinking-water quality standards. Finally, the advantages, disadvantages and prospects for improving the precision of this well vulnerability assessment approach are discussed.

  7. Vulnerability mapping of groundwater contamination based on 3D lithostratigraphical models of porous aquifers.

    Science.gov (United States)

    Ducci, Daniela; Sellerino, Mariangela

    2013-03-01

    The aim of this paper is to apply a methodology in order to reconstruct a lithostratigraphic 3D model of an aquifer so as to define some parameters involved in the evaluation of the aquifer vulnerability to contamination of porous aquifers. The DRASTIC, SINTACS and AVI methods have been applied to an alluvial coastal aquifer of southern Italy. The stratigraphic reconstruction has been obtained by interpolating stratigraphic data from more than one borehole per 2 km. The lithostratigraphic reconstruction of a 3D model has been applied and used for three-dimensional or two-dimensional representations. In the first two methods, the layers of the vadose zone and the aquifer media have been evaluated not only by the interpolation of the single boreholes and piezometers, but also by the 3D model, assigning the scores of the parameters of each layer of the 3D model. The comparison between the maps constructed from the weighted values in each borehole and the maps deriving from the attribution of the values of each layer of the 3D model, highlights that the second representation avoids or minimizes the "bullseye" effect linked to the presence of boreholes with higher or lower values. The study has demonstrated that it is possible to integrate a 3D lithostratigraphic model of an aquifer in the assessment of the parameters involved in the evaluation of the aquifer vulnerability to contamination by Point Count System methods.

  8. Vulnerable Hunter

    Directory of Open Access Journals (Sweden)

    Md.Asha Begum

    2016-05-01

    Full Text Available This project "VULNERABLE HUNTER" application main aim is to detect risk in our mobile applications. This application contains modules like Fetch Application, Generate Score, Uninstall and Display Graph. Through this application it detects risk so that this application is very useful to smart phone users Now-a-days so many people are using smart phones and people are crazy about new apps. But by installing all the applications into our mobile may reduce its performance. Some apps contain more risk. But user may not know the effects that are caused by the app which is installed until the performance of mobile is reduced. With the prosperity of the Android app economy, many apps have been published and sold in various markets. However, short development applications and insufficient security development apps have led to many vulnerable apps. So to reduce these type of problems Vulnerable Hunter is proposed. Through the proposed application user can see which application is risky and then the user may uninstall that application. The main advantage of designing this app is without internet also the users will use this application. Users also feel more convenient to work with mobile apps.

  9. Social Vulnerability Index (SoVI) for the U.S. Coastal States based on the 2010 Census Tracts

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Social Vulnerability Index (SoVI) 2006-10 measures the social vulnerability of U.S. counties to environmental hazards. The index is a comparative metric that...

  10. Waterborne toxoplasmosis investigated and analysed under hydrogeological assessment: new data and perspectives for further research

    OpenAIRE

    2015-01-01

    We present a set of data on human and chicken Toxoplasma gondii seroprevalence that was investigated and analysed in light of groundwater vulnerability information in an area endemic for waterborne toxoplasmosis in Brazil. Hydrogeological assessment was undertaken to select sites for water collection from wells for T. gondii oocyst testing and for collecting blood from free-range chickens and humans for anti-T. gondii serologic testing. Serologic testing of human specimens was done using conv...

  11. Ethics in Community-Based Research with Vulnerable Children: Perspectives from Rwanda.

    Directory of Open Access Journals (Sweden)

    Theresa Betancourt

    Full Text Available A "risk of harm" protocol to identify youth in need of immediate emergency assistance in a study on mental health and HIV in Rwanda among 680 youth ages 10-17 is described. Cases are presented that describe the experience in using this protocol to ensure safety of participants, with ethical and logistical challenges considered. Among the population of the study, 3.2% were deemed "risk of harm." The most prevalent presenting problem was non-fatal suicidal behavior (91% of risk of harm cases, with 36% having a history of a reported previous attempt. Challenges included: acute food insecurity/significant poverty; lack of support/adequate supervision from family members; family violence; alcohol abuse; and HIV-related stigma. Development of a "risk of harm" protocol and collaboration between study staff, community leadership, health authorities, and health workers are critical to ensuring participants' safety in research among vulnerable populations.

  12. An integrated theoretical and practical approach for teaching hydrogeology

    Science.gov (United States)

    Bonomi, Tullia; Fumagalli, Letizia; Cavallin, Angelo

    2013-04-01

    their limitations; C) by an evaluation process whose results contribute to the final examination, so that the students are evaluated on the basis of their ability to discuss theoretical subjects and/or projects and to resolving exercises and case studies either by hand calculations or by modelling. The applied hydrogeology examination is an example of the evaluation process. It involves development of a plan to resolve a real hydrogeological issue, such as the design of a hydraulic barrier for a landfill, the design of a well field to meet the supply requirements of a muncipality, or the control of possible seepage from a contaminated site close to to sensitive discharge features such as wells, springs, rivers. The students are allowed to work on computers for three consecutive mornings for a total 15 hours, and in the end are required to produce a technical report and a hydrogeological model. Obviously their solutions are neither unique nor completely optimized (just as in the real world), but the comparisons and debates among the students are important portals to learning and improvement. A second example: the groundwater pollution and remediation examination is based on the discussion of a remediation project elaborated in stages during the course, with the addition of increasing complex types of data and information. The students have one hour a week, during the course, to submit to the teacher their analysis of the problem and possible solutions. In ten years of experience all students have considered this method of examination a challenge, and found it engaging and helpful, even if unusual, at least in Italy. The University of Milano Bicocca has recently drilled a piezometric well both to monitor the flow of groundwater and to allow students to perform aquifer tests and to conduct standard groundwater sampling procedure, without any longer needing to rely on outside private donors for access to a field site. The overall approach, which includes, lectures

  13. Bedrock Hydrogeology - Site investigation SFR

    Energy Technology Data Exchange (ETDEWEB)

    Oehman, Johan [Geosigma AB, Stockholm (Sweden); Bockgaard, Niclas [Golder Assoes AB, Stockholm (Sweden); Follin, Sven [SF GeoLogic AB, Taeby (Sweden)

    2012-06-15

    The Swedish Nuclear Fuel and Waste Management Company (SKB) has conducted site investigations for a planned extension of the existing final repository for short-lived radioactive waste (SFR). This report presents an integrated analysis and interpretation of the historic data from the existing SFR (1980 - 1986), as well as, from the recent investigations for the planned extension of SFR (2008 - 2009). The primary objective is to establish a conceptual hydrogeological model of the bedrock for safety assessment and design analyses. Analyses and interpretations of all (old and new) hydraulic data are analysed with regard to the recently developed geological deformation zone model of the SFR model domain (Curtis et al. 2011). The methodology used by Curtis et al. (2011) has focussed on magnetic anomalies and deformation zone intercepts with ground surface greater than 300 m. In the hydrogeological modelling, however, it has been considered important to also explore the occurrence and characteristics of shallow horizontal to sub-horizontal structures (sheet joints) inside the SFR model domain. Such structures are of considerable importance for the hydrogeology in the uppermost c. 150 m of bedrock in SDM-Site Forsmark; hence the term Shallow Bedrock Aquifer was used to emphasise their hydraulic significance. In this study, the acronym SBA-structure is used for horizontal structures identified in the hydrogeological modelling. In addition to the predominantly steeply dipping geological deformation zones, eight so-called SBA-structures are modelled deterministically in the hydrogeological model. The SBA-structures are envisaged as hydraulically heterogeneous and composed of clusters of minor gently dipping to horizontal fractures rather than extensive single features. A type of structures that is partly included in the definition of the SBA-structures is the Unresolved Possible Deformations Zone (Unresolved PDZ) intercepts identified by Curtis et al. (2011). The Unresolved

  14. Group-Based Intervention to Improve Socio-Emotional Health in Vulnerable Children

    Directory of Open Access Journals (Sweden)

    Tony Cassidy

    2014-12-01

    Full Text Available Internalizing and externalizing problems present as difficulties in socio-emotional competence and predispose to a wide range of mental and physical health outcomes. This study examines the efficacy of an intervention (Pyramid Plus in strengthening children’s socio-emotional competencies. Participants (294 11 year old children attending schools in Northern Ireland were screened for socio-emotional difficulties using the Strengths and Difficulties Questionnaire (SDQ and before being allocated to attend a Pyramid Club intervention (n = 162, and a waiting list control (n = 122. A 3 × 2 mixed-model design was used: group (intervention group vs. waiting list control × 3 time points (pre- vs. post-intervention vs. 12 weeks follow up to investigate the impact of the Pyramid Plus intervention. Teachers and children completed the SDQ-11-16 years, and children completed the TEIQue-CSF ant all 3 times. SDQ total difficult, internalizing and externalizing scores were reduced significantly, and prosocial and emotional intelligence scores were increased significantly compared to waiting list controls post intervention and at follow up. The Pyramid Plus intervention improves the socio-emotional health of vulnerable children through promoting positive outcomes as well as reducing socio- emotional deficits.

  15. HYDROGEOLOGY

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    <正>20102620 Chen Chuanfang(Southeastern Fujian Geology Party of Fujian Province,Quanzhou 362021,China)Preestimation of Flowing Yield from the Mine Pits of the Pantian Minefield in Anxi County,Fujian Province(Geology of Fujian,ISSN1001-3970,CN35-1080/P,28(4),2009,p.315-319,1 illus.,2 tables,with English abstract)Key words:estimating water yield of mine,Fujian

  16. HYDROGEOLOGY

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    <正>20110546 Chen Chuanfang(Southeastern Geology Party of Fujian Province,Quanzhou 362021,China)Primary Influencing Factors of Mine Drainage in the Karst Area of the Pantian Iron Minefield,Fujian Province(Geology of Fujian,ISSN1001-3970,CN35-1080/P,29(1),2010,p.42-45,1 illus.)Key words:mine drainage,Fujian Province The Pantian marble and iron mining area in Anxi County has the mixture conditio

  17. HYDROGEOLOGY

    Institute of Scientific and Technical Information of China (English)

    2014-01-01

    <正>20141756 Chen Ruige(Mathematical College,China University of Geosciences,Beijing100083,China);Zhou Xun Numerical Simulation of Groundwater Level Fluctuation in a Coastal Confined Aquifer with Sloping Initial Groundwater Level Induced by the Tide(Geological Bulletin of China,ISSN1671-2552,CN11-4648/P,32(7),2013,p.1099-1104,6 illus.,16 refs.) Key words:confined water,groundwater level

  18. HYDROGEOLOGY

    Institute of Scientific and Technical Information of China (English)

    2013-01-01

    <正>20131276 Chen Dengqi (Guizhou Institute of Geological Engineering Exploration , Guiyang 550008 , China); Song Xiaoqing The Reasons of Sifangjing Karst Spring Drying-Up in Zhijin of Guizhou Province (Guizhou Geology , ISSN1000-5943 , CN52-1059/P , 29 (2), 2012 , p.94-98 , 2illus. , 6refs.) Key words : karst water

  19. HYDROGEOLOGY

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    <正>20081223 Chen Jiansheng(State Key Laboratory of Hydrology-Water Resources and Hydraulic Engineering,Hohai University,Nanjing 210098,China);Zhao Xia Isotope Method for Confined Groundwater Recharge of the Lower Reaches of the Heihe Riv

  20. HYDROGEOLOGY

    Institute of Scientific and Technical Information of China (English)

    2015-01-01

    20151960 Cao Chongben(No.114 Geological Party,Guizhou Bureau of Geology and Mineral Exploration and Development,Zunyi563000,China);Zhou Shien Building and Significance of Karst Reservoir Structure Resistivity Model in Geophysical Water Exploration

  1. Use of non-petroleum fuels to reduce military energy vulnerabilities: self-sufficient bases and new weapon propulsion systems

    Energy Technology Data Exchange (ETDEWEB)

    Freiwald, D.A.

    1980-01-01

    The US fossil synfuels program may not have significant impact on domestic fuel supplies until near the year 2000, resulting in a continuing mobility fuels vulnerability for the US military until then. But there are other mobility fuel options for both propulsion systems and stationary base-energy sources, for which the base technology is commercially available or at least demonstrated. For example, for surface propulsion systems, hydrogen-fuel-cell/battery-electric hybrids may be considered; for weapons systems these may offer some new flexibilities, standardization possibilities, and multiple military-controlled fuel-supply options. Hydrogen-fueled aircraft may provide interesting longer-term possibilities in terms of military energy self-sufficiency and multiple supply options, as well as performance specifications. These scenarios will be discussed, along with possibilities for demonstrations in the MX-system ground vehicles.

  2. Hydrogeology of Webb County, Texas

    Science.gov (United States)

    Lambert, Rebecca B.

    2004-01-01

    Introduction: Webb County, in semiarid South Texas on the U.S.-Mexico border, is a region confronted by increasing stresses on natural resources. Laredo (fig. 1), the largest city in Webb County (population 193,000 in 2000), was one of the 10 fastest-growing metropolitan areas in the country during 1990-2000 (Perry and Mackun, 2001). Commercial and industrial activities have expanded throughout the region to support the maquiladora industry (manufacturing plants in Mexico) along the border and other growth as a result of the passage of the North American Free Trade Agreement. The Rio Grande currently (2002) is the primary source of public water supply for Laredo and other cities along the border in Webb County (fig. 1). Other cities, such as Bruni and Mirando City in the southeastern part of the county, rely on ground-water supplies to meet municipal demands. Increased water demand associated with development and population growth in the region has increased the need for the City of Laredo and Webb County to evaluate alternative water sources to meet future demand. Possible options include (1) supplementing the surface-water supply with ground water, and (2) applying artificial storage and recovery (ASR) technology to recharge local aquifers. These options raise issues regarding the hydraulic capability of the aquifers to store economically substantial quantities of water, current or potential uses of the resource, and possible effects on the quality of water resulting from mixing ground water with alternative source waters. To address some of these issues, the U.S. Geological Survey (USGS), in cooperation with the City of Laredo, began a study in 1996 to assess the ground-water resources of Webb County. A hydrogeologic study was conducted to review and analyze available information on the hydrogeologic units (aquifers and confining units) in Webb County, to locate available wells in the region with water-level and water-quality information from the aquifers, and

  3. Vulnerability-Based Critical Neurons, Synapses, and Pathways in the Caenorhabditis elegans Connectome

    Science.gov (United States)

    Kim, Seongkyun; Kim, Hyoungkyu; Kralik, Jerald D.; Jeong, Jaeseung

    2016-01-01

    Determining the fundamental architectural design of complex nervous systems will lead to significant medical and technological advances. Yet it remains unclear how nervous systems evolved highly efficient networks with near optimal sharing of pathways that yet produce multiple distinct behaviors to reach the organism’s goals. To determine this, the nematode roundworm Caenorhabditis elegans is an attractive model system. Progress has been made in delineating the behavioral circuits of the C. elegans, however, many details are unclear, including the specific functions of every neuron and synapse, as well as the extent the behavioral circuits are separate and parallel versus integrative and serial. Network analysis provides a normative approach to help specify the network design. We investigated the vulnerability of the Caenorhabditis elegans connectome by performing computational experiments that (a) “attacked” 279 individual neurons and 2,990 weighted synaptic connections (composed of 6,393 chemical synapses and 890 electrical junctions) and (b) quantified the effects of each removal on global network properties that influence information processing. The analysis identified 12 critical neurons and 29 critical synapses for establishing fundamental network properties. These critical constituents were found to be control elements—i.e., those with the most influence over multiple underlying pathways. Additionally, the critical synapses formed into circuit-level pathways. These emergent pathways provide evidence for (a) the importance of backward locomotion, avoidance behavior, and social feeding behavior to the organism; (b) the potential roles of specific neurons whose functions have been unclear; and (c) both parallel and serial design elements in the connectome—i.e., specific evidence for a mixed architectural design. PMID:27540747

  4. GIS Grid and CWS-based assessment of vulnerability to debris flow hazards in the upper reaches of Min River, China

    Science.gov (United States)

    Ding, Mingtao; Hübl, Johannes; Fuchs, Sven

    2014-05-01

    Based on conceptual models of vulnerability assessment for mountain hazards, this paper aims to improve a quantitative assessment model for regional vulnerability by a detailed analysis of the relation between and among vulnerability (V), exposure (E), social coping capacity (C) and resilience (Re) with the expression of V = E(1-° C+Re- 2). Taking the mountain settlements in the upper reaches of Min River, China, as an example and ArcGIS 9.3 as the platform, we applied the technology of GIS Grid and the method of Contributing Weight Superposition (CWS) to establish both a model and a system for the vulnerability assessment of elements at risk. The latter consists of 13 index factors including population, economics and road densities, building and farmland coverage, hazard-affected areas, a monitoring coefficient to take into account early warning measures, the urbanization rate, GDP per capita, and labor aged population ratio. Accordingly, a debris-flow hazard vulnerability zoning map has been obtained and the assessment results had shown that the distribution of high and comparatively high vulnerability zones, where economic activities are the most intensive, had a close correlation to the river geometry and geomorphology and population activities. Such results correspond well with loss data in the region, proving the reasonability and feasibility of assessment methods in this paper. The results thus may serve as the pertinent guidance for settlement relocation, population distribution readjustment, and management to prevent and reduce hazards in the upper reaches of Min River.

  5. Hydrogeologic Constraints on Yucatan's Development.

    Science.gov (United States)

    Doehring, D O; Butler, J H

    1974-11-15

    The Republic of Mexico has an ambitious and effective national water program. The Secretaria de Recursos Hidraulicos (SRH), whose director has cabinet rank in the federal government, is one of the most professionally distinguished government agencies of its kind in the Americas. Resources for the Future, Inc., has been assisting the World Bank with a water planning study which the Bank is undertaking jointly with the Mexican government. The study is intended to provide guidelines for the development of government policies and projects designed to bring about the most efficient use of Mexico's water resources. However, to date, their study has not been directed toward the growing problems of the northern Yucatáan Peninsula which are discussed here. LeGrand (13) suggested that man has inherited a harsh environment in carbonate terranes. In the case of the northern Yucatán Peninsula, the physical environment creates a set of hydrogeologic constraints to future economic and social development. Planning for intermediate and long-range land use on the peninsula must be related directly to the limited and fragile groundwater source. Continued contamination will make future aquifer management a difficult challenge for federal, state, and territorial agencies. We conclude that any strategy for long-range land use in the study area should include establishment of a regional aquifermonitoring network for long-term measurements of key hydrogeologic parameters, including precipitation, evapotranspiration, water table elevations, and water quality. Information from this network would flow into a central facility for storage, interpretation, and analysis. At present the SRH is collecting some of these data. Expansion of the existing program to provide sound information for regional planning will greatly benefit present as well as future generations. If such a program is implemented, it will represent a model for regional planning in other tropical and subtropical karstic

  6. Sandia National Laboratories site-wide hydrogeologic characterization project calendar year 1992 annual report

    Energy Technology Data Exchange (ETDEWEB)

    Crowson, D.; Gibson, J.D.; Haase, C.S.; Holt, R.; Hyndman, D.; Krumhansl, J.; Lauffer, F.; McCord, J.P.; McCord, J.T.; Neel, D. [and others

    1993-10-01

    The Sandia National Laboratories, New Mexico (SNL/NM) Site-Wide Hydrogeologic Characterization (SWHC) project has been implemented as part of the SNL/NM Environmental Restoration (ER) Program to develop the regional hydrogeologic framework and baseline for the approximately 100 mi of Kirtland Air Force Base (KAFB) and adjacent withdrawn public lands upon which SNL/NM has performed research and development activities. Additionally, the SWHC project will investigate and characterize generic hydrogeologic issues associated with the 172 ER sites owned by SNL/NM across its facilities on KAFB. As called for in the Hazardous and Solid Waste Amendments (HSWA) to the Resource Conservation and Recovery Act (RCRA) Part B permit agreement between the U.S. Environmental Protection Agency (EPA) as the permitter and the U.S. Department of Energy (DOE) and SNL/NM as the permittees, an annual report is to be prepared by the SWHC project team. This document serves two primary purposes: (1) to identify and describe the conceptual framework for the hydrogeologic system underlying SNL/NM and (2) to describe characterization activities undertaken in the preceding year that add to our understanding (reduce our uncertainties) regarding the conceptual and quantitative hydrogeologic framework. This SWHC project annual report focuses primarily on purpose 1, providing a summary description of the current {open_quotes}state of knowledge{close_quotes} of the Sandia National Laboratories/Kirtland Air Force Base (SNL/KAFB) hydrogeologic setting.

  7. Assessing the vulnerability of human and biological communities to changing ecosystem services using a GIS-based multi-criteria decision support tool

    Science.gov (United States)

    Villarreal, Miguel; Norman, Laura M.; Labiosa, William B.

    2012-01-01

    In this paper we describe an application of a GIS-based multi-criteria decision support web tool that models and evaluates relative changes in ecosystem services to policy and land management decisions. The Santa Cruz Watershed Ecosystem Portfolio (SCWEPM) was designed to provide credible forecasts of responses to ecosystem drivers and stressors and to illustrate the role of land use decisions on spatial and temporal distributions of ecosystem services within a binational (U.S. and Mexico) watershed. We present two SCWEPM sub-models that when analyzed together address bidirectional relationships between social and ecological vulnerability and ecosystem services. The first model employs the Modified Socio-Environmental Vulnerability Index (M-SEVI), which assesses community vulnerability using information from U.S. and Mexico censuses on education, access to resources, migratory status, housing situation, and number of dependents. The second, relating land cover change to biodiversity (provisioning services), models changes in the distribution of terrestrial vertebrate habitat based on multitemporal vegetation and land cover maps, wildlife habitat relationships, and changes in land use/land cover patterns. When assessed concurrently, the models exposed some unexpected relationships between vulnerable communities and ecosystem services provisioning. For instance, the most species-rich habitat type in the watershed, Desert Riparian Forest, increased over time in areas occupied by the most vulnerable populations and declined in areas with less vulnerable populations. This type of information can be used to identify ecological conservation and restoration targets that enhance the livelihoods of people in vulnerable communities and promote biodiversity and ecosystem health.

  8. Spatiotemporal variation of long-term drought propensity through reliability-resilience-vulnerability based Drought Management Index

    Science.gov (United States)

    Chanda, Kironmala; Maity, Rajib; Sharma, Ashish; Mehrotra, Rajeshwar

    2014-10-01

    This paper characterizes the long-term, spatiotemporal variation of drought propensity through a newly proposed, namely Drought Management Index (DMI), and explores its predictability in order to assess the future drought propensity and adapt drought management policies for a location. The DMI was developed using the reliability-resilience-vulnerability (RRV) rationale commonly used in water resources systems analysis, under the assumption that depletion of soil moisture across a vertical soil column is equivalent to the operation of a water supply reservoir, and that drought should be managed not simply using a measure of system reliability, but should also take into account the readiness of the system to bounce back from drought to a normal state. Considering India as a test bed, 5 year long monthly gridded (0.5° Lat × 0.5° Lon) soil moisture data are used to compute the RRV at each grid location falling within the study domain. The Permanent Wilting Point (PWP) is used as the threshold, indicative of transition into water stress. The association between resilience and vulnerability is then characterized through their joint probability distribution ascertained using Plackett copula models for four broad soil types across India. The joint cumulative distribution functions (CDF) of resilience and vulnerability form the basis for estimating the DMI as a five-yearly time series at each grid location assessed. The status of DMI over the past 50 years indicate that drought propensity is consistently low toward northern and north eastern parts of India but higher in the western part of peninsular India. Based on the observed past behavior of DMI series on a climatological time scale, a DMI prediction model comprising deterministic and stochastic components is developed. The predictability of DMI for a lead time of 5 years is found to vary across India, with a Pearson correlation coefficient between observed and predicted DMI above 0.6 over most of the study area

  9. Classification of hydrogeologic areas and hydrogeologic flow systems in the basin and range physiographic province, southwestern United States

    Science.gov (United States)

    Anning, David W.; Konieczki, Alice D.

    2005-01-01

    The hydrogeology of the Basin and Range Physiographic Province in parts of Arizona, California, New Mexico, Utah, and most of Nevada was classified at basin and larger scales to facilitate information transfer and to provide a synthesis of results from many previous hydrologic investigations. A conceptual model for the spatial hierarchy of the hydrogeology was developed for the Basin and Range Physiographic Province and consists, in order of increasing spatial scale, of hydrogeologic components, hydrogeologic areas, hydrogeologic flow systems, and hydrogeologic regions. This hierarchy formed a framework for hydrogeologic classification. Hydrogeologic areas consist of coincident ground-water and surface-water basins and were delineated on the basis of existing sets of basin boundaries that were used in past investigations by State and Federal government agencies. Within the study area, 344 hydrogeologic areas were identified and delineated. This set of basins not only provides a framework for the classification developed in this report, but also has value for regional and subregional purposes of inventory, study, analysis, and planning throughout the Basin and Range Physiographic Province. The fact that nearly all of the province is delineated by the hydrogeologic areas makes this set well suited to support regional-scale investigations. Hydrogeologic areas are conceptualized as a control volume consisting of three hydrogeologic components: the soils and streams, basin fill, and consolidated rocks. The soils and streams hydrogeologic component consists of all surface-water bodies and soils extending to the bottom of the plant root zone. The basin-fill hydrogeologic component consists of unconsolidated and semiconsolidated sediment deposited in the structural basin. The consolidated-rocks hydrogeologic component consists of the crystalline and sedimentary rocks that form the mountain blocks and basement rock of the structural basin. Hydrogeologic areas were

  10. Editors' message--Hydrogeology Journal in 2003

    Science.gov (United States)

    Voss, Clifford; Olcott, Perry; Schneider, Robert

    2004-01-01

    Hydrogeology Journal appeared in six issues containing a total of 710 pages and 48 major articles, including 31 Papers and 14 Reports, as well as some Technical Notes and Book Reviews. The number of submitted manuscripts continues to increase. The final issue of 2003 also contained the annual volume index. Hydrogeology Journal (HJ) is an international forum for hydrogeology and related disciplines and authors in 2003 were from about 28 countries. Articles advanced hydrogeologic science and described hydrogeologic systems in many regions worldwide. These articles focused on a variety of general topics and on studies of hydrogeology in 24 countries: Afghanistan, Algeria, Argentina, Australia, Bangladesh, Belgium, Canada, Chile, China, Denmark, France, India, Italy, Mexico, Netherlands, New Zealand, Nigeria, Norway, Portugal, Russia, South Africa, Switzerland, Turkey, and U.S.A. The Guest Editor of the 2003 HJ theme issue on “Hydromechanics in Geology and Geotechnics”, Ove Stephansson, assembled a valuable collection of technical reviews and research papers from eminent authors on important aspects of the subject area.

  11. HIV/AIDS in mid-sized cities in Senegal: From individual to place-based vulnerability.

    Science.gov (United States)

    Drame, Fatou Maria; Foley, Ellen E

    2015-05-01

    In Senegal, recent data indicates that the HIV epidemic is increasingly driven by concurrent sexual partners among men and women in stable relationships. In order to respond to this changing epidemiological profile in Senegal, multi-lateral and national AIDS actors require information about these emerging trends in unstudied populations. To that end, this study has several objectives, first, to assess local dynamics of sexual behaviors among individuals at popular socializing venues in areas at increased risk of HIV transmission; and then to examine how particular venues may influence risks of HIV transmission. In 2013 we collected data at 314 venues in 10 cities in Senegal using PLACE methodology. These venues were listed with collaboration of 374 community informants. They are places where commercial sex workers, MSM, and individuals who are not part of any identified risk group socialize and meet new sexual partners. We conducted 2600 interviews at the 96 most popular venues. A significant portion of the sample reports buying or selling sex and the majority engaged in behavior considered high-risk for transmitting sexual infections. Almost a quarter of patrons interviewed in venues were young people aged 15-24 years. Types of venues described were very diverse. Half of them were venues (n = 156) where sex workers could be solicited and almost a third were venues where MSM could meet male partners (n = 90). The study showed existing pockets of vulnerability to HIV in Thies, Bignona or Saly that are not evident from aggregate HIV data. These early findings suggest links between risky behaviors and type of venue on the one hand and type of city on the other hand. Finally, these findings offer complementary insight to existing studies of HIV vulnerability in Senegal and support a case for venue-based interventions.

  12. A new GIS-based tsunami risk evaluation: MeTHuVA (METU tsunami human vulnerability assessment) at Yenikapı, Istanbul

    Science.gov (United States)

    Cankaya, Zeynep Ceren; Suzen, Mehmet Lutfi; Yalciner, Ahmet Cevdet; Kolat, Cagil; Zaytsev, Andrey; Aytore, Betul

    2016-07-01

    Istanbul is a mega city with various coastal utilities located on the northern coast of the Sea of Marmara. At Yenikapı, there are critical vulnerable coastal utilities, structures, and active metropolitan life. Fishery ports, commercial ports, small craft harbors, passenger terminals of intercity maritime transportation, waterfront commercial and/or recreational structures with residential/commercial areas and public utility areas are some examples of coastal utilization that are vulnerable to marine disasters. Therefore, the tsunami risk in the Yenikapı region is an important issue for Istanbul. In this study, a new methodology for tsunami vulnerability assessment for areas susceptible to tsunami is proposed, in which the Yenikapı region is chosen as a case study. Available datasets from the Istanbul Metropolitan Municipality and Turkish Navy are used as inputs for high-resolution GIS-based multi-criteria decision analysis (MCDA) evaluation of tsunami risk in Yenikapı. Bathymetry and topography database is used for high-resolution tsunami numerical modeling where the tsunami hazard, in terms of coastal inundation, is deterministically computed using the NAMI DANCE numerical code, considering earthquake worst case scenarios. In order to define the tsunami human vulnerability of the region, two different aspects, vulnerability at location and evacuation resilience maps were created using the analytical hierarchical process (AHP) method of MCDA. A vulnerability at location map is composed of metropolitan use, geology, elevation, and distance from shoreline layers, whereas an evacuation resilience map is formed by slope, distance within flat areas, distance to buildings, and distance to road networks layers. The tsunami risk map is then computed by the proposed new relationship which uses flow depth maps, vulnerability at location maps, and evacuation resilience maps.

  13. 基于辐射井抽水试验的水文地质参数求解%Determination of hydrogeological parameter based on the data of radiation well pumping test

    Institute of Scientific and Technical Information of China (English)

    吴彬; 刘慧; 王智

    2013-01-01

    specific yield based on the wiring method. However, the calculated specific yield has certain limitation, so the determination of arid aquifer' s hydrogeology parameters must be carried out the further study in the future.%在新疆台兰河流域冲洪积扇平原修建坎儿井式地下水库,以解决干旱区水资源合理利用分配等问题.为确定该地下水库库区的水文地质参数,本文利用研究区抽水试验资料,采用等效大井法和博尔顿法计算含水层的渗透系数和给水度,并利用MODFLOW软件建立了数值模型,进行参数反演,以验证计算结果的准确性、可靠性.利用等效大井法在已知抽水量和降深的前提下,反求含水层渗透系数;通过博尔顿法的“迟后疏干”效应,采用配线法确定给水度.计算结果表明:对于台兰河流域含水层的水文地质参数的计算,采用等效大井法和博尔顿法计算的结果较符合实际,为今后计算干旱区含水层水文地质参数提供参考依据.

  14. 基于爬虫的XSS漏洞检测工具设计与实现%Design and Implementation of XSS Vulnerability Detection Tool Based on Crawler

    Institute of Scientific and Technical Information of China (English)

    沈寿忠; 张玉清

    2009-01-01

    Through the deep study and analysis oftbe Cross Site Scripting(XSS) vulnerability, this paper knows that how the XSS vulnerability produces and to be used. Further analysis and improvement are made about the XSS vulnerability's detection mechanism. This paper realizes an XSS vulnerability detection tools(XSS-Scan) based on Crawler's technology, and does the analysis and comparison with some popular soRwares. This tool can be used to audit the Web site's safety and detect the existence of XSS vulnerability in it.%通过对XSS漏洞的研究,剖析其产生、利用的方式,在此基础上针对XSS漏洞的检测机制进行进一步的分析和完善.结合阿络爬虫的技术,研究设计并实现了一款XSS漏洞的检测工具(XSS-Scan),并与当前比较流行的一些软件做了分析比较,证明利用该工具可以对Web网站进行安全审计,检测其是否存在XSS漏洞.

  15. Measuring Vulnerability in the Food System

    OpenAIRE

    Paloviita, Ari; Puupponen, Antti; Kortetmäki, Teea; Silvasti, Tiina

    2015-01-01

    Food system vulnerability is an emerging concept for food security policies and food supply chain management. Hence, measuring food system vulnerability is necessary for developing appropriate food security policies and managing food supply chain vulnerabilities. In this paper, we aim to clarify the development process of food system vulnerability indicators. We conducted an abducted qualitative content analysis based on public documents of various Finnish organizations, including mi...

  16. Preschool children with lower executive function may be more vulnerable to emotional-based eating in the absence of hunger.

    Science.gov (United States)

    Pieper, Joy Rickman; Laugero, Kevin D

    2013-03-01

    Decreased executive function (EF) has been linked to unhealthy eating behaviors and obesity in older children and adults, however little is known about this relationship in young children. One possible reason for this association is that individuals with degraded EF are more vulnerable to emotional-based overeating. Emotional eating may thus be more likely to occur in persons with lower self-control or ability to regulate emotions. A pilot project in a research-based preschool was conducted to examine the relationships between executive function, emotional arousal and eating in the absence of hunger (EAH) in 3-6year-old children. Executive function was measured through child-completed tasks, parent questionnaires, and standardized teacher reports. Emotional arousal was measured via skin conductance. Children who had lower cognitive development scores as indicated by teacher reports had higher EAH. Increased emotional arousal was associated with increased EAH, but only in a subgroup of children who had a lower capacity for emotional regulation as suggested by lower delay of gratification scores, lower effortful control (parent questionnaire), and overall lower teacher-reported cognitive development. Further studies are necessary to determine whether interventions to improve executive function and emotional regulation in young children may also have the benefit of improving eating behaviors and decreasing risk of obesity in the long run.

  17. Geological and hydrogeological conditions of the Aigion seismic active fault zone (Deep Geodynamic Laboratory Corinth) based on borehole data and hydraulic tests

    Science.gov (United States)

    Rettenmaier, D.; Giurgea, V.; Pizzino, L.; Unkel, I.; Hoetzl, H.; Foerster, A.; Quattrocchi, F.; Nikas, K.

    2003-04-01

    The Gulf of Corinth and the northern part of the Peloponnesus/Greece, an area of asymmetric graben structure, step faults and tilted blocks, is one of the most active seismic zones in the world. Six major faults are known to be most responsible for the historic and present seismic activities in the area of Aigion. Our study focuses preliminarily on the area around the Aigion fault, whose trace runs E-W through the harbour of Aigion. Investigations of the stratigraphic sequence, tectonic structure and hydrogeologic conditions of the southern Corinth graben shoulder and first drilling activities there, have started in summer 2001. From July until September 2002 the International Continental Deep Drilling Project (ICDP) and the EU Project DGLab-Gulf of Corinth drilled the AIG10 borehole in the harbour of Aigion to a total depth of 1001 m. Our investigations in this ICDP/EU framework are aimed at studying the thermal-hydraulic conditions on the southern graben shoulder. Here we report the first results on sampling and hydraulic testing. The deep AIG10 borehole has successfully cored in approx. 760 m depth the fault plane, which separates fractured radiolarite in the hanging wall from highly fractured and karstified platy, micritic limestone (Olonos-Pindos Unit) in the footwall. A complete lithologic section is now available through the monitoring of cuttings and cores, which built a major cornerstone for defining an integrated regional tectonic and geologic model. Several pumping tests and hydrochemical investigations made in the region of Aigion and especially in the AIG10 borehole deliver together with geophysical borehole logging the database for a thermo-hydraulic heat flow model. The pumping test AIG10C in the conglomerates of the graben sediments show a hydraulic conductivity of about 2 x 10E-5 m/s - 3 x 10E-4 m/s at a depth of approximately 211 m. The result was a residual drawdown, which indicates a closed hydraulic system between the semi-permeable Aigion

  18. Forecasting the effects of EU policy measures on the nitrate pollution of groundwater based on a coupled agroeconomic - hydro(geo)logic model (Invited)

    Science.gov (United States)

    Wendland, F.

    2010-12-01

    The fundamental objectives of the European Union-Water Framework Directive and the EU Groundwater Directive are to attain a good status of water and groundwater resources in the member states of the EU by 2015. For river basins, whose good status cannot be guaranteed by 2015, catchment wide operational plans and measurement programs have to be drafted and implemented until 2009. In the river basin district Weser, Germany, which comprises a catchment area of ca. 49.000 km2, the achievement of the good status is unclear, or rather unlikely for 63% of the groundwater bodies. Inputs from diffuse sources and most of all nitrate losses from agriculturally used land have been identified as the main reasons for exceeding the groundwater threshold value for nitrate (50 mg/l) and for failing the good qualitative status of groundwater. The achievement of good qualitative status of groundwater bodies entails a particular challenge as the complex ecological, hydrological, hydrogeological and agro-economic relationships have to be considered simultaneously. We used an interdisciplinary model network to predict the nitrogen intakes into groundwater at the regional scale using an area differentiated approach. The model system combines the agro-economic model RAUMIS for estimating nitrogen surpluses from agriculture and the hydrological models GROWA/DENUZ/WEKU for describing the reactive nitrate transport in the soil-groundwater system. In a first step the model is used to analyze the present situation using N surpluses from agriculture for the year 2003. In many region of the Weser basin, particularly in the northwestern part which is characterized by high livestock densities, predicted nitrate concentrations in percolation water exceed the EU groundwater quality standard of 50 mg/L by far. In a second step the temporal and spatial impacts of the common agricultural policy (CAP) of the EU, already implemented agri-environmental measures of the Federal States and the expected

  19. Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers

    CERN Document Server

    Shioji, Eitaro; Uyematsu, Tomohiko

    2010-01-01

    Silva et al. proposed a universal secure network coding scheme based on MRD codes, which can be applied to any underlying network code. This paper considers a stronger eavesdropping model where the eavesdroppers possess the ability to re-select the tapping links during the transmission. We give a proof for the impossibility of attaining universal security against such adversaries using Silva et al.'s code for all choices of code parameters, even with restricted number of tapped links. We also consider the cases with restricted tapping duration and derive some conditions for this code to be secure.

  20. Supply Chain Vulnerability Analysis Using Scenario-Based Input-Output Modeling: Application to Port Operations.

    Science.gov (United States)

    Thekdi, Shital A; Santos, Joost R

    2016-05-01

    Disruptive events such as natural disasters, loss or reduction of resources, work stoppages, and emergent conditions have potential to propagate economic losses across trade networks. In particular, disruptions to the operation of container port activity can be detrimental for international trade and commerce. Risk assessment should anticipate the impact of port operation disruptions with consideration of how priorities change due to uncertain scenarios and guide investments that are effective and feasible for implementation. Priorities for protective measures and continuity of operations planning must consider the economic impact of such disruptions across a variety of scenarios. This article introduces new performance metrics to characterize resiliency in interdependency modeling and also integrates scenario-based methods to measure economic sensitivity to sudden-onset disruptions. The methods will be demonstrated on a U.S. port responsible for handling $36.1 billion of cargo annually. The methods will be useful to port management, private industry supply chain planning, and transportation infrastructure management.

  1. Hydrogeological assessment of the Thar lignite prospect

    Energy Technology Data Exchange (ETDEWEB)

    Singh, R.N.; Stace, R. [Nottingham Centre of Geomechanics (United Kingdom). Dept. of Civil Engineering, Faculty of Engineering; Pathan, A.G. [Mehran Univ. of Engineering and Technology, Shahrood (Iran, Islamic Republic of). Faculty of Mining, Petroleum and Geophysics; Atkins, A.S. [Staffordshire Univ., Stafford (United Kingdom). Faculty of Computing, Engineering and Technology

    2010-07-01

    This paper described a hydrogeological appraisal conducted at a proposed mine site in the Thar lignite field in Pakistan. The field contains an estimate 9 billion tonnes of lignite reserves. Three aquifers surrounding the lignite seams are inducing pore pressure in the rock mass and creating hazardous conditions at the site's high wall slopes. Groundwater inflow predictions were conducted using a finite element-based software package. The study was conducted to calculate dewatering quantities in order to ensure stability during excavation activities. Pumping tests conducted in boreholes at the bottom aquifer were used to determine permeability coefficients. Pumping rates from the 3 aquifers were calculated using the equivalent well approach. Results of the simulations were used to predict groundwater inflow from the bottom aquifer to the fully penetrating pit of the mine under steady state flow conditions. Results of the study indicated that 20 pumping out wells equipped with 150 mm diameter motor pumps will be required over a period of 10 years to achieve an overall dewatering rate of 0.6 m{sup 3}/s for the top aquifer. High head borehole pumps are needed for the intermediate and bottom-confined aquifers. 6 refs., 2 tabs., 2 figs.

  2. Vulnerability Analysis in Web Distributed Applications

    Directory of Open Access Journals (Sweden)

    Ion Ivan

    2011-03-01

    Full Text Available The paper analyze vulnerabilities found on web based distributed applications from different perspectives. Classes of vulnerabilities types are identified in order to cope with their different characteristics that each one develops. Methods for analyzing vulnerabilities of an authentication process are developed and solutions are proposed. A model for vulnerability minimization is discussed based on an indicator built on the amount of sensitive data revealed to the end users. Risks are analyzed together with the vulnerabilities that they exploit and measures are identified to combat these pairs.

  3. Teacher training in multicultural educational institutions and vulnerable. Base to build inclusive and intercultural citizenship

    Directory of Open Access Journals (Sweden)

    Iván Manuel Sánchez Fontalvo

    2014-07-01

    Full Text Available Education for an inclusive and intercultural citizenship has recreate in all educational institutions, since the nature of the sociocultural reality in their daily requests for urgent manner the formation of competent citizens to interact with diverse individuals and groups that make and build local, political and cultural communities. It is within reach mutual exchange of goods and cultural values, based on the active promotion of respect and interdependence, allowing the development of projects that benefit the common good, which together different people involved. It is necessary, point and carry out processes of teacher training in their own institutions which are dimensional development of critical judgment to problems hindering social welfare, allowing sensitize people towards assume e introspecten suspicion and evidence of marginalization and exclusion. In this altruistic line is required to learn or awaken the ability to identify the voices of people and groups involved in the processes of social injustice and sociocultural, economic and educational backwardness, be flexible and put us alongside them in their emancipation justified in the research standing reach their dignity and freedom.

  4. Early handling reduces vulnerability of rats to activity-based anorexia.

    Science.gov (United States)

    Carrera, O; Gutiérrez, E; Boakes, R A

    2006-11-01

    Resistance to restricted feeding with and without wheel access was tested in rats handled (H) for 20 days since birth. Weight loss produced by 1.5-hr restricted food access was less in H than in non-handled (NH) males when tested aged 41 days. At this age combining food restriction with access to a running wheel (a procedure commonly known as activity-based anorexia, ABA) produced very rapid weight loss and no effect of handling was detected. When 75-day females were tested in the same way, under the ABA procedure H rats took longer than NH controls to reach the removal criterion. Simply restricting food access in these females produced variable weight loss, without detection of any handling effect. No differences in food intake or running were detected between H and NH rats in either males or females. In conclusion, handling seems to have a direct effect on rats' later response to either food deprivation alone or to an ABA procedure.

  5. Development and implementation of a GIS-based tool for spatial modeling of seismic vulnerability of Tehran

    Directory of Open Access Journals (Sweden)

    M. Hashemi

    2012-12-01

    Full Text Available Achieving sustainable development in countries prone to earthquakes is possible with taking effective measures to reduce vulnerability to earthquakes. In this context, damage assessment of hypothetical earthquakes and planning for disaster management are important issues. Having a computer tool capable of estimating structural and human losses from earthquakes in a specific region may facilitate the decision-making process before and during disasters. Interoperability of this tool with wide-spread spatial analysis frameworks will expedite the data transferring process. In this study, the earthquake damage assessment (EDA software tool is developed as an embedded extension within a GIS (geographic information system environment for the city of Tehran, Iran. This GIS-based extension provides users with a familiar environment to estimate and observe the probable damages and fatalities of a deterministic earthquake scenario. The productivity of this tool is later demonstrated for southern Karoon parish, Region 10, Tehran. Three case studies for three active faults in the area and a comparison of the results with other research substantiated the reliability of this tool for additional earthquake scenarios.

  6. Care for the most vulnerable children in Tanzania: a faith-based model of care and support for children affected by HIV.

    Science.gov (United States)

    Mmbando, Paul; Hartwig, Kari A; Hofgren, Berit; Disorbo, Phil; Smith, Shelley; Hartwig, Kristopher N

    2009-01-01

    In the fight against HIV and AIDS in sub-Saharan Africa, the plight of orphaned and vulnerable children was long overlooked. The first United Nations report on orphans and vulnerable children did not emerge until 2002 after more than two generations of children and youth had struggled to survive with limited family, institutional, or government support. The major social determinants of health for infants and children with one or more parents dying or dead from HIV include pervasive poverty, weak community social support systems, lack of policy commitment by governments or foreign donors, lack of access to anti-retroviral drugs, limited access to schools, and gender. In this paper, we present a model of care and support to the most vulnerable children (MVC) affected by HIV that brings together faith-based institutions in partnership with the government and community volunteers in 13 rural districts of Tanzania. Although still being implemented, the project has a number of valuable lessons learned for program managers, donors, and researchers working with faith-based organizations in the development and delivery of services to the most vulnerable children in a resource-limited setting.

  7. Uncertainty in geological and hydrogeological data

    Directory of Open Access Journals (Sweden)

    B. Nilsson

    2007-09-01

    Full Text Available Uncertainty in conceptual model structure and in environmental data is of essential interest when dealing with uncertainty in water resources management. To make quantification of uncertainty possible is it necessary to identify and characterise the uncertainty in geological and hydrogeological data. This paper discusses a range of available techniques to describe the uncertainty related to geological model structure and scale of support. Literature examples on uncertainty in hydrogeological variables such as saturated hydraulic conductivity, specific yield, specific storage, effective porosity and dispersivity are given. Field data usually have a spatial and temporal scale of support that is different from the one on which numerical models for water resources management operate. Uncertainty in hydrogeological data variables is characterised and assessed within the methodological framework of the HarmoniRiB classification.

  8. Waterborne toxoplasmosis investigated and analysed under hydrogeological assessment: new data and perspectives for further research.

    Science.gov (United States)

    Vieira, Flávia Pereira; Alves, Maria da Glória; Martins, Livia Mattos; Rangel, Alba Lucínia Peixoto; Dubey, Jitender Prakash; Hill, Dolores; Bahia-Oliveira, Lilian Maria Garcia

    2015-11-01

    We present a set of data on human and chicken Toxoplasma gondii seroprevalence that was investigated and analysed in light of groundwater vulnerability information in an area endemic for waterborne toxoplasmosis in Brazil. Hydrogeological assessment was undertaken to select sites for water collection from wells for T. gondii oocyst testing and for collecting blood from free-range chickens and humans for anti-T. gondii serologic testing. Serologic testing of human specimens was done using conventional commercial tests and a sporozoite-specific embryogenesis-related protein (TgERP), which is able to differentiate whether infection resulted from tissue cysts or oocysts. Water specimens were negative for the presence of viable T. gondii oocysts. However, seroprevalence in free-range chickens was significantly associated with vulnerability of groundwater to surface contamination (p toxoplasmosis in light of groundwater vulnerability information associated with prevalence in humans estimated by oocyst antigens recognition have implications for the potential role of hydrogeological assessment in researching waterborne toxoplasmosis at a global scale.

  9. SRP baseline hydrogeologic investigation, Phase 2

    Energy Technology Data Exchange (ETDEWEB)

    Bledsoe, H.W.

    1987-11-01

    As discussed in the program plan for the Savannah River Plant (SRP) Baseline Hydrogeologic Investigation, this program has been implemented for the purpose of updating and improving the current state of knowledge and understanding of the hydrogeologic systems underlying the Savannah River Plant (SRP). The objective of the program is to install a series of observation well clusters (wells installed in each major water bearing formation at the same site) at key locations across the plant site in order to: (1) provide detailed information on the lithology, stratigraphy, and groundwater hydrology, (2) provide observation wells to monitor the groundwater quality, head relationships, gradients, and flow paths.

  10. SRP Baseline Hydrogeologic Investigation, Phase 3

    Energy Technology Data Exchange (ETDEWEB)

    Bledsoe, H.W.

    1988-08-01

    The SRP Baseline Hydrogeologic Investigation was implemented for the purpose of updating and improving the knowledge and understanding of the hydrogeologic systems underlying the SRP site. Phase III, which is discussed in this report, includes the drilling of 7 deep coreholes (sites P-24 through P-30) and the installation of 53 observation wells ranging in depth from approximately 50 ft to more than 970 ft below the ground surface. In addition to the collection of geologic cores for lithologic and stratigraphic study, samples were also collected for the determination of physical characteristics of the sediments and for the identification of microorganisms.

  11. SRP baseline hydrogeologic investigation: Aquifer characterization

    Energy Technology Data Exchange (ETDEWEB)

    Strom, R.N.; Kaback, D.S.

    1992-03-31

    An investigation of the mineralogy and chemistry of the principal hydrogeologic units and the geochemistry of the water in the principal aquifers at Savannah River Site (SRS) was undertaken as part of the Baseline Hydrogeologic Investigation. This investigation was conducted to provide background data for future site studies and reports and to provide a site-wide interpretation of the geology and geochemistry of the Coastal Plain Hydrostratigraphic province. Ground water samples were analyzed for major cations and anions, minor and trace elements, gross alpha and beta, tritium, stable isotopes of hydrogen, oxygen, and carbon, and carbon-14. Sediments from the well borings were analyzed for mineralogy and major and minor elements.

  12. The study of past damaging hydrogeological events for damage susceptibility zonation

    Directory of Open Access Journals (Sweden)

    O. Petrucci

    2008-08-01

    Full Text Available Damaging Hydrogeological Events are defined as periods during which phenomena, such as landslides, floods and secondary floods, cause damage to people and the environment.

    A Damaging Hydrogeological Event which heavily damaged Calabria (Southern Italy between December 1972, and January 1973, has been used to test a procedure to be utilised in the zonation of a province according to damage susceptibility during DHEs. In particular, we analyzed the province of Catanzaro (2391 km2, an administrative district composed of 80 municipalities, with about 370 000 inhabitants.

    Damage, defined in relation to the reimbursement requests sent to the Department of Public Works, has been quantified using a procedure based on a Local Damage Index. The latter, representing classified losses, has been obtained by multiplying the value of the damaged element and the percentage of damage affecting it.

    Rainfall has been described by the Maximum Return Period of cumulative rainfall, for both short (1, 3, 5, 7, 10 consecutive days and long duration (30, 60, 90, 180 consecutive days, recorded during the event.

    Damage index and population density, presumed to represent the location of vulnerable elements, have been referred to Thiessen polygons associated to rain gauges working at the time of the event.

    The procedure allowed us to carry out a preliminary classification of the polygons composing the province according to their susceptibility to damage during DHEs. In high susceptibility polygons, severe damage occurs during rainfall characterised by low return periods; in medium susceptibility polygons maximum return period rainfall and induced damage show equal levels of exceptionality; in low susceptibility polygons, high return period rainfall induces a low level of damage.

    The east and west sectors of the province show the highest susceptibility, while polygons of the N-NE sector show the lowest

  13. Spatiotemporal variation of watershed health propensity through reliability-resilience-vulnerability based drought index (case study: Shazand Watershed in Iran).

    Science.gov (United States)

    Sadeghi, Seyed Hamidreza; Hazbavi, Zeinab

    2017-06-01

    Quantitative response of the watershed health to climate variability is of critical importance for watershed managers. However, existing studies seldom considered the impact of climate variability on watershed health. The present study therefore aimed to analyze the temporal and spatial variability of reliability (Rel), resilience (Res) and vulnerability (Vul) indicators in node years of 1986, 1998, 2008 and 2014 in connection with Standardized Precipitation Index (SPI) for 24 sub-watersheds in the Shazand Watershed of Markazi Province in Iran. The analysis was based on rainfall variability as one of the main climatic drivers. To achieve the study purposes, the monthly rainfall time series of eight rain gauge stations distributed across the watershed or neighboring areas were analyzed and corresponding SPIs and Rel ResVul indicators were calculated. Ultimately, the spatial variation of SPI oriented Rel ResVul was mapped for the study watershed using Geographic Information System (GIS). The average and standard deviation of SPI-Rel ResVul index for the study years of 1986, 1998, 2008 and 2014 was obtained 0.240±0.025, 0.290±0.036, 0.077±0.0280 and 0.241±0.081, respectively. In overall, the results of the study proved the spatiotemporal variations of SPI-Rel ResVul watershed health index in the study area. Accordingly, all the sub-watersheds of the Shazand Watershed were grouped in unhealthy and very unhealthy conditions in all the study years. For 1986 and 1998 all the sub-watersheds were assessed in unhealthy status. Whilst, it declined to very unhealthy condition in 2008 and then some 75% of the watershed ultimately referred again to unhealthy and the rest still remained under very unhealthy conditions in 2014.

  14. A Vulnerability Evaluation of the Phreatic Water in the Plain Area of the Junggar Basin, Xinjiang Based on the VDEAL Model

    Directory of Open Access Journals (Sweden)

    Ruiliang Jia

    2014-11-01

    Full Text Available A VDEAL (V is the lithology of the vadose zone, D is the groundwater depth, E is the degree of groundwater exploitation, A is the aquifer characteristics and L is the land use pattern. model, which is suitable for a vulnerability evaluation of the groundwater in arid inland areas, and that is based on the GOD (G is the groundwater status, O is overburden feature and D is groundwater depth method and DRASTIC (D is the depth of water-table, R is the net recharge, A is the aquifer media, S is the soil media, T is the topography, I is the impact of the vadose and C is the conductivity of the aquifer. model is proposed in this paper. Five indicators were selected by reference to the DRAV (D is the depth of water-table, R is the net recharge, A is the aquifer media and V is the impact of the vadose. and VLDA (V is the lithology of the vadose zone , L is the land use pattern, D is the groundwater depth and A is the aquifer characteristics and. models, namely, the lithology of the vadose zone (V, the groundwater depth (D, the degree of groundwater exploitation (E, the aquifer characteristics (A and the land use pattern (L. According to monitoring data from 2003 and 2011, the variations of phreatic water quality in the plain area of the Junggar Basin were divided into three types: the water quality may have deteriorated, be unchanged or improved. Four groups of indicator weights were configured to calculate the vulnerability index using the VDEAL model. The changes of phreatic water quality were then compared against the vulnerability index. The normalized weights of V, D, E, A, and L were respectively 0.15, 0.25, 0.10, 0.10, and 0.40; this is according to the principle that the sampling sites of deteriorated water quality are generally distributed in a high-vulnerability region, and the sites of unchanged and improved water quality are distributed in middle vulnerability, low vulnerability and invulnerable regions. The evaluation results of phreatic

  15. A Contamination Vulnerability Assessment for the Sacramento Area Groundwater Basin

    Energy Technology Data Exchange (ETDEWEB)

    Moran, J E; Hudson, G B; Eaton, G F; Leif, R

    2004-03-10

    In response to concerns expressed by the California Legislature and the citizenry of the State of California, the State Water Resources Control Board (SWRCB), implemented a program to assess groundwater quality, and provide a predictive capability for identifying areas that are vulnerable to contamination. The program was initiated in response to concern over public supply well closures due to contamination by chemicals such as MtBE from gasoline, and solvents from industrial operations. As a result of this increased awareness regarding groundwater quality, the Supplemental Report of the 1999 Budget Act mandated the SWRCB to develop a comprehensive ambient groundwater-monitoring plan, and led to the initiation of the Ambient Groundwater Monitoring and Assessment (GAMA) Program. The primary objective of the GAMA Program is to assess the water quality and to predict the relative susceptibility to contamination of groundwater resources throughout the state of California. Under the GAMA program, scientists from Lawrence Livermore National Laboratory (LLNL) collaborate with the SWRCB, the U.S. Geological Survey, the California Department of Health Services (DHS), and the California Department of Water Resources (DWR) to implement the groundwater assessment program in cooperation with local water purveyors. In 2001 and 2002, LLNL carried out this vulnerability study in the groundwater basin of Sacramento suburban area, located to the north of the American River and to the east of the Sacramento River. The goal of the study is to provide a probabilistic assessment of the relative vulnerability of groundwater used for the public water supply to contamination from surface sources. This assessment of relative contamination vulnerability is made based on the results of two types of analyses that are not routinely carried out at public water supply wells: ultra low-level measurement of volatile organic compounds (VOCs), and groundwater age dating (using the tritium-helium-3

  16. Hydrogeologic framework of western Cape Cod, Massachusetts

    Science.gov (United States)

    Masterson, John P.; Stone, Byron D.; Walter, Donald A.; Savoie, Jennifer G.

    1997-01-01

    The aquifer of western Cape Cod consists of several hydrogeologic units composed of sand, gravel, silt, and clay (fig. 1) that were deposited during the late Wisconsinan glaciation of New England. The aquifer is a shallow, unconfined hydrologic system in which ground-water flows radially outward from the apex of the ground-water mound near the center of the peninsula toward the coast (fig.2). The aquifer is the sole source of water supply for the towns of Bourne, Sandwich, Falmouth, and Mashpee, and the Massachusetts Military Reservation (MMR).Previous geologic studies summarized the characteristics and relative ages of the glacial moraines and meltwater deposits and the relation of these sediments to the extent of the ice-sheet lobes during the last glaciation of southern New England (Oldale and Barlow, 1986; Hartshorn and others, 1991). Hydrogeologic studies in western Cape Cod characterized the shallow regional ground-water-flow system (LeBlanc and others, 1986) and analyzed simulated responses of the aquifer to changes in hydrologic stresses (Guswa and LeBlanc, 1985; Barlow and Hess, 1993; Masterson and Barlow, 1994; and Masterson and others, 1996). Recent concerns about widespread ground-water contamination, especially from sources on the MMR, have resulted in extensive investigations to characterize the local hydrogeology of the aquifer near the MMR (ABB Environmental Services, 1992). Masterson and others (1996) illustrated the strong influence of geology on ground-water flow and the importance of characterizing the hydrogeology to predict the migration of the contaminant plumes beneath the MMR.This report, a product of a cooperative study between the National Guard Bureau and the U.S. Geological Survey (USGS), characterizes the regional hydrogeology of the western Cape Cod aquifer on the basis of surficial glacial geology previously described by Mather and others (1940) and Oldale and Barlow (1986), and presents a new analysis of the subsurface hydrogeology

  17. Hydrogeology and groundwater availability in Clarke County, Virginia

    Science.gov (United States)

    Nelms, David L.; Moberg, Roger M.

    2010-01-01

    seasonal highs and lows tend to shift in response to the current conditions. Springs generally are present along faults and fold axes, and discharges for the study period ranged from dry to 10 cubic feet per second. A similar downward trend in discharges correlates with the trend in water levels and is indicative of an aquifer system that, over time, drains to a base level controlled by springs and streams. Point discharge from springs can occur as the start of flows of streams and creeks, along banks, and as discrete discharge through streambeds in the Great Valley. For the most part, streams, creeks, and rivers in the Great Valley function as aqueducts. Springs in the Blue Ridge have relatively low discharge rates, have small drainage areas, and are susceptible to current meteorological conditions. Estimates of effective groundwater recharge from 2001 to 2007 ranged from 6.4 to 23.0 inches per year (in/yr) in the Dry Marsh Run and Spout Run Basins with averages of 11.6 and 11.9 in/yr, respectively. Base flow accounted for between 80 and 97 percent of mean streamflow and averaged about 90 percent in these basins. The high base-flow index values (percent of streamflow from base flow) in the Dry Marsh Run and Spout Run Basins indicate that groundwater is the dominant source of streamflow during both wet and drought conditions. Between 46 and 82 percent of the precipitation that fell on the Dry Marsh Run and Spout Run Basins from 2001 to 2007 was removed by evapotranspiration, and an average of approximately 30 percent of the precipitation reached the water table as effective recharge. The high permeability of the rocks and low relief in these basins are not conducive for runoff; therefore, on average, only about 3 to 4 percent of the precipitation becomes runoff. Groundwater flow systems in the county are extremely vulnerable to current climatic conditions. Successive years of below-average effective recharge cause declines in water levels, spring discha

  18. Hydrogeological modeling for improving groundwater monitoring network and strategies

    Science.gov (United States)

    Thakur, Jay Krishna

    2016-09-01

    The research aimed to investigate a new approach for spatiotemporal groundwater monitoring network optimization using hydrogeological modeling to improve monitoring strategies. Unmonitored concentrations were incorporated at different potential monitoring locations into the groundwater monitoring optimization method. The proposed method was applied in the contaminated megasite, Bitterfeld/Wolfen, Germany. Based on an existing 3-D geological model, 3-D groundwater flow was obtained from flow velocity simulation using initial and boundary conditions. The 3-D groundwater transport model was used to simulate transport of α-HCH with an initial ideal concentration of 100 mg/L injected at various hydrogeological layers in the model. Particle tracking for contaminant and groundwater flow velocity realizations were made. The spatial optimization result suggested that 30 out of 462 wells in the Quaternary aquifer (6.49 %) and 14 out of 357 wells in the Tertiary aquifer (3.92 %) were redundant. With a gradual increase in the width of the particle track path line, from 0 to 100 m, the number of redundant wells remarkably increased, in both aquifers. The results of temporal optimization showed different sampling frequencies for monitoring wells. The groundwater and contaminant flow direction resulting from particle tracks obtained from hydrogeological modeling was verified by the variogram modeling through α-HCH data from 2003 to 2009. Groundwater monitoring strategies can be substantially improved by removing the existing spatio-temporal redundancy as well as incorporating unmonitored network along with sampling at recommended interval of time. However, the use of this model-based method is only recommended in the areas along with site-specific experts' knowledge.

  19. The Effects of a School-Based Psychosocial Intervention on Resilience and Health Outcomes among Vulnerable Children

    Science.gov (United States)

    Olowokere, A. E.; Okanlawon, F. A.

    2014-01-01

    Responding to the psychosocial health needs of the vulnerable population has been considered as a significant public health issue that must be addressed through access to public health professionals. The study adopted a quasi-experimental design to evaluate the impact of a training program on nurses and teachers' knowledge of psychosocial health…

  20. Youth Empowerment for the Most Vulnerable: A Model Based on the Pedagogy of Freire and Experiences in the Field

    Science.gov (United States)

    Mohajer, Nicole; Earnest, Jaya

    2009-01-01

    Purpose: This paper aims to review global adolescent empowerment programmes and develops and proposes a model that can be used with vulnerable adolescents. The model reflects theory and experience drawn from the literature. Design/methodology/approach: The review is a synthesis of articles on empowerment theory, models and programme evaluations.…

  1. DS926 Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system in Florida and parts of Georgia, Alabama, and South Carolina -- Point features used for the top of the regional middle confining unit (base of Upper Floridan aquifer)

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system were developed to define an updated hydrogeologic framework as part...

  2. DS926 Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system in Florida and parts of Georgia, Alabama, and South Carolina -- Raster surface depicting the top of the regional middle confining unit (base of Upper Floridan aquifer)

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system were developed to define an updated hydrogeologic framework as part...

  3. DS926 Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system in Florida and parts of Georgia, Alabama, and South Carolina -- Point features used for the top of the regional middle confining unit (base of Upper Floridan aquifer), constrained

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system were developed to define an updated hydrogeologic framework as part...

  4. Evaluation of a Home-Based Environmental and Educational Intervention to Improve Health in Vulnerable Households: Southeastern Pennsylvania Lead and Healthy Homes Program

    OpenAIRE

    Deepa Mankikar; Carla Campbell; Rachael Greenberg

    2016-01-01

    This evaluation examined whether participation in a home-based environmental educational intervention would reduce exposure to health and safety hazards and asthma-related medical visits. The home intervention program focused on vulnerable, low-income households, where children had asthma, were at risk for lead poisoning, or faced multiple unsafe housing conditions. Home visitors conducted two home visits, two months apart, consisting of an environmental home assessment, Healthy Homes educati...

  5. Hydrogeological Prognosis with Regard to Realisation of the New Colle Di Tenda Road Tunnel

    Directory of Open Access Journals (Sweden)

    Cinzia Banzato

    2011-01-01

    Full Text Available Problem statement: The doubling of Tenda pass road tunnel jointing SW France to Piedmont (Italy was planned to penetrate a complicate rock structure in which several complex play an hydrogeologic role including carbonate-Karst aquifer between flysch impervious complexes. The main problem of the project is the presence of an hydraulic circulation feeding a spring of social and economic great importance discharging into a railroad tunnel below. Approach: The authors was charged by ANAS, Italian National Roads Authority, to execute a complete hydrogeologic prognosis of the situation that will be determinate by the excavation of the new tunnel and forecast as well as possible the hazard for the tapped spring. Results: Two years research have included a complete hydrogeologic and hydrochemical survey all the hypothesized structure feeding the spring, with several bore holes used as observation wells, the use of several monitoring device for the discharge and the chemical characters of spring, a lot of laboratory tests on cements and micro-cements and other materials used in waterproofing and sustain the rocks during the excavation and the concrete lining of the tunnel. Conclusion: The study ends with the evaluation of the vulnerability of the spring and the forecasting of contamination and depletion of the spring.

  6. Assessment of groundwater vulnerability to pollution of a wetland watershed : the case study of the Oualidia-Sidi Moussa wetland, Morocco

    OpenAIRE

    2013-01-01

    The susceptibility of wetlands to continental pollution is closely related to the vulnerability of their surface and sub-surface watersheds. Therefore, to help manage wetlands, especially those fed by groundwater, it can be useful to assess the vulnerability of their aquifers. This approach is illustrated by the case study of the wetland of Oualidia-Sidi Moussa. Firstly, the hydrogeological basin of the wetland was identified. Vulnerability mapping was then performed using the specific Suscep...

  7. Regional hydrogeological simulations using CONECTFLOW. Preliminary site description. Laxemar sub area - version 1.2

    Energy Technology Data Exchange (ETDEWEB)

    Hartley, Lee; Hunter, Fiona; Jackson, Peter; McCarthy, Rachel [Serco Assurance, Risley (United Kingdom); Gylling, Bjoern; Marsic, Niko [Kemakta Konsult AB, Stockholm (Sweden)

    2006-04-15

    The main objective of this study is to support the development of a preliminary Site Description of the Laxemar subarea on a regional-scale based on the available data of November 2004 (Data Freeze L1.2). A more specific objective of this study is to assess the role of both known and less quantified hydrogeological conditions in determining the present-day distribution of saline groundwater in the Laxemar subarea on a regional-scale. An improved understanding of the palaeo-hydrogeology is necessary in order to gain credibility for the Site Description in general and the hydrogeological description in particular. This is to serve as a basis for describing the present hydrogeological conditions on a local-scale, as well as predictions of future hydrogeological conditions. Another objective is to assess the flow-paths from the local-scale model domain, based on the present-day flow conditions, to assess the distribution of discharge and recharge areas connected to the flow at the approximate repository depth to inform the Preliminary Safety Evaluation. Significant new features incorporated in the modelling include: a depth variation in hydraulic properties within the deformation zones; a dependence on rock domain and depth in the rock mass properties in regional-scale models; a more detailed model of the overburden in terms of a layered system of spatially variable thickness made up of several different types of Quaternary deposits has been implemented; and several variants on the position of the watertable have been tried. The motivation for introducing a dependence on rock domain was guided by the hydrogeological interpretation with the aim of honouring the observed differences in hydraulic properties measured at the boreholes.

  8. Implications of adopting a biodiversity-based vulnerability index versus a shoreline environmental sensitivity index on management and policy planning along coastal areas.

    Science.gov (United States)

    Harik, G; Alameddine, I; Maroun, R; Rachid, G; Bruschi, D; Astiaso Garcia, D; El-Fadel, M

    2017-02-01

    In this study, a multi-criteria index was developed to assess anthropogenic stressors along the Mediterranean coastline. The index aimed at geo-locating pollution hotspots for informed decision making related to coastal zone management. The index was integrated in a Geographical Information System based geodatabase implemented at several pilot areas along the Northern (Italy and France), Eastern (Lebanon), and Southern (Tunisia) Mediterranean coastlines. The generated stressor maps were coupled with a biodiversity richness index and an environmental sensitivity index to produce vulnerability maps that can form the basis for prioritizing management and mitigation interventions towards the identification of pollution hotspots and the promotion of sustainable coastal zone management. The results identified significant differences between the two assessment methods, which can bias prioritization in decision making and policy planning depending on stakeholders' interests. The discrepancies emphasize the need for transparency and understanding of the underlying foundations behind vulnerability indices and mapping development.

  9. Fault Hydrogeology Characterization for a Civil Infrastructure Project

    Science.gov (United States)

    Sholley, M. G.; Waterman, M. K.; Attanayake, P. M.

    2011-12-01

    hydrogeology associated with the Arrowhead Spring fault system was required because elevated groundwater temperatures and adverse chemistry posed a risk for tunneling. Standard investigation techniques were employed including borings, geologic mapping with trenching, resistivity surveys, installation and monitoring of observation wells, and assessment of surface water features in the area. A detailed geological model was constructed based on the drilling, mapping and resistivity surveys, but due to the fractured nature of the rock, water level measurements provided little insight into the groundwater flow regime. Under these circumstances, the hydrochemistry proved to be significant. Through the use of the expanded Durov plot, the major ion chemistry contributed to characterization of different water types, their origin, the delineation of the geothermal regime, and the influence of the fault on the groundwater regime. The combination of geological and hydrochemical characterization led to an understanding of the hydrogeology associated with the Arrowhead Springs Fault, and potential impacts to construction as a result of the characterization.

  10. The Research of Hydrogeological Information Release Platform Based on WebGIS%基于 WebGIS的水文地质调查信息发布平台的研究

    Institute of Scientific and Technical Information of China (English)

    肖兴平; 佟元清

    2016-01-01

    在WebGIS、数据库等信息技术支撑下,论述水文地质调查信息发布平台建设的相关方案,围绕水文地质数据特征、平台的体系结构、数据库与平台功能架构等方面进行研究,并提出具体的解决办法,实现了水文地质调查信息发布相关的数据库建设、软件平台开发.表明水文地质调查信息发布平台具有一定的服务专业机构和社会公众的能力,能够助推水文地质调查信息服务经济社会的力度.%This article discusses the in WebGIS and database supported by information technology,hydrological geological survey information release platform construction scheme,around the characteristics of hydrogeological data,platform system structure,database and the function of the platform architecture research,and put forward the specific solution solution,the hydrogeology survey information released related database building and software development platform. Show that the hydroge-ology survey information publishing platform has certain professional services organizations and the public ability,to efforts to boost hydrogeology survey information services,economic and social.

  11. Health-Related Quality of Life, Self-Efficacy and Enjoyment Keep the Socially Vulnerable Physically Active in Community-Based Physical Activity Programs: A Sequential Cohort Study.

    Science.gov (United States)

    Herens, Marion; Bakker, Evert Jan; van Ophem, Johan; Wagemakers, Annemarie; Koelen, Maria

    2016-01-01

    Physical inactivity is most commonly found in socially vulnerable groups. Dutch policies target these groups through community-based health-enhancing physical activity (CBHEPA) programs. As robust evidence on the effectiveness of this approach is limited, this study investigated whether CBHEPA programs contribute to an increase in and the maintenance of physical activity in socially vulnerable groups. In four successive cohorts, starting at a six-month interval, 268 participants from 19 groups were monitored for twelve months in seven CBHEPA programs. Data collection was based on repeated questionnaires. Socio-economic indicators, program participation and coping ability were measured at baseline. Physical activity, health-related quality of life and on-going program participation were measured three times. Self-efficacy and enjoyment were measured at baseline and at twelve months. Statistical analyses were based on a quasi-RCT design (independent t-tests), a comparison of participants and dropouts (Mann-Whitney test), and multilevel modelling to assess change in individual physical activity, including group level characteristics. Participants of CBHEPA programs are socially vulnerable in terms of low education (48.6%), low income (52.4%), non-Dutch origin (64.6%) and health-related quality of life outcomes. Physical activity levels were not below the Dutch average. No increase in physical activity levels over time was observed. The multilevel models showed significant positive associations between health-related quality of life, self-efficacy and enjoyment, and leisure-time physical activity over time. Short CBHEPA programs (10-13 weeks) with multiple trainers and gender-homogeneous groups were associated with lower physical activity levels over time. At twelve months, dropouts' leisure-time physical activity levels were significantly lower compared to continuing participants, as were health-related quality of life, self-efficacy and enjoyment outcomes. BMI and

  12. Extraction of lidar-based dune-crest elevations for use in examining the vulnerability of beaches to inundation during hurricanes

    Science.gov (United States)

    Stockdon, H.F.; Doran, K.S.; Sallenger, A.H.

    2009-01-01

    The morphology of coastal sand dunes plays an important role in determining how a beach will respond to a hurricane. Accurate measurements of dune height and position are essential for assessing the vulnerability of beaches to extreme coastal change during future landfalls. Lidar topographic surveys provide rapid, accurate, high-resolution datasets for identifying the location, position, and morphology of coastal sand dunes over large stretches of coast. An algorithm has been developed for identification of the crest of the most seaward sand dune that defines the landward limit of the beach system. Based on changes in beach slope along cross-shore transects of lidar data, dune elevation and location can automatically be extracted every few meters along the coastline. Dune elevations in conjunction with storm-induced water levels can be used to predict the type of coastal response (e.g., beach erosion, dune erosion, overwash, or inundation) that may be expected during hurricane landfall. The vulnerability of the beach system at Fire Island National Seashore in New York to the most extreme of these changes, inundation, is assessed by comparing lidar-derived dune elevations to modeled wave setup and storm surge height. The vulnerability of the beach system to inundation during landfall of a Category 3 hurricane is shown to be spatially variable because of longshore variations in dune height (mean elevation 5.44 m, standard deviation 1.32 m). Hurricane-induced mean water levels exceed dune elevations along 70 of the coastal park, making these locations more vulnerable to inundation during a Category 3 storm. ?? 2009 Coastal Education and Research Foundation.

  13. The physical hydrogeology of ore deposits

    Science.gov (United States)

    Ingebritsen, Steven E.; Appold, M.S.

    2012-01-01

    Hydrothermal ore deposits represent a convergence of fluid flow, thermal energy, and solute flux that is hydrogeologically unusual. From the hydrogeologic perspective, hydrothermal ore deposition represents a complex coupled-flow problem—sufficiently complex that physically rigorous description of the coupled thermal (T), hydraulic (H), mechanical (M), and chemical (C) processes (THMC modeling) continues to challenge our computational ability. Though research into these coupled behaviors has found only a limited subset to be quantitatively tractable, it has yielded valuable insights into the workings of hydrothermal systems in a wide range of geologic environments including sedimentary, metamorphic, and magmatic. Examples of these insights include the quantification of likely driving mechanisms, rates and paths of fluid flow, ore-mineral precipitation mechanisms, longevity of hydrothermal systems, mechanisms by which hydrothermal fluids acquire their temperature and composition, and the controlling influence of permeability and other rock properties on hydrothermal fluid behavior. In this communication we review some of the fundamental theory needed to characterize the physical hydrogeology of hydrothermal systems and discuss how this theory has been applied in studies of Mississippi Valley-type, tabular uranium, porphyry, epithermal, and mid-ocean ridge ore-forming systems. A key limitation in the computational state-of-the-art is the inability to describe fluid flow and transport fully in the many ore systems that show evidence of repeated shear or tensional failure with associated dynamic variations in permeability. However, we discuss global-scale compilations that suggest some numerical constraints on both mean and dynamically enhanced crustal permeability. Principles of physical hydrogeology can be powerful tools for investigating hydrothermal ore formation and are becoming increasingly accessible with ongoing advances in modeling software.

  14. Recent hydrogeologic study of the Vis island

    Directory of Open Access Journals (Sweden)

    Janislav Kapelj

    2002-12-01

    Full Text Available The Vis Island belongs to the group of the Middle Dalmatian islands. It comprises an area of about 90.2 km2. Morphologically, three belts of highlands and two depressions with karst poljes are significant. The highest point on the island is Hum with 587 m a.s.l. theisland’s water supply is organized from the water-supply station “Korita”, situated in the central part of island, in tectonically formed depression. There are two additional capturedobjects: the well K-1 above the Komiža town and the spring “Pizdica”. The most important hydrogeological role on the island have two hydrogeological barriers, one in the KomižaBay, completely made of impermeable igneous and clastic rocks, and another one, the recently recognized relative barrier in the area of Dra~evo, Plisko and Velo polje. Since the island karst aquifer is in permanent dynamic relation with seawater, classical geologic,structural and hydrogeologic investigations have been performed with application of hydrogeochemical methods taking into account the natural chemical tracer content of groundwater and its variations in different hydrologic and vegetation conditions. Precipitationregime is very unfavorable with regard to the recharging of island’s aquifer, because dry periods are usually very long. During the summer tourist season, when the number of inhabitants and fresh water consumption considerably increase, amounts of island’sgroundwater suitable for water supply and irrigation rapidly decrease. Sometimes, insufficient quantity of fresh water on the Vis Island causes restrictions. Concerning the development of tourist potential and the present agricultural activities, summer lack ofwater is a serious restrictive factor. Some results of the performed hydrogeological study, important as a basis for island’s fresh water potential assessment, will be presented.

  15. Hydrogeology, waste disposal, science and politics: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    Link, P.K. [ed.

    1994-07-01

    A total of 48 papers were presented at the Engineering Geology and Geotechnical Engineering 30th Symposium. These papers are presented in this proceedings under the following headings: site characterization--Pocatello area; site characterization--Boise Area; site assessment; Idaho National Engineering Laboratory; geophysical methods; remediation; geotechnical engineering; and hydrogeology, northern and western Idaho. Individual papers have been processed separately for inclusion in the Energy Science and Technology Database.

  16. Global assessment of vulnerability to sea-level rise in topography-limited and recharge-limited coastal groundwater systems

    Science.gov (United States)

    Michael, Holly A.; Russoniello, Christopher J.; Byron, Lindsay A.

    2013-04-01

    Impacts of rising sea level on the hydraulic balance between aquifers and the ocean threaten fresh water resources and aquatic ecosystems along many world coastlines. Understanding the vulnerability of groundwater systems to these changes and the primary factors that determine the magnitude of system response is critical to developing effective management and adaptation plans in coastal zones. We assessed the vulnerability of two types of groundwater systems, recharge-limited and topography-limited, to changes caused by sea-level rise over a range of hydrogeologic settings. Vulnerability in this context is defined by the rate and magnitude of salinization of coastal aquifers and changes in groundwater flow to the sea. Two-dimensional variable-density groundwater flow and salt transport simulations indicate that the response of recharge-limited systems is largely minimal, whereas topography-limited systems are vulnerable for various combinations of permeability, vertical anisotropy in permeability, and recharge. World coastlines were classified according to system type as a vulnerability indicator. Results indicate that approximately 70% of world coastlines may be topography-limited, though variability in hydrogeologic conditions strongly affects classification. Future recharge and sea-level rise scenarios have much less influence on the proportion of vulnerable coastlines than differences in permeability, distance to a hydraulic divide, and recharge, indicating that hydrogeologic properties and setting are more important factors to consider in determining system type than uncertainties in the magnitude of sea-level rise and hydrologic shifts associated with future climate change.

  17. Enhancing the usability of seasonal to decadal (S2D) climate information - an evidence-based framework for the identification and assessment of sector-specific vulnerabilities

    Science.gov (United States)

    Funk, Daniel

    2016-04-01

    The successful provision of from seasonal to decadal (S2D) climate service products to sector-specific users is dependent on specific problem characteristics and individual user needs and decision-making processes. Climate information requires an impact on decision making to have any value (Rodwell and Doblas-Reyes, 2006). For that reason the knowledge of sector-specific vulnerabilities to S2D climate variability is very valuable information for both, climate service producers and users. In this context a concept for a vulnerability assessment framework was developed to (i) identify climate events (and especially their temporal scales) critical for sector-specific problems to assess the basic requirements for an appropriate climate-service product development; and to (ii) assess the potential impact or value of related climate information for decision-makers. The concept was developed within the EUPORIAS project (European Provision of Regional Impacts Assessments on Seasonal and Decadal Timescales) based on ten project-related case-studies from different sectors all over Europe. In the prevalent stage the framework may be useful as preliminary assessment or 'quick-scan' of the vulnerability of specific systems to climate variability in the context of S2D climate service provision. The assessment strategy of the framework is user-focused, using predominantly a bottom-up approach (vulnerability as state) but also a top-down approach (vulnerability as outcome) generally based on qualitative data (surveys, interviews, etc.) and literature research for system understanding. The starting point of analysis is a climate-sensitive 'critical situation' of the considered system which requires a decision and is defined by the user. From this basis the related 'critical climate conditions' are assessed and 'climate information needs' are derived. This mainly refers to the critical period of time of the climate event or sequence of events. The relevant period of time of problem

  18. Vulnerability assessment of karst aquifer feeding Pertuso Spring (Central Italy): comparison between different applications of COP method

    Science.gov (United States)

    Sappa, Giuseppe; Ferranti, Flavia; Luciani, Giulia

    2016-04-01

    Vulnerability assessment of karst aquifers and vulnerability mapping are important tools for improved sustainable management and protection of karst groundwater resources. In this paper, to estimate the vulnerability degree of the karst aquifer feeding Pertuso Spring in Central Italy, two different implementations of COP method, supported by an open source GIS, were tested and a comparison of the vulnerability maps is proposed. The study area is a highly karstified carbonate aquifer located in the Upper Valley of the Aniene River, in the south-east part of Latium Region. The hydrogeological basin covers about 50 km2 and the karst aquifer provides a water supply of about 120.000 m3d-1. The well-developed karst features in this hydrogeological system is responsible of the fast infiltration of rainfall in the saturated zone and, consequently, of the high discharge rate of Pertuso Spring (up to 3 m3/s). Thus, in the aim of emphasizing the presence of these karst features, due to which, there are limited attenuation processes in the unsaturated zone, in this work COP method has been applied by the implementation of a new discretization methodology of the hydrogeological basin using polygonal layer. Therefore, the hydrogeological catchment basin has been divided into 52 polygonal layer, representative of outcropping lithology and karst features, to which COP method has been applied. The intrinsic vulnerability maps, produced using a GIS approach, has been examinated and compared with the maps obtained using traditional vulnerability assessment method, which provides the discretization of the study area generating a grid map to which associate the Vulnerability Indexes. The results of this study highlight vulnerability from low to very high. The maximum vulnerability degree is due to karstic features responsible of high recharge and high hydraulic conductivity. The new proposed discretization of the hydrogeological basin using polygonal layer raise four vulnerability

  19. A GIS-based vulnerability assessment of brine contamination to aquatic resources from oil and gas development in eastern Sheridan County, Montana

    Science.gov (United States)

    Preston, Todd M.; Chesley-Preston, Tara L.; Thamke, Joanna N.

    2014-01-01

    Water (brine) co-produced with oil in the Williston Basin is some of the most saline in the nation. The Prairie Pothole Region (PPR), characterized by glacial sediments and numerous wetlands, covers the northern and eastern portion of the Williston Basin. Sheridan County, Montana, lies within the PPR and has a documented history of brine contamination. Surface water and shallow groundwater in the PPR are saline and sulfate dominated while the deeper brines are much more saline and chloride dominated. A Contamination Index (CI), defined as the ratio of chloride concentration to specific conductance in a water sample, was developed by the Montana Bureau of Mines and Geology to delineate the magnitude of brine contamination in Sheridan County. Values > 0.035 indicate contamination. Recently, the U.S. Geological Survey completed a county level geographic information system (GIS)-based vulnerability assessment of brine contamination to aquatic resources in the PPR of the Williston Basin based on the age and density of oil wells, number of wetlands, and stream length per county. To validate and better define this assessment, a similar approach was applied in eastern Sheridan County at a greater level of detail (the 2.59 km2 Public Land Survey System section grid) and included surficial geology. Vulnerability assessment scores were calculated for the 780 modeled sections and these scores were divided into ten equal interval bins representing similar probabilities of contamination. Two surface water and two groundwater samples were collected from the section with the greatest acreage of Federal land in each bin. Nineteen of the forty water samples, and at least one water sample from seven of the ten selected sections, had CI values indicating contamination. Additionally, CI values generally increased with increasing vulnerability assessment score, with a stronger correlation for groundwater samples (R2 = 0.78) than surface water samples (R2 = 0.53).

  20. Hydrogeology and Water Quality of the Pepacton Reservoir Watershed in Southeastern New York. Part 4. Quantity and Quality of Ground-Water and Tributary Contributions to Stream Base Flow in Selected Main-Valley Reaches

    Science.gov (United States)

    Heisig, Paul M.

    2004-01-01

    Estimates of the quantity and quality of ground-water discharge from valley-fill deposits were calculated for nine valley reaches within the Pepacton watershed in southeastern New York in July and August of 2001. Streamflow and water quality at the upstream and downstream end of each reach and at intervening tributaries were measured under base-flow conditions and used in mass-balance equations to determine quantity and quality of ground-water discharge. These measurements and estimates define the relative magnitudes of upland (tributary inflow) and valley-fill (ground-water discharge) contributions to the main-valley streams and provide a basis for understanding the effects of hydrogeologic setting on these contributions. Estimates of the water-quality of ground-water discharge also provide an indication of the effects of road salt, manure, and human wastewater from villages on the water quality of streams that feed the Pepacton Reservoir. The most common contaminant in ground-water discharge was chloride from road salt; concentrations were less than 15 mg/L. Investigation of ground-water quality within a large watershed by measurement of stream base-flow quantity and quality followed by mass-balance calculations has benefits and drawbacks in comparison to direct ground-water sampling from wells. First, sampling streams is far less expensive than siting, installing, and sampling a watershed-wide network of wells. Second, base-flow samples represent composite samples of ground-water discharge from the most active part of the ground-water flow system across a drainage area, whereas a well network would only be representative of discrete points within local ground-water flow systems. Drawbacks to this method include limited reach selection because of unfavorable or unrepresentative hydrologic conditions, potential errors associated with a large number of streamflow and water-quality measurements, and limited ability to estimate concentrations of nonconservative

  1. Mining Bug Databases for Unidentified Software Vulnerabilities

    Energy Technology Data Exchange (ETDEWEB)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  2. Assessment of the desertification vulnerability of the Cappadocian district (Central Anatolia, Turkey based on aridity and climate-process system

    Directory of Open Access Journals (Sweden)

    Murat Türkeş

    2011-03-01

    Full Text Available The present study discusses climate of the Cappadocian district in Turkey on the basis of Thornthwaite’s climate classification and water budget, Erinç’s aridity index and United Nations Convention to Combat Desertification (UNCCD aridity index, along with the spatial and inter-seasonal variations of precipitation and air temperatures. Vulnerability of the Cappadocia to desertification processes was also investigated with respect to the aridity, lithology dominated by tuffs and climate-process system and present land-use features of the district. The data analysis revealed that coefficients of variation (CV of the mean and maximum temperatures are the greatest in summer and the smallest in winter. Nevşehir and Kayseri environs are the most continental parts of the Cappadocia with a high inter-annual variability and low temperatures. Cappadocia is characterized with a continental rainfall regime having a maximum precipitation in spring. Variability of summer precipitation totals is greater than that of other seasons, varying from 65.7% to 78%. The CVs of the annual precipitation totals are about 18% at north and about 20% at south. Semi-arid and dry sub-humid or semi-humid climate types prevail over Cappadocia according to Thornthwaite’s moisture and Erinç’s aridity indices. Steppe is the dominant vegetation formation with sparse dry forests. The Cappadocia is vulnerable to the desertification processes due to both natural factors (e.g. degree of aridity, climate-process system, weathering of tuffs, erosion, climate change, etc. and human-involvement (e.g. land degradation and intensive tourism, etc.. In order to mitigate desertification and to preserve the historical and cultural heritages in Cappadocia, sustainable land-use management and tourism planning applications are urgently needed.

  3. Assessment of the desertification vulnerability of the Cappadocian district (Central Anatolia, Turkey based on aridity and climate-process system

    Directory of Open Access Journals (Sweden)

    Murat Türkeş

    2011-03-01

    Full Text Available The present study discusses climate of the Cappadocian district in Turkey on the basis of Thornthwaite’s climate classification and water budget, Erinç’s aridity index and United Nations Convention to Combat Desertification (UNCCD aridity index, along with the spatial and inter-seasonal variations of precipitation and air temperatures. Vulnerability of the Cappadocia to desertification processes was also investigated with respect to the aridity, lithology dominated by tuffs and climate-process system and present land-use features of the district. The data analysis revealed that coefficients of variation (CV of the mean and maximum temperatures are the greatest in summer and the smallest in winter. Nevşehir and Kayseri environs are the most continental parts of the Cappadocia with a high inter-annual variability and low temperatures. Cappadocia is characterized with a continental rainfall regime having a maximum precipitation in spring. Variability of summer precipitation totals is greater than that of other seasons, varying from 65.7% to 78%. The CVs of the annual precipitation totals are about 18% at north and about 20% at south. Semi-arid and dry sub-humid or semi-humid climate types prevail over Cappadocia according to Thornthwaite’s moisture and Erinç’s aridity indices. Steppe is the dominant vegetation formation with sparse dry trees. The Cappadocia is vulnerable to the desertification processes due to both natural factors (e.g. degree of aridity, climate-process system, weathering of tuffs, erosion, climate change, etc. and human-involvement (e.g. land degradation and intensive tourism, etc.. In order to mitigate desertification and to preserve the historical and cultural heritages in Cappadocia, sustainable land-use management and tourism planning applications are urgently needed.

  4. Computer vulnerability in information- based AIS and optimization of control%面向信息化的AIS计算机漏洞与控制优化

    Institute of Scientific and Technical Information of China (English)

    刘雪晶; 潘荣根; 聂铁铸

    2012-01-01

    AIS从构建开始到寿命结束都面临着各种风险,而计算机漏洞已成为信息化下AIS越来越致命的风险因素之一.针对信息化下AIS在应用程序设计、系统运行、数据库系统、网络系统等方面面临的计算机漏洞以及应采取的控制目标进行了分析和探讨.%AIS faces a variety of risks from its beginning stage to its ending of longevity, and the computer vulnerability has been one of the fatal risks in information - based AIS. An analysis is made of computer vulnerability in information- based AIS concerning application program design, system operation, database system and network system, and some control measures are proposed.

  5. Hydrogeology of the Jharia Coal Field, India

    Energy Technology Data Exchange (ETDEWEB)

    Choubey, V.D.; Sankaranarayana, I. (Indian School of Mines, Dhanbad (India). Dept. of Applied Geology)

    1990-07-01

    The Jharia Coalfield is a part of an east-west trending intracratonic Gondwana basin in eastern India. This paper presents the results of a comprehensive research programme to understand the hydrogeological setting and the aquifer characteristics. Water table in weathered zone is observed to fluctuate cyclically with seasons and suggests shallow ground water flow system. Aquifer parameters obtained by pumping tests are relatively low and these formations are classified as poor aquifers. The small volumes of water in coal mines are directly related to poor hydraulic conductivity of the rocks associated with coal. 12 refs., 7 figs., 1 tab.

  6. Risk and Damage As A Main Factors of Groundwater Vulnerability

    Science.gov (United States)

    Zakharova, Julia V.

    It's well known that groundwater is widely used for potable water supply in compar- ison with surface water. However significant urbanization, intensive growth of indus- try, quite limited investments for reconstractision of existed manufactures and also imperfect environmental protective legislation, all these are the cause of ecosystem degradation. Because of these the problem of both preventing of change in groundwa- ter chemical composition and forecasting of negative processes caused by economical activity is the main at present. According to data of Ministry of Economy, the increas- ing of total production in all spheres of industry till 2004 is forecasted. All these lead to increasing of anthropogenic load on ecosystems. So, the problem of environmental risk assessment including groundwater is actual. The methodology of risk assessment includes natural groundwater protection and the damage cost. The first is based on the time calculation of contaminated water in- filtration through the soil and vadoze zone till groundwater level, i.e. assessment of groundwater vulnerability. The second (damage cost) is based on the cost value of measures aimed to the elimination of contamination aftereffects. Damage can be direct and indirect. The first appears as a result of direct destroying of buildings, agricultural areas, natural landscapes, people and animals death or sickness. and amount of direct damage is determined by expendures, necessary for reduction of objects. The second, indirect, damage is determined by product losses or other negative affects connected with supply lines, deterioration of ecological conditions. It is necessary to mark that risk assessment is very important for planning of hy- drotechnical, engineering and civil construction (e.g., construction and location of different buildings depending from hydrogeological and geological conditions; or- ganization of well-fields and etc.), because all these factors correctly estimated can eleminate or

  7. Progress in Geo-Electrical Methods for Hydrogeological Mapping?

    DEFF Research Database (Denmark)

    Schrøder, Niels

    2014-01-01

    In most of the 20th century the geo-electrical methods were primarily used for groundwater exploration and the application of the methods were normally followed by a borehole, and a moment of truth. In this process the use of DC (direct current) soundings have been developed to a high grade...... of excellence. In the last 25 years the geo-electrical methods are more used in connection with groundwater protection and planning, and new methods, as transient electromagnetic (TEM) soundings, have been developed that provide more measurements per hour. In Denmark this change is very explicit, and a paper....... The test area was earlier mapped by DC-soundings, so it is possible to test the methods against each other. It is concluded that well performed DC-soundings with a Schlumberger configuration still provide the best base for hydrogeological mapping...

  8. Digital elevations and extents of regional hydrogeologic units in the Northern Atlantic Coastal Plain aquifer system from Long Island, New York, to North Carolina

    Science.gov (United States)

    Pope, Jason P.; Andreasen, David C.; Mcfarland, E. Randolph; Watt, Martha K.

    2016-08-31

    Digital geospatial datasets of the extents and top elevations of the regional hydrogeologic units of the Northern Atlantic Coastal Plain aquifer system from Long Island, New York, to northeastern North Carolina were developed to provide an updated hydrogeologic framework to support analysis of groundwater resources. The 19 regional hydrogeologic units were delineated by elevation grids and extent polygons for 20 layers: the land and bathymetric surface at the top of the unconfined surficial aquifer, the upper surfaces of 9 confined aquifers and 9 confining units, and the bedrock surface that defines the base of all Northern Atlantic Coastal Plain sediments. The delineation of the regional hydrogeologic units relied on the interpretive work from source reports for New York, New Jersey, Delaware and Maryland, Virginia, and North Carolina rather than from re-analysis of fundamental hydrogeologic data. This model of regional hydrogeologic unit geometries represents interpolation, extrapolation, and generalization of the earlier interpretive work. Regional units were constructed from available digital data layers from the source studies in order to extend units consistently across political boundaries and approximate units in offshore areas.Though many of the Northern Atlantic Coastal Plain hydrogeologic units may extend eastward as far as the edge of the Atlantic Continental Shelf, the modeled boundaries of all regional hydrogeologic units in this study were clipped to an area approximately defined by the furthest offshore extent of fresh to brackish water in any part of the aquifer system, as indicated by chloride concentrations of 10,000 milligrams per liter. Elevations and extents of units that do not exist onshore in Long Island, New York, were not included north of New Jersey. Hydrogeologic units in North Carolina were included primarily to provide continuity across the Virginia-North Carolina State boundary, which was important for defining the southern edge of

  9. Groundwater Vulnerability Regions of Iowa

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — The regions onThis map represent areas with similar hydrogeologic characteristics thought to represent similar potentials for contamination of groundwater and/or...

  10. Evaluation of a Home-Based Environmental and Educational Intervention to Improve Health in Vulnerable Households: Southeastern Pennsylvania Lead and Healthy Homes Program.

    Science.gov (United States)

    Mankikar, Deepa; Campbell, Carla; Greenberg, Rachael

    2016-09-09

    This evaluation examined whether participation in a home-based environmental educational intervention would reduce exposure to health and safety hazards and asthma-related medical visits. The home intervention program focused on vulnerable, low-income households, where children had asthma, were at risk for lead poisoning, or faced multiple unsafe housing conditions. Home visitors conducted two home visits, two months apart, consisting of an environmental home assessment, Healthy Homes education, and distribution of Healthy Homes supplies. Measured outcomes included changes in participant knowledge and awareness of environmental home-based hazards, rate of children's asthma-related medical use, and the presence of asthma triggers and safety hazards. Analysis of 2013-2014 baseline and post-intervention program data for a cohort of 150 families revealed a significantly lower three-month rate (p interventions may effectively reduce environmental home hazards and improve the health of asthmatic children in the short term.

  11. Unified Approach to Vulnerability Analysis of Web Applications

    Science.gov (United States)

    Le, H. T.; Loh, P. K. K.

    2008-11-01

    Web vulnerabilities in web-based applications may be detected, classified and documented. Several Web scanners exist for vulnerabilities in Web applications implemented via different technologies. However, none of them provides the technology-independent, generic coverage of possible vulnerabilities. In this project that is funded by Mindef Singapore, we propose a new approach for Web application security and vulnerability analysis. The design addresses the categorization of scanner results with a generic data model and the design of a language-independent rule-based engine that detects, analyses and reports suspected vulnerabilities in web-based applications.

  12. Quality of life as a vulnerability and recovery factor in eating disorders: a community-based study

    Directory of Open Access Journals (Sweden)

    Deborah Mitchison

    2016-10-01

    Full Text Available Abstract Background Emerging evidence suggests that changes in quality of life (QoL predicts later changes in eating disorder (ED symptoms. The objective of this study was to explore individual sufferers’ perspectives on the influence of QoL on the onset, maintenance, and/or remission of ED symptoms. Method 19 women from the community with a history of eating disorders (n = 13 currently symptomatic; n = 6 recovered were interviewed about their observations on the relationship between QoL and ED symptoms over time in their own lives. Interviews were audio-taped and transcribed, and then thematically analysed. Results Thematic analysis uncovered two major themes: 1. QoL as a Vulnerability Factor, and 2. QoL as a Recovery Factor. In relation to the first theme, onset of ED symptoms was discussed by women in this study as having been triggered by impairment in QoL, including a general sense of lacking control in life, stress, abusive intimate relationships, poor role modelling from family, physical impairment related to obesity, peer pressure, and weight-related teasing. On the other hand, and in relation to the second theme, subsequent improvement in QoL was nominated as central to symptom improvement and recovery. QoL improvement was described by participants differently, but included increased general satisfaction in life, emotional maturation, prioritising and improving physical health, the development of a supportive intimate relationship and social relationships, and having children. Conclusions Impairment in QoL may act as a trigger for the onset and maintenance of ED symptoms, whereas improvement in QoL may be central to eating disorder improvement and eventual recovery. Treatment should involve consideration of a core focus on QoL improvement as a potential ‘backdoor’ approach to improving ED symptoms.

  13. Selective vulnerability in brain hypoxia

    DEFF Research Database (Denmark)

    Cervos-Navarro, J.; Diemer, Nils Henrik

    1991-01-01

    Neuropathology, selective vulnerability, brain hypoxia, vascular factors, excitotoxicity, ion homeostasis......Neuropathology, selective vulnerability, brain hypoxia, vascular factors, excitotoxicity, ion homeostasis...

  14. Arizona - Social Vulnerability Index

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Social Vulnerability Index is derived from the 2000 US Census data. The fields included are percent minority, median household income, age (under 18 and over...

  15. Calibration of the hydrogeological model of the Baltic Artesian Basin

    Science.gov (United States)

    Virbulis, J.; Klints, I.; Timuhins, A.; Sennikovs, J.; Bethers, U.

    2012-04-01

    . The parameters of the calibration are the horizontal and vertical hydraulic conductivities of the hydrogeological layers, which are assumed uniform throughout the whole individual layer. The initial values of conductivities are taken from the available field pumping test measurements or based on the lithology of individual hydrogeological layers. The allowed variation range (multiplicative coefficient applied to respective initial parameter value) of conductivities for all layers and of infiltration rate is from 0.01 to 100 times. The minimization of objective function converges in several hundreds of iterations and the mean squared difference in one layer is 7 m. The ratio between the horizontal and vertical conductivity is kept fixed in each optimization run and the effect of different ratios on objective function is shown. The influence of initial values of hydraulic conductivities on the objective function is analyzed. The calibration results are validated using different data sets for calibration and validation. Acknowledgement The present work has been funded by the European Social Fund project "Establishment of interdisciplinary scientist group and modelling system for groundwater research" (Project Nr. 2009/0212/1DP/1.1.1.2.0/09/APIA/VIAA/060)

  16. Assessing forest vulnerability to climate warming using a process-based model of tree growth: bad prospects for rear-edges.

    Science.gov (United States)

    Sánchez-Salguero, Raúl; Camarero, Jesus Julio; Gutiérrez, Emilia; González Rouco, Fidel; Gazol, Antonio; Sangüesa-Barreda, Gabriel; Andreu-Hayles, Laia; Linares, Juan Carlos; Seftigen, Kristina

    2016-10-26

    Growth models can be used to assess forest vulnerability to climate warming. If global warming amplifies water deficit in drought-prone areas, tree populations located at the driest and southernmost distribution limits (rear-edges) should be particularly threatened. Here, we address these statements by analyzing and projecting growth responses to climate of three major tree species (silver fir, Abies alba; Scots pine, Pinus sylvestris; and mountain pine, Pinus uncinata) in mountainous areas of NE Spain. This region is subjected to Mediterranean continental conditions, it encompasses wide climatic, topographic and environmental gradients, and, more importantly, it includes rear-edges of the continuous distributions of these tree species. We used tree-ring width data from a network of 110 forests in combination with the process-based Vaganov-Shashkin-Lite growth model and climate-growth analyses to forecast changes in tree growth during the 21st century. Climatic projections were based on four ensembles CO2 emission scenarios. Warm and dry conditions during the growing season constrain silver fir and Scots pine growth, particularly at the species rear-edge. By contrast, growth of high-elevation mountain pine forests is enhanced by climate warming. The emission scenario (RCP 8.5) corresponding to the most pronounced warming (+1.4 to 4.8 °C) forecasted mean growth reductions of -10.7% and -16.4% in silver fir and Scots pine, respectively, after 2050. This indicates that rising temperatures could amplify drought stress and thus constrain the growth of silver fir and Scots pine rear-edge populations growing at xeric sites. Contrastingly, mountain pine growth is expected to increase by +12.5% due to a longer and warmer growing season. The projections of growth reduction in silver fir and Scots pine portend dieback and a contraction of their species distribution areas through potential local extinctions of the most vulnerable driest rear-edge stands. Our modeling

  17. Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system in Florida and parts of Georgia, Alabama, and South Carolina

    Science.gov (United States)

    Williams, Lester J.; Dixon, Joann F.

    2015-01-01

    Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system were developed to define an updated hydrogeologic framework as part of the U.S. Geological Survey Groundwater Resources Program. The dataset contains structural surfaces depicting the top and base of the aquifer system, its major and minor hydrogeologic units and zones, geophysical marker horizons, and the altitude of the 10,000-milligram-per-liter total dissolved solids boundary that defines the approximate fresh and saline parts of the aquifer system. The thicknesses of selected major and minor units or zones were determined by interpolating points of known thickness or from raster surface subtraction of the structural surfaces. Additional data contained include clipping polygons; regional polygon features that represent geologic or hydrogeologic aspects of the aquifers and the minor units or zones; data points used in the interpolation; and polygon and line features that represent faults, boundaries, and other features in the aquifer system.

  18. Volcanic aquifers of Hawai‘i—Hydrogeology, water budgets, and conceptual models

    Science.gov (United States)

    Izuka, Scot K.; Engott, John A.; Bassiouni, Maoya; Johnson, Adam G.; Miller, Lisa D.; Rotzoll, Kolja; Mair, Alan

    2016-06-13

    Hawai‘i’s aquifers have limited capacity to store fresh groundwater because each island is small and surrounded by saltwater. Saltwater also underlies much of the fresh groundwater. Fresh groundwater resources are, therefore, particularly vulnerable to human activity, short-term climate cycles, and long-term climate change. Availability of fresh groundwater for human use is constrained by the degree to which the impacts of withdrawal—such as lowering of the water table, saltwater intrusion, and reduction in the natural discharge to springs, streams, wetlands, and submarine seeps—are deemed acceptable. This report describes the hydrogeologic framework, groundwater budgets (inflows and outflows), conceptual models of groundwater occurrence and movement, and the factors limiting groundwater availability for the largest and most populated of the Hawaiian Islands—Kaua‘i, O‘ahu, Maui, and Hawai‘i Island.

  19. Borehole Completion and Conceptual Hydrogeologic Model for the IFRC Well Field, 300 Area, Hanford Site

    Energy Technology Data Exchange (ETDEWEB)

    Bjornstad, Bruce N.; Horner, Jacob A.; Vermeul, Vincent R.; Lanigan, David C.; Thorne, Paul D.

    2009-04-20

    A tight cluster of 35 new wells was installed over a former waste site, the South Process Pond (316-1 waste site), in the Hanford Site 300 Area in summer 2008. This report documents the details of the drilling, sampling, and well construction for the new array and presents a summary of the site hydrogeology based on the results of drilling and preliminary geophysical logging.

  20. 软件脆弱性分析%Software Vulnerability Analysis

    Institute of Scientific and Technical Information of China (English)

    李新明; 李艺; 徐晓梅; 韩存兵

    2003-01-01

    Software vulnerability is the root reason that cause computer system security problem. It' s a new researchtopic to analyze vulnerability based on the essence of software vulnerability. This paper analyzes the main definitionsand taxonomies of vulnerability,studies vulnerability database and tools for vulnerability analysis and detection,andgives the details about what caused the most common vnlnerabilities in the LINUX/UNIX operating systems.

  1. Marine hydrogeology: recent accomplishments and future opportunities

    Science.gov (United States)

    Fisher, A. T.

    2005-03-01

    Marine hydrogeology is a broad-ranging scientific discipline involving the exploration of fluid-rock interactions below the seafloor. Studies have been conducted at seafloor spreading centers, mid-plate locations, and in plate- and continental-margin environments. Although many seafloor locations are remote, there are aspects of marine systems that make them uniquely suited for hydrologic analysis. Newly developed tools and techniques, and the establishment of several multidisciplinary programs for oceanographic exploration, have helped to push marine hydrogeology forward over the last several decades. Most marine hydrogeologic work has focused on measurement or estimation of hydrogeologic properties within the shallow subsurface, but additional work has emphasized measurements of local and global fluxes, fluid source and sink terms, and quantitative links between hydrogeologic, chemical, tectonic, biological, and geophysical processes. In addition to summarizing selected results from a small number of case studies, this paper includes a description of several new experiments and programs that will provide outstanding opportunities to address fundamental hydrogeologic questions within the seafloor during the next 20-30 years. L'hydrogéologie marine est une large discipline scientifique impliquant l' exploration des interactions entre les fluides et les roches sous les fonds marins. Des études ont été menées dans les différents environnements sous-marins (zone abyssale, plaque océanique, marges continentales). Bien que de nombreux fonds marins soient connus, il existe des aspects des systèmes marins qui les rendent inadaptés à l'analyse hydrologique. De nouveaux outils et techniques, et la mise en oeuvre de nombreux programmes multidisciplinaires d'exploration océanographique, ont aidé à pousser en avant l'hydrogéologie marine ces dix dernières années. La plus part des études hydrogéologiques se sont concentrées jusqu'à présent sur la mesure ou

  2. Facility Environmental Vulnerability Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Van Hoesen, S.D.

    2001-07-09

    From mid-April through the end of June 2001, a Facility Environmental Vulnerability Assessment (FEVA) was performed at Oak Ridge National Laboratory (ORNL). The primary goal of this FEVA was to establish an environmental vulnerability baseline at ORNL that could be used to support the Laboratory planning process and place environmental vulnerabilities in perspective. The information developed during the FEVA was intended to provide the basis for management to initiate immediate, near-term, and long-term actions to respond to the identified vulnerabilities. It was expected that further evaluation of the vulnerabilities identified during the FEVA could be carried out to support a more quantitative characterization of the sources, evaluation of contaminant pathways, and definition of risks. The FEVA was modeled after the Battelle-supported response to the problems identified at the High Flux Beam Reactor at Brookhaven National Laboratory. This FEVA report satisfies Corrective Action 3A1 contained in the Corrective Action Plan in Response to Independent Review of the High Flux Isotope Reactor Tritium Leak at the Oak Ridge National Laboratory, submitted to the Department of Energy (DOE) ORNL Site Office Manager on April 16, 2001. This assessment successfully achieved its primary goal as defined by Laboratory management. The assessment team was able to develop information about sources and pathway analyses although the following factors impacted the team's ability to provide additional quantitative information: the complexity and scope of the facilities, infrastructure, and programs; the significantly degraded physical condition of the facilities and infrastructure; the large number of known environmental vulnerabilities; the scope of legacy contamination issues [not currently addressed in the Environmental Management (EM) Program]; the lack of facility process and environmental pathway analysis performed by the accountable line management or facility owner; and

  3. Discovery and research of network security vulnerabilities based on Web application%基于Web应用的网络安全漏洞发现与研究

    Institute of Scientific and Technical Information of China (English)

    张晓双; 徐依凌; 刘渊

    2016-01-01

    Web安全漏洞可分为2类,即基于Web平台和基于Web自身应用的安全漏洞。通过分析Web应用网络安全漏洞的攻击原理和攻击过程,研究了包括反射型、存储型和文档对象模型(DOM,document object model)的跨站脚本(XSS,cross site scripting)漏洞和结构化查询语言(SQL,structured query language)注入漏洞,以及会话认证管理漏洞,提出了基于3种不同漏洞的相应的防范措施。%Web security vulnerabilities can be divided into two categories, including security vulnerabilities Web platform and Web their own application. By analyzing the attack principle and process of Web application network security vulnerabilities, XSS vulnerability including type of the reflective, stored, and DOM, SQL injection vulner-ability and session authentication management vulnerability were studied. The corresponding preventive measures of the three kinds of vulnerabilities were put forward.

  4. Assessing European wild fire vulnerability

    Science.gov (United States)

    Oehler, F.; Oliveira, S.; Barredo, J. I.; Camia, A.; Ayanz, J. San Miguel; Pettenella, D.; Mavsar, R.

    2012-04-01

    Wild fire vulnerability is a measure of potential socio-economic damage caused by a fire in a specific area. As such it is an important component of long-term fire risk management, helping policy-makers take informed decisions about adequate expenditures for fire prevention and suppression, and to target those regions at highest risk. This paper presents a first approach to assess wild fire vulnerability at the European level. A conservative approach was chosen that assesses the cost of restoring the previous land cover after a potential fire. Based on the CORINE Land Cover, a restoration cost was established for each land cover class at country level, and an average restoration time was assigned according to the recovery capacity of the land cover. The damage caused by fire was then assessed by discounting the cost of restoring the previous land cover over the restoration period. Three different vulnerability scenarios were considered assuming low, medium and high fire severity causing different levels of damage. Over Europe, the potential damage of wild land fires ranges from 10 - 13, 732 Euro*ha-1*yr-1 for low fire severity, 32 - 45,772 Euro*ha-1*yr-1 for medium fire severity and 54 - 77,812 Euro*ha-1*yr-1 for high fire severity. The least vulnerable are natural grasslands, moors and heathland and sclerophyllous vegetation, while the highest cost occurs for restoring broad-leaved forest. Preliminary validation comparing these estimates with official damage assessments for past fires shows reasonable results. The restoration cost approach allows for a straightforward, data extensive assessment of fire vulnerability at European level. A disadvantage is the inherent simplification of the evaluation procedure with the underestimation of non-markets goods and services. Thus, a second approach has been developed, valuing individual wild land goods and services and assessing their annual flow which is lost for a certain period of time in case of a fire event. However

  5. Personal vulnerability and work-home interaction: the effect of job performance-based self-esteem on work/home conflict and facilitation.

    Science.gov (United States)

    Innstrand, Siw Tone; Langballe, Ellen Melbye; Espnes, Geir Arild; Aasland, Olaf Gjerløw; Falkum, Erik

    2010-12-01

    The aim of the present study was to examine the longitudinal relationship between job performance-based self-esteem (JPB-SE) and work-home interaction (WHI) in terms of the direction of the interaction (work-to-home vs. home-to-work) and the effect (conflict vs. facilitation). A sample of 3,475 respondents from eight different occupational groups (lawyers, physicians, nurses, teachers, church ministers, bus drivers, and people working in advertising and information technology) supplied data at two points of time with a two-year time interval. The two-wave, cross-lagged structural equations modeling (SEM) analysis demonstrated reciprocal relationships between these variables, i.e., job performance-based self-esteem may act as a precursor as well as an outcome of work-home interaction. The strongest association was between job performance-based self-esteem and work-to-home conflict. Previous research on work-home interaction has mainly focused on situational factors. This longitudinal study expands the work-home literature by demonstrating how individual vulnerability (job performance-based self-esteem) contributes to the explanation of work-home interactions.

  6. Hydrogeologic Areas of the Southwest Principal Aquifer (SWPA) study

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — This raster dataset represents the boundaries of the hydrogeologic areas of the Southwest Principal Aquifer (SWPA) study of the National Water Quality Assessment...

  7. Vulnerability, Health Agency and Capability to Health.

    Science.gov (United States)

    Straehle, Christine

    2016-01-01

    One of the defining features of the capability approach (CA) to health, as developed in Venkatapuram's book Health Justice, is its aim to enable individual health agency. Furthermore, the CA to health hopes to provide a strong guideline for assessing the health-enabling content of social and political conditions. In this article, I employ the recent literature on the liberal concept of vulnerability to assess the CA. I distinguish two kinds of vulnerability. Considering circumstantial vulnerability, I argue that liberal accounts of vulnerability concerned with individual autonomy, align with the CA to health. Individuals should, as far as possible, be able to make health-enabling decisions about their lives, and their capability to do so should certainly not be hindered by public policy. The CA to health and a vulnerability-based analysis then work alongside to define moral responsibilities and designate those who hold them. Both approaches demand social policy to address circumstances that hinder individuals from taking health-enabling decisions. A background condition of vulnerability, on the other hand, even though it hampers the capability for health, does not warrant the strong moral claim proposed by the CA to health to define health as a meta-capability that should guide social policy. Nothing in our designing social policy could change the challenge to health agency when we deal with background conditions of vulnerability.

  8. Hydrogeology in North America: past and future

    Science.gov (United States)

    Narasimhan, T. N.

    2005-03-01

    This paper is a retrospective on the evolution of hydrogeology in North America over the past two centuries, and a brief speculation of its future. The history of hydrogeology is marked by developments in many different fields such as groundwater hydrology, soil mechanics, soil science, economic geology, petroleum engineering, structural geology, geochemistry, geophysics, marine geology, and more recently, ecology. The field has been enriched by the contributions of distinguished researchers from all these fields. At present, hydrogeology is in transition from a state of discovering new resources and exploiting them efficiently for maximum benefit, to one of judicious management of finite, interconnected resources that are vital for the sustenance of humans and other living things. The future of hydrogeology is likely to be dictated by the subtle balance with which the hydrological, erosional, and nutritional cycles function, and the decision of a technological society to either adapt to the constraints imposed by the balance, or to continue to exploit hydrogeological systems for maximum benefit. Although there is now a trend towards ecological and environmental awareness, human attitudes could change should large parts of the populated world be subjected to the stresses of droughts that last for many decades. Cet article est une rétrospective de l'évolution de l'hydrogéologie en Amérique du Nord sur les deux derniers siècles, et une brève évaluation de son futur. L'histoire de l'hydrogéologie est marquée par le développement de plusieurs techniques de terrain telles, l'hydrologie des eaux souterraines, la mécanique des sols, les sciences du sol, la géologie économique, l' ingénierie pétrolière, la géologie structurale, la géochimie, la géophysique, la géologie marine et plus récemment l'écologie. La science a été enrichie par la contribution de plusieurs chercheurs distingués, provenant de toutes ces branches. A présent, l

  9. Chemical Hydrogeology: Fifty Years of Advances, Breakthroughs, and Innovation

    Science.gov (United States)

    Brusseau, M. L.

    2015-12-01

    Chemical hydrogeology focuses on the composition, properties, and biogeochemical processes inherent to water in subsurface environments. Multiple avenues of research coalesced in the 1960's to foment the development of chemical hydrogeology as a distinct field. In the intervening 50 years, chemical hydrogeology principles have been applied to innumerable issues and problems, and concomitantly, the field has continually experienced advances, breakthroughs, and innovations in theory, analysis, and application. An overarching theme to chemical hydrogeology in both theory and application is integration--- integration of disciplines (interdisciplinary, multidisciplinary), integration of approaches (theoretical, experimental, analytical), and integration of scales (spatial, temporal). Chemical hydrogeology has never been more relevant and more challenged as today, as we face critical issues related to for example water scarcity and availability of clean water, impacts of energy development, production and storage, and human interactions with ecosystem services. This presentation will illustrate recent advances in chemical hydrogeology, ranging from application of advanced imaging for characterization of pore-scale multiphase systems to integrated physical and biogeochemical assessments of field-scale contaminant transport.

  10. Energy vulnerability relationships

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  11. Evaluation of a Home-Based Environmental and Educational Intervention to Improve Health in Vulnerable Households: Southeastern Pennsylvania Lead and Healthy Homes Program

    Directory of Open Access Journals (Sweden)

    Deepa Mankikar

    2016-09-01

    Full Text Available This evaluation examined whether participation in a home-based environmental educational intervention would reduce exposure to health and safety hazards and asthma-related medical visits. The home intervention program focused on vulnerable, low-income households, where children had asthma, were at risk for lead poisoning, or faced multiple unsafe housing conditions. Home visitors conducted two home visits, two months apart, consisting of an environmental home assessment, Healthy Homes education, and distribution of Healthy Homes supplies. Measured outcomes included changes in participant knowledge and awareness of environmental home-based hazards, rate of children’s asthma-related medical use, and the presence of asthma triggers and safety hazards. Analysis of 2013–2014 baseline and post-intervention program data for a cohort of 150 families revealed a significantly lower three-month rate (p < 0.05 of children’s asthma-related doctor visits and hospital admissions at program completion. In addition, there were significantly reduced reports of the presence of home-based hazards, including basement or roof leaks (p = 0.011, plumbing leaks (p = 0.019, and use of an oven to heat the home (p < 0.001. Participants’ pre- and post- test scores showed significant improvement (p < 0.05 in knowledge and awareness of home hazards. Comprehensive home interventions may effectively reduce environmental home hazards and improve the health of asthmatic children in the short term.

  12. Plutonium Vulnerability Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  13. Dynamic Assessment on Ecosystem Vulnerability in Dashanbao Wetland

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    [Objective] The aim was to assess the ecosystem vulnerability of Dashanbao wetland.[Method] The evaluation index system of ecosystem vulnerability of Dashanbao wetland was constructed by using analytic hierarchy process(AHP),and the ecosystem vulnerability of Dashanbao wetland from 2002 to 2008 was assessed based on vulnerable degree of ecosystem.[Result] The vulnerable degree of ecosystem of Dashanbao wetland from 2002 to 2008 was 0.560 0,0.513 7,0.516 4,0.465 4,0.476 0,0.449 2 and 0.400 6 respectively,tha...

  14. Earthquake Vulnerability Assessment for Hospital Buildings Using a Gis-Based Group Multi Criteria Decision Making Approach: a Case Study of Tehran, Iran

    Science.gov (United States)

    Delavar, M. R.; Moradi, M.; Moshiri, B.

    2015-12-01

    Nowadays, urban areas are threatened by a number of natural hazards such as flood, landslide and earthquake. They can cause huge damages to buildings and human beings which necessitates disaster mitigation and preparation. One of the most important steps in disaster management is to understand all impacts and effects of disaster on urban facilities. Given that hospitals take care of vulnerable people reaction of hospital buildings against earthquake is vital. In this research, the vulnerability of hospital buildings against earthquake is analysed. The vulnerability of buildings is related to a number of criteria including age of building, number of floors, the quality of materials and intensity of the earthquake. Therefore, the problem of seismic vulnerability assessment is a multi-criteria assessment problem and multi criteria decision making methods can be used to address the problem. In this paper a group multi criteria decision making model is applied because using only one expert's judgments can cause biased vulnerability maps. Sugeno integral which is able to take into account the interaction among criteria is employed to assess the vulnerability degree of buildings. Fuzzy capacities which are similar to layer weights in weighted linear averaging operator are calculated using particle swarm optimization. Then, calculated fuzzy capacities are included into the model to compute a vulnerability degree for each hospital.

  15. Home-Based Economic Activities and Caribbean Urban Livelihoods : Vulnerability, Ambition and Impact in Paramaribo and Port of Spain

    NARCIS (Netherlands)

    Verrest, Hebe

    2007-01-01

    Poor urban households in the economic 'south' deploy various livelihood activities. One of these is a Home-Based Economic Activity (HBEA), e.g. sales of home-made snacks or car maintenance. This study examines the prevalence, organisation and relevance of HBEAs in four neighbourhoods in the Caribbea

  16. Blast vulnerability assessment : challenges and myths

    Energy Technology Data Exchange (ETDEWEB)

    Braimah, A.; Contestabile, E. [Natural Resources Canada, Ottawa, ON (Canada). Canadian Explosives Research Laboratory

    2007-07-01

    Challenges related to the creation of a comprehensive blast vulnerability assessment program for Canadian buildings was presented. Many building owners are now seeking to assess the vulnerability of their structures to blast loads, and wish to increase the survivability of both occupants and structures. However, the engineering community has not yet incorporated existing physical security measures into comprehensive mitigation strategies and designs. Different institutions are currently using varying amounts of explosives in vulnerability assessments, and there is an urgent need for information on terrorist capabilities in both the present and the future. Pressure-impulse diagrams are now used by engineers to assess component responses to blasts. However, pressure-impulse diagrams are based on single modes of failure, and may not be capable of capturing all failure modes of building components, nor are they able to ensure that vulnerability assessments do not overestimate the blast load resistance of buildings.

  17. Summary of discrete fracture network modelling as applied to hydrogeology of the Forsmark and Laxemar sites

    Energy Technology Data Exchange (ETDEWEB)

    Hartley, Lee; Roberts, David

    2013-04-15

    The Swedish Nuclear Fuel and Waste Management Company (SKB) is responsible for the development of a deep geological repository for spent nuclear fuel. The permitting of such a repository is informed by assessment studies to estimate the risks of the disposal method. One of the potential risks involves the transport of radionuclides in groundwater from defective canisters in the repository to the accessible environment. The Swedish programme for geological disposal of spent nuclear fuel has involved undertaking detailed surface-based site characterisation studies at two different sites, Forsmark and Laxemar-Simpevarp. A key component of the hydrogeological modelling of these two sites has been the development of Discrete Fracture Network (DFN) concepts of groundwater flow through the fractures in the crystalline rocks present. A discrete fracture network model represents some of the characteristics of fractures explicitly, such as their, orientation, intensity, size, spatial distribution, shape and transmissivity. This report summarises how the discrete fracture network methodology has been applied to model groundwater flow and transport at Forsmark and Laxemar. The account has involved summarising reports previously published by SKB between 2001 and 2011. The report describes the conceptual framework and assumptions used in interpreting site data, and in particular how data has been used to calibrate the various parameters that define the discrete fracture network representation of bedrock hydrogeology against borehole geologic and hydraulic data. Steps taken to confirm whether the developed discrete fracture network models provide a description of regional-scale groundwater flow and solute transport consistent with wider hydraulic tests hydrochemical data from Forsmark and Laxemar are discussed. It illustrates the use of derived hydrogeological DFN models in the simulations of the temperate period hydrogeology that provided input to radionuclide transport

  18. Site investigation SFR. Hydrogeological modelling of SFR. Model version 0.2

    Energy Technology Data Exchange (ETDEWEB)

    Oehman, Johan (Golder Associates AB (Sweden)); Follin, Sven (SF GeoLogic (Sweden))

    2010-01-15

    The Swedish Nuclear Fuel and Waste Management Company (SKB) has conducted site investigations for a planned extension of the existing final repository for short-lived radioactive waste (SFR). A hydrogeological model is developed in three model versions, which will be used for safety assessment and design analyses. This report presents a data analysis of the currently available hydrogeological data from the ongoing Site Investigation SFR (KFR27, KFR101, KFR102A, KFR102B, KFR103, KFR104, and KFR105). The purpose of this work is to develop a preliminary hydrogeological Discrete Fracture Network model (hydro-DFN) parameterisation that can be applied in regional-scale modelling. During this work, the Geologic model had not yet been updated for the new data set. Therefore, all analyses were made to the rock mass outside Possible Deformation Zones, according to Single Hole Interpretation. Owing to this circumstance, it was decided not to perform a complete hydro-DFN calibration at this stage. Instead focus was re-directed to preparatory test cases and conceptual questions with the aim to provide a sound strategy for developing the hydrogeological model SFR v. 1.0. The presented preliminary hydro-DFN consists of five fracture sets and three depth domains. A statistical/geometrical approach (connectivity analysis /Follin et al. 2005/) was performed to estimate the size (i.e. fracture radius) distribution of fractures that are interpreted as Open in geologic mapping of core data. Transmissivity relations were established based on an assumption of a correlation between the size and evaluated specific capacity of geologic features coupled to inflows measured by the Posiva Flow Log device (PFL-f data). The preliminary hydro-DFN was applied in flow simulations in order to test its performance and to explore the role of PFL-f data. Several insights were gained and a few model technical issues were raised. These are summarised in Table 5-1

  19. Design and testing of a process-based groundwater vulnerability assessment (P-GWAVA) system for predicting concentrations of agrichemicals in groundwater across the United States

    Science.gov (United States)

    Barbash, Jack E; Voss, Frank D.

    2016-03-29

    Efforts to assess the likelihood of groundwater contamination from surface-derived compounds have spanned more than three decades. Relatively few of these assessments, however, have involved the use of process-based simulations of contaminant transport and fate in the subsurface, or compared the predictions from such models with measured data—especially over regional to national scales. To address this need, a process-based groundwater vulnerability assessment (P-GWAVA) system was constructed to use transport-and-fate simulations to predict the concentration of any surface-derived compound at a specified depth in the vadose zone anywhere in the conterminous United States. The system was then used to simulate the concentrations of selected agrichemicals in the vadose zone beneath agricultural areas in multiple locations across the conterminous United States. The simulated concentrations were compared with measured concentrations of the compounds detected in shallow groundwater (that is, groundwater drawn from within a depth of 6.3 ± 0.5 meters [mean ± 95 percent confidence interval] below the water table) in more than 1,400 locations across the United States. The results from these comparisons were used to select the simulation approaches that led to the closest agreement between the simulated and the measured concentrations.The P-GWAVA system uses computer simulations that account for a broader range of the hydrologic, physical, biological and chemical phenomena known to control the transport and fate of solutes in the subsurface than has been accounted for by any other vulnerability assessment over regional to national scales. Such phenomena include preferential transport and the influences of temperature, soil properties, and depth on the partitioning, transport, and transformation of pesticides in the subsurface. Published methods and detailed soil property data are used to estimate a wide range of model input parameters for each site, including surface

  20. The use of historical data for the characterisation of multiple damaging hydrogeological events

    Directory of Open Access Journals (Sweden)

    O. Petrucci

    2003-01-01

    Full Text Available Landslides, floods and secondary floods (hereinafter called phenomena triggered by rainfall and causing extensive damage are reviewed in this paper. Damaging Hydrogeological Events (DHEs are defined as the occurrence of one or more simultaneous aforementioned phenomena. A method for the characterisation of DHEs based upon historic data is proposed. The method is aimed at assessing DHE-related hazard in terms of recurrence, severity, damage, and extent of the affected area. Using GIS, the DHEs historical and climatic data collection, the geomorphological and hydrogeological characterisation of the hit areas, the characterisation of induced damage, the evaluation of triggering rainfall return period and critical duration of each DHE were carried out. The approach was applied to a test site in Southern Italy (Calabria for validation purposes. A database was set up including data from 24 events which have occurred during an 80-year period. The spatial distribution of phenomena was analysed together with the return period of cumulative rainfall. The trend of the occurred phenomena was also compared with the climatic trend. Four main types of Damaging Hydrogeological Events were identified in the study area.

  1. A Contamination Vulnerability Assessment for the Santa Clara and San Mateo County Groundwater Basins

    Energy Technology Data Exchange (ETDEWEB)

    Moran, J E; Hudson, G B; Eaton, G F; Leif, R

    2004-01-06

    In response to concerns expressed by the California Legislature and the citizenry of the State of California, the State Water Resources Control Board (SWRCB), implemented a program to assess groundwater quality, and provide a predictive capability for identifying areas that are vulnerable to contamination. The program was initiated in response to concern over public supply well closures due to contamination by chemicals such as MtBE from gasoline, and solvents from industrial operations. As a result of this increased awareness regarding groundwater quality, the Supplemental Report of the 1999 Budget Act mandated the SWRCB to develop a comprehensive ambient groundwater-monitoring plan, and led to the initiation of the Ambient Groundwater Monitoring and Assessment (GAMA) Program. The primary objective of the GAMA Program is to assess the water quality and to predict the relative susceptibility to contamination of groundwater resources throughout the state of California. Under the GAMA program, scientists from Lawrence Livermore National Laboratory (LLNL) collaborate with the SWRCB, the U.S. Geological Survey, the California Department of Health Services (DHS), and the California Department of Water Resources (DWR) to implement this groundwater assessment program. In 2001 and 2002, LLNL carried out this vulnerability study in the groundwater basins of Santa Clara County and San Mateo County, located to the south of the city of San Francisco. The goal of the study is to provide a probabilistic assessment of the relative vulnerability of groundwater used for the public water supply to contamination from surface sources. This assessment of relative contamination vulnerability is made based on the results of two types of analyses that are not routinely carried out at public water supply wells: ultra low-level measurement of volatile organic compounds (VOCs), and groundwater age dating (using the tritium-helium-3 method). In addition, stable oxygen isotope measurements

  2. California GAMA Program: A Contamination Vulnerability Assessment for the Bakersfield Area

    Energy Technology Data Exchange (ETDEWEB)

    Moran, J E; Hudson, G B; Eaton, G F; Leif, R

    2004-11-01

    In response to concerns expressed by the California Legislature and the citizenry of the State of California, the State Water Resources Control Board (SWRCB), implemented a program to assess groundwater quality, and provide a predictive capability for identifying areas that are vulnerable to contamination. The program was initiated in response to concern over public supply well closures due to contamination by chemicals such as MTBE from gasoline, and solvents from industrial operations. As a result of this increased awareness regarding groundwater quality, the Supplemental Report of the 1999 Budget Act mandated the SWRCB to develop a comprehensive ambient groundwater-monitoring plan, and led to the initiation of the Groundwater Ambient Monitoring and Assessment (GAMA) Program. The primary objective of the GAMA Program is to assess the water quality and to predict the relative susceptibility to contamination of groundwater resources throughout the state of California. Under the GAMA program, scientists from Lawrence Livermore National Laboratory (LLNL) collaborate with the SWRCB, the U.S. Geological Survey (USGS), the California Department of Health Services (DHS), and the California Department of Water Resources (DWR) to implement this groundwater assessment program. In 2003, LLNL carried out this vulnerability study in the groundwater basin that underlies Bakersfield, in the southern San Joaquin Valley. The goal of the study is to provide a probabilistic assessment of the relative vulnerability of groundwater used for the public water supply to contamination from surface sources. This assessment of relative contamination vulnerability is made based on the results of two types of analyses that are not routinely carried out at public water supply wells: ultra low-level measurement of volatile organic compounds (VOCs), and groundwater age dating (using the tritium-helium-3 method). In addition, stable oxygen isotope measurements help determine the recharge water

  3. Hydrogeologic Framework in Three Drainage Basins in the New Jersey Pinelands, 2004-06

    Science.gov (United States)

    Walker, Richard L.; Reilly, Pamela A.; Watson, Kara M.

    2008-01-01

    layers are defined by their predominant sediment textures as aquifers and leaky confining layers. The confining layer at the base of the Kirkwood-Cohansey aquifer system, depending on location, is defined as one of two distinct clays of the Kirkwood Formation. The framework models are described using hydrogeologic sections, maps of structure tops of layers, and thickness maps showing variations of sediment textures of the various model layers. The three framework models are similar in structure but unique to their respective study areas. The hydraulic conductivity of the Kirkwood-Cohansey aquifer system in the vicinity of the three study areas was determined from analysis of 16 slug tests and 136 well-performance tests. The mean values for hydraulic conductivity in the three study areas ranged from about 84 feet per day to 130 feet per day. With the exception of the basal confining layers, the variable and discontinuous nature of clay layers within the Kirkwood-Cohansey aquifer system was confirmed by the geophysical and lithologic records. Leaky confining layers and discontinuous clays are generally more common in the upper part of the aquifer system. Although the Kirkwood-Cohansey aquifer system generally has been considered a water-table aquifer in most areas, localized clays in the aquifer layers and the effectiveness of the leaky confining layers may act to impede the flow of ground water in varying amounts depending on the degree of confinement and the location, duration, and magnitude of the hydraulic stresses applied. Considerable variability exists in the different sediment textures. The extent to which this hydrogeologic variability can be characterized is constrained by the extent of the available data. Thus, the hydraulic properties of the modeled layers were estimated on the basis of available horizontal hydraulic conductivity data and the range of sediment textures estimated from geophysical and lithologic data.

  4. Photogrammetry in Experiments for Hydrogeological Risk Assessment

    Science.gov (United States)

    Barazzetti, L.; Scaioni, M.; Feng, T.; Qiao, G.; Lu, P.; Tong, X.; Li, R.

    2013-01-01

    The construction of scaled-down simulation platforms is largely used to support investigations for the assessment of hydrological risk. Achieved outcomes can be integrated and assimilated to numerical analyses for the study of unstable slope collapse, debris transport, and hydrological modeling in general. During design of such simulation platforms, a relevant role has to be given to the spatial sensor network (SSN) to deploy, which is in charge of collecting geo-referenced, quantitative information during experiments. Photogrammetry (including 3D imaging sensors) can play an important role in SSN owing to its capability of collecting 2D images and 3D point clouds data covering wide surfaces without any contact. Different kinds of metric measurements can be then extracted from datasets. The aim of this paper is to give an overview and some examples on the potential of photogrammetry in hydrogeological experiments. After a general introduction on a few preliminary issues (sensors, calibration, ground reference, usage of imaging or ranging sensors), potential applications are classified into 2D and 3D categories. Examples are focused on a scaled-down landslide simulation platform developed at Tongji University (Shanghai, P. R. China).

  5. Hydrogeology of Montserrat review and new insights

    Directory of Open Access Journals (Sweden)

    Brioch Hemmings

    2015-03-01

    New hydrological insights for the region: A new groundwater recharge model predicts whole island recharge of 266 mm/year, between 10% and 20% of annual rainfall. Core scale permeability tests reveal ranges from 10−14 to 10−12 m2 for volcaniclastic rocks with coarse matrix, to a minimum of 10−18 m2 for andesitic lavas and volcaniclastics with fine or altered matrix. Analysis of historical pumping tests on aquifers in reworked, channel and alluvial sediment indicate permeabilities ∼10−10 m2. Springs at elevations between 200 and 400 m above mean sea level on Centre Hills currently discharge over 45 L/s. High discharge require a reasonably laterally continuous low permeability body. Contrasting conceptual models are presented to illustrate two potential hydrogeological scenarios. New field observations also reveal systematic spatial variations in spring water temperature and specific electrical conductivity indicating that meteoric waters supplying the springs are mixed with a deeper groundwater source at some sites.

  6. Hydrogeological Issues Concerning the Thar Lignite Prospect

    Directory of Open Access Journals (Sweden)

    R. N. Singh

    2012-12-01

    Full Text Available The paper is concerned with the hydrogeological appraisal of the proposed mining operations in theThar lignite field in Sindh, Pakistan. The Thar coalfield covers an area of approximately 9000km2 andcontains three lignite seams lying at depth of 130m to 250 m. In the Thar lignite field, the presence ofthree main aquifers induces pore pressure in the rock mass surrounding the lignite seams and makes highwall slopes potentially unsafe. It is, therefore, necessary to dewater the rock mass before commencingmining excavations. The paper describes the proposed mine dewatering scheme to facilitatedepressurising of the rock mass surrounding the mining excavations. Inflow prediction of groundwater tothe surface mining excavation was carried out using a SEEP/W finite element software package. Thesimulation results show that the ground water inflow from the Top aquifer is 114m3/d, from theIntermediate confined aquifer is 141m3/d and from the Bottom confined aquifer is 1.28 x 105 m3 /d. Theseresults were compared with the analytical solutions which indicated that the relative error of estimation ofinflow quantities varies from 3.4 % to 6.4%.

  7. PHOTOGRAMMETRY IN EXPERIMENTS FOR HYDROGEOLOGICAL RISK ASSESSMENT

    Directory of Open Access Journals (Sweden)

    L. Barazzetti

    2014-01-01

    Full Text Available The construction of scaled-down simulation platforms is largely used to support investigations for the assessment of hydrological risk. Achieved outcomes can be integrated and assimilated to numerical analyses for the study of unstable slope collapse, debris transport, and hydrological modeling in general. During design of such simulation platforms, a relevant role has to be given to the spatial sensor network (SSN to deploy, which is in charge of collecting geo-referenced, quantitative information during experiments. Photogrammetry (including 3D imaging sensors can play an important role in SSN owing to its capability of collecting 2D images and 3D point clouds data covering wide surfaces without any contact. Different kinds of metric measurements can be then extracted from datasets. The aim of this paper is to give an overview and some examples on the potential of photogrammetry in hydrogeological experiments. After a general introduction on a few preliminary issues (sensors, calibration, ground reference, usage of imaging or ranging sensors, potential applications are classified into 2D and 3D categories. Examples are focused on a scaled-down landslide simulation platform developed at Tongji University (Shanghai, P. R. China.

  8. Geology and hydrogeology of the Florida Keys

    Science.gov (United States)

    Halley, Robert B.; Vacher, H. L.; Shinn,

    1997-01-01

    This chapter discusses the geology and hydrogeology of the Florida Keys, and focuses on the islands formed of Pleistocene limestone. These islands, which are crossed when driving from Miami to Key West, are typically regarded as "the Florida Keys." The outstanding and fragile character of ecosystems on and around the Florida Keys has prompted State and Federal efforts to protect and preserve the remaining public portions of the region. The Florida Keys were largely ignored during the sixteenth, seventeenth, and eighteenth centuries, although the waters just offshore provided a major shipping thoroughfare to and from the New World. The Florida Keys are now recognized as one of the great recreational and environmental resources of the United States. The islands are outposts of a laid-back, tropical resort culture that has as its foundation warmth and clear water. A significant part of the attraction is fishing, diving, and boating around the area's coral reefs, which the islands protect. But the reefs were not always so highly valued. The Florida Keys that have protected the reefs for millennia, may now be the source of the agents that may accomplish what Agassiz thought was beyond man's power a century ago.

  9. Exploring impacts of multi-year, community-based care programs for orphans and vulnerable children: a case study from Kenya.

    Science.gov (United States)

    Larson, Bruce A; Wambua, Nancy; Masila, Juliana; Wangai, Susan; Rohr, Julia; Brooks, Mohamad; Bryant, Malcolm

    2013-01-01

    The Community-Based Care for Orphans and Vulnerable Children (CBCO) program operated in Kenya during 2006-2010. In Eastern Province, the program provided support to approximately 3000 orphans and vulnerable children (OVC) living in 1500 households. A primary focus of the program was to support savings and loan associations composed of OVC caregivers (typically elderly women) to improve household and OVC welfare. Cross-sectional data were collected in 2011 from 1500 randomly selected households from 3 populations: program participants (CBCO group, n=500), households in the same villages as program participants but not in the program (the local-community-group = Group L, n=300), and households living in nearby villages where the program did not operate (the adjacent-community-group, Group A, n=700). Primary welfare outcomes evaluated are household food security, as measured by the Household Food Insecurity Access instrument, and OVC educational attainment. We compared outcomes between the CBCO and the subset of Group L not meeting program eligibility criteria (L-N) to investigate disparities within local communities. We compared outcomes between the CBCO group and the subset of Group A meeting eligibility criteria (A-E) to consider program impact. We compared outcomes between households not eligible for the program in the local and adjacent community groups (L-N and A-N) to consider if the adjacent communities are similar to the local communities. In May-June 2011, at the end of the OVC program, the majority of CBCO households continued to be severely food insecure, with rates similar to other households living in nearby communities. Participation rates in primary school are high, reflecting free primary education. Among the 18-22 year olds who were "children" during the program years, relatively few children completed secondary school across all study groups. Although the CBCO program likely provided useful services and benefits to program participants, disparities

  10. Food security and vulnerability modeling of East Java Province based on Geographically Weighted Ordinal Logistic Regression Semiparametric (GWOLRS model

    Directory of Open Access Journals (Sweden)

    N.W. Surya Wardhani

    2014-10-01

    Full Text Available Modeling of food security based on the characteristics of the area will be affected by the geographical location which means that geographical location will affect the region’s potential. Therefore, we need a method of statistical modeling that takes into account the geographical location or the location factor observations. In this case, the research variables could be global means that the location affects the response variables significantly; when some of the predictor variables are global and the other variables are local, then Geographically Weighted Ordinal Logistic Regression Semiparametric (GWOLRS could be used to analyze the data. The data used is the resilience and food insecurity data in 2011 in East Java Province. The result showed that three predictor variables that influenced by the location are the percentage of poor (%, rice production per district (tons and life expectancy (%. Those three predictor variables are local because they have significant influence in some districts/cities but had no significant effect in other districts/cities, while other two variables that are clean water and good quality road length (km are assumed global because it is not a significant factor for the whole districts/towns in East Java .

  11. A GIS based urban flood risk analysis model for vulnerability assessment of critical structures during flood emergencies

    Science.gov (United States)

    Albano, R.; Sole, A.; Adamowski, J.; Mancusi, L.

    2014-04-01

    Risk analysis has become a priority for authorities and stakeholders in many European countries, with the aim of reducing flooding risk by considering the priority and benefits of possible interventions. Within this context, a flood risk analysis model was developed in this study that is based on GIS, and integrated with a model that assesses the degree of accessibility and operability of strategic emergency response structures in an urban area. The proposed model is unique in that it provides a quantitative estimation of flood risk on the basis of the operability of the strategic emergency structures in an urban area, their accessibility, and connection within the urban system of a city (i.e., connection between aid centres and buildings at risk) in the emergency phase. The results of a case study in the Puglia Region in Southern Italy are described to illustrate the practical applications of this newly proposed approach. The main advantage of the proposed approach is that it allows for the defining of a hierarchy between different infrastructures in the urban area through the identification of particular components whose operation and efficiency are critical for emergency management. This information can be used by decision makers to prioritize risk reduction interventions in flood emergencies in urban areas.

  12. Seismic vulnerability assessment of a steel-girder highway bridge equipped with different SMA wire-based smart elastomeric isolators

    Science.gov (United States)

    Hedayati Dezfuli, Farshad; Shahria Alam, M.

    2016-07-01

    Shape memory alloy wire-based rubber bearings (SMA-RBs) possess enhanced energy dissipation capacity and self-centering property compared to conventional RBs. The performance of different types of SMA-RBs with different wire configurations has been studied in detail. However, their reliability in isolating structures has not been thoroughly investigated. The objective of this study is to analytically explore the effect of SMA-RBs on the seismic fragility of a highway bridge. Steel-reinforced elastomeric isolators are equipped with SMA wires and used to isolate the bridge. Results revealed that SMA wires with a superelastic behavior and re-centering capability can increase the reliability of the bearing and the bridge structure. It was observed that at the collapse level of damage, the bridge isolated by SMA-HDRB has the lowest fragility. Findings also showed that equipping NRB with SMA wires decreases the possibility of damage in the bridge while, replacing HDRB with SMA-HDRB; or LRB with SMA-LRB increases the failure probability of the system at slight, moderate, and extensive limit states.

  13. Beyond 'vulnerable groups': contexts and dynamics of vulnerability

    NARCIS (Netherlands)

    Zarowsky, C.; Haddad, S.; Nguyen, V.K.

    2013-01-01

    This paper reviews approaches to vulnerability in public health, introducing a series of 10 papers addressing vulnerability in health in Africa. We understand vulnerability as simultaneously a condition and a process. Social inequalities are manifest in and exacerbate three key dimensions of vulnera

  14. New insights on the rarity of the vulnerable Cinereous Warbling-finch (Aves, Emberizidae based on density, home range, and habitat selection

    Directory of Open Access Journals (Sweden)

    F Marques-Santos

    Full Text Available The Cinereous Warbling-finch Poospiza cinerea (Emberizidae is a Neotropical grassland bird considered rare, with population declining due to habitat loss and classified as vulnerable. However, the species conspicuously remains in several degraded areas, suggesting that it may be favored by these environments. Studies which focus on this species were inexistent until 2012, making questionable any statement about its threaten status. Here we analyzed population density, home range, and habitat selection of two groups of P. cinerea at independent sites that differ in human impact levels. Density was estimated by counting and mapping birds. Kernel density and minimum convex polygon were used to estimate home ranges. Habitat selection was inferred from use and availability of every habitat identified within the home range boundaries. One group positively selected urban tree vegetation, despite the availability of natural habitats in its home range. Based on a review on the literature and our findings, we assume that it is unlikely that P. cinerea is rare owing to habitat degradation, as previously thought. Nevertheless, this species was always recorded around native Cerrado vegetation and thus habitat modification may still threaten this species at some level. It is suggested that this species might be a woodland edge species, but future studies are necessary to confirm this assumption.

  15. Rockfall vulnerability assessment for reinforced concrete buildings

    Directory of Open Access Journals (Sweden)

    O. Mavrouli

    2010-10-01

    Full Text Available The vulnerability of buildings to the impact of rockfalls is a topic that has recently attracted increasing attention in the scientific literature. The quantification of the vulnerability, when based on empirical or heuristic approaches requires data recorded from historical rockfalls, which are not always available. This is the reason why appropriate alternatives are required. The use of analytical and numerical models can be one of them. In this paper, a methodology is proposed for the analytical evaluation of the vulnerability of reinforced concrete buildings. The vulnerability is included in the risk equation by incorporating the uncertainty of the impact location of the rock block and the subsequent damage level. The output is a weighted vulnerability that ranges from 0 to 1 and expresses the potential damage that a rock block causes to a building in function of its velocity and size. The vulnerability is calculated by the sum of the products of the probability of block impact on each element of the building and its associated damage state, the latter expressed in relative recovery cost terms. The probability of exceeding a specific damage state such as non-structural, local, partial, extensive or total collapse is also important for the quantification of risk and to this purpose, several sets of fragility curves for various rock diameters and increasing velocities have been prepared. An example is shown for the case of a simple reinforced concrete building and impact energies from 0 to 4075 kJ.

  16. Geologic Setting and Hydrogeologic Units of the Columbia Plateau Regional Aquifer System, Washington, Oregon, and Idaho

    Science.gov (United States)

    Kahle, Sue C.; Olsen, Theresa D.; Morgan, David S.

    2009-01-01

    The Columbia Plateau Regional Aquifer System (CPRAS) covers approximately 44,000 square miles of northeastern Oregon, southeastern Washington, and western Idaho. The area supports a $6 billion per year agricultural industry, leading the Nation in production of apples and nine other commodities (State of Washington Office of Financial Management, 2007; U.S. Department of Agriculture, 2007). Groundwater availability in the aquifers of the area is a critical water-resource management issue because the water demand for agriculture, economic development, and ecological needs is high. The primary aquifers of the CPRAS are basalts of the Columbia River Basalt Group (CRBG) and overlying basin-fill sediments. Water-resources issues that have implications for future groundwater availability in the region include (1) widespread water-level declines associated with development of groundwater resources for irrigation and other uses, (2) reduction in base flow to rivers and associated effects on temperature and water quality, and (3) current and anticipated effects of global climate change on recharge, base flow, and ultimately, groundwater availability. As part of a National Groundwater Resources Program, the U.S. Geological Survey began a study of the CPRAS in 2007 with the broad goals of (1) characterizing the hydrologic status of the system, (2) identifying trends in groundwater storage and use, and (3) quantifying groundwater availability. The study approach includes documenting changes in the status of the system, quantifying the hydrologic budget for the system, updating the regional hydrogeologic framework, and developing a groundwater-flow simulation model for the system. The simulation model will be used to evaluate and test the conceptual model of the system and later to evaluate groundwater availability under alternative development and climate scenarios. The objectives of this study were to update the hydrogeologic framework for the CPRAS using the available

  17. VT - Vermont Social Vulnerability Index

    Data.gov (United States)

    Vermont Center for Geographic Information — Social vulnerability refers to the resilience of communities when responding to or recovering from threats to public health. The Vermont Social Vulnerability Index...

  18. Insights and participatory actions driven by a socio-hydrogeological approach for groundwater management: the Grombalia Basin case study (Tunisia)

    Science.gov (United States)

    Tringali, C.; Re, V.; Siciliano, G.; Chkir, N.; Tuci, C.; Zouari, K.

    2017-02-01

    Sustainable groundwater management strategies in water-scarce countries need to guide future decision-making processes pragmatically, by simultaneously considering local needs, environmental problems and economic development. The socio-hydrogeological approach named `Bir Al-Nas' has been tested in the Grombalia region (Cap Bon Peninsula, Tunisia), to evaluate the effectiveness of complementing hydrogeochemical and hydrogeological investigations with the social dimension of the issue at stake (which, in this case, is the identification of groundwater pollution sources). Within this approach, the social appraisal, performed through social network analysis and public engagement of water end-users, allowed hydrogeologists to get acquainted with the institutional dimension of local groundwater management, identifying issues, potential gaps (such as weak knowledge transfer among concerned stakeholders), and the key actors likely to support the implementation of the new science-based management practices resulting from the ongoing hydrogeological investigation. Results, hence, go beyond the specific relevance for the Grombaila basin, showing the effectiveness of the proposed approach and the importance of including social assessment in any given hydrogeological research aimed at supporting local development through groundwater protection measures.

  19. Hydrogeologic Framework Model for the Saturated Zone Site Scale flow and Transport Model

    Energy Technology Data Exchange (ETDEWEB)

    T. Miller

    2004-11-15

    The purpose of this report is to document the 19-unit, hydrogeologic framework model (19-layer version, output of this report) (HFM-19) with regard to input data, modeling methods, assumptions, uncertainties, limitations, and validation of the model results in accordance with AP-SIII.10Q, Models. The HFM-19 is developed as a conceptual model of the geometric extent of the hydrogeologic units at Yucca Mountain and is intended specifically for use in the development of the ''Saturated Zone Site-Scale Flow Model'' (BSC 2004 [DIRS 170037]). Primary inputs to this model report include the GFM 3.1 (DTN: MO9901MWDGFM31.000 [DIRS 103769]), borehole lithologic logs, geologic maps, geologic cross sections, water level data, topographic information, and geophysical data as discussed in Section 4.1. Figure 1-1 shows the information flow among all of the saturated zone (SZ) reports and the relationship of this conceptual model in that flow. The HFM-19 is a three-dimensional (3-D) representation of the hydrogeologic units surrounding the location of the Yucca Mountain geologic repository for spent nuclear fuel and high-level radioactive waste. The HFM-19 represents the hydrogeologic setting for the Yucca Mountain area that covers about 1,350 km2 and includes a saturated thickness of about 2.75 km. The boundaries of the conceptual model were primarily chosen to be coincident with grid cells in the Death Valley regional groundwater flow model (DTN: GS960808312144.003 [DIRS 105121]) such that the base of the site-scale SZ flow model is consistent with the base of the regional model (2,750 meters below a smoothed version of the potentiometric surface), encompasses the exploratory boreholes, and provides a framework over the area of interest for groundwater flow and radionuclide transport modeling. In depth, the model domain extends from land surface to the base of the regional groundwater flow model (D'Agnese et al. 1997 [DIRS 100131], p 2). For the site

  20. 通用Web漏洞库%Common Web Vulnerability Database

    Institute of Scientific and Technical Information of China (English)

    张昊星; 孙应飞

    2013-01-01

    Based on the research of Web vulnerability database and the situation of vulnerability database construction at home and aboard, the paper designed and implemented a vulnerability database focused on Web vulnerabilities. In consideration of both the features of Web vulnerability and the differences with traditional vulnerability, the paper designed the Web vulnerability database description model, enriched the ways of Web vulnerability collection, redefined the Web vulnerability scoring attributes and added the Web vulnerability reproduce function. The Web vulnerability database guarantees the comprehensive collection of Web vulnerability information and the standard release of Web vulnerability information, helps analyze the Web vulnerability information and data better, and provides a powerful technical support to Web security.%本文研究了国内外Web漏洞库及建设的现状,设计并实现了一个专注于Web漏洞发布的Web漏洞数据库。文中兼顾了Web漏洞的固有特点及其与传统漏洞的属性差别,设计了Web漏洞库描述模型,丰富了Web漏洞的收集方法,定义了Web漏洞的漏洞评价属性标准,并在Web漏洞库中添加了Web漏洞重现模块。我们所设计的Web漏洞库确保了全面的Web漏洞信息收集和Web漏洞信息发布的标准化,可更好地对Web漏洞信息和数据进行分析研究,也为Web安全提供了有力的技术支撑。

  1. Windows Server 2012 vulnerabilities and security

    Directory of Open Access Journals (Sweden)

    Gabriel R. López

    2015-09-01

    Full Text Available This investigation analyses the history of the vulnerabilities of the base system Windows Server 2012 highlighting the most critic vulnerabilities given every 4 months since its creation until the current date of the research. It was organized by the type of vulnerabilities based on the classification of the NIST. Next, given the official vulnerabilities of the system, the authors show how a critical vulnerability is treated by Microsoft in order to countermeasure the security flaw. Then, the authors present the recommended security approaches for Windows Server 2012, which focus on the baseline software given by Microsoft, update, patch and change management, hardening practices and the application of Active Directory Rights Management Services (AD RMS. AD RMS is considered as an important feature since it is able to protect the system even though it is compromised using access lists at a document level. Finally, the investigation of the state of the art related to the security of Windows Server 2012 shows an analysis of solutions given by third parties vendors, which offer security products to secure the base system objective of this study. The recommended solution given by the authors present the security vendor Symantec with its successful features and also characteristics that the authors considered that may have to be improved in future versions of the security solution.

  2. Benchmark analysis for quantifying urban vulnerability to terrorist incidents.

    Science.gov (United States)

    Piegorsch, Walter W; Cutter, Susan L; Hardisty, Frank

    2007-12-01

    We describe a quantitative methodology to characterize the vulnerability of U.S. urban centers to terrorist attack, using a place-based vulnerability index and a database of terrorist incidents and related human casualties. Via generalized linear statistical models, we study the relationships between vulnerability and terrorist events, and find that our place-based vulnerability metric significantly describes both terrorist incidence and occurrence of human casualties from terrorist events in these urban centers. We also introduce benchmark analytic technologies from applications in toxicological risk assessment to this social risk/vulnerability paradigm, and use these to distinguish levels of high and low urban vulnerability to terrorism. It is seen that the benchmark approach translates quite flexibly from its biological roots to this social scientific archetype.

  3. 基于 PSR 模型的电网基础设施脆弱性评估方法研究%Research on vulnerability assessment method of power grid infrastructures based on PSR model

    Institute of Scientific and Technical Information of China (English)

    门永生; 于振; 朱朝阳; 吴睦远; 何真珍

    2014-01-01

    Safety assessment of power system in China has been long focused on network modeling and failure anal -ysis.Vulnerability assessment for important power infrastructures is a new concept appeared in recent years .There are no unanimous definition and norm to carry out evaluation .In this paper , a precise concept on vulnerability of power infrastructures was defined firstly based on the analysis on vulnerability in various fields .Then, several methods of vulnerability assessment in the field of power grid and urban infrastructure were compared .At last, ac-cording to the concentration and requirement , the framework of vulnerability assessment for electric power infra-structures based on PSR (Pressure-Status-Response) model was proposed, and then, taking a 500kV transformer substation for example , the case verification of vulnerability assessments was conducted .The vulnerability index was calculated by the model , and its level of vulnerability was determined to be light based on criteria .The method provides theoretic guide for promotion and development of infrastructure vulnerability assessment in electric power system, and can guide the vulnerability assessment of power grid infrastructure effectively .%当前我国电力系统安全性评估主要是针对电力系统本身建模和故障分析计算,而对电网基础设施的脆弱性评估目前还没有公认的定义和统一标准。针对电网基础设施,在研究不同领域脆弱性概念的基础上,给出了电网基础设施脆弱性的定义,并在分析比较电网领域及城市基础设施领域脆弱性评估方法的基础上,提出了基于PSR模型的电网基础设施脆弱性评估方法及思路,以某500 kV变电站为例,进行脆弱性评估方法的实例验证,通过模型分析计算得出脆弱性指数,并依据标准判定其脆弱性等级为较轻。该方法的研究可为电网基础设施脆弱性评估提供重要的理论基础,可有效指导电

  4. Research-based Reflections on How the Educational, Economic and Social Circumstances Faced by Some Children and Young People Can Lead to Significant Disadvantage and Vulnerability

    Directory of Open Access Journals (Sweden)

    Tucker Stanley

    2016-07-01

    Full Text Available The paper provides detailed reflections on the educational, economic and social circumstances that impact on the lives of many disadvantaged and vulnerable children and young people. Drawing largely on primary research data collected in Romania, Germany and the United Kingdom, three illustrative case studies are presented for consideration focusing on: life in residential care and youth offending institutions; experiences of educational vulnerability; and human trafficking. The methodological approach adopted across the research projects explored, was shaped by the demands and expectations of the United Nations Convention on the Rights of the Child (UNCRC. All of the reported data reflects the views of children and young people who were interviewed as part of three research projects. It is argued that the difficult and challenging circumstances that many children and young people find themselves in, place them at significant disadvantage and increased vulnerability in terms of their social and educational development and life chances.

  5. Attack Vulnerability of Network Controllability.

    Science.gov (United States)

    Lu, Zhe-Ming; Li, Xin-Feng

    2016-01-01

    Controllability of complex networks has attracted much attention, and understanding the robustness of network controllability against potential attacks and failures is of practical significance. In this paper, we systematically investigate the attack vulnerability of network controllability for the canonical model networks as well as the real-world networks subject to attacks on nodes and edges. The attack strategies are selected based on degree and betweenness centralities calculated for either the initial network or the current network during the removal, among which random failure is as a comparison. It is found that the node-based strategies are often more harmful to the network controllability than the edge-based ones, and so are the recalculated strategies than their counterparts. The Barabási-Albert scale-free model, which has a highly biased structure, proves to be the most vulnerable of the tested model networks. In contrast, the Erdős-Rényi random model, which lacks structural bias, exhibits much better robustness to both node-based and edge-based attacks. We also survey the control robustness of 25 real-world networks, and the numerical results show that most real networks are control robust to random node failures, which has not been observed in the model networks. And the recalculated betweenness-based strategy is the most efficient way to harm the controllability of real-world networks. Besides, we find that the edge degree is not a good quantity to measure the importance of an edge in terms of network controllability.

  6. A physical approach on flood risk vulnerability of buildings

    OpenAIRE

    B. Mazzorana; S. Simoni; Scherer, C.; B. Gems; Fuchs, S.; Keiler, Margreth

    2014-01-01

    The design of efficient hydrological risk mitigation strategies and their subsequent implementation relies on a careful vulnerability analysis of the elements exposed. Recently, extensive research efforts were undertaken to develop and refine empirical relationships linking the structural vulnerability of buildings to the impact forces of the hazard processes. These empirical vulnerability functions allow estimating the expected direct losses as a result of the hazard scenario based on spatia...

  7. Vulnerability-Based Spatial Sampling Stratification for the National Children’s Study, Worcester County, Massachusetts: Capturing Health-Relevant Environmental and Sociodemographic Variability

    Science.gov (United States)

    Downs, Timothy J.; Ogneva-Himmelberger, Yelena; Aupont, Onesky; Wang, Yangyang; Raj, Ann; Zimmerman, Paula; Goble, Robert; Taylor, Octavia; Churchill, Linda; Lemay, Celeste; McLaughlin, Thomas; Felice, Marianne

    2010-01-01

    Background The National Children’s Study is the most ambitious study ever attempted in the United States to assess how environmental factors impact child health and development. It aims to follow 100,000 children from gestation until 21 years of age. Success requires breaking new interdisciplinary ground, starting with how to select the sample of > 1,000 children in each of 105 study sites; no standardized protocol exists for stratification of the target population by factoring in the diverse environments it inhabits. Worcester County, Massachusetts, like other sites, stratifies according to local conditions and local knowledge, subject to probability sampling rules. Objectives We answer the following questions: How do we divide Worcester County into viable strata that represent its health-relevant environmental and sociodemographic heterogeneity, subject to sampling rules? What potential does our approach have to inform stratification at other sites? Results We developed a multivariable, vulnerability-based method for spatial sampling consisting of two descriptive indices: a hazards/stressors exposure index (comprising three proxy variables), and an adaptive capacity/sociodemographic character index (five variables). Multivariable, health-relevant stratification at the start of the study may improve detection power for environment–child health associations down the line. Eighteen strata capture countywide heterogeneity in the indices and have optimal relative homogeneity within each. They achieve comparable expected birth counts and conform to local concepts of space. Conclusion The approach offers moderate to high potential to inform other sites, limited by intersite differences in data availability, geodemographics, and technical capacity. Energetic community engagement from the start promotes local stratification coherence, plus vital researcher–community trust and co-ownership for sustainability. PMID:20211802

  8. Use of lipid-based nutrient supplements (LNS) to improve the nutrient adequacy of general food distribution rations for vulnerable sub-groups in emergency settings.

    Science.gov (United States)

    Chaparro, Camila M; Dewey, Kathryn G

    2010-01-01

    The term 'lipid-based nutrient supplements' (LNS) refers generically to a range of fortified, lipid-based products, including products like Ready-to-Use Therapeutic Foods (RUTF) (a large daily ration with relatively low micronutrient concentration) as well as highly concentrated supplements (1-4 teaspoons/day, providing groups [e.g. infants and children between 6 and 24 months of age, and pregnant and lactating women (PLW)]. Currently, the main food and nutrition interventions in emergency settings include general food distribution (GFD) rations, which are provided to the affected population as a whole, and selective (or supplementary) feeding programs (SFP), which are to be provided to nutritionally vulnerable or malnourished individuals. In addition to logistical and operational challenges that may limit the intended effect of these programs, the nutritional quality of the food commodities provided may be insufficient to meet the needs of infants and young children and PLW. Because these subgroups have particularly high nutrient needs for growth and development, meeting these needs is challenging in settings where the ration is limited to a few food commodities, with little access to a diverse diet and bioavailable sources of micronutrients. In recent years, there has been increased attention to adding micronutrient interventions, on top of the other food-based interventions (such as GFDs and SFPs), to fill micronutrient gaps in diets in emergency settings. The focus of this document is the potential role of LNS in meeting the nutritional needs of these vulnerable subgroups, with the goal of preventing malnutrition in emergency-affected populations. The document addresses the desired nutritional formulation of LNS for these target groups, taking into account the expected bioavailability of relevant nutrients and toxicity concerns. It also discusses the recommended chemical forms of the fortificants in LNS; stability and shelf-life considerations; production

  9. Hydrogeology of Cibola County, New Mexico

    Science.gov (United States)

    Baldwin, J.A.; Rankin, D.R.

    1995-01-01

    The hydrogeology of Cibola County, New Mexico, was evaluated to determine the occurrence, availability, and quality of ground-water resources. Rocks of Precambrian through Quaternary age are present in Cibola County. Most rocks are sedimentary in origin except for Precambrian igneous and metamorphic rocks exposed in the Zuni Uplift and Tertiary and Quaternary basalts in northern and central parts of the county. The most productive aquifers in the county include (youngest to oldest) Quaternary deposits, sandstones in the Mesaverde Group, the Dakota-Zuni-Bluff aquifer, the Westwater Canyon aquifer, the Todilto- Entrada aquifer, sandstone beds in the Chinle Formation, and the San Andres-Glorieta aquifer. Unconsolidated sand, silt, and gravel form a mantle ranging from a few inches to 150 to 200 feet over much of the bedrock in Cibola County. Well yields range from 5 to 1,110 gallons per minute. Dissolved-solids concentrations of ground water range from 200 to more than 5,200 milligrams per liter. Calcium, magnesium, bicarbonate, and sulfate are the predominant ions in ground water in alluvial material. The Mesaverde Group mainly occurs in three areas of the county. Well yields range from less than 1 to 12 gallons per minute. The predominant ions in water from wells in the Mesaverde Group are calcium, sodium, and bicarbonate. The transition from calcium-predominant to sodium-predominant water in the southwestern part of the county likely is a result of ion exchange. Wells completed in the Dakota-Zuni-Bluff aquifer yield from 1 to 30 gallons per minute. Dissolved-solids concentrations range from 220 to 2,000 milligrams per liter in water from 34 wells in the western part of the county. Predominant ions in the ground water include calcium, sodium, sulfate, and bicarbonate. Calcium predominates in areas where the aquifer is exposed at the surface or is overlain with alluvium. Sandstones in the Chinle Formation yield from 10 to 300 gallons per minute to wells in the Grants

  10. CSRF Vulnerabilities and Defensive Techniques

    Directory of Open Access Journals (Sweden)

    Rupali D. Kombade

    2012-02-01

    Full Text Available Web applications are now part of day to day life due to their user friendly environment as well as advancement of technology to provide internet facilities, but these web applications brought lot of threats with them and these threats are continuously growing, one of the these threat is Cross Site Request Forgery(CSRF. CSRF attack is immerged as serious threat to web applications which based on the vulnerabilities present in the normal request response pattern of HTTP protocol. It is difficult to detect and hence it is present in most of the existing web applications. CSRF attack occurs when a malicious web site causes a user’s web browser to perform an unwanted action on a trusted site. It is listed in OWASP’s top ten Web Application attacks list. In this survey paper we will study CSRF attack, CSRF vulnerabilities and its defensive measures. We have compared various defense mechanisms to analyse the best defense mechanism. This study will help us to build strong and robust CSRF protection mechanism.

  11. Exploration and Practice of Using Typical Software Vulnerabilities Based on Windows%基于 Windows 的软件安全典型漏洞利用策略探索与实践

    Institute of Scientific and Technical Information of China (English)

    关通; 任馥荔; 伟平; 张浩

    2014-01-01

    With the rapid development of the global information technology, computer software has become the important engine of the world economy, science and technology, military and social development. The core of information security is attached to the security mechanism of the operating system and software vulnerabilities. Software vulnerability itself can not constitute attack, software vulnerability exploiting make the attack possible. This article is based on the Windows operating system, mainly analyzes the principles of some typical software vulnerabilities as well as the common ways to exploit software vulnerabilities, comparing them. in different environment.The article also simply analyzes the protective effect to software security and the hinder to software vulnerability exploiting of Windows security mechanisms. The article emphatically does some explorations and practices on exploiting several typical software vulnerabilities, analyzing the fragility of Windows security mechanisms by using the current popular methods of bypassing security mechanisms.%随着全球信息化的迅猛发展,计算机软件已成为世界经济、科技、军事和社会发展的重要引擎。信息安全的核心在于其所依附的操作系统的安全机制以及软件本身存在的漏洞。软件漏洞本身无法构成攻击,软件漏洞利用使得把漏洞转化为攻击变为可能。文章立足于 Windows 操作系统,主要分析了一些常用软件的典型漏洞原理以及常见的利用方法,比较了不同利用方法在不同环境下的性能优劣,并简单分析了 Windows 的安全机制对软件的防护作用以及对软件漏洞利用的阻碍作用。文章着重对几种典型漏洞进行了软件漏洞利用的探索和实践,并使用当前流行的对安全机制的绕过方法分析了 Windows 几种安全机制的脆弱性。

  12. Assessing human vulnerability: Daytime residential distribution as a vulnerability indicator

    Science.gov (United States)

    Gokesch, Karin; Promper, Catrin; Papathoma-Köhle, Maria; Glade, Thomas

    2014-05-01

    Natural hazard risk management is based on detailed information on potential impacts of natural hazards. Especially concerning fast onset hazards such as flash floods, earthquakes but also debris flows and landslides, knowing potential hotspots of impact to both, assets and human lives is essential. This information is important for emergency management and decision making in the response phase of the disaster management cycle. Emergency managers are in need of information regarding not only the number of humans being potentially affected but also the respective vulnerability of the group affected based on characteristics such as age, income, health condition, mobility, etc. regarding a certain hazard. The analysis presented focuses on the distribution of the population, assuming a certain pattern of people in a certain radius of action. The method applied is based on a regular pattern of movement of different groups of people and a pattern of presence in certain units, e.g. schools, businesses or residential buildings. The distribution is calculated on a minimum of available data including the average household size, as well as information on building types. The study area is located in the Southwest of Lower Austria, Austria. The city of Waidhofen/Ybbs can be regarded as a regional center providing basic infrastructure, shops and schools. The high concentration of buildings combining shops and residential units leads to a high damage potential throughout the whole study area. The presented results indicate the population distribution within the study area on an average working day. It is clear that explicitly high numbers of people are located in specific buildings (e.g. schools and hospitals) which also include highly vulnerable groups especially to fast onset hazards. The results provide emergency services with the information that they need in order to intervene directly where large numbers of victims or people that need to be evacuated are located. In this

  13. What maintains the waters flowing in our rivers? - Rethinking hydrogeology to improve public policy

    Science.gov (United States)

    Vasconcelos, Vitor Vieira

    2016-01-01

    This article discusses how new contributions from hydrogeological science in the 20th and 21st centuries have allowed for a better understanding of the processes that affect the maintenance of river flows. Moreover, the way in which this knowledge has been conveyed beyond academia and has been gradually incorporated into public policy for natural resource management is also discussed. This article explains the development of several approaches used to understand the relationships among the management of aquifers, vegetation and river flows, including water balance, aquifer recharge, the piston effect, seasonal effects, and safe and sustainable yields. Additionally, the current challenges regarding the modeling of hydrological processes that integrate groundwater and surface waters are discussed. Examples of studies applied in Brazil that demonstrate these processes and stimulate thought regarding water management strategies are presented. In light of the case studies, it is possible to propose different strategies, each adapted for specific hydrogeological context to maximize aquifer recharge or base flow maintenance. Based on these strategies, the role of infiltration ponds and other artificial recharge techniques is re-evaluated in the context of the mitigation of environmental impacts on the maintenance of river flows. Proposals for the improvement of public policies regarding the payment of related environmental services to stimulate investment in aquifer recharge and the maintenance of base flow, for which the goal is to attain win-win-win situations for the environment, farmers and water users, while preventing land speculation, are discussed. Lastly, a conceptual model for the dissemination of hydrogeological knowledge in public policies is provided, and its challenges and possibilities are discussed.

  14. Beyond 'vulnerable groups': contexts and dynamics of vulnerability.

    Science.gov (United States)

    Zarowsky, Christina; Haddad, Slim; Nguyen, Vinh-Kim

    2013-03-01

    This paper reviews approaches to vulnerability in public health, introducing a series of 10 papers addressing vulnerability in health in Africa. We understand vulnerability as simultaneously a condition and a process. Social inequalities are manifest in and exacerbate three key dimensions of vulnerability: the initial level of wellbeing, the degree of exposure to risk, and the capacity to manage risk effectively. We stress the dynamic interactions linking material and social deprivation, poverty, powerlessness and ill health: risks or shocks and their health impacts are intimately interconnected and reinforce each other in a cycle which in the absence of effective interventions, increases vulnerability. An inductive process which does not begin with an a priori definition or measurement of 'vulnerability' and which does not assume the existence of fixed 'vulnerable groups' allowed us both to re-affirm core aspects of existing conceptual frameworks, and to engage in new ways with literature specifically addressing vulnerability and resilience at the population level as well as with literature - for example in ecology, and on the concept of frailty in research on aging - with which researchers on health and poverty in Africa may not be familiar. We invite conceptual and empirical work on vulnerability in complex systems frameworks. These perspectives emphasize contexts and nonlinear causality thus supporting analyses of vulnerability and resilience as both markers and emergent properties of dynamic interactions. We accept a working definition of vulnerability, and recognize that some definable groups of people are more likely than others to suffer harm from exposure to health risks. But we suggest that the real work - at both intellectual and policy/political levels - lies in understanding and responding to the dynamics, meanings and power relations underlying actual instances and processes of vulnerability and harm.

  15. Identification and Characterization of Hydrogeologic Units at the Nevada Test Site Using Geophysical Logs: Examples from the Underground Test Area Project

    Energy Technology Data Exchange (ETDEWEB)

    Prothro, Lance [National Security Technologies, LLC, Las Vegas, NV (United States); Drellack, Sigmund [National Security Technologies, LLC, Las Vegas, NV (United States); Townsend, Margaret [National Security Technologies, LLC, Las Vegas, NV (United States)

    2009-03-25

    The diverse and complex geology of the Nevada Test Site region makes for a challenging environment for identifying and characterizing hydrogeologic units penetrated by wells drilled for the U.S. Department of Energy, National Nuclear Security Administration, Underground Test Area (UGTA) Environmental Restoration Sub-Project. Fortunately, UGTA geoscientists have access to large and robust sets of subsurface geologic data, as well as a large historical knowledge base of subsurface geological analyses acquired mainly during the underground nuclear weapons testing program. Of particular importance to the accurate identification and characterization of hydrogeologic units in UGTA boreholes are the data and interpretation principles associated with geophysical well logs. Although most UGTA participants and stakeholders are probably familiar with drill hole data such as drill core and cuttings, they may be less familiar with the use of geophysical logs; this document is meant to serve as a primer on the use of geophysical logs in the UGTA project. Standard geophysical logging tools used in the UGTA project to identify and characterize hydrogeologic units are described, and basic interpretation principles and techniques are explained. Numerous examples of geophysical log data from a variety of hydrogeologic units encountered in UGTA wells are presented to highlight the use and value of geophysical logs in the accurate hydrogeologic characterization of UGTA wells.

  16. Natural and Artificial (fluorescent) Tracers to Characterise Hydrogeological Functioning and to Protect Karst Aquifers

    Science.gov (United States)

    Andreo, B.; Mudarra, M.; Marin, A. I.; Barberá, J. A.

    2012-12-01

    The hydrogeological functioning and response of karst aquifers can be determined by the joint use of natural hydrogeochemical tracers, especially total organic carbon (TOC) and intrinsic fluorescence of water, together with artificial (fluorescent) tracers, under the same hydrodynamic conditions. Sharp and rapid variations in discharge, temperature, electrical conductivity and water chemistry, particularly of natural tracers of infiltration (TOC, intrinsic fluorescence and NO3-) recorded in karst spring water, confirm the existence of well developed karst conduits in the sector of the aquifer being drained, with rapid flows and very short water transit times from the surface to the springs (Mudarra et al., 2011). This is in agreement with the evidence obtained from breakthrough curves of fluorescent dye tracers (uranine, eosine, etc.). However, time lags between maximum concentrations of natural (especially TOC and intrinsic fluorescence) and artificial tracers show that the global system response is faster than that produced from a recharge concentrated at a point on the surface, even in karst sinkholes. Response and transit times of water through the karst can be calculated using both natural and artificial tracers, but flow velocities can really only be quantified using artificial tracers. Analysis of the responses obtained by natural tracers of infiltration (global system response) and artificial tracers (single response) in karst waters has revealed the usefulness and complementarity of both techniques for characterising the hydrogeological functioning of karst aquifers and, even more important, for validating contamination vulnerability mapping in these medium (Zwahlen, 2004; Andreo et al., 2006). In recent decades, several methods have been developed for such vulnerability mapping, but little progress has been made in validating their results. This validation is essential for the adequate protection of water resources in karst media, as has been shown in

  17. Human Rights and Vulnerability. Examples of Sexism and Ageism

    Directory of Open Access Journals (Sweden)

    Mª DEL CARMEN BARRANCO AVILÉS

    2015-12-01

    Full Text Available A human rights based approach applied to the idea of ‘vulnerable group’ connects vulnerability and structural discrimination. The Convention on the Rights of Persons with Disability provides some elements that allow to state that we are facing a new paradigm in the International Human Rights Law. One of the keys for the understanding of this new framework is the assumption of the disadvantage related to vulnerability as, at least in a part, socially built and ideologically justified. Sexism and ageism are examples of how ideologies reinforce vulnerability of women, children and aged persons transforming them in groups which members are in risk of discrimination.

  18. Climate challenges, vulnerabilities, and food security.

    Science.gov (United States)

    Nelson, Margaret C; Ingram, Scott E; Dugmore, Andrew J; Streeter, Richard; Peeples, Matthew A; McGovern, Thomas H; Hegmon, Michelle; Arneborg, Jette; Kintigh, Keith W; Brewington, Seth; Spielmann, Katherine A; Simpson, Ian A; Strawhacker, Colleen; Comeau, Laura E L; Torvinen, Andrea; Madsen, Christian K; Hambrecht, George; Smiarowski, Konrad

    2016-01-12

    This paper identifies rare climate challenges in the long-term history of seven areas, three in the subpolar North Atlantic Islands and four in the arid-to-semiarid deserts of the US Southwest. For each case, the vulnerability to food shortage before the climate challenge is quantified based on eight variables encompassing both environmental and social domains. These data are used to evaluate the relationship between the "weight" of vulnerability before a climate challenge and the nature of social change and food security following a challenge. The outcome of this work is directly applicable to debates about disaster management policy.

  19. Distributed Temperature Sensing as a downhole tool in hydrogeology

    NARCIS (Netherlands)

    Bense, V.F.; Read, T.; Bour, O.; Borgne, Le T.; Coleman, T.; Krause, S.; Chalari, A.; Mondanos, M.; Ciocca, F.; Selker, J.S.

    2016-01-01

    Distributed Temperature Sensing (DTS) technology enables downhole temperature monitoring to study hydrogeological processes at unprecedentedly high frequency and spatial resolution. DTS has been widely applied in passive mode in site investigations of groundwater flow, in-well flow, and subsurfac

  20. Hydrogeology and hydrologic conditions of the Ozark Plateaus aquifer system

    Science.gov (United States)

    Hays, Phillip D.; Knierim, Katherine J.; Breaker, Brian K.; Westerman, Drew A.; Clark, Brian R.

    2016-11-23

    The hydrogeology and hydrologic characteristics of the Ozark Plateaus aquifer system were characterized as part of ongoing U.S. Geological Survey efforts to assess groundwater availability across the Nation. The need for such a study in the Ozark Plateaus physiographic province (Ozark Plateaus) is highlighted by increasing demand on groundwater resources by the 5.3 million people of the Ozark Plateaus, water-level declines in some areas, and potential impacts of climate change on groundwater availability. The subject study integrates knowledge gained through local investigation within a regional perspective to develop a regional conceptual model of groundwater flow in the Ozark Plateaus aquifer system (Ozark system), a key phase of groundwater availability assessment. The Ozark system extends across much of southern Missouri and northwestern and north-central Arkansas and smaller areas of southeastern Kansas and northeastern Oklahoma. The region is one of the major karst landscapes in the United States, and karst aquifers are predominant in the Ozark system. Groundwater flow is ultimately controlled by aquifer and confining unit lithologies and stratigraphic relations, geologic structure, karst development, and the character of surficial lithologies and regolith mantle. The regolith mantle is a defining element of Ozark Plateaus karst, affecting recharge, karst development, and vulnerability to surface-derived contaminants. Karst development is more advanced—as evidenced by larger springs, hydraulic characteristics, and higher well yields—in the Salem Plateau and in the northern part of the Springfield Plateau (generally north of the Arkansas-Missouri border) as compared with the southern part of the Springfield Plateau in Arkansas, largely due to thinner, less extensive regolith and purer carbonate lithology.Precipitation is the ultimate source of all water to the Ozark system, and the hydrologic budget for the Ozark system includes inputs from recharge

  1. Morphological and Stress Vulnerability Indices for Human Coronary Plaques and Their Correlations with Cap Thickness and Lipid Percent: An IVUS-Based Fluid-Structure Interaction Multi-patient Study.

    Directory of Open Access Journals (Sweden)

    Liang Wang

    2015-12-01

    Full Text Available Plaque vulnerability, defined as the likelihood that a plaque would rupture, is difficult to quantify due to lack of in vivo plaque rupture data. Morphological and stress-based plaque vulnerability indices were introduced as alternatives to obtain quantitative vulnerability assessment. Correlations between these indices and key plaque features were investigated. In vivo intravascular ultrasound (IVUS data were acquired from 14 patients and IVUS-based 3D fluid-structure interaction (FSI coronary plaque models with cyclic bending were constructed to obtain plaque wall stress/strain and flow shear stress for analysis. For the 617 slices from the 14 patients, lipid percentage, min cap thickness, critical plaque wall stress (CPWS, strain (CPWSn and flow shear stress (CFSS were recorded, and cap index, lipid index and morphological index were assigned to each slice using methods consistent with American Heart Association (AHA plaque classification schemes. A stress index was introduced based on CPWS. Linear Mixed-Effects (LME models were used to analyze the correlations between the mechanical and morphological indices and key morphological factors associated with plaque rupture. Our results indicated that for all 617 slices, CPWS correlated with min cap thickness, cap index, morphological index with r = -0.6414, 0.7852, and 0.7411 respectively (p<0.0001. The correlation between CPWS and lipid percentage, lipid index were weaker (r = 0.2445, r = 0.2338, p<0.0001. Stress index correlated with cap index, lipid index, morphological index positively with r = 0.8185, 0.3067, and 0.7715, respectively, all with p<0.0001. For all 617 slices, the stress index has 66.77% agreement with morphological index. Morphological and stress indices may serve as quantitative plaque vulnerability assessment supported by their strong correlations with morphological features associated with plaque rupture. Differences between the two indices may lead to better plaque

  2. Open Source Vulnerability Database Project

    Directory of Open Access Journals (Sweden)

    Jake Kouns

    2008-06-01

    Full Text Available This article introduces the Open Source Vulnerability Database (OSVDB project which manages a global collection of computer security vulnerabilities, available for free use by the information security community. This collection contains information on known security weaknesses in operating systems, software products, protocols, hardware devices, and other infrastructure elements of information technology. The OSVDB project is intended to be the centralized global open source vulnerability collection on the Internet.

  3. DEMOGRAPHIC VULNERABILITIES IN TECUCI PLAIN

    Directory of Open Access Journals (Sweden)

    Iulian Adrian ŞORCARU

    2013-06-01

    Full Text Available The study focuses on analyzing and mapping 8 indicators considered to best reflect the demographic vulnerability in Tecuci Plain in the year 2010 and proposes a model of aggregation which finally allows us to distinguish three major types of demographic vulnerability (low, medium and high. Mapping the final values also shows significant disparities in the territorial administrative units that broadly overlap the plain, the most vulnerable being Tecuci city and the peripheral communes, towards Vrancea and Vaslui Counties.

  4. Social vulnerability assessment: a growing practice in Europe?

    Science.gov (United States)

    Tapsell, S.; McC arthy, S.

    2012-04-01

    This paper builds upon work on social vulnerability from the CapHaz-Net consortium, an ongoing research project funded by the European Commission in its 7th Framework Programme. The project focuses on the social dimensions of natural hazards, as well as on regional practices of risk prevention and management, and aims at improving the resilience of European societies to natural hazards, paying particular attention to social capacity building. The topic of social vulnerability is one of seven themes being addressed in the project. There are various rationales for examining the relevance of social vulnerability to natural hazards. Vulnerability assessment has now been accepted as a requirement for the effective development of emergency management capability, and assessment of social vulnerability has been recognised as being integral to understanding the risk to natural hazards. The aim of our research was to examine social vulnerability, how it might be understood in the context of natural hazards in Europe, and how social vulnerability can be addressed to increase social capacity. The work comprised a review of research on social vulnerability to different natural hazards within Europe and included concepts and definitions of social vulnerability (and related concepts), the purpose of vulnerability assessment and who decides who is vulnerable, different approaches to assessing or measuring social vulnerability (such as the use of 'classical' quantitative vulnerability indicators and qualitative community-based approaches, along with the advantages and disadvantages of both), conceptual frameworks for assessing social vulnerability and three case studies of social vulnerability studies within Europe: flash floods in the Italian Alps, fluvial flooding in Germany and heat waves in Spain. The review reveals variable application of social vulnerability analysis across Europe and there are indications why this might be the case. Reasons could range from the scale of

  5. Geophysical characterization of Hydrogeological processes at the catchment scale

    Science.gov (United States)

    Flores Orozco, Adrian; Gallistl, Jakob; Schlögel, Ingrid; Chwatal, Werner; Oismüller, Markus; Blöschl, Günter

    2016-04-01

    The characterization of hydrogeological properties in the subsurface with high resolution across space and time scales is critical to improve our understanding of water flow and transport processes. However, to date, hydrogeological investigations are mainly performed through well-tests or the analysis of samples, thus, limiting the spatial resolution of the investigation. To properly capture heterogeneities in the subsurface controlling surface-groundwater interactions, modern hydrogeological studies require the development of innovative investigation techniques that permit to gain continuous information about subsurface state with high spatial and temporal resolution at different scales: from the pore-space all the way to the catchment. To achieve this, we propose the conduction of geophysical surveys, in particular field-scale Spectral Induced Polarization (SIP) imaging measurements. SIP images provide information about the complex electrical conductivity (CEC), which is controlled by important hydrogeological parameters, such as porosity, water content and the chemical properties of the pore-water. Here, we present imaging results collected at the catchment scale (approximately 66 ha), which permitted to gain detailed information about the spatial variability of hydrogeological parameters at different scales. The heterogeneities observed in the geophysical images revealed consistency with independent information collected at the study area. In addition to this, and taking into account that different geophysical methods yield information about different properties and at diverse scales, interpretation of the SIP images was improved by incorporation of complementary measurements, such as: ElectroMagnetic Induction (EMI), Ground Penetrating Radar (GPR), Multichannel Analysis of Surface-Waves (MASW) and Seismic Refraction-Reflection (SRR).

  6. A Formal Classification of Internet Banking Attacks and Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Laerte Peotta

    2011-02-01

    Full Text Available A formal classification of attacks and vulnerabilities that affect current internet banking systems is presented along with two attacks which demonstrate the insecurity of such systems. Based ona thoroughanalysis of current security models, we propose a guidelines for designing secure internet banking systems which are not affected by the presented attacks and vulnerabilities.

  7. Common Control System Vulnerability

    Energy Technology Data Exchange (ETDEWEB)

    Trent Nelson

    2005-12-01

    The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an

  8. Mapping disaster vulnerability in India using analytical hierarchy process

    Directory of Open Access Journals (Sweden)

    Anusheema Chakraborty

    2016-01-01

    Full Text Available Disasters are the coincidences between hazardous events, elements at risk, and conditions of vulnerability. Vulnerability integrates social and environmental systems to reduce the intensity and frequency of these risks. By categorizing regions according to their level of vulnerability, one can examine and assess the possible impacts of developmental and environmental degradation processes. This study is an attempt to map the sub-national areas (districts in India that are vulnerable to natural and climate-induced disasters. The assessment is considered under the framework of Intergovernmental Panel on Climate Change definition of vulnerability. Using analytical hierarchy process as a multi-criteria decision-mapping method, vulnerability is measured in terms of exposure, sensitivity, and adaptive capacity. Based on this mapping assessment, districts in the state of Arunachal Pradesh, Assam, Bihar, Himachal Pradesh, Jharkhand, Manipur, Meghalaya, Mizoram, Uttar Pradesh, Uttarakhand, and West Bengal are the most vulnerable regions; while districts in the state of Punjab, Haryana, Gujarat, Tamil Nadu, Maharashtra, Goa, Andhra Pradesh, Kerala, and Karnataka are among the least vulnerable regions. The results of this study can serve as the basis for targeting prioritization efforts, emergency response measures, and policy interventions at district level for mitigating disaster vulnerability in the country.

  9. A Branch Comprehensive Vulnerability Assessment Method Based on Improved DEAHP Model%基于改进DEAHP模型的支路综合脆弱性评估方法

    Institute of Scientific and Technical Information of China (English)

    王羽佳; 李华强; 刘沛清; 王兰

    2016-01-01

    Identification of branch vulnerability is of great significance for safe operation of power system and prevention of catastrophic failures. Most of existing branch vulnerability assessment methods fail to present a full view and weight-based comprehensive indices are too subjective. To solve these problems, this paper starts analysis from perspective of cause analysis and consequence evaluation of vulnerability, and presents evaluation indices reflecting anti-interference ability and influence of branches. Then branch comprehensive vulnerability index, considering both subjective preference and objective data, is generated with improved data envelopment analysis model with analytic hierarchy process restraint cone. Multi-layer and multi-angle branch vulnerability assessment index system is built. On this basis, a new branch comprehensive vulnerability assessment method is proposed. Simulation results show that this method is comprehensive and effective.%电力系统脆弱支路辨识,对系统安全运行、防止灾难性事故发生具有重要意义。针对现有脆弱支路评估方法存在的评估角度单一,综合指标权重选取过于主观的问题,文中综合脆弱性的原因分析与后果评估2个角度,建立反映支路抗干扰能力和影响力的指标集;基于改进的带层次分析法约束锥的数据包络分析模型进行多指标综合,得到了既考虑主观偏好又考虑客观数据的支路综合脆弱性评估指标,构建了多层次多角度的支路脆弱性评估指标体系,并基于此提出了一种新的支路综合脆弱性评估方法。仿真结果证明了该方法的全面性与有效性。

  10. Buffer Overflow Vulnerability Location Technology Based on Code Instrumentation%基于代码插装的缓冲区溢出漏洞定位技术

    Institute of Scientific and Technical Information of China (English)

    史胜利

    2012-01-01

    In order to find buffer overflow vulnerability point accurately and rapidly, this paper proposes a method that can find buffer overflow vulnerabilities in binary file through code instrumentation. It uses plentiful functions PIN providing to make program analysis tool and saves information needed during program execution. When detecting memory access violation exception, it distinguishes what class of memory corruption and obtains memory corruption point and seeks illegal memory writing instruction to locate vulnerability. Example analysis shows that the method does not need source program, and has higher efficiency, it can locate popular buffer overflow vulnerabilities successfully.%为准确快速地找到缓冲区溢出漏洞点,提出一种通过代码插装对二进制文件中的缓冲区溢出漏洞自动定位的方法.使用PIN提供的函数编写程序分析工具,在程序执行过程中记录所需的信息.当检测到内存访问错误异常时,判别破坏内存的情况,获取内存破坏点,查找到非法写内存的指令定位漏洞.实例分析表明,该方法不需要源程序且效率较高,能成功地定位常见的缓冲区溢出漏洞.

  11. Mapping Regional Drought Vulnerability: a Case Study

    Science.gov (United States)

    Karamouz, M.; Zeynolabedin, A.; Olyaei, M. A.

    2015-12-01

    are ranked in 5 intervals and for each parameter vulnerability maps are prepared in GIS environment. Selection of theses parameters are based on factors such as regional features and availability of data. Considering the fact that the aforementioned parameters have different level of importance in vulnerability maps, different weights are assigned to the parameters considering how critical each parameter is in the overall drought analysis. Expert's opinion is selected in assigning weights. A multi-criteria decision making (MCDM) framework is used to check the consistency of the provided information. Then the weighted maps are overlaid to find the overall vulnerability map. The map shows very low, low, medium, intense and very intense regional vulnerabilities. According to the results, the west part of East Azarbaijan province is the most vulnerable region to drought which is expected due to the vicinity of this part to Urumia Lake that has been lost most of its water during the last decades. The least vulnerable part seems to be the Eastern part of the province with longer lasting resources. Taking into consideration that Caspian Sea is near this part with high precipitation record, the outcome of this study is in line with the general expectations. The result of this study can be used for preparedness planning and for allocating resources for facing droughts in this region.

  12. MAPPING REGIONAL DROUGHT VULNERABILITY: A CASE STUDY

    Directory of Open Access Journals (Sweden)

    M. Karamouz

    2015-12-01

    series. Vulnerabilities are ranked in 5 intervals and for each parameter vulnerability maps are prepared in GIS environment. Selection of theses parameters are based on factors such as regional features and availability of data. Considering the fact that the aforementioned parameters have different level of importance in vulnerability maps, different weights are assigned to the parameters considering how critical each parameter is in the overall drought analysis. Expert's opinion is selected in assigning weights. A multi-criteria decision making (MCDM framework is used to check the consistency of the provided information. Then the weighted maps are overlaid to find the overall vulnerability map. The map shows very low, low, medium, intense and very intense regional vulnerabilities. According to the results, the west part of East Azarbaijan province is the most vulnerable region to drought which is expected due to the vicinity of this part to Urumia Lake that has been lost most of its water during the last decades. The least vulnerable part seems to be the Eastern part of the province with longer lasting resources. Taking into consideration that Caspian Sea is near this part with high precipitation record, the outcome of this study is in line with the general expectations. The result of this study can be used for preparedness planning and for allocating resources for facing droughts in this region.

  13. Mapping the groundwater vulnerability for pollution at the pan African scale.

    Science.gov (United States)

    Ouedraogo, Issoufou; Defourny, Pierre; Vanclooster, Marnik

    2016-02-15

    We estimated vulnerability and pollution risk of groundwater at the pan-African scale. We therefore compiled the most recent continental scale information on soil, land use, geology, hydrogeology and climate in a Geographical Information System (GIS) at a resolution of 15 km × 15 km and at the scale of 1:60,000,000. The groundwater vulnerability map was constructed by means of the DRASTIC method. The map reveals that groundwater is highly vulnerable in Central and West Africa, where the watertable is very low. In addition, very low vulnerability is found in the large sedimentary basins of the African deserts where groundwater is situated in very deep aquifers. The groundwater pollution risk map is obtained by overlaying the DRASTIC vulnerability map with land use. The northern, central and western part of the African continent is dominated by high pollution risk classes and this is very strongly related to shallow groundwater systems and the development of agricultural activities. Subsequently, we performed a sensitivity analysis to evaluate the relative importance of each parameter on groundwater vulnerability and pollution risk. The sensitivity analysis indicated that the removal of the impact of vadose zone, the depth of the groundwater, the hydraulic conductivity and the net recharge causes a large variation in the mapped vulnerability and pollution risk. The mapping model was validated using nitrate concentration data of groundwater as a proxy of pollution risk. Pan-African concentration data were inferred from a meta-analysis of literature data. Results shows a good match between nitrate concentration and the groundwater pollution risk classes. The pan African assessment of groundwater vulnerability and pollution risk is expected to be of particular value for water policy and for designing groundwater resources management programs. We expect, however, that this assessment can be strongly improved when better pan African monitoring data related to groundwater

  14. Hydrogeologic Modeling at the Sylvania Corning FUSRAP Site - 13419

    Energy Technology Data Exchange (ETDEWEB)

    Ewy, Ann [U.S. Army Corps of Engineers, Kansas City District (United States); Heim, Kenneth J. [U.S. Army Corps of Engineers, New England District (United States); McGonigal, Sean T.; Talimcioglu, Nazmi M. [The Louis Berger Group, Inc. (United States)

    2013-07-01

    pumping activity, and to better understand the contaminant transport and fate mechanisms through the underlying aquifers. This regional model, developed for the N.Y. State Department of Environmental Conservation (NYSDEC) by Camp Dresser and McKee (CDM), uses the finite element model DYNFLOW developed by CDM, Cambridge, Massachusetts. The coarseness of the regional model, however, could not adequately capture the hydrogeologic heterogeneity of the aquifer. Specifically, the regional model did not adequately capture the interbedded nature of the Magothy aquifer and, as such, simulated particles tended to track down-gradient from the Site in relatively straight lines while the movement of groundwater in such a heterogeneous aquifer is expected to proceed along a more tortuous path. This paper presents a qualitative comparison of site-specific groundwater flow modeling results with results obtained from the regional model. In order to assess the potential contaminant migration pathways, a particle tracking method was employed. Available site-specific and regional hydraulic conductivity data measured in-situ with respect to depth and location were incorporated into the T-PROG module in GMS model to define statistical variation to better represent the actual stratigraphy and layer heterogeneity. The groundwater flow characteristics in the Magothy aquifer were simulated with the stochastic hydraulic conductivity variation as opposed to constant values as employed in the regional model. Contaminant sources and their exact locations have been fully delineated at the Site during the Remedial Investigation (RI) phase of the project. Contaminant migration pathways originating from these source locations at the Site are qualitatively traced within the sole source aquifer utilizing particles introduced at source locations. Contaminant transport mechanism modeled in the current study is based on pure advection (i.e., plug flow) and mechanical dispersion while molecular diffusion

  15. Coupled hydrogeological and geomechanical modelling for the analysis of large slope instabilities.

    Science.gov (United States)

    Laloui, Lyesse; Ferrari, Alessio; Bonnard, Christophe

    2010-05-01

    Slowly-moving landslides (average velocity between 2 and 10 cm/year) are quite frequent in mountainous or hilly areas and they may display occasional crises, generally due to exceptional climatic conditions. The hazard related to these events cannot be analysed in terms of probability analysis, as the number of recorded past events is generally very small and climate changes could significantly modify the environmental setting. Quantitative relationships relating climatic condition fluctuations and sliding area velocity must then be pursued by taking into account the most relevant physical processes involved in the landslide behaviours. Conventional stability analyses are unable to deal with such questions because they do not allow the velocity fields to be determined. With regard to the behaviour of large slope instabilities, a methodology is presented which aims to describe the behaviour of slow-moving landslides by means of a coupled hydrogeological and geomechanical modelling framework. As it is well known, the evolution of the pore water pressure within the landslide body is often recognized as the main cause for the occurrence of displacement accelerations. In this sense the interaction among the hydrological and the mechanical responses must be considered to analyse the landslide behaviour, with the aim of quantitatively relating pore water pressure variations and movements. For a given case study, pore water pressure evolutions in space and time are obtained from a duly calibrated finite element hydrogeological model, which can take into account the role of several key factors such as infiltration, preferential flows and vegetation. Computed groundwater pressures resulting from the hydrogeological simulations are introduced as nodal forces in a finite element geomechanical model in order to calculate stress evolutions and displacements. The use of advanced constitutive models based on the generalised effective stress concept allows taking into account

  16. An Integrated Approach for Urban Earthquake Vulnerability Analyses

    Science.gov (United States)

    Düzgün, H. S.; Yücemen, M. S.; Kalaycioglu, H. S.

    2009-04-01

    -economical, structural, coastal, ground condition, organizational vulnerabilities, as well as accessibility to critical services within the framework. The proposed framework has the following eight components: Seismic hazard analysis, soil response analysis, tsunami inundation analysis, structural vulnerability analysis, socio-economic vulnerability analysis, accessibility to critical services, GIS-based integrated vulnerability assessment, and visualization of vulnerabilities in 3D virtual city model The integrated model for various vulnerabilities obtained for the urban area is developed in GIS environment by using individual vulnerability assessments for considered elements at risk and serve for establishing the backbone of the spatial decision support system. The stages followed in the model are: Determination of a common mapping unit for each aspect of urban earthquake vulnerability, formation of a geo-database for the vulnerabilities, evaluation of urban vulnerability based on multi attribute utility theory with various weighting algorithms, mapping of the evaluated integrated earthquake risk in geographic information systems (GIS) in the neighborhood scale. The framework is also applicable to larger geographical mapping scales, for example, the building scale. When illustrating the results in building scale, 3-D visualizations with remote sensing data is used so that decision-makers can easily interpret the outputs. The proposed vulnerability assessment framework is flexible and can easily be applied to urban environments at various geographical scales with different mapping units. The obtained total vulnerability maps for the urban area provide a baseline for the development of risk reduction strategies for the decision makers. Moreover, as several aspects of elements at risk for an urban area is considered through vulnerability analyses, effect on changes in vulnerability conditions on the total can easily be determined. The developed approach also enables decision makers to

  17. Mapping global vulnerability index in mining sectors: A case study Moulares-Redayef aquifer system, southwestern Tunisia

    Science.gov (United States)

    Khelif, Nadia; Jmal, Ikram; Bouri, Salem

    2016-09-01

    Contrary to the DRASTIC model grouping together the saturated and unsaturated zones to compute a global intrinsic vulnerability index, the global vulnerability index method incorporates both hydrogeological and hydrochemical data for a comprehensive index mapping for the saturated zones. This concept depends on the behavior and the uses of the groundwater. The main aim of this study is to propose a scientific basis for sustainable land use planning and groundwater management of the Moulares-Reayef aquifer, located in Southwestern Tunisia. The overexploitation of this aquifer causes the threat of groundwater quality by various sources of pollution. The global vulnerability index was applied in the Moulares-Reayef aquifer. The results show that the most favorable zones to pollutant percolation are situated along the wadis (Tabaddit, Zallaz, Berka, …) which are drained by continuous discharges. The global vulnerability values were correlated with nitrates values for validation. It revealed a significant correlation showing that high values of nitrates occurred in highly vulnerable zones with a value of 0.69 for the Pearson coefficient. The global vulnerability evaluation shows that the aquifer is characterized by high vertical vulnerability and high susceptibility.

  18. Use of a ground-water flow model with particle tracking to evaluate ground-water vulnerability, Clark County, Washington

    Science.gov (United States)

    Snyder, D.T.; Wilkinson, J.M.; Orzol, L.L.

    1996-01-01

    A ground-water flow model was used in conjunction with particle tracking to evaluate ground-water vulnerability in Clark County, Washington. Using the particle-tracking program, particles were placed in every cell of the flow model (about 60,000 particles) and tracked backwards in time and space upgradient along flow paths to their recharge points. A new computer program was developed that interfaces the results from a particle-tracking program with a geographic information system (GIS). The GIS was used to display and analyze the particle-tracking results. Ground-water vulnerability was evaluated by selecting parts of the ground-water flow system and combining the results with ancillary information stored in the GIS to determine recharge areas, characteristics of recharge areas, downgradient impact of land use at recharge areas, and age of ground water. Maps of the recharge areas for each hydrogeologic unit illustrate the presence of local, intermediate, or regional ground-water flow systems and emphasize the three-dimensional nature of the ground-water flow system in Clark County. Maps of the recharge points for each hydrogeologic unit were overlaid with maps depicting aquifer sensitivity as determined by DRASTIC (a measure of the pollution potential of ground water, based on the intrinsic characteristics of the near-surface unsaturated and saturated zones) and recharge from on-site waste-disposal systems. A large number of recharge areas were identified, particularly in southern Clark County, that have a high aquifer sensitivity, coincide with areas of recharge from on-site waste-disposal systems, or both. Using the GIS, the characteristics of the recharge areas were related to the downgradient parts of the ground-water system that will eventually receive flow that has recharged through these areas. The aquifer sensitivity, as indicated by DRASTIC, of the recharge areas for downgradient parts of the flow system was mapped for each hydrogeologic unit. A number of

  19. North-West Iowa Groundwater Vulnerability Regions

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — The regions on this map represent areas with similar hydro-geologic characteristics thought to represent similar potentials for contamination of groundwater and/or...

  20. North-East Iowa Groundwater Vulnerability Regions

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — The regions on this map represent areas with similar hydro-geologic characteristics thought to represent similar potentials for contamination of groundwater and/or...

  1. Coastal hydrogeological system of Mar Piccolo (Taranto, Italy).

    Science.gov (United States)

    Zuffianò, L E; Basso, A; Casarano, D; Dragone, V; Limoni, P P; Romanazzi, A; Santaloia, F; Polemio, M

    2016-07-01

    The Mar Piccolo basin is an internal sea basin located along the Ionian coast (Southern Italy), and it is surrounded primarily by fractured carbonate karstic environment. Because of the karstic features, the main continental water inflow is from groundwater discharge. The Mar Piccolo basin represents a peculiar and sensitive environment and a social emergency because of sea water and sediment pollution. This pollution appears to be caused by the overlapping effects of dangerous anthropogenic activities, including heavy industries and commercial and navy dockyards. The paper aims to define the contribution of subaerial and submarine coastal springs to the hydrological dynamic equilibrium of this internal sea basin. A general approach was defined, including a hydrogeological basin border assessment to detect inflowing springs, detailed geological and hydrogeological conceptualisation, in situ submarine and subaerial spring measurements, and flow numerical modelling. Multiple sources of data were obtained to define a relevant geodatabase, and it contained information on approximately 2000 wells, located in the study area (1600 km(2)). The conceptualisation of the hydrogeological basin, which is 978 km(2) wide, was supported by a 3D geological model that interpolated 716 stratigraphic logs. The variability in hydraulic conductivity was determined using hundreds of pumping tests. Five surveys were performed to acquire hydro-geochemical data and spring flow-yield measurements; the isotope groundwater age was assessed and used for model validation. The mean annual volume exchanged by the hydrogeological basin was assessed equal to 106.93 10(6) m(3). The numerical modelling permitted an assessment of the mean monthly yield of each spring outflow (surveyed or not), travel time, and main path flow.

  2. Identifying Vulnerabilities and Hardening Attack Graphs for Networked Systems

    Energy Technology Data Exchange (ETDEWEB)

    Saha, Sudip; Vullinati, Anil K.; Halappanavar, Mahantesh; Chatterjee, Samrat

    2016-09-15

    We investigate efficient security control methods for protecting against vulnerabilities in networked systems. A large number of interdependent vulnerabilities typically exist in the computing nodes of a cyber-system; as vulnerabilities get exploited, starting from low level ones, they open up the doors to more critical vulnerabilities. These cannot be understood just by a topological analysis of the network, and we use the attack graph abstraction of Dewri et al. to study these problems. In contrast to earlier approaches based on heuristics and evolutionary algorithms, we study rigorous methods for quantifying the inherent vulnerability and hardening cost for the system. We develop algorithms with provable approximation guarantees, and evaluate them for real and synthetic attack graphs.

  3. [Assessment of eco-environmental vulnerability of Hainan Island, China].

    Science.gov (United States)

    Huang, Bao-rong; Ouyang, Zhi-yun; Zhang, Hui-zhi; Zhang, Li-hua; Zheng, Hua

    2009-03-01

    Based on the assessment method of environmental vulnerability constructed by SOPAC and UNEP, this paper constructed an indicator system from three sub-themes including hazard, resistance, and damage to assess the eco-environmental vulnerability of Hainan Island. The results showed that Hainan Island was suffering a middling level eco-environmental hazard, and the main hazards came from some intensive human activities such as intensive agriculture, mass tourism, mining, and a mass of solid wastes thrown by islanders and tourists. Some geographical characters such as larger land area, larger altitude range, integrated geographical form, and abundant habitat types endowed Hainan Island higher resistance to environmental hazards. However, disturbed by historical accumulative artificial and natural hazards, the Island ecosystem had showed serious ecological damage, such as soil degradation and biodiversity loss. Comprehensively considered hazard, resistance, damage, and degradation, the comprehensive environmental vulnerability of the Island was at a middling level. Some indicators showed lower vulnerability, but some showed higher vulnerability.

  4. Hydrogeology of the Western Amazon Aquifer System (WAAS)

    Science.gov (United States)

    Rosário, Fátima Ferreira do; Custodio, Emilio; Silva, Gerson Cardoso da, Jr.

    2016-12-01

    The Western Amazon Aquifer System (WAAS), as defined and proposed in the present work, encompasses an area of about 2.0·106 km2 located in the northwestern portion of South America. Published and unpublished data were used to define WAAS boundaries and main hydrogeologic characteristics. Petroleum industry data, environmental data, and other diverse thematic data were compiled for this study according to the data's origin. The analysis, treatment and integration of available data allowed us to define the WAAS as a multilayered aquifer system comprised of the Tertiary Solimões Aquifer System (SAS) and the Cretaceous Tikuna Aquifer System (TAS). The thick clay-rich basal strata of the SAS appear to confine the TAS. The SAS is widely used for both domestic and industrial purposes, providing good quality freshwater. The TAS has varying water quality: it contains freshwater near its recharge areas in the Sub-Andean fault belt zone, brackish to brine water in the Sub-Andean basins, and salty water in the Solimões Basin (Brazil). The interpretation and conclusions provided by an increasing understanding of the area's hydrogeology resulting from this work made it possible to propose an improved and new WAAS regional hydrogeologic conceptual model with data and descriptions not previously available. Some surprising results have been later confirmed as true by looking at unpublished reports, logs and field notes. Therefore, this work resulted in new findings and settled the basis for future works, especially for the poorly understood TAS.

  5. Defining Hydrogeological Boundaries for Mountain Front Recharge (MFR) Predictions in Multi-Catchment Mountainous Systems

    Science.gov (United States)

    Neilson-Welch, L. A.; Allen, D. M.

    2010-12-01

    Cross-catchment groundwater flow in mountainous watersheds results from the development of local, intermediate, and regional groundwater flow pathways in multi-catchment systems. As such, hydrogeological analysis (e.g. water balance calculations and numerical modelling) to assess contributions of groundwater to mountain front recharge (MFR) must consider the choice of boundaries based on hydrological divides. Numerical 3-dimensional hydrogeological modelling was completed using FeFlow (DHI-WASY), for conceptual regional-scale multi-catchment systems; extending from a watershed boundary to a mountain front. The modelled systems were designed to represent major ridge and valley configurations observed in mountainous watersheds including: nested, adjacent, disconnected, non-parallel, and parallel catchments. Both homogeneous and heterogeneous hydraulic conductivity scenarios were simulated; with the heterogeneous scenario including a shallow zone of higher hydraulic conductivity bedrock overlying less permeable bedrock. The influence of cross-catchment flow in the development of groundwater flow pathways contributing to MFR was examined. The results provide a basis for identifying topographic scenarios where contributions to MFR may originate outside hydrological divides. This understanding will contribute to improving MFR predictions using both the numerical modelling approach and the water balance approach.

  6. A Novel Approach to Modeling of Hydrogeologic Systems Using Fuzzy Differential Equations

    Science.gov (United States)

    Faybishenko, B. A.

    2003-12-01

    The many simultaneously occurring processes in unsaturated-saturated heterogeneous soils and fractured rocks can cause field observations to become imprecise and incomplete. Consequently, the results of predictions using deterministic and stochastic mathematical models are often uncertain, vague or "fuzzy." One of the alternative approaches to modeling hydrogeologic systems is the application of a fuzzy-systems approach, which is already widely used in such fields as engineering, physics, chemistry, and biology. After presenting a hydrogeologic system as a fuzzy system, the author presents a fuzzy form of Darcy's equation. Based on this equation, second-order fuzzy partial differential equations of the elliptic type (analogous to the Laplace equation) and the parabolic type (analogous to the Richards equation) are derived. These equations are then approximated as fuzzy-difference equations and solved using the basic principles of fuzzy arithmetic. The solutions for the fuzzy-difference equations take the form of fuzzy membership functions for each observation point (node). The author gives examples of the solutions of these equations for flow in unsaturated and saturated media and then compares them with those obtained using deterministic and stochastic methods.

  7. Vulnerability Assessment Models to Drought: Toward a Conceptual Framework

    Directory of Open Access Journals (Sweden)

    Kiumars Zarafshani

    2016-06-01

    Full Text Available Drought is regarded as a slow-onset natural disaster that causes inevitable damage to water resources and to farm life. Currently, crisis management is the basis of drought mitigation plans, however, thus far studies indicate that effective drought management strategies are based on risk management. As a primary tool in mitigating the impact of drought, vulnerability assessment can be used as a benchmark in drought mitigation plans and to enhance farmers’ ability to cope with drought. Moreover, literature pertaining to drought has focused extensively on its impact, only awarding limited attention to vulnerability assessment as a tool. Therefore, the main purpose of this paper is to develop a conceptual framework for designing a vulnerability model in order to assess farmers’ level of vulnerability before, during and after the onset of drought. Use of this developed drought vulnerability model would aid disaster relief workers by enhancing the adaptive capacity of farmers when facing the impacts of drought. The paper starts with the definition of vulnerability and outlines different frameworks on vulnerability developed thus far. It then identifies various approaches of vulnerability assessment and finally offers the most appropriate model. The paper concludes that the introduced model can guide drought mitigation programs in countries that are impacted the most by drought.

  8. Vulnerability to Poverty in select Central Asian Countries

    Directory of Open Access Journals (Sweden)

    Raghbendra Jha

    2009-06-01

    Full Text Available In the extant literature either income or consumption expenditures as measured over short periods of time have been regarded as a proxy for the material well-being of households. However, economists have long recognized that a household's sense of well-being depends not just on its average income or expenditures, but also on the risks it faces and its ability to deal with these risks. Hence vulnerability is a more satisfactory measure of welfare. In this study we used the concept of vulnerability as expected poverty to assess the household vulnerability to poverty in four Central Asian countries: Azerbaijan, Kazakhstan, Kyrgyzstan, and Tajikistan. Except for Tajikistan, headcount poverty and vulnerability rates are significantly different. We also find that vulnerability differs significantly across households by location and selected household characteristics. In this paper we use a simple empirical measurement that allows estimating the headcount vulnerability to poverty using cross-section data. This measurement is based on the strong assumption that households have the same conditional distribution of consumption in a stationary environment. While this approach cannot capture all dimensions of vulnerability, it at least begins to raise the policy issue that vulnerability should be considered alongside poverty.

  9. Vulnerability analysis for design of bridge health monitoring system

    Science.gov (United States)

    Sun, L. M.; Yu, G.

    2010-03-01

    The recent engineering implementation of health monitoring system for long span bridges show difficulties for precisely assessing structural physical condition as well as for accurately alarming on structural damages, although hundreds of sensors were installed on a structure and a great amount of data were collected from the monitoring system. The allocation of sensors and the alarming algorithm are still two of the most important tasks to be considered when designing the structural health monitoring system. Vulnerability, in its original meaning, is the system susceptibility to local damage. For a structural system, the vulnerability can thus be regarded as structural performance susceptibility to local damage of structure. The purpose of this study is to propose concepts and methods of structural vulnerability for determining monitoring components which are more vulnerable than others and the corresponding warning threshold once the damages occur. The structural vulnerability performances to various damage scenarios depend upon structural geometrical topology, loading pattern on the structure and the degradation of component performance. A two-parameters structural vulnerability evaluation method is proposed in this paper. The parameters are the damage consequence and the relative magnitude of the damage scenarios to the structural system, respectively. Structural vulnerability to various damage scenarios can be regarded as the tradeoff between the two parameters. Based on the results of structural vulnerability analysis, the limited structural information from health monitoring can be utilized efficiently. The approach of the design of bridge health monitoring system is illustrated for a cable-stayed bridge.

  10. Patterns of Electronic Portal Use among Vulnerable Patients in a Nationwide Practice-based Research Network: From the OCHIN Practice-based Research Network (PBRN)

    Science.gov (United States)

    Wallace, Lorraine S.; Angier, Heather; Huguet, Nathalie; Gaudino, James A.; Krist, Alex; Dearing, Marla; Killerby, Marie; Marino, Miguel; DeVoe, Jennifer E.

    2017-01-01

    Background Underserved patient populations experience barriers to accessing and engaging within the complex health care system. Electronic patient portals have been proposed as a potential new way to improve access and engagement. We studied patient portal use for 12 consecutive months (365 days) among a large, nationally distributed, underserved patient population within the OCHIN (originally created as the Oregon Community Health Information Network and renamed OCHIN as other states joined) practice-based research network (PBRN). Methods We retrospectively assessed adoption and use of Epic’s MyChart patient portal in the first 12 months after MyChart was made available to the OCHIN PBRN. We examined electronic health record data from 36,549 patients aged ≥18 years who were offered a MyChart access code between May 1, 2012, and April 30, 2013, across the OCHIN PBRN in 13 states. Results Overall, 29% of patients offered an access code logged into their MyChart account. Superusers (minimum of 2 logins per month over a 12-month period) accounted for 6% of users overall. Men, nonwhite patients, Hispanic patients, Spanish-speaking patients, and those with the lowest incomes were significantly less likely to activate. Publicly insured and uninsured patients were also less likely to log in to their MyChart account, but once activated they were more likely than privately insured patients to use MyChart functions. Conclusions Our findings suggest that, compared with others, certain patient groups may be less interested in using patient portals or may have experienced significant barriers that prevented use. Making portal access available is a first step. Additional studies need to specifically identify health system–, clinic-, and patient-level barriers and facilitators to portal adoption and use. PMID:27613792

  11. Seismic vulnerability assessments in risk analysis

    Science.gov (United States)

    Frolova, Nina; Larionov, Valery; Bonnin, Jean; Ugarov, Alexander

    2013-04-01

    The assessment of seismic vulnerability is a critical issue within natural and technological risk analysis. In general, there are three common types of methods used for development of vulnerability functions of different elements at risk: empirical, analytical and expert estimations. The paper addresses the empirical methods for seismic vulnerability estimation for residential buildings and industrial facilities. The results of engineering analysis of past earthquake consequences, as well as the statistical data on buildings behavior during strong earthquakes presented in the different seismic intensity scales, are used to verify the regional parameters of mathematical models in order to simulate physical and economic vulnerability for different building types classified according to seismic scale MMSK-86. Verified procedure has been used to estimate the physical and economic vulnerability of buildings and constructions against earthquakes for the Northern Caucasus Federal region of the Russian Federation and Krasnodar area, which are characterized by rather high level of seismic activity and high population density. In order to estimate expected damage states to buildings and constructions in the case of the earthquakes according to the OSR-97B (return period T=1,000 years) within big cities and towns, they were divided into unit sites and their coordinates were presented as dots located in the centers of unit sites. Then the indexes obtained for each unit site were summed up. The maps of physical vulnerability zoning for Northern Caucasus Federal region of the Russian Federation and Krasnodar area includes two elements: percent of different damage states for settlements with number of inhabitants less than 1,000 and vulnerability for cities and towns with number of inhabitants more than 1,000. The hypsometric scale is used to represent both elements on the maps. Taking into account the size of oil pipe line systems located in the highly active seismic zones in

  12. Demarcation of coastal vulnerability line along the Indian coast

    Digital Repository Service at National Institute of Oceanography (India)

    Ajai; Baba, M.; Unnikrishnan, A.S.; Rajawat, A.S.; Bhattacharya, S.; Ratheesh, R.; Kurian, N.P.; Hameed, S.; Sundar, D.

    been considered. Changes along the shoreline are considered as net impact of dynamic coastal processes and are mapped using multidate satellite data. Vulnerability due to coastal erosion has been assessed based on rate of coastal erosion. Coastal...

  13. Hydrogeologic framework of LaSalle County, Illinois

    Science.gov (United States)

    Kay, Robert T.; Bailey, Clinton R.

    2016-10-28

    Water-supply needs in LaSalle County in northern Illinois are met by surface water and groundwater. Water-supply needs are expected to increase to serve future residential and mining uses. Available information on water use, geology, surface-water and groundwater hydrology, and water quality provides a hydrogeologic framework for LaSalle County that can be used to help plan the future use of the water resources.The Illinois, Fox, and Vermilion Rivers are the primary surface-water bodies in LaSalle County. These and other surface-water bodies are used for wastewater disposal in the county. The Vermilion River is used as a drinking-water supply in the southern part of the county. Water from the Illinois and Fox Rivers also is used for the generation of electric power.Glacial drift aquifers capable of yielding sufficient water for public supply are expected to be present in the Illinois River Valley in the western part of the county, the Troy Bedrock Valley in the northwestern part of the county, and in the Ticona Bedrock Valley in the south-central part of the county. Glacial drift aquifers capable of yielding sufficient water for residential supply are present in most of the county, although well yield often needs to be improved by using large-diameter wells. Arsenic concentrations above health-based standards have been detected in some wells in this aquifer. These aquifers are a viable source for additional water supply in some areas, but would require further characterization prior to full development.Shallow bedrock deposits comprising the sandstone units of the Ancell Group, the Prairie du Chien Group, dolomite of the Galena and Platteville Groups, and Silurian-aged dolomite are utilized for water supply where these units are at or near the bedrock surface or where overlain by Pennsylvanian-aged deposits. The availability of water from the shallow bedrock deposits depends primarily on the geologic unit analyzed. All these deposits can yield sufficient water for

  14. Investigation of the large scale regional hydrogeological situation at Beberg

    Energy Technology Data Exchange (ETDEWEB)

    Hartley, L. [AEA Technology, Harwell (United Kingdom); Boghammar, A.; Grundfelt, B. [Kemakta Konsult AB, Stockholm (Sweden)

    1998-12-01

    The present study forms part of the large-scale groundwater flow studies within the SR 97 project. The site of interest is Beberg which is based on data from the Finnsjoen site. To understand the groundwater flow and salinity at present it is necessary to consider the history of the Finnsjoen site over the last few thousand years. A numerical approach is developed to model a situation of transient variable density flow on a regional scale. The model is considered a reasonable representation of the real situation at the site, since it is consistent with the current conceptual understanding of the site and predictions of salinity are in broad agreement with field observations. The effects of post-glacial uplift on the hydrogeological conditions are considered. It is assumed that about 9,000-4,000 years BP the rock was completely infiltrated by saline groundwaters during the periods when the Yoldia and Litorina Seas covered the Finnsjoen area. The model represents the interval from the end of this period up to the present day. During which time the recharge of fresh water in the form of rainfall flushed or displaced saline water from the near-surface. Many variants on the basis conceptual model are considered both to calibrate the model against field data and to quantify the sensitivities of groundwater pathways. The present study shows that: Salinity and transient processes are very important in determining groundwater pathways in the deep rock. Salinity drives flow downwards increasing the length of pathways and groundwater travel times. A high contrast in hydraulic conductivity between major structures and the rock mass results in the fracture zones being the dominant flow paths, in particular Zone 1 and Imundbo. There are two distinct flow paths. In the east of the hypothetical repository the path is short along Zone 1, for the west the path is longer through the rock mass. Fracture zones are flushed of salt on a time-scale of 10-100 years. For the rock mass it

  15. Region 9 - Social Vulnerability Index

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Social Vulnerability Index is derived from the 2000 US Census data. The fields included are percent minority, median household income, age (under 18 and over...

  16. VT - Vermont Heat Vulnerability Index

    Data.gov (United States)

    Vermont Center for Geographic Information — This map shows: The overall vulnerability of each town to heat related illness. This index is a composite of the following themes: Population Theme, Socioeconomic...

  17. CDC's Social Vulnerability Index (SVI)

    Data.gov (United States)

    U.S. Department of Health & Human Services — Social vulnerability refers to the resilience of communities when confronted by external stresses on human health, stresses such as natural or human-caused...

  18. Vulnerability of pipelines

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    2006-07-01

    Although pipelines may be damaged due to natural sources such as stress corrosion cracking (SCC) or hydrogen-induced cracking (HIC), most pipeline damages are a result of third-party interference, such as unauthorized construction in a right of way. Pipelines are also among the prime targets for sabotage because interruptions in energy distribution can render large segments of a population debilitated. The importance of protecting critical infrastructure was emphasized in this theme issue which disseminated information on vulnerability of pipelines due to third-party intrusions, both intentional and unintentional. It summarized the 10 presentations that were delivered at a pipelines security forum in Calgary, Alberta, addressing Canadian and U.S. government and industry approaches to oil and natural gas pipeline security. The opening keynote address remarked on the evolution of international terror networks, the targeting of the energy sector, and the terrorist threat and presence in Canada. Policies towards critical energy infrastructure protection (CIP) were then examined in light of these threats. A policy shift away from traditional defensive protective security towards an offensive intelligence-led strategy to forestall terrorist threats was advocated. Energy sector representatives agreed that Canada needs an effective national lead agency to provide threat assessments, alert notification, and coordination of information pertaining to CIP. It was agreed that early warning information must come from Canadian as well as U.S. sources in order to be pertinent. The conference session on information collection concentrated on defining what sort of threat information is needed by the energy sector, who should collect it and how should it be shared. It was emphasized that government leadership should coordinate threat reporting and disseminate information, set standards, and address the issues of terrorism risk insurance. Concern was raised about the lack of

  19. Vulnerability Assessments in Ethical Hacking

    OpenAIRE

    2016-01-01

    Ethical hackers use the same methods and techniques to test and bypass a system's defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found, they document them and provide actionable advice on how to fix them so the organization can improve its overall security. The purpose of ethical hacking is to evaluate the security of a network or system's infrastructure. It entails finding and attempting to exploit any vulnerabilities to de...

  20. Power system vulnerability assessment based on transient energy hybrid method%基于暂态能量函数混合法的电力系统脆弱性分析

    Institute of Scientific and Technical Information of China (English)

    李迁; 李华强; 黄昭蒙; 李艳卿

    2013-01-01

    电力系统在遭受大干扰后失稳的后果非常严重,甚至是灾难性的,从暂态稳定方面分析系统的脆弱性具有重大的研究价值。采用暂态能量函数,结合暂态稳定分析中数值仿真法和直接法两种基本方法,同时考虑预想事故概率,从暂态稳定安全角度快速、定量评估电力系统的脆弱性。基于事故概率与暂态能量裕度构建相关脆弱度指标,并根据临界机群状态以修正暂态动能,改进不同事故下系统脆弱性的评估精度,同时确定系统的薄弱环节。通过对IEEE 5机14节点系统的仿真,验证了该方法的合理性与有效性。%losing stabilityThe consequences of power system by being subjected to large disturbance are very serious and even disastrous, so analyzing vulnerability of power system from the viewpoint of transient stability is extraordinarily valuable. This paper evaluates the vulnerability of power system from the viewpoint of transient stability safety quickly and quantitatively based on the transient energy function, combining the time simulation method and the direct method which are the two main methods of transient stability analysis, and at the same time considering the occurrence probability of contingency. It constructs correlative vulnerability index based on the probability of contingencies and transient energy margin, and revises transient kinetic energy based on the condition of critical cluster for improving the evaluation precision of vulnerability of power system under different contingencies and confirming the weak links of power system. Simulations of this method in IEEE 14-bus system demonstrate its rationality and effectiveness.

  1. Commercial Air Carrier Vulnerabilities to Information Operations

    Science.gov (United States)

    2007-11-02

    GMO /ENS/02E-11 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson Air Force Base, Ohio...AFIT/ GMO /ENS/02E-11 COMMERCIAL AIR CARRIER VULNERABILITIES TO INFORMATION OPERATIONS...networks that without them, “there is no water coming out of your tap; there is no electricity lighting your room; there is no food being transported to

  2. Hydrogeological studies in high mountains karst environment: the example of Picos de Europa (Spain)

    Science.gov (United States)

    Meléndez, Mónica; Ballesteros, Daniel; Jiménez-Sanchez, Montserrat; García-Sansegundo, Joaquín

    2015-04-01

    Karst aquifers are very vulnerable to contamination due their high infiltration coefficient, elevated hydraulic conductivity, high speed of circulation, and very low self-purification capacities. The functioning of that type of aquifer is quite complicated by the high heterogeneity and anisotropy of the karst and the presence of three different types of porosity. It is necessary to understand the functioning of a karst aquifer in order to protect and manage them properly. Therefore, it is necessary to develop working methods to establish the aquifer hydrodynamics, especially in high mountain areas with many methodological constrains (e. g. difficulty to access). The Picos de Europa karst aquifer, located in theNational Park of Picos de Europa (North Spain), presents a high environmental, geomorphological and hydrogeological value; it is included in the "Spanish geological contexts with global relevance" by the Law of Natural Heritage and Biodiversity of Spain, being considered as a Global Geosite by the Geological and Mining Institute of Spain. In addition, the karst massif is included in several figures of environmental protection, both at global and national levels. Hydrogeological and geomorphological research is developed together in this area under the GEOCAVE project (MAGRAMA-580/12 OAPN) and the "Investigación hidrogeológica en las masas de agua subterránea 012.014 Picos de Europa-Panes y 012.018 Alto Deva-Alto Cares. (IGME-73.3.00.41.00/2013)". The aim of this study is to characterize the hydrodynamics of the karst aquifer, considering the snow as an important component of the aquifer recharge. The proposed methodology includes the installation of an integrated pressure sensor and data logger for level and temperature measurement in two karst spring related to two groundwater bodies (GWB) with 86 and 14 km2 extension. The store of data to regular intervals with punctual values of discharge measures has provided, at least, an annual series of data in

  3. Description of climate, surface hydrology, and near-surface hydrogeology. Simpevarp 1.2

    Energy Technology Data Exchange (ETDEWEB)

    Werner, Kent [SWECO VIAK AB/Golder Associates AB, Stockholm (Sweden); Bosson, Emma; Berglund, Sten [Swedish Nuclear Fuel and Waste Management Co., Stockholm (Sweden)

    2005-04-01

    This report presents and evaluates the site investigations and primary data on meteorology, surface hydrology and near-surface hydrogeology that are available in the Simpevarp 1.2 'data freeze'. The main objective is to update the previous Simpevarp 1.1 description of the meteorological, surface hydrological and near-surface hydrogeological conditions in the Simpevarp area. Based on the Simpevarp 1.2 dataset, an updated conceptual and descriptive model of the surface and near-surface water flow conditions in the Simpevarp area is presented. In cases where site investigation data are not yet available, regional and/or generic data are used as input to the modelling. GIS- and process-based tools, used for initial quantitative flow modelling, are also presented. The objectives of this initial quantitative modelling are to illustrate, quantify and support the site descriptive model, and also to produce relevant input data to the ecological systems modelling within the SKB SurfaceNet framework.For the Simpevarp 1.2 model, the relevant site investigations include the establishment of one local meteorological station and surface-hydrological stations for discharge measurements, delineation and description of catchment areas, manual discharge measurements in water courses, slug tests in groundwater monitoring wells, and manual groundwater level measurements. In addition, other investigations have also contributed to the modelling, providing data on geometry (including topography), data from surface-based geological investigations and boreholes in Quaternary deposits, and data on the hydrogeological properties of the bedrock. The conceptual and descriptive modelling includes an identification and basic description of type areas, domains and interfaces between domains within the model area. The surface and near-surface flow system is described, including the assignment of hydrogeological properties to HSDs (Hydraulic Soil Domains) of Quaternary deposits based on a

  4. A community-based participatory research study of HIV and HPV vulnerabilities and prevention in two Pacific Islander communities: ethical challenges and solutions.

    Science.gov (United States)

    DiStefano, Anthony; Peters, Ruth; Tanjasiri, Sora Park; Quitugua, Lourdes; Dimaculangan, Jeany; Hui, Brian; Barrera-Ng, Angelica; Vunileva, 'Isileli; Tui'one, Vanessa; Takahashi, Lois

    2013-02-01

    We describe ethical issues that emerged during a one-year CBPR study of HIV and human papillomavirus (HPV) vulnerabilities and prevention in two Pacific Islander (PI) communities, and the collaborative solutions to these challenges reached by academic and community partners. In our project case study analysis, we found that ethical tensions were linked mainly to issues of mutual trust and credibility in PI communities; cultural taboos associated with the nexus of religiosity and traditional PI culture; fears of privacy breaches in small, interconnected PI communities; and competing priorities of scientific rigor versus direct community services. Mutual capacity building and linking CBPR practice to PI social protocols are required for effective solutions and progress toward social justice outcomes.

  5. Vulnerability of pension fund balances

    Directory of Open Access Journals (Sweden)

    Ólafur Ísleifsson

    2012-12-01

    Full Text Available Although the Icelandic general labour market pension funds are built on the proviso that pension schemes are fully funded these funds are still grappling with the devastating financial effects of the 2008 economic collapse that rendered most of them in a significant actuarial deficit. The public sector pension funds are based on an employer guarantee that makes up for any lack of funding that historically has been quite significant. We identify the relatively high actuarial discount rate and increasing longevity as two factors that add to the vulnerability of the Icelandic pension system. We present a stochastic model in order to obtain reasonably sound estimates of the effect of revising such key parameters of the actuarial assessments of the pension funds and thus obtain a view of the viability of the Icelandic pension system when confronted with the potential necessity of such parameter shifts. We present results of stochastic simulations of this models made to assess effects of changes in these major financial and demographic assumptions in actuarial evaluations of pension fund balances. Our results suggest that the Icelandic pension funds may be significantly less well funded than is generally perceived.

  6. Vulnerability Assessment Method of Natural Gas System in Seism Based on Capacity Curve%基于能力曲线的燃气系统地震脆弱性评估方法

    Institute of Scientific and Technical Information of China (English)

    颜峻

    2013-01-01

    为了定量评估燃气系统在地震中的脆弱性水平,基于能力——需求谱方法建立了燃气系统地震脆弱性评估方法.评估方法从地震潜在危险性分析、结构抗震能力、需求谱与脆弱性曲线建立以及破坏状态预测等四方面着手研究.基于上述模型与方法,研究了地震动作用下燃气系统最大承载能力、破坏等级及概率.最后以某天然气压缩站主体建筑为例,建立了反映场地地震潜在危险性的地震反应谱,构建了用于确定性能点的抗震能力——需求谱,并基于FEMA 273绘制了不同破坏等级的脆弱性曲线,定量分析了该压缩站遭受破坏等级和概率.%In order to assess the vulnerability level of natural gas supply system in seism quantitatively, assessment method of vulnerability level is investigated based on capacity-demand spectrum. Study works are done from 4 aspects including potential earthquake hazard analysis, capacity-demand spectrum of the natural gas supply system, vulnerability curves and forecast method for the destruction state. On this basis, maximum carrying capacity and probabilities of specific damage levels in the role of ground motion parameters are studied. Finally, take for example the main structure of a natural gas compressor station, seismic response spectrum is established to analyze the potential earthquake risk, capacity-demand spectrum is constructed to determine the seismic performance point, vulnerability curves of the corresponding destruction states for this type of natural gas compressor stations is drew based on the FEMA 273, the level and the possibilities of destruction level is calculated quantitatively.

  7. Thicknesses of hydrogeologic units used in the hydrogeologic framework and transient ground-water flow model of the Death Valley regional ground-water flow system, Nevada and California

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — A digital three-dimensional hydrogeologic framework model (HFM) represents the geometry and extent of hydrogeologic units (HGUs) and major structures in the Death...

  8. Surface altitudes of hydrogeologic units used in the hydrogeologic framework and transient ground-water flow model of the Death Valley regional ground-water flow system, Nevada and California

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — A digital three-dimensional (3D) hydrogeologic framework model (HFM) represents the geometry and extent of hydrogeologic units (HGUs) and major structures in the...

  9. Preliminary Assessment of the Hydrogeology and Groundwater Availability in the Metamorphic and Siliciclastic Fractured-Rock Aquifer Systems of Warren County, Virginia

    Science.gov (United States)

    Nelms, David L.; Moberg, Roger M.

    2010-01-01

    . Estimates of effective groundwater recharge from 2001 to 2007 ranged from 2.4 to 29.4 inches per year in the Gooney Run, Manassas Run, and Crooked Run Basins, with averages of 15.3, 14.2, and 5.3 inches per year, respectively. Base flow accounted for between 57 and 86 percent of mean streamflow in the Gooney Run and Manassas Run Basins and averaged about 70 percent in these Blue Ridge Province basins. In the siliciclastic rock-dominated Crooked Run Basin of the Great Valley, base flow accounted for between 33 and 65 percent of mean streamflow and averaged about 54 percent. The high base-flow index values (percentage of streamflow from base flow) in these basins indicate that groundwater is the dominant source of streamflow during wet and drought conditions. About 50 percent of the precipitation that fell on the Blue Ridge basins from 2001 to 2007 was removed by evapotranspiration, and between 33 and 36 percent of the precipitation reached the water table as effective recharge. Nearly 76 percent of the precipitation was removed by evapotranspiration in the Crooked Run Basin, and effective recharge averaged about 12 percent of precipitation between 2001 and 2007. Average values of runoff in all three basins were less than 15 percent of precipitation. Groundwater flow systems in the county are extremely vulnerable to current climatic conditions. Successive years of below-average effective recharge cause declines in water levels, spring discharges, and streamflows. However, these systems can recover quickly because effective recharge increases with increasing precipitation. Lack of precipitation, especially snow, during the critical recharge period (January-April) can have an effect on the amount of recharge to the groundwater system and eventual stream base flow. Estimated values of annual mean base flow have approached and have been below the average regression-derived recharge rates during a period classified as having above-average precipitation. This relation is indicative

  10. 基于复杂网络理论含分布式发电的电网脆弱度分析%Analysis of grid vulnerability containing distributed generation based on complex networks theory

    Institute of Scientific and Technical Information of China (English)

    马草原; 孙展展; 葛森; 蒋峰景

    2016-01-01

    设计并改进供电效率和综合供电效率评估指标,运用复杂网络理论分析直接接入主电网的分布式电源对电网供电效率的影响。基于综合供电效率指标对含分布式发电的电网进行不同故障模式下的脆弱度评估,且对IEEE39节点系统进行仿真,比较分析不同故障模式下在分布式发电加入前后的电网脆弱度,以验证指标的有效性。定性评估分布式发电接入后对电网脆弱度的影响,对实现高效、清洁能源的大力发展和应用具有重要的理论和现实意义。%This paper designs and improves the evaluation index of power supply efficiency and integrated power effi -ciency , and the influence on the power supply efficiency of distributed generation directly access to the main power grid is analyzed by using complex network theory .The vulnerability assessment under different fault modes of power grid containing distributed generation is done based on an integrated power supply efficiency index , and the IEEE39 nodes system is tested as well , and comparatively analyze the power grid vulnerability at distributed generation to join before and after under different fault modes in order to verify the validity of indicators .The qualitative assessment of the impact on the grid vulnerability as the distributed generation access to grid has important theoretical and practical significance to develop and apply the high -efficient and clean energy .

  11. SQL inj ection vulnerability detection based on sequence value comparison of Webpage DOM tree%基于DO M树序列值比对的SQL注入漏洞检测

    Institute of Scientific and Technical Information of China (English)

    罗明宇; 凌捷

    2015-01-01

    为更好地防止SQL注入的危害,优化漏洞检测方法,提出一种基于DOM树序列值比对的SQL注入检测算法。对待检测的页面进行SQL注入,选取注入前后页面的DOM树中体现结构的关键参数;通过计算得到序列值,用比对序列值的方法比对页面是否相同,将节点比对转化成数值比对,简化网页比对。实验分析结果表明,该算法有效地提高了漏洞检测的准确率与效率。%SQL injection is one of the leading Web application security vulnerabilities,to find a better way to solve the problem and optimize the method of detecting,a SQL inj ection vulnerability detection based on sequence value comparison of Webpage DOM tree was presented.Firstly,the key parameters were selected which reflected the structure of DOM tree of Webpages be-fore and after attack.Then,sequence value of DOM tree was calculated by using the key parameters and comparing the pages through the comparison of sequence value,Webpage comparison was simplified by converting the node comparison into numerical comparison.Finally,the experimental result shows that this method improves the SQL injection vulnerability detection accuracy and efficiency.

  12. Analysis of Ecological Vulnerability Based on Land-use Changes in mountain plain transition zones%基于土地利用变化的辉南县生态脆弱性时空变化分析

    Institute of Scientific and Technical Information of China (English)

    周岩; 张艳红; 翟羽娟

    2013-01-01

    of this special zone for the whole zone's ecologi-cal safety. Especially from land use to understand the eco-vulner-ability, it is feasible to plan land use and land cover in order to protect the eco-environments. The Huinan County which locates in this zone is taken as study area, based on the analysis of land-use changes, the spatial-temporal characteristics on ecological vulnerability are assessed by using ecological synthetical index which is built according to the evaluation system of ecological value and sensitive factors. The results show that:1) According to the types of land-use, the order of ecological synthetical index is forest land, grass land, water body, unused land, cultivated land and construction land. 2) During the past 20 years, because of the great change of land cover, especially the decreased forest and the increased cultivated land & construction land the value of land use contribution index, land use stability index and ecological synthetical index decreased markedly, from 2.999,3.324 and 6.322 to 2.828,3.032 and 5.861 respectively. 3) The spatial characteris-tics on ecological vulnerability change markedly, the mild vulnera-bility area increase while the severe vulnerability area decrease obviously, detailed description listed as follows: the mild vulnera-bility area increases from 86550.87 to 98084.83 and the severe vulnerability area decreases from 33217.95 to1283.40 during the past 20 years. 4)all the three ecological indexes of the whole study area decrease. However, great different changes vary obviously in different catchments, which decrease in the southeast region while increase in the northwest ones obviously. From the results we are told that forest land decrease and arable land increase are the main reasons which cause the eco -vulnerability. Reasonable measures for land use plan could be taken to control the land use changes.

  13. Assessment of groundwater vulnerability using supervised committee to combine fuzzy logic models.

    Science.gov (United States)

    Nadiri, Ata Allah; Gharekhani, Maryam; Khatibi, Rahman; Moghaddam, Asghar Asghari

    2017-02-13

    Vulnerability indices of an aquifer assessed by different fuzzy logic (FL) models often give rise to differing values with no theoretical or empirical basis to establish a validated baseline or to develop a comparison basis between the modeling results and baselines, if any. Therefore, this research presents a supervised committee fuzzy logic (SCFL) method, which uses artificial neural networks to overarch and combine a selection of FL models. The indices are expressed by the widely used DRASTIC framework, which include geological, hydrological, and hydrogeological parameters often subject to uncertainty. DRASTIC indices represent collectively intrinsic (or natural) vulnerability and give a sense of contaminants, such as nitrate-N, percolating to aquifers from the surface. The study area is an aquifer in Ardabil plain, the province of Ardabil, northwest Iran. Improvements on vulnerability indices are achieved by FL techniques, which comprise Sugeno fuzzy logic (SFL), Mamdani fuzzy logic (MFL), and Larsen fuzzy logic (LFL). As the correlation between estimated DRASTIC vulnerability index values and nitrate-N values is as low as 0.4, it is improved significantly by FL models (SFL, MFL, and LFL), which perform in similar ways but have differences. Their synergy is exploited by SCFL and uses the FL modeling results "conditioned" by nitrate-N values to raise their correlation to higher than 0.9.

  14. Assessment of groundwater vulnerability by combining drastic and susceptibility index: Application to Annaba superficial aquifer (Algeria)

    Science.gov (United States)

    Sedrati, Nassima; Djabri, Larbi; Chaffai, Hicham; Bougherira, Nabil

    2016-07-01

    Groundwater pollution due to anthropogenic activities is one of the major environmental problems in urban and industrial areas. The aim of this work is to propose a new integrated methodology to assess actual and forecasted groundwater vulnerability by combining Drastic and susceptibility index. The contamination susceptibility index (SI) at a given location was calculated by taking the product of the vulnerability DRASTIC index (VI) and the quality index (QI): SI=VI x QI. The superficial aquifer of Annaba plain was the study case proposed for the application of this methodology. The study revealed that the area with Very High vulnerability would increase 73 % in this superficial layer. This result can be explained by the susceptibility index map shows both hydrogeological and hydrochemical data related to the contamination problem including areas that should be taken into consideration during water management planning. The index map indicates that the most susceptible groundwater is occupies the majority of the study area. The validity of the DRASTIC and the susceptibility index methods, verified by comparing the distribution of some pollutants (Daouad, 2013) in the groundwater and the different vulnerability classes, shows a high contamination that affect the water quality in study areas.

  15. “Informative representation” for the vulnerability analysis of anthropic landscape. two different areas in comparison: the historical center of St. Elia Fiume Rapido (FR and the mining site of Coreno Ausonio.

    Directory of Open Access Journals (Sweden)

    Assunta Pelliccio

    2013-05-01

    Full Text Available The main riscks of the landscape are the overexploitation of the soil and a high physical vulnerability of our country determined by considerable seismic and volcanic activities, and by the peculiar geomorphological and hydrogeological pattern. This risk needs to be mitigated through a careful analysis of the criticity levels in the different geographical areas and by developing strategies based on requirements and operational guidance. In this paper two different procedures for vulnerability analysis are described, designed for completely different landscape areas. The first case concerns the historical center of Sant’Elia Fiumerapido, in the province of Frosinone, with the objective of analysing the town and its exposure to natural factors of degradation. The second case is the basin of Coreno Ausonio, in the province of Latina, deeply marked by intense mining activities. These two cases constitute examples where the "Informative Representation" allows an immediate reading of the involved components with the aim, in the first case to preserve the evidence of the past, in the second case to protect the environment from uncontrolled human activities.

  16. 基于气候变化的干旱脆弱性评价——以青海东部为例%Vulnerability assessment of drought based on climate change:a case study of eastern Qinghai Province

    Institute of Scientific and Technical Information of China (English)

    侯光良; 肖景义; 李生梅

    2012-01-01

    基于青海东部农业区22个县区的20个气象、农业、社会经济统计指标,利用层次分析法和等级化等数学分析方法,分别进行了暴露性、敏感性和适应性的评价,再通过分析承险体的内在脆弱性,将气候变化和内在脆弱性进行综合分析,得到了青海东部干旱脆弱性等级。结果表明:在目前全球变暖背景下,干旱脆弱性最高的是民和、化隆,较高的是城中、城北区、湟中、大通等四县区,门源、互助、同仁、同德的干旱脆弱性中等。在此基础上,提出了强化旱灾的风险管理模式、倡导节约型水资源开发利用模式等干旱防范措施。%Based on 20 statistical indices of meteorology,agriculture and socioeconomy in 22 counties and districts in eastern Qinghai Province and analytic hierarcy process(AHP) method and mathematic classification method,the assessment was carried out to exposure,sensitivity and adaptability.Also a comprehension analysis of climatic change with the inherent vulnerability is done through the analysis of the inherent vulnerability of the risk-affected body,and the drought vulnerabilities grade in eastern Qinghai Province was obtained.Results show that under present global warming background,the drought vulnerability of Minhe and Hualong counties is the strongest,Chengzhong and other three counties and districts is stronger,and Menyuan,Huzu,Tongren and Tongde is medium.On this basis,drought preventing countermeasures were proposed,such as enhance drought management,advocate save-type development and usage of water resources,etc.

  17. Quantitative Vulnerability Assessment of Cyber Security for Distribution Automation Systems

    Directory of Open Access Journals (Sweden)

    Xiaming Ye

    2015-06-01

    Full Text Available The distribution automation system (DAS is vulnerable to cyber-attacks due to the widespread use of terminal devices and standard communication protocols. On account of the cost of defense, it is impossible to ensure the security of every device in the DAS. Given this background, a novel quantitative vulnerability assessment model of cyber security for DAS is developed in this paper. In the assessment model, the potential physical consequences of cyber-attacks are analyzed from two levels: terminal device level and control center server level. Then, the attack process is modeled based on game theory and the relationships among different vulnerabilities are analyzed by introducing a vulnerability adjacency matrix. Finally, the application process of the proposed methodology is illustrated through a case study based on bus 2 of the Roy Billinton Test System (RBTS. The results demonstrate the reasonability and effectiveness of the proposed methodology.

  18. Soil compaction vulnerability at Organ Pipe Cactus National Monument, Arizona

    Science.gov (United States)

    Webb, Robert H.; Nussear, Kenneth E.; Carmichael, Shinji; Esque, Todd C.

    2014-01-01

    Compaction vulnerability of different types of soils by hikers and vehicles is poorly known, particularly for soils of arid and semiarid regions. Engineering analyses have long shown that poorly sorted soils (for example, sandy loams) compact to high densities, whereas well-sorted soils (for example, eolian sand) do not compact, and high gravel content may reduce compaction. Organ Pipe Cactus National Monument (ORPI) in southwestern Arizona, is affected greatly by illicit activities associated with the United States–Mexico border, and has many soils that resource managers consider to be highly vulnerable to compaction. Using geospatial soils data for ORPI, compaction vulnerability was estimated qualitatively based on the amount of gravel and the degree of sorting of sand and finer particles. To test this qualitative assessment, soil samples were collected from 48 sites across all soil map units, and undisturbed bulk densities were measured. A scoring system was used to create a vulnerability index for soils on the basis of particle-size sorting, soil properties derived from Proctor compaction analyses, and the field undisturbed bulk densities. The results of the laboratory analyses indicated that the qualitative assessments of soil compaction vulnerability underestimated the area of high vulnerability soils by 73 percent. The results showed that compaction vulnerability of desert soils, such as those at ORPI, can be quantified using laboratory tests and evaluated using geographic information system analyses, providing a management tool that managers potentially could use to inform decisions about activities that reduce this type of soil disruption in protected areas.

  19. Mine hydrogeologic conditions prospected by comprehensive geophysical exploration

    Energy Technology Data Exchange (ETDEWEB)

    Xing, X.; Pu, C. [Feicheng Coal Mining Bureau (China)

    1997-12-01

    Mine water gushing is one of the difficult problems puzzling mine safety. The investigation of the hydrogeological condition of the working face is a prerequisite to control effectively the water hazard and guarantee safe mining. The production practice in Feicheng Mining Bureau proved that the comprehensive geophysical survey in which the DC electrical survey, Rayleigh wave method and transient electromagnetic method are the main means, is a simple, high-speed and effective tool to detect the geological structure, water abundance of aquifer and concealed water flowing structure at the working face and the front of driving end. 1 ref., 3 figs.

  20. Hydrogeologic unit flow characterization using transition probability geostatistics.

    Science.gov (United States)

    Jones, Norman L; Walker, Justin R; Carle, Steven F

    2005-01-01

    This paper describes a technique for applying the transition probability geostatistics method for stochastic simulation to a MODFLOW model. Transition probability geostatistics has some advantages over traditional indicator kriging methods including a simpler and more intuitive framework for interpreting geologic relationships and the ability to simulate juxtapositional tendencies such as fining upward sequences. The indicator arrays generated by the transition probability simulation are converted to layer elevation and thickness arrays for use with the new Hydrogeologic Unit Flow package in MODFLOW 2000. This makes it possible to preserve complex heterogeneity while using reasonably sized grids and/or grids with nonuniform cell thicknesses.

  1. MODFLOW-2000, the U.S. Geological Survey modular ground-water model -- Documentation of the Model-Layer Variable-Direction Horizontal Anisotropy (LVDA) capability of the Hydrogeologic-Unit Flow (HUF) package

    Science.gov (United States)

    Anderman, Evan R.; Kipp, K.L.; Hill, Mary C.; Valstar, Johan; Neupauer, R.M.

    2002-01-01

    This report documents the model-layer variable-direction horizontal anisotropy (LVDA) capability of the Hydrogeologic-Unit Flow (HUF) Package of MODFLOW-2000. The LVDA capability allows the principal directions of horizontal anisotropy to be different than the model-grid row and column directions, and for the directions to vary on a cell-by-cell basis within model layers. The HUF Package calculates effective hydraulic properties for model grid cells based on hydraulic properties of hydrogeologic units with thicknesses defined independently of the model layers. These hydraulic properties include, among other characteristics, hydraulic conductivity and a horizontal anisotropy ratio. Using the LVDA capability, horizontal anisotropy direction is defined for model grid cells within which one or more hydrogeologic units may occur. For each grid cell, the HUF Package calculates the effective horizontal hydraulic conductivity along the primary direction of anisotropy using the hydrogeologic-unit hydraulic conductivities, and calculates the effective horizontal hydraulic conductivity along the orthogonal anisotropy direction using the effective primary direction hydraulic conductivities and horizontal anisotropy ratios. The direction assigned to the model layer effective primary hydraulic conductivity is specified using a new data set defined by the LVDA capability, when active, to calculate coefficients needed to solve the ground-water flow equation. Use of the LVDA capability is illustrated in four simulation examples, which also serve to verify hydraulic heads, advective-travel paths, and sensitivities calculated using the LVDA capability. This version of the LVDA capability defines variable-direction horizontal anisotropy using model layers, not the hydrogeologic units defined by the HUF Package. This difference needs to be taken into account when designing model layers and hydrogeologic units to produce simulations that accurately represent a given field problem. This

  2. Traces of geologic and hydrogeologic cross sections used to develop the hydrogeologic framework model of the Death Valley regional ground-water flow system, Nevada and California

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — This digital dataset defines the traces of geologic and hydrogeologic cross sections that were used in the construction of a digital three-dimensional (3D)...

  3. The hack attack - Increasing computer system awareness of vulnerability threats

    Science.gov (United States)

    Quann, John; Belford, Peter

    1987-01-01

    The paper discusses the issue of electronic vulnerability of computer based systems supporting NASA Goddard Space Flight Center (GSFC) by unauthorized users. To test the security of the system and increase security awareness, NYMA, Inc. employed computer 'hackers' to attempt to infiltrate the system(s) under controlled conditions. Penetration procedures, methods, and descriptions are detailed in the paper. The procedure increased the security consciousness of GSFC management to the electronic vulnerability of the system(s).

  4. Special Analysis of Vulnerability Based on Network Models%基于网络模型的脆弱性的特例分析

    Institute of Scientific and Technical Information of China (English)

    张婧婧; 达新民

    2009-01-01

    Using the model which depicted airplane kidnappers attacks in the US as the source of data, this paper idealizes it and obtains another two structures with the same scale, such as uniformly distributed structure and hierarchical structure. Under the existing attacking strategies, experiments have done to analyse the vulnerability of three given structures. At last, it gets the descendent rate of efficiency by attacking the networks. So the aim for quantifying the discrepancy of different structures is realized.%以美国劫机事件绘制的网络模型作为数据源,将其理想化为相同规模的均匀结构和层次结构,利用现有的攻击策略,针对三种不同分布的模型进行脆弱性分析实验,并根据实验得到网络被攻击前、后效率的下降比例,以此定量衡量不同网络模型的脆弱性差异.

  5. Are Vulnerability Disclosure Deadlines Justified?

    Energy Technology Data Exchange (ETDEWEB)

    Miles McQueen; Jason L. Wright; Lawrence Wellman

    2011-09-01

    Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

  6. Land tenure, disasters and vulnerability.

    Science.gov (United States)

    Reale, Andreana; Handmer, John

    2011-01-01

    Although often overlooked, land tenure is an important variable impacting on vulnerability to disaster. Vulnerability can occur either where land tenure is perceived to be insecure, or where insecure tenure results in the loss of land, especially when alternative livelihood and housing options are limited. Disasters often provide the catalyst for such loss. This paper avoids making generalisations about the security of particular types of tenure, but instead explores factors that mediate tenure security, particularly in the wake of a disaster. The paper identifies five mediating factors: (1) the local legal system; (2) government administrative authority; (3) the economy; (4) evidence of tenure, and; (5) custom and dominant social attitudes. It is shown that some mediating factors are more salient for particular types of tenure than others. The paper will highlight the importance of land tenure in any assessment of vulnerability, and conclude with suggestions for further research.

  7. Local spatial and temporal factors influencing population and societal vulnerability to natural disasters.

    Science.gov (United States)

    Zhou, Yang; Li, Ning; Wu, Wenxiang; Wu, Jidong; Shi, Peijun

    2014-04-01

    The identification of societal vulnerable counties and regions and the factors contributing to social vulnerability are crucial for effective disaster risk management. Significant advances have been made in the study of social vulnerability over the past two decades, but we still know little regarding China's societal vulnerability profiles, especially at the county level. This study investigates the county-level spatial and temporal patterns in social vulnerability in China from 1980 to 2010. Based on China's four most recent population censuses of 2,361 counties and their corresponding socioeconomic data, a social vulnerability index for each county was created using factor analysis. Exploratory spatial data analysis, including global and local autocorrelations, was applied to reveal the spatial patterns of county-level social vulnerability. The results demonstrate that the dynamic characteristics of China's county-level social vulnerability are notably distinct, and the dominant contributors to societal vulnerability for all of the years studied were rural character, development (urbanization), and economic status. The spatial clustering patterns of social vulnerability to natural disasters in China exhibited a gathering-scattering-gathering pattern over time. Further investigations indicate that many counties in the eastern coastal area of China are experiencing a detectable increase in social vulnerability, whereas the societal vulnerability of many counties in the western and northern areas of China has significantly decreased over the past three decades. These findings will provide policymakers with a sound scientific basis for disaster prevention and mitigation decisions.

  8. Forest climate change Vulnerability and Adaptation Assessment in Himalayas

    Science.gov (United States)

    Chitale, V. S.; Shrestha, H. L.; Agarwal, N. K.; Choudhurya, D.; Gilani, H.; Dhonju, H. K.; Murthy, M. S. R.

    2014-11-01

    Forests offer an important basis for creating and safeguarding more climate-resilient communities over Hindu Kush Himalayan region. The forest ecosystem vulnerability assessment to climate change and developing knowledge base to identify and support relevant adaptation strategies is realized as an urgent need. The multi scale adaptation strategies portray increasing complexity with the increasing levels in terms of data requirements, vulnerability understanding and decision making to choose a particular adaptation strategy. We present here how such complexities could be addressed and adaptation decisions could be either directly supported by open source remote sensing based forestry products or geospatial analysis and modelled products. The forest vulnerability assessment under climate change scenario coupled with increasing forest social dependence was studied using IPCC Landscape scale Vulnerability framework in Chitwan-Annapurna Landscape (CHAL) situated in Nepal. Around twenty layers of geospatial information on climate, forest biophysical and forest social dependence data was used to assess forest vulnerability and associated adaptation needs using self-learning decision tree based approaches. The increase in forest fires, evapotranspiration and reduction in productivity over changing climate scenario was observed. The adaptation measures on enhancing productivity, improving resilience, reducing or avoiding pressure with spatial specificity are identified to support suitable decision making. The study provides spatial analytical framework to evaluate multitude of parameters to understand vulnerabilities and assess scope for alternative adaptation strategies with spatial explicitness.

  9. Chronic stress-induced hippocampal vulnerability: the glucocorticoid vulnerability hypothesis.

    Science.gov (United States)

    Conrad, Cheryl D

    2008-01-01

    The hippocampus, a limbic structure important in learning and memory, is particularly sensitive to chronic stress and to glucocorticoids. While glucocorticoids are essential for an effective stress response, their oversecretion was originally hypothesized to contribute to age-related hippocampal degeneration. However, conflicting findings were reported on whether prolonged exposure to elevated glucocorticoids endangered the hippocampus and whether the primate hippocampus even responded to glucocorticoids as the rodent hippocampus did. This review discusses the seemingly inconsistent findings about the effects of elevated and prolonged glucocorticoids on hippocampal health and proposes that a chronic stress history, which includes repeated elevation of glucocorticoids, may make the hippocampus vulnerable to potential injury. Studies are described to show that chronic stress or prolonged exposure to glucocorticoids can compromise the hippocampus by producing dendritic retraction, a reversible form of plasticity that includes dendritic restructuring without irreversible cell death. Conditions that produce dendritic retraction are hypothesized to make the hippocampus vulnerable to neurotoxic or metabolic challenges. Of particular interest is the finding that the hippocampus can recover from dendritic retraction without any noticeable cell loss. When conditions surrounding dendritic retraction are present, the potential for harm is increased because dendritic retraction may persist for weeks, months or even years, thereby broadening the window of time during which the hippocampus is vulnerable to harm, called the 'glucocorticoid vulnerability hypothesis'. The relevance of these findings is discussed with regard to conditions exhibiting parallels in hippocampal plasticity, including Cushing's disease, major depressive disorder (MDD), and post-traumatic stress disorder (PTSD).

  10. Managing a network vulnerability assessment

    CERN Document Server

    Peltier, Thomas R; Blackley, John A

    2003-01-01

    Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.

  11. Higher-order risk vulnerability

    OpenAIRE

    Huang,Xiaoping; Stapleton, Richard Christopher

    2017-01-01

    We add an independent unfair background risk to higher-order risk-taking models in the current literature and examine its interaction with the main risk under consideration. Parallel to the well-known concept of risk vulnerability, which is defined by Gollier and Pratt (Econometrica 64:1109–1123, 1996), an agent is said to have a type of higher-order risk vulnerability if adding an independent unfair background risk to wealth raises his level of this type of higher-order risk aversion. We der...

  12. Water-Resources Data and Hydrogeologic Setting at the Raleigh Hydrogeologic Research Station, Wake County, North Carolina, 2005-2007

    Science.gov (United States)

    McSwain, Kristen Bukowski; Bolich, Richard E.; Chapman, Melinda J.; Huffman, Brad A.

    2009-01-01

    Water-resources data were collected to describe the hydrologic conditions at the Raleigh hydrogeologic research station, located in the Piedmont Physiographic Province of North Carolina. Data collected by the U.S. Geological Survey and the North Carolina Department of Environment and Natural Resources, Division of Water Quality, from May 2005 through September 2007 are presented in this report. Three well clusters and four piezometers were installed at the Raleigh hydrogeologic research station along an assumed flow path from recharge to discharge areas. Each well cluster includes four wells to monitor the regolith, transition zone, and shallow and deep bedrock. Borehole, surface, and waterborne geophysics were conducted to examine the lithology and physical properties of the bedrock and to determine the aerial extent of near vertical diabase dikes. Slug tests were conducted in the wells at each cluster to determine the hydraulic conductivity of the formation tapped by each well. Periodic water-level altitudes were measured in all wells and in four piezometers. Continuous hourly water levels were measured in wells for variable periods of time during the study, and a surface-water gage collected 15-minute stage data from April to June 2006. In October 2005 and April 2006, water-quality samples were collected from a tributary and in all wells at the Raleigh hydrogeologic research station. Continuous water-quality data were collected hourly in three wells from December 2005 through January 2007 and every 15 minutes in the tributary from May to June 2006. In August 2006, streambed temperatures and drive-point ground-water samples were collected across lines of section spanning the Neuse River.

  13. Geophysical modeling and geochemical analysis for hydrogeologic assessment of the Steamboat Hills area, Nevada

    Science.gov (United States)

    Skalbeck, John David

    2001-07-01

    Three studies constitute the hydrogeologic assessment of the Steamboat Hills area, Washoe County, Nevada. Geophysical modeling and geochemical analysis are used to assess the hydrogeologic connection between a fractured bedrock geothermal system used to produce electrical power and surrounding alluvial aquifer basins used for municipal drinking water supply. Understanding the hydrogeologic connection between these two water resources is important for long-term management of these resources. Coupled 2.75-D forward modeling of multiple gravity and aeromagnetic profiles constrained by geological and physical properties (density, magnetic susceptibility, remanent magnetic) data yields a detailed 3-D geologic model of the geothermal system and the alluvial basins. A new method is presented for modeling the geothermal reservoir based on altered physical properties of host rock that yields a reservoir volume estimate that is double the previously assumed volume. The configuration of the modeled geothermal reservoir suggests that a previously unrecognized thermal water up-flow zone may exist along the west flank of the Steamboat Hills. Model results delineate the elevation and thickness of geologic units that can be used in numerical modeling of groundwater flow, planning exploration drilling, and evaluating fully 3-D forward modeling software. The Steamboat Hills geothermal resource area offers an excellent opportunity to test an exploration strategy using magnetics. A zone of demagnetized rock within the geothermal resource area resulting from thermochemical alteration due to thermal water flow along faults and fractures is apparent as an aeromagnetic low anomaly. Anomalously low ground magnetic data delineate a fault that conducts thermal water from the geothermal system to an alluvial aquifer. Vertical magnetic susceptibility from core measurements yields an average value for altered granodiorite used in forward modeling. Permeable fractures and a major fault zone

  14. Geology and hydrogeology of northern Guam

    Energy Technology Data Exchange (ETDEWEB)

    Barner, W.L. [ICF Kaiser Engineers, Inc., Pittsburgh, PA (United States)

    1995-12-31

    Recent site characterization activities on the northern portion of the island of Guam have provided data challenging the perception of expected rapid flow within the karst ground water system. The main water bearing formations consist of Tertiary and Quaternary age coralline reef limestones of the Barrigada and Mariana formations. The Barrigada formation lies on top of the underlying Tertiary aged volcanics, and the younger Mariana formation overlies and onlaps the Barrigada formation as a vertical and transgressional facies, changing from a deep to a shallow water depositional sequence. Rain water rapidly infiltrates through the limestone recharging the fresh water aquifer. Conditions that affect the occurrence and extent of the fresh water aquifer are: tidal fluctuations, storm surges, stratigraphic settings, and karstification of the limestone. Evidence from boreholes drilled inland and near the coast suggest karstification has occurred between the phreatic and vadose zone at a depth of approximately 150 meters below ground surface, and within the transition zone between the fresh and salt water interface, near sea level. Although one might expect a rapid flow system in this karst aquifer, non-flashy responses on water levels in wells, and current results from a dye tracing study, suggest ground water movement is indicative of diffuse porous flow. However, flow velocity within the vadose zone has been found to be several times that occurring within the aquifer and it is very difficult to predict the direction of movement. Andersen Air Force Base, located on the northern portion of the island of Guam, has been operating since World War II after re-capturing the island from the Japanese in 1944. In the intervening years, sanitary and industrial wastes have been disposed in various trenches, borrow pits, quarries, and sinkholes. Potential ground water degradation may result if hazardous substances, in the form of leachate, are released from these disposal areas.

  15. Quantification of Submarine Groundwater Discharge Using a Radon (222-Rn) Mass Balance and Hydrogeological Modelling

    Science.gov (United States)

    Petermann, Eric; Stollberg, Reiner; Scholten, Jan; Knöller, Kay; Schubert, Michael

    2016-04-01

    Apart from river and surface water runoff subsurface discharge of groundwater plays a key role in coastal water and matter budgets. Two major forms of submarine groundwater discharge (SGD) can be distinguished: (i) pure freshwater discharge from continental aquifers that are connected to the coastal sea driven by a positive hydraulic gradient (fresh SGD) and (ii) re-circulation of seawater that has penetrated permeable coastal sediments (re-circulated SGD), e.g. driven by tidal pumping. The localization of SGD zones and the quantification of SGD fluxes is of high interest for coastal water management due to potential threats related to SGD, namely (i) the detrimental impact of discharging nutrient- or contaminant-laden groundwater on coastal seawater quality, an aspect that is of relevance along coastlines which are impacted by agriculture, industry or intense urbanization, and (ii) the loss of freshwater to the ocean, an issue that is of major relevance in all coastal areas with (seasonally) limited freshwater availability. In this work, we discuss estimates for the total (fresh + re-circulated) SGD fluxes derived from a mass balance of the radioactive noble gas radon (222-Rn) with estimates of fresh SGD fluxes derived by hydrogeological modelling. The precision of the mass balance results depends on the adequate determination of the mass balance source and sink terms. These terms are calculated based on field observations of environmental tracers (salinity, δ18O, 222-Rn, 223-Ra, 224-Ra, 226-Ra) in seawater and porewater, as well as on meteorological data. The numerical hydrogeological model estimates groundwater flow based on groundwater monitoring data, river flow data, groundwater recharge estimates, tidal dynamics, and density effects along the freshwater/seawater interface. We compare these two independent methodological approaches of SGD flux estimation, discuss results regarding their relevance for the regional water balance and reason the implications of

  16. Forensic analysis of MTBE contamination using basic hydrogeologic concepts.

    Science.gov (United States)

    Boving, Thomas

    2014-07-01

    Contamination of groundwater with petroleum hydrocarbons and additives, such as methyl tert-butyl ether (MTBE), is often linked to the leaking product distribution system of gas stations. In very few cases is it know if and when a leak occurred and how much product was released to the environment. In the absence of direct evidence, a careful analysis of the available data, such as contaminant breakthrough at receptor wells or discrepancies in the product inventory data, may provide evidence about the nature of the release, its timing and magnitude. Using a MTBE contamination site in the formerly glaciated New England region as an example, two possible release scenarios (slow, long-term release vs. spill) were examined. Of the two scenarios, the slow release could be ruled out as the sole source even though there was no direct evidence for a spill. The analysis of hydraulic test results together with chemical data further permitted to estimate when such an undocumented spill might have occurred. Analyses of the data also allowed these results to be compared to that of a prior transport and fate modeling study. Good agreement and consistency for contaminant travel times was confirmed. This forensic analysis demonstrates that applying basic hydrogeologic principles can aide in the reconstruction of contamination events while providing more readily understandable and defendable evidence relative to complex models. Conceptually, the approach described herein is transferable to other sites with similar hydrogeologies.

  17. Flawed processing of airborne EM data affecting hydrogeological interpretation.

    Science.gov (United States)

    Viezzoli, Andrea; Jørgensen, Flemming; Sørensen, Camilla

    2013-03-01

    Airborne electromagnetics (AEMs) is increasingly being used across the globe as a tool for groundwater and environmental management. Focus is on ensuring the quality of the source data, their processing and modeling, and the integration of results with ancillary information to generate accurate and relevant products. Accurate processing and editing of raw AEM data, the topic of this article, is one of the crucial steps in obtaining quantitative information for groundwater modeling and management. In this article, we examine the consequences that different levels of processing of helicopter transient electromagnetic method data have on the resulting electrical models and subsequently on hydrogeological models. We focus on different approaches used in the industry for processing of the raw data and show how the electrical resistivity-depth models, which is the end "geophysical" product (after data inversion) of an AEM survey, change with different levels of processing of the raw data. We then extend the study to show the impact on some of the hydrogeological parameters or models, which can be derived from the geophysical results. The consequences of improper handling of raw data to groundwater and environmental management can be significant and expensive.

  18. Evolution of the notion of time in hydrogeology

    Science.gov (United States)

    Narasimhan, T. N.

    1986-10-01

    The AGU Hydrology Section sponsored a special session on History and Heritage of Hydrology between 8:30 A.M. and 12 noon on Monday, December 9, 1985, during the Fall Meeting at San Francisco. The session was chaired by T. N. Narasimhan of Lawrence Berkeley Laboratory (Berkeley, Calif.). The attendance of between 100 and 120 for each talk was indicative of a healthy interest among researchers on matters related to history.The first part of the session focused attention on the theme “The Evolution of the Notion of Time in Hydrogeology.” The last two speakers addressed topics outside of this theme. Simon Ince (University of Arizona, Tucson) presented a historical account of the contributions of 19th century French scientist Barre de Saint-Venant to transient flow of water in open channels. Olaf H. Pfannkuch (University of Minnesota, Minneapolis) presented a historical account of the Cult of Saint Barbara and the mining profession of medieval Europe. The following summary is restricted to an overview of those presentations that dealt with the evolution of the notion of time in hydrogeology.

  19. Proceedings of the joint Russian-American hydrogeology seminar

    Energy Technology Data Exchange (ETDEWEB)

    Tsang, C.F. [ed.] [Lawrence Berkeley National Lab., CA (United States); Mironenko, V. [ed.] [Russian Academy of Sciences, St. Petersburg (Russian Federation). Inst. of Environmental Geology; Pozdniakov, S. [ed.] [Moscow State Univ. (Russian Federation)

    1997-12-31

    Hydrogeology research has been very active in both Russia and the US because of the concerns for migration of radioactive and chemical contaminants in soils and geologic formations, as well as for water problems related to mining and other industrial operations. Russian hydrogeologists have developed various analysis and field testing techniques, sometimes in parallel with US counterparts. These Proceedings come out of a Seminar held to bring together a small group (about 15) of active Russian researchers in geologic flow and transport associated with the disposal of radioactive and chemical wastes either on the soils or through deep injection wells, with a corresponding group (about 25) of American hydrogeologists. The meeting was intentionally kept small to enable informal, detailed and in-depth discussions on hydrogeological issues of common interest. Out of this interaction, the authors hope that, firstly, they will have learned from each other and secondly, that research collaborations will be established where there is the opportunity. This proceedings presents the summaries and viewgraphs from the presentations. What cannot be conveyed here is the warm and cooperative atmosphere of these interactions, both inside and outside the formal sessions, which may well lead to future collaborations.

  20. HIV gender-based vulnerabilities of women using drugs in long-term heterosexual relationships: baseline results from a randomized trial in Ukraine

    Directory of Open Access Journals (Sweden)

    Shulga, Liudmyla

    2012-07-01

    Full Text Available BACKGROUND: Sexual way of HIV transmission in Ukraine outweighs parenteral route since 2007. In response to situation change couple’s counseling for IDUs was introduced and is currently tested within randomized trial.METHODS: Baseline data were collected in June-September 2011: 548 IDU couples in 10 cities were surveyed and screened for HIV and Hepatitis C. Participants were recruited using respondent-driven sampling method. RESULTS: The average age of participants varied between 30 – 33 years old with women being 3 years younger. On many aspects drug using couples in long-term relationships share the same values as non-drug using couples. However, drug use resulted into specific HIV/STIs risks for the couple. Common reasons of being with the current partner included mutual understanding (98%; similar life styles (90%; understanding life with addiction (88%; and love (87%. At the same time, looking at the quality time partners spend together, it was found that mostly, they are connected by their drug use, fear of social exclusion and economical reasons. Although these factors are important for both men and women, they have a bigger impact on women and put them into more vulnerable position: 25% have children who in 59% of cases mostly live with mother and her partner; 40% live in a partner’s house; 30% are financially supported by partners; 77% women get drugs from partners and only 20% are first one to be injected. Trust also seems to be an issue. Thus, 83% of respondents believe that they know the HIV/STI status of their partner and 90% of those believe it to be negative, while 20% of those surveyed appeared to be HIV positive and about 30% Hepatitis C positive. CONCLUSIONS: Understanding characteristics of sexual partners is crucial for HIV prevention programme design and implementation.

  1. Results of monitoring at Olkiluoto in 2013. Hydrology and hydrogeology

    Energy Technology Data Exchange (ETDEWEB)

    Vaittinen, T.; Ahokas, H.; Komulainen, J.; Nummela, J.; Pentti, E.; Turku, J. [Poeyry Finland Oy, Vantaa (Finland); Karvonen, T. [WaterHope, Helsinki (Finland); Aro, S.

    2014-12-15

    The impact of the construction of ONKALO is monitored by measuring and observing numerous different parameters related to hydrology, geochemistry, environment, rock mechanics and foreign materials. The Hydrological Monitoring Programme consists of the following parameters: groundwater level, hydraulic head, flow conditions in open drillholes, transverse flow, hydraulic conductivity, groundwater salinity (in situ EC), precipitation (including snow), sea-water level, surface flow (runoff), infiltration, ground frost, leakages in tunnels, and water balance in the tunnel system and in Korvensuo Reservoir. This Report focuses on hydrogeological parameters. Other parameters, like precipitation, ground frost etc. will be reported in the Monitoring Report of Environment. Updated monitoring program was introduced in the beginning of 2012. The updated program will be used for the period before repository operation. Only minor changes were implemented. Monitoring has been carried out according to plan. This Report presents the results for the year 2013. Excavation of the access tunnel was completed in 2012. Demonstration tunnels 3 and 4 were excavated and central tunnel 1 was continued from chainage 4366-22 m to chainage 4366-60 m in 2013. Total inflow into ONKALO down to chainage 4580 m including shaft ONK-KU2 down to level -437 m was on average 35 l/min in 2013. The mapping of water leakages and moisture conditions on the tunnel walls and the ceiling has been continued. The general pattern of leakages has remained similar during the construction of ONKALO. Most significant differences are caused by seasonal effects like condensation of warm ventilation air on tunnel walls and ceiling. The changes observed in the groundwater level in observation tubes in the overburden and in shallow drillholes in the bedrock are not necessarily caused by the construction of ONKALO. However, weak indications of a local decrease in groundwater level have been observed. Effects on the head

  2. Autonomy, Vulnerability, Recognition, and Justice

    NARCIS (Netherlands)

    Anderson, J.H.; Honneth, A.

    2005-01-01

    One of liberalism’s core commitments is to safeguarding individuals’ autonomy. And a central aspect of liberal social justice is the commitment to protecting the vulnerable. Taken together, and combined with an understanding of autonomy as an acquired set of capacities to lead one’s own life, these

  3. Cognitive vulnerability and dental fear

    Directory of Open Access Journals (Sweden)

    Spencer A John

    2008-01-01

    Full Text Available Abstract Background The Cognitive Vulnerability Model proposes that perceptions of certain characteristics of a situation are critical determinants of fear. Although the model is applicable to all animal, natural environment and situational fears, it has not yet been applied specifically to dental fear. This study therefore aimed to examine the association between dental fear and perceptions of dental visits as uncontrollable, unpredictable and dangerous. Methods The study used a clustered, stratified national sample of Australians aged 15 years and over. All participants were asked in a telephone interview survey to indicate their level of dental fear. Participants who received an oral examination were subsequently provided with a self-complete questionnaire in which they rated their perceptions of uncontrollability, unpredictability and dangerousness associated with dental visiting. Results 3937 participants were recruited. Each of the three vulnerability-related perceptions was strongly associated with the prevalence of high dental fear. In a logistic regression analysis, uncontrollability and dangerousness perceptions were significantly associated with high dental fear after controlling for age and sex. However, unpredictability perceptions did not have a statistically significant independent association with dental fear after controlling for all other variables. Conclusion Results are mostly consistent with the Cognitive Vulnerability Model of the etiology of fear, with perceptions of uncontrollability, unpredictability and dangerousness each showing a strong bivariate relationship with high dental fear prevalence. However, more extensive measures of vulnerability perceptions would be valuable in future investigations.

  4. Livelihood strategies under the constraints of climate change vulnerability in Quang Nam

    DEFF Research Database (Denmark)

    Casse, Thorkil

    2013-01-01

    This chapter examines how vulnerability can be measured in quantitative terms. Households whose livelihoods are based on economic activities like acacia production and shrimp farming suffered the most....

  5. Status and understanding of groundwater quality in the San Diego Drainages Hydrogeologic Province, 2004: California GAMA Priority Basin Project

    Science.gov (United States)

    Wright, Michael T.; Belitz, Kenneth

    2011-01-01

    Groundwater quality in the approximately 3,900-square-mile (mi2) San Diego Drainages Hydrogeologic Province (hereinafter San Diego) study unit was investigated from May through July 2004 as part of the Priority Basin Project of the Groundwater Ambient Monitoring and Assessment (GAMA) Program. The study unit is located in southwestern California in the counties of San Diego, Riverside, and Orange. The GAMA Priority Basin Project is being conducted by the California State Water Resources Control Board in collaboration with the U.S. Geological Survey (USGS) and the Lawrence Livermore National Laboratory. The GAMA San Diego study was designed to provide a statistically robust assessment of untreated-groundwater quality within the primary aquifer systems. The assessment is based on water-quality and ancillary data collected by the USGS from 58 wells in 2004 and water-quality data from the California Department of Public Health (CDPH) database. The primary aquifer systems (hereinafter referred to as the primary aquifers) were defined by the depth interval of the wells listed in the California Department of Public Health (CDPH) database for the San Diego study unit. The San Diego study unit consisted of four study areas: Temecula Valley (140 mi2), Warner Valley (34 mi2), Alluvial Basins (166 mi2), and Hard Rock (850 mi2). The quality of groundwater in shallow or deep water-bearing zones may differ from that in the primary aquifers. For example, shallow groundwater may be more vulnerable to surficial contamination than groundwater in deep water-bearing zones. This study had two components: the status assessment and the understanding assessment. The first component of this study-the status assessment of the current quality of the groundwater resource-was assessed by using data from samples analyzed for volatile organic compounds (VOC), pesticides, and naturally occurring inorganic constituents, such as major ions and trace elements. The status assessment is intended to

  6. Combined geophysical and petrophysical characterization to support a hydrogeological model of a coastal environment

    Science.gov (United States)

    Burschil, Thomas; Wiederhold, Helga; Scheer, Wolfgang; Kirsch, Reinhard; Krawczyk, Charlotte M.

    2014-05-01

    Global warming affects the water cycle by changing precipitation/evaporation and raising sea level. Especially groundwater systems in sensitive environments, such as coastal areas or barrier islands, have to be evaluated with respect to the potential reduction of water quality, e.g. salinization by saltwater intrusion (Hinsby et al., 2012). To assess these hazards using groundwater modeling we need a strong base of hydraulic and hydrogeological information. The use of integrated geophysical methods, in combination with a petrophysical characterization, provides a reliable architecture for groundwater modeling. Within the EU-project CLIWAT, we investigated the hydrogeological situation of the North Sea island of Föhr in Schleswig-Holstein (Germany). The island was mainly formed during glaciations in Pleistocene Series, especially Saalian and Weichselian Stages. These deposits remain as a Geest core in the southern central part, and house a freshwater lens that is used for the local water supply. To investigate the architecture of the fresh water lens, we carried out several surveys with airborne electromagnetic (AEM), seismic reflection, and borehole methods. To enhance the AEM resistivity model we inverted the data with a-priori constraints from seismic reflections (Burschil et al., 2012a). This constrained inversion leads to, among other things, a separation of two aquifers by resistivity data. Additionally, from borehole logs, vertical seismic profiles (VSP), and nearby AEM inversion point models we are able to petrophysically characterize different lithological categories regarding resistivity and seismic velocity. Subsurface glacial structures, e.g. buried valleys and a push moraine complex, are mapped down to 150 m below sea level. Below this rather horizontal features indicate Tertiary layers. Geophysically determined petrophysical values were correlated with lithological categories to enhance the interpretation of geophysical data. In this way, we expose

  7. Spatio-temporal variation of flood vulnerability at the Poyang Lake Ecological Economic Zone, Jiangxi Province, China.

    Science.gov (United States)

    Chen, Ping; Chen, Xiaoling

    2012-01-01

    For a long time areas of Poyang Lake have been threatened by floods. It is therefore important to assess flood vulnerability in this area. A composite flood vulnerability index was developed using an indicator approach to detect spatial distribution and temporal variation of flood vulnerability in the Poyang Lake Ecological Economic Zone (abbreviated to PLEEZ). Thematic maps of flood vulnerability showed a spatially ring-shaped distribution. The flood vulnerability ranking of one unit negatively correlated with the distance between the unit and the lake. Although flood vulnerability in PLEEZ declined significantly, the spatial distribution hardly changed from 1997 to 2006. The degree of flood vulnerability is highly related to exposure; variations in flood vulnerability are influenced by sensitivity and adaptive capacity. Based on correlation analysis, three proxies were identified as determinants of flood vulnerability variation over the past 10 years. This approach could provide policymakers with important flood risk information and entry points for flood management.

  8. Estimating Hydrogeological Parameters in Covered Carbonate Rocks Using a Discrete-State Compartment Model and Environmental Tritium

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Nowadays, isotope environmental technique tends to be used as a reconnaissance tool , both qualitative and quantitative, to calculate the aquifer parameters particularly in carbonate rock aquifers. But, the heterogeneous flow is still problematic when Lumped-parameter Models are usually used to calculate the residence times and hydraulic parameters. However, Discrete-State Compartment Model can provide a powerful model to heterogeneous medium. One such study was carried on in Dazha valley, where the environmental tritium was used as a tracer for determining hydrogeological parameters based on a discrete-state compartment model.

  9. Mitigation of the surficial hydrogeological impact induced by the construction of the Pajares Tunnels (NW Spain).

    Science.gov (United States)

    Valenzuela, Pablo; Sáenz de Santa María, José Antonio; José Domínguez-Cuesta, María; López Fernández, Carlos; Meléndez-Asensio, Mónica; Jiménez-Sánchez, Montserrat

    2016-04-01

    Pajares Tunnels are railway tunnels 24.5 km long and 700 m depth drilled in Paleozoic rocks of the Cantabrian Range (NW Spain). The construction of these tunnels is the cause of a very important surficial hydrogeological impact on the Alcedo Valley consisting on: i) the strong alteration of its natural hydrogeological regime; ii) the development of 25 sinkholes from 2007 to 2014 in calcareous rocks covered by alluvial deposits; iii) the transformation of the Alcedo stream into an influent, losing all the surficial water flow by infiltration trough 7 active ponors developed at the stream bed. The estimated mean water volume infiltration across these sinkholes was around 0.4 Hm3/year (10 ls-1). Previous studies proved the infiltration of this runoff towards the new base level established by the tunnels, which would affect the operation and safety conditions required in a high-speed railway line. In order to minimize this situation, several geotechnical works have been performed from July 2014 to November 2015. These works consist on: (i) geological research, (ii) borehole drilling, (iii) geophysical prospecting, (iv) sealing of sinkholes and ponors, (v) construction of a concrete channel covered with geotextile and completely buried with original removed alluvial materials, and (vi) environmental restoration. After the completion of these actions, the first observations have allowed to note a total elimination of the infiltration from the Alcedo Valley to the tunnels. This involves an 8% reduction of total drainage in Pajares Tunnels (from average 350 l s-1 to 325 l s-1).

  10. 基于地震动参数的RC框架结构易损性分析%Seismic Vulnerability Analysis of Reinforced Concrete Frame Structures Based on Ground Motion Parameters

    Institute of Scientific and Technical Information of China (English)

    徐超; 温增平

    2016-01-01

    以某典型的12层钢筋混凝土框架结构作为研究对象,研究基于非线性动力时程分析和地震动参数的RC框架结构易损性分析方法。首先采用静力 pushover分析判定结构薄弱层,并确定结构性能(capacity)参数;然后应用非线性动力时程分析估计结构地震反应,研究以峰值加速度和基本周期加速度反应谱作为地震动参数结构反应的不确定性,并进一步分析结构地震需求(demand)参数与地震动参数的关系;在此基础上,分别建立该结构基于峰值加速度和加速度反应谱的易损性曲线,通过考虑场地条件对地震动特性的影响,研究场地条件对结构易损性的影响,结果表明不同场地条件下的结构易损性曲线有一定差异。应用本文方法,根据新一代地震区划图或地震安全性评价确定的地震动参数,可以直接估计结构在未来地震中出现不同破坏的概率,这在结构的抗震性能评估和地震损失预测中有一定意义。%In this study,we performed the seismic vulnerability analysis of reinforced concrete (RC)frame buildings based on nonlinear dynamic time history analysis and ground motion pa-rameters.We used a typical 1 2-story RC frame structure as the research obj ect.First,we conducted static pushover analysis to identify a weak layer and to determine the capacity parameters of the building.Then,we performed nonlinear dynamic time history analysis to estimate the seismic re-sponse of the structure and to analyze the relation between the demand and ground motion param-eters.With respect to ground motion parameters,we studied the uncertainty of the structural re-sponse and then established peak ground acceleration and vulnerability curves based on the first-mode acceleration response spectrum.By considering the impacts of site conditions on ground mo-tion characteristics,we examined the impact of site conditions on vulnerability.The results show

  11. Potential of 3D City Models to assess flood vulnerability

    Science.gov (United States)

    Schröter, Kai; Bochow, Mathias; Schüttig, Martin; Nagel, Claus; Ross, Lutz; Kreibich, Heidi

    2016-04-01

    Vulnerability, as the product of exposure and susceptibility, is a key factor of the flood risk equation. Furthermore, the estimation of flood loss is very sensitive to the choice of the vulnerability model. Still, in contrast to elaborate hazard simulations, vulnerability is often considered in a simplified manner concerning the spatial resolution and geo-location of exposed objects as well as the susceptibility of these objects at risk. Usually, area specific potential flood loss is quantified on the level of aggregated land-use classes, and both hazard intensity and resistance characteristics of affected objects are represented in highly simplified terms. We investigate the potential of 3D City Models and spatial features derived from remote sensing data to improve the differentiation of vulnerability in flood risk assessment. 3D City Models are based on CityGML, an application scheme of the Geography Markup Language (GML), which represents the 3D geometry, 3D topology, semantics and appearance of objects on different levels of detail. As such, 3D City Models offer detailed spatial information which is useful to describe the exposure and to characterize the susceptibility of residential buildings at risk. This information is further consolidated with spatial features of the building stock derived from remote sensing data. Using this database a spatially detailed flood vulnerability model is developed by means of data-mining. Empirical flood damage data are used to derive and to validate flood susceptibility models for individual objects. We present first results from a prototype application in the city of Dresden, Germany. The vulnerability modeling based on 3D City Models and remote sensing data is compared i) to the generally accepted good engineering practice based on area specific loss potential and ii) to a highly detailed representation of flood vulnerability based on a building typology using urban structure types. Comparisons are drawn in terms of

  12. Development of AHPDST Vulnerability Indexing Model for Groundwater Vulnerability Assessment Using Hydrogeophysical Derived Parameters and GIS Application

    Science.gov (United States)

    Mogaji, K. A.

    2017-02-01

    Producing a bias-free vulnerability assessment map model is significantly needed for planning a scheme of groundwater quality protection. This study developed a GIS-based AHPDST vulnerability index model for producing groundwater vulnerability model map in the hard rock terrain, Nigeria by exploiting the potentials of analytic hierarchy process (AHP) and Dempster-Shafer theory (DST) data mining models. The acquired borehole and geophysical data in the study area were processed to derive five groundwater vulnerability conditioning factors (GVCFs), namely recharge rate, aquifer transmissivity, hydraulic conductivity, transverse resistance and longitudinal conductance. The produced GVCFs' thematic maps were multi-criterially analyzed by employing the mechanisms of AHP and DST models to determine the normalized weight (W) parameter for the GVCFs and mass function factors (MFFs) parameter for the GVCFs' thematic maps' class boundaries, respectively. Based on the application of the weighted linear average technique, the determined W and MFFs parameters were synthesized to develop groundwater vulnerability potential index (GVPI)-based AHPDST model algorithm. The developed model was applied to establish four GVPI mass/belief function indices. The estimates based on the applied GVPI belief function indices were processed in GIS environment to create prospective groundwater vulnerability potential index maps. The most representative of the resulting vulnerability maps (the GVPIBel map) was considered for producing the groundwater vulnerability potential zones (GVPZ) map for the area. The produced GVPZ map established 48 and 52% of the areal extent to be covered by the lows/moderate and highs vulnerable zones, respectively. The success and the prediction rates of the produced GVPZ map were determined using the relative operating characteristics technique to give 82.3 and 77.7%, respectively. The analyzed results reveal that the developed GVPI-based AHPDST model algorithm is

  13. Importance of Hydrogeological Conditions on Open-loop Geothermal System

    Science.gov (United States)

    Park, D.; Bae, G.; Kim, S.; Lee, K.

    2013-12-01

    The open-loop geothermal system has been known as an eco-friendly, energy-saving, and cost-efficient alternative for the cooling and heating of buildings with directly using the relatively stable temperature of groundwater. Thus, hydrogeological properties of aquifer, such as hydraulic conductivity and storage, must be important in the system application. The study site is located near Han-river, Korea, and because of the well-developed alluvium it might be a typical site appropriate to this system requiring an amount of groundwater. In this study, the first objective of numerical experiments was to find the best distributions of pumping and injection wells suitable to the hydrogeological conditions of the site for the efficient and sustainable system operation. The aquifer has a gravel layer at 15m depth below the ground surface and the river and the agricultural field, which may be a potential contaminant source, are located at the west and east sides, respectively. Under the general conditions that the regional groundwater flows from the east to the river, the locally reversed well distribution, locating the pumping well at upgradient and the injection well at downgradient of the regional flow, was most sustainable. The gravel layer with high hydraulic conductivity caused a little drawdown despite of an amount of pumping and allowed to stably reinject the used groundwater in all the cases, but it provided a passage transferring the injected heat to the pumping well quickly, particularly in the cases locating the injection well at the upgradient. This thermal interference was more severe in the cases of the short distance between the wells. The high conductive layer is also a reason that the seasonal role conversion of wells for the aquifer thermal energy storage was ineffective in this site. Furthermore, the well distribution vertical to the regional groundwater flow was stable, but not best, and, thus, it may be a good choice in the conditions that the regional

  14. The Greenland Analogue Project (GAP). Literature review of hydrogeology/ hydrogeochemistry

    Energy Technology Data Exchange (ETDEWEB)

    Wallroth, Thomas; Lokrantz, Hanna; Rimsa, Andrius (Bergab Consulting Geologists, Goeteborg (Sweden))

    2010-09-15

    This report is produced as part of the Greenland Analogue Project (GAP), carried out as a collaboration project with the Canadian Nuclear Waste Management Organization (NWMO), Posiva Oy and the Swedish Nuclear Fuel and Waste Management Co (SKB). The overall aim of the project is to improve the current understanding of hydrogeological and hydrogeochemical processes associated with continental-scale glacial periods including with the presence of permafrost and the advance/retreat of ice sheets. The project will focus on studying how an ice sheet affects groundwater flow and water chemistry around a deep geological repository in crystalline bedrock. The Greenland Analogue Project consists of three active sub-projects (A-C) with individual objectives. Field studies are conducted in the Kangerlussuaq region, in central Western Greenland. Sub-projects A and B collectively aim at improving the understanding of ice sheet hydrology by combining investigations on surface water processes with ice sheet drilling and instrumentation. In sub-project C, the penetration of glacial melt water into the bedrock, groundwater flow and the chemical composition of water will be studied. Main planned activities in sub-project C include drilling of a deep borehole in front of the ice sheet, in which different downhole surveys, sampling and monitoring will be carried out. The primary aim of this report is to review available information about hydrogeology and hydrogeochemistry in central Western Greenland, with special emphasis on the area around Kangerlussuaq. The relevant information about this area is however very limited, and it was decided to extend the review to briefly include studies made in other regions with similar conditions in terms of geology, climate and glaciology. The number of published studies made in other areas with glaciers, ice sheets or permafrost is very large, and the review and list of references in this report is far from complete. It is also obvious that both

  15. Adapting to Sea Level Rise to the Year 2100 and Beyond in the State of Florida, USA: A Regional Approach Based upon Common Vulnerabilities and the Utility of Shared Resources

    Science.gov (United States)

    Parkinson, R. W.; Harlem, P. W.; Meeder, J.

    2014-12-01

    We simulate the vulnerability of all 35 Florida coastal counties to the ongoing Anthropocene marine transgression unconstrained by the artificial end date of year 2100. Coastal submergence was emulated using a 'bathtub model' and rising sea level associated with an atmospheric temperature increase of +1 oC to +4 oC (see Levermann et al. [1]). Simulation results are organized into seven regions, each representing an area of common vulnerability characterized in this study as high (9% to 30% land loss), higher (16 to 68% land loss) and highest (48% to 97% land loss). This grouping provides a logical basis for establishing or re-enforcing collaboration based upon a common threat and the utility of shared technical and financial resources. Our bathtub model assumes Florida terrain is simply submerged as the shoreline migrates across a static landscape without change in the physical and biological materials subject to marine transgression. However, geologic studies of past and present Florida shorelines indicate the rate of rise is as important as the magnitude when predicting coastal response. To determine the utility of the bathtub model as a representative simulation of Florida's response to future sea level rise, we considered Florida's coastal response to varying rates of sea level rise over the last 14,000 years. Available data clearly demonstrate predicted rates of sea level rise will result in widespread submergence; the rate of rise will be too fast to be offset by the stabilizing forces of biogenic or physical sediment accumulation. Hence the magnitude of land loss and associated shoreline retreat in each of the seven Florida regions - and likely other coastal zones in the southeast U.S. - will be solely a function of topographic elevation and can therefore be reasonably forecast using a bathtub model. While our focus is on Florida's coastal counties, we recognize in some regions the effects of sea level rise will extend further inland. In these areas, the

  16. Vulnerability of mountain glaciers in China to climate change

    Institute of Scientific and Technical Information of China (English)

    YANG Jian-Ping; DING Yong-Jian; LIU Shi-Yin; TAN Chun-Ping

    2015-01-01

    Mountain glaciers in China are an important water source for both China and adjoining countries, and therefore their adaptation to glacier change is crucial in relation to maintaining populations. This study aims to improve our understanding of glacial vulnerability to climate change to establish adaptation strategies. A glacial numerical model is developed using spatial principle component analysis (SPCA) supported by remote sensing (RS) and geographical information system (GIS) technologies. The model contains nine factorsdslope, aspect, hillshade, elevation a.s.l., air temperature, precipitation, glacial area change percentage, glacial type and glacial area, describing topography, climate, and glacier characteristics. The vulnerability of glaciers to climate change is evaluated during the period of 1961e2007 on a regional scale, and in the 2030s and 2050s based on projections of air temperature and precipitation changes under the IPCC RCP6.0 scenario and of glacier change in the 21st century. Glacial vulnerability is graded into five levels:potential, light, medial, heavy, and very heavy, using natural breaks classification (NBC). The spatial distribution of glacial vulnerability and its temporal changes in the 21st century for the RCP6.0 scenario are analyzed, and the factors influencing vulnerability are discussed. Results show that mountain glaciers in China are very vulnerable to climate change, and 41.2% of glacial areas fall into the levels of heavy and very heavy vulnerability in the period 1961e2007. This is mainly explained by topographical exposure and the high sensitivity of glaciers to climate change. Trends of glacial vulnerability are projected to decline in the 2030s and 2050s, but a declining trend is still high in some regions. In addition to topographical factors, variation in precipitation in the 2030s and 2050s is found to be crucial.

  17. Multimodal spectroscopy detects features of vulnerable atherosclerotic plaque

    Science.gov (United States)

    Šćepanović, Obrad R.; Fitzmaurice, Maryann; Miller, Arnold; Kong, Chae-Ryon; Volynskaya, Zoya; Dasari, Ramachandra R.; Kramer, John R.; Feld, Michael S.

    2011-01-01

    Early detection and treatment of rupture-prone vulnerable atherosclerotic plaques is critical to reducing patient mortality associated with cardiovascular disease. The combination of reflectance, fluorescence, and Raman spectroscopy-termed multimodal spectroscopy (MMS)-provides detailed biochemical information about tissue and can detect vulnerable plaque features: thin fibrous cap (TFC), necrotic core (NC), superficial foam cells (SFC), and thrombus. Ex vivo MMS spectra are collected from 12 patients that underwent carotid endarterectomy or femoral bypass surgery. Data are collected by means of a unitary MMS optical fiber probe and a portable clinical instrument. Blinded histopathological analysis is used to assess the vulnerability of each spectrally evaluated artery lesion. Modeling of the ex vivo MMS spectra produce objective parameters that correlate with the presence of vulnerable plaque features: TFC with fluorescence parameters indicative of collagen presence; NC/SFC with a combination of diffuse reflectance β-carotene/ceroid absorption and the Raman spectral signature of lipids; and thrombus with its Raman signature. Using these parameters, suspected vulnerable plaques can be detected with a sensitivity of 96% and specificity of 72%. These encouraging results warrant the continued development of MMS as a catheter-based clinical diagnostic technique for early detection of vulnerable plaques.

  18. Study on vulnerability assessment of cable-stayed bridges

    Science.gov (United States)

    Chang, C. C.; Yan, D.

    2006-03-01

    A structure is vulnerable if any small damage will trigger disproportionately large consequences, even leads to a cascade of failure events and progressive collapse. The structural vulnerability performance depends upon the properties, locations of damaged components and the way they are connected to the rest of the structure. In this paper, progressive failure analysis method is utilized for the vulnerability study of cable-stayed bridges. The goal of it is to identify various failure scenarios initiated from the sudden damage of some bridge components. Based on the analysis results, assuming that the behaviors of damaged components can be modeled using plastic hinges, the hybrid element model is introduced to derived the modified stiffness matrix considering both of the effects of bending moments and shear forces. Furthermore, the vulnerability index in terms of the nodal stiffness degradation can be analytically quantified, which could be regarded as an index to determine the bridge failure consequences, so that the vulnerability distribution graph for the whole bridge can be sketched to evaluate the bridge performances from vulnerability viewpoints. This quantitative approach is applicable for structural evaluation under unforeseen attack and illustrated on a typical long-span cable-stayed bridge.

  19. Vulnerability and the bioethics through the experiences of illness

    Directory of Open Access Journals (Sweden)

    Rolim-Neto Leite Modesto

    2012-03-01

    Full Text Available Background: Vulnerable people are relatively or absolutely incapable of protecting their own interests. Vulnerability is an anthropological attribute of human beings due to the simple fact of being alive. Brazilian society has long been established as a matter through the eyes of social scientists. In the name of it, the vulnerability in the doctor-patient context is now being a much-discussed issue. Purpose: This study aims to analyze the current studies regarding the insertion of vulnerability in the health issue, reflexively dealing with the ethical matters involved, as well as with the narratives’ insertion in this process. Methods: This article is based on data extracted from Scientific Electronic Library Online (Scielo and on secondary data from textbooks about vulnerability, ethics, physician-patient relationship and narratives. Results and discussion: Doctors are faced with dilemmas in clinical practice: moral, ethical, legal, social, religious and economic. On these occasions, question their own values. By listening carefully to the stories of patients, health professionals broaden their perspectives, organize and integrate complex situations, which assists in conducting these difficult situations. Conclusion: Reflect the concept of vulnerability raises (re think health practices, particularly in bringing to light the social experience of illness and hospitalization of the patient.

  20. Hydrogeological characterisation and modelling of deformation zones and fracture domains, Forsmark modelling stage 2.2

    Energy Technology Data Exchange (ETDEWEB)

    Follin, Sven (SF GeoLogic AB, Taeby (SE)); Leven, Jakob (Swedish Nuclear Fuel and Waste Management Co., Stockholm (SE)); Hartley, Lee; Jackson, Peter; Joyce, Steve; Roberts, David; Swift, Ben (Serco Assurance, Harwell (GB))

    2007-09-15

    categories of steeply-dipping deformation zones may be due to the anisotropy in the stress field, where the maximum stress is horizontal and has an azimuth of c. 140 deg. The hypothesis is supported by the deformation zones that strike WNW and NW. These two categories of steeply-dipping deformation zones have, relatively speaking, higher mean transmissivities than steeply dipping deformation zones in other directions. Key hydrogeological aspects of the fracture domains modelled are: We find the geological division of the bedrock in between the deterministically deformation zones to fall into six fracture domains useful from a hydrogeological point of view. In fact, the suggested division is consistent with the hydrogeological modelling approach reported for modelling stage 1.2. The key aspect for Forsmark is that the corrected conductive fracture frequency for the potential fracture domain FFM01 shows very strong variations with depth, and so it is suggested that the Hydro-DFN be split into three layers: above the elevation -200, between the elevations -200 and -400, and below the elevation -400. FFM01 is also very anisotropic, being dominated by the HZ set, and only with a small contribution from the NE and NS sets. The top layer of fracture domain FFM01 is similar to the Hydro-DFN parameters for fracture domain FFM02. FFM03 has less variation with depth and is comparable to the middle section of FFM01, but is more isotropic. Data for fracture domain FFM06, which is also a part of the potential target bedrock, will be treated in modelling stage 2.3. Pending this information, it is envisaged that fracture domain FFM06 can be modelled in the same fashion as fracture domain FFM01. Fracture domains FFM04 and FFM05 lie in the periphery of the candidate area. Based on the statistical analysis, FFM05 seems to be similar to FFM03, while FFM04 is of slightly higher hydraulic conductivity, but the statistical significance of the data for these fracture domains is very limited, being

  1. Infrastructure Vulnerability Assessment Model (I-VAM).

    Science.gov (United States)

    Ezell, Barry Charles

    2007-06-01

    Quantifying vulnerability to critical infrastructure has not been adequately addressed in the literature. Thus, the purpose of this article is to present a model that quantifies vulnerability. Vulnerability is defined as a measure of system susceptibility to threat scenarios. This article asserts that vulnerability is a condition of the system and it can be quantified using the Infrastructure Vulnerability Assessment Model (I-VAM). The model is presented and then applied to a medium-sized clean water system. The model requires subject matter experts (SMEs) to establish value functions and weights, and to assess protection measures of the system. Simulation is used to account for uncertainty in measurement, aggregate expert assessment, and to yield a vulnerability (Omega) density function. Results demonstrate that I-VAM is useful to decisionmakers who prefer quantification to qualitative treatment of vulnerability. I-VAM can be used to quantify vulnerability to other infrastructures, supervisory control and data acquisition systems (SCADA), and distributed control systems (DCS).

  2. Assessment of groundwater vulnerability and sensitivity to pollution in Berrechid plain, using drastic model

    Directory of Open Access Journals (Sweden)

    M. Aboulouafa*1

    2016-06-01

    Full Text Available The Groundwater protection and management is vital for human evolution, socio-economic development and ecological diversity, because it is one of the most valuable natural resources. Agricultural and industrial activities, more and more intensive and significant population growth, have contributed to the degradation of Berrechid Groundwater quality. The present study aimed to assess the vulnerability of Berrechid aquifer using the DRASTIC models. The application of the methodology developed has needed the establishment of a Geographical Information System synthesizing a considerable mass of data (geological, hydrogeological, geophysical, etc., constitutes a real tool to aid in the decision for the managers of water resources in the region of Chaouia. The results show that three classes of vulnerability are observed in the study area: the higher drastic indices appear at the areas with low groundwater table depth and the areas which are not protected by the clays, and the areas less vulnerable are located in areas where the water is deeper and the clays recovery is important.

  3. Factors affecting public-supply well vulnerability in two karst aquifers.

    Science.gov (United States)

    Musgrove, MaryLynn; Katz, Brian G; Fahlquist, Lynne S; Crandall, Christy A; Lindgren, Richard J

    2014-09-01

    Karst aquifers occur in a range of climatic and geologic settings. Nonetheless, they are commonly characterized by their vulnerability to water-quality impairment. Two karst aquifers, the Edwards aquifer in south-central Texas and the Upper Floridan aquifer in western Florida, were investigated to assess factors that control the movement of contaminants to public-supply wells (PSWs). The geochemistry of samples from a selected PSW or wellfield in each aquifer was compared with that from nearby monitoring wells and regional PSWs. Geochemistry results were integrated with age tracers, flow modeling, and depth-dependent data to refine aquifer conceptual models and to identify factors that affect contaminant movement to PSWs. The oxic Edwards aquifer is vertically well mixed at the selected PSW/wellfield, although regionally the aquifer is geochemically variable downdip. The mostly anoxic Upper Floridan aquifer is affected by denitrification and also is geochemically variable with depth. In spite of considerable differences in geology and hydrogeology, the two aquifers are similarly vulnerable to anthropogenic contamination. Vulnerability in studied PSWs in both aquifers is strongly influenced by rapid karst flowpaths and the dominance of young (aquifers (nitrate, atrazine, deethylatrazine, tetrachloroethene, and chloroform). Specific consideration of water-quality protection efforts, well construction and placement, and aquifer response times to land-use changes and contaminant loading are discussed, with implications for karst groundwater management.

  4. Summary of hydrogeologic conditions at Aberg, Beberg and Ceberg

    Energy Technology Data Exchange (ETDEWEB)

    Walker, D.; Gurban, I. [INTERA KB, Sollentuna (Sweden); Rhen, I. [VBB Viak AB (Sweden)

    1997-10-01

    This report is a compilation of existing data and descriptions for use in the hydrogeologic modelling of three hypothetical sites for a nuclear waste repository in Sweden. It provides modelling teams with preliminary conceptual models, parameter values and uncertainties for inputs to numerical flow and transport models on the regional and site scales. Its primary objective is to provide consistent data sets and conceptual models so that the results of performance assessment modelling will be as comparable as possible. Where possible, this report also provides alternative conceptual models that should be evaluated as part of the modelers` sensitivity analysis. The information contained in this report is taken from several key sources, including the SKB SICADA database, the Swedish Geological Survey well database, the SKB Geographic Information System, the Swedish Land Survey databases, and published SKB reports. 148 refs, 25 tabs, 60 figs.

  5. Application of TEM in hydrogeological prospecting of mining district

    Energy Technology Data Exchange (ETDEWEB)

    Lid Shu-cai; Liu Zhi-xin; Jang Zhi-hai [China University of Milling & Technology, Xuzhou (China). School of Resource and Earth Science

    2005-07-15

    Exploration of small structures and their transmissivity is very important in coal mining geology. The 3D seismic method is mainly applied in detecting geological structures while the electrical method is mainly applied in detecting structures which are filled with water. In this paper the principle, the field procedure, the method of data processing and interpretation are introduced. The TEM combining with 3D seismic method is applied in hydrogeological prospecting of mining district. The result indicates that the combination of TEM and seismic method can solve, to some extent, the problem of multi-solution, improve the detecting precision, and provide reliable hydro-geophysical information for the prevention and control of water disaster in coal mines. 10 refs., 4 figs.

  6. Climate vulnerability, communities' resilience and child labour

    OpenAIRE

    Boutin, Delphine

    2014-01-01

    This article clarifies and quantifies the causal impact of climate change vulnerability on child labour incidence and intensity. For this purpose, we create an index of vulnerability to climate change, composed of biophysical vulnerability and communities' resilience. Both, participation to economic activities and to household chores have been taken into account. We find that climate vulnerability negatively affects child labour incidence and intensity, while has no significant impact on hous...

  7. Soil vulnerability for cesium transfer.

    Science.gov (United States)

    Vandenhove, Hildegarde; Sweeck, Lieve

    2011-07-01

    The recent events at the Fukushima Daiichi nuclear power plant in Japan have raised questions about the accumulation of radionuclides in soils and the possible impacts on agriculture surrounding nuclear power plants. This article summarizes the knowledge gained after the nuclear power plant accident in Chernobyl, Ukraine, on how soil parameters influence soil vulnerability for radiocesium bioavailability, discusses some potential agrochemical countermeasures, and presents some predictions of radiocesium crop concentrations for areas affected by the Fukushima accident.

  8. Hydrogeological and environmental impact of coal mining, Jharia coalfield, India

    Energy Technology Data Exchange (ETDEWEB)

    Choubey, V.D. (Indian School of Mines, Dhanbad (India). Dept. of Applied Geology)

    The Jharia coalfield is the most important and active mining region in India, it experiences groundwater inflow and affects groundwater levels in overlying aquifers, and it provides the basis for a conceptual model of the hydrogeological impacts of coal mining. The several sandstone aquifers of the overburden are separated by aquitards that limit vertical hydraulic connection, but the inflow responds to seasonal events and seems to be linked to shallow groundwater behaviour. The mine drainage behaviour suggests a hydraulic connection between the mine and the shallower groundwater system. The greatest declines are directly above the panels, with an immediate response to coal mining. The inflow is localized by natural and induced fracture zones and is mostly into recent workings. The groundwater behaviour is controlled by hydraulic property changes caused by mine-induced fracturing. The hydrological and chemical qualities of the shallow groundwater regime in 13 mining collieries in Mukunda Block have been investigated. Water samples were collected from 30 shallow monitoring dug wells. Rainfall, runoff, and infiltration rates have been calculated in the area. The water-quality plottings were used to interpret the distribution of individual chemical parameters and in predicting the water quality. The underground mine water has been classified as: (1) unconfined groundwater in the calcareous siltstone and sandstone - its composition in Na, Ca, SO{sub 4} and Na-MgHCO{sub 3} with moderate total dissolved solids (TDS)200-1480 ppm; (2) the deep groundwater originating from the coal seams and associated sediments in the near-surface environments - this is a Na-HCO{sub 3} water with higher TDS; and (3) spoil dump waters are essentially Na-HCO{sub 3} with high TDS. This article presents some hydrologic results and conclusions relating to the hydrogeological and environmental impacts of the coal mining in the Jharia coalfield. 19 refs., 11 figs., 2 tabs.

  9. Vulnerabilities

    Science.gov (United States)

    2009-05-04

    May 1, 2006)”, http://www.mod.go.jp/e/d_policy/dp13.html (accessed 1 April 2009). 6 ibid 7 Hongo , Jun. “Japan, U.S. sign accord on forces,” The...Jacobs, G. Keith. "Guam Becoming US Pacific Linchpin." Asia-Pacific Defence Reporter 29 (2003): 38-39. Jun, Hongo . "Japan, U.S. sign accord on forces

  10. Vulnerability Assessments in Ethical Hacking

    Directory of Open Access Journals (Sweden)

    Ashiqur Rahman ,

    2016-06-01

    Full Text Available Ethical hackers use the same methods and techniques to test and bypass a system's defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found, they document them and provide actionable advice on how to fix them so the organization can improve its overall security. The purpose of ethical hacking is to evaluate the security of a network or system's infrastructure. It entails finding and attempting to exploit any vulnerabilities to determine whether unauthorized access or other malicious activities are possible. Vulnerabilities tend to be found in poor or improper system configuration, known and unknown hardware or software flaws, and operational weaknesses in process or technical countermeasures. One of the first examples of ethical hacking occurred in the 1970s, when the United States government used groups of experts called "red teams" to hack its own computer systems. It has become a sizable sub-industry within the information security market and has expanded to also cover the physical and human elements of an organization's defenses. A successful test doesn't necessarily mean a network or system is 100% secure, but it should be able to withstand automated attacks and unskilled hackers.

  11. Assessing vulnerability of urban African communities

    DEFF Research Database (Denmark)

    Karlsson Nyed, Patrik; Jean-Baptiste, Nathalie; Herslund, Lise Byskov

    2014-01-01

    East African cities are in the process of assessing their vulnerabilities to climate change, but face difficulties in capturing the complexity of the various facets of vulnerability. This holistic approach, captures four different dimensions of vulnerability to flooding - Assets, Institutions...... to flooding across the city, at the finest administrative level....

  12. Hydrogeological investigation of shallow aquifers in an arid data-scarce coastal region (El Daba'a, northwestern Egypt)

    Science.gov (United States)

    Yousif, Mohamed; van Geldern, Robert; Bubenzer, Olaf

    2016-02-01

    Hydrogeological investigations in arid regions are particularly important to support sustainable development. The study area, El Daba'a in northwestern Egypt, faces scarce water resources as a result of reported climate change that particularly affects the southern Mediterranean coast and increases stress on the local groundwater reserves. This change in climate affects the area in terms of drought, over-pumping and unregulated exploration of groundwater for irrigation purposes. The hydrogeological investigation is based on a multidisciplinary data-layer analysis that includes geomorphology, geology, slope, drainage lines, soil type, structural lineaments, subsurface data, stable isotopes, and chemical analyses. The study area contains Pleistocene and middle Miocene marine limestone aquifers. Based on lithology and microfacies analysis, the middle Miocene aquifer is subdivided into two water-bearing zones. The area is affected by sets of faults and anticline folds, and these structures are associated with fractures and joints that increase permeability and facilitate the recharge of groundwater. Stable isotope data indicate that groundwater of both the Pleistocene and middle Miocene aquifers is recharged by modern precipitation. The high salinity values observed in some groundwater wells that tap both aquifers could be attributed to leaching and dissolution processes of marine salts from the aquifers' marine limestone matrix. In addition, human activities can also contribute to an increase in groundwater salinity. A future water exploration strategy, based on the results from the multidisciplinary data-layer analysis, is proposed for the area. The derived scientific approach is transferable to other arid coastal areas with comparable conditions.

  13. Mapping Social and Economic Vulnerability in Forest and Peatland Fire Disaster in Bengkalis Regency, Riau Province

    Directory of Open Access Journals (Sweden)

    Eko Ahmad Riyanto

    2015-08-01

    Full Text Available The aims of this research are (1 analyzing social and economic vulnerability of forest and peat land fire disaster in Bengkalis Regency; (2 Mapping social and economic vulnerability of forest and peat land fire disaster in Bengkalis Regency.  Research Variable is social and economic vulnerability. The data that used is primary and secondary data with survey method. Analysis method is scoring and weightings. After that classified based on the value of the score to determine the level of vulnerability. The analysis based on the head of National Agency for Disaster Management (Perka BNPB Number 02.2012 and literatures study. The results of research show that social vulnerability of forest and peat land fire in Bengkalis Regency is medium vulnerability because it has value of social vulnerability is 0.46663. While economic vulnerability in Bengkalis Regency is low vulnerability because economic vulnerability is 0.3333. In addition, required mitigation that is quick and appropriate by governments of Bengkalis Regency and the local community in management of forest and peat land fire disaster.

  14. Regional hydrogeological simulations for Forsmark - numerical modelling using CONNECTFLOW. Preliminary site description Forsmark area - version 1.2

    Energy Technology Data Exchange (ETDEWEB)

    Hartley, Lee; Cox, Ian; Hunter, Fiona; Jackson, Peter; Joyce, Steve; Swift, Ben [Serco Assurance, Risley (United Kingdom); Gylling, Bjoern; Marsic, Niko [Kemakta Konsult AB, Stockholm (Sweden)

    2005-05-01

    The Swedish Nuclear Fuel and Waste Management Company (SKB) carries out site investigations in two different candidate areas in Sweden with the objective of describing the in-situ conditions for a bedrock repository for spent nuclear fuel. The site characterisation work is divided into two phases, an initial site investigation phase (IPLU) and a complete site investigation phase (KPLU). The results of IPLU are used as a basis for deciding on a subsequent KPLU phase. On the basis of the KPLU investigations a decision is made as to whether detailed characterisation will be performed (including sinking of a shaft). An integrated component in the site characterisation work is the development of site descriptive models. These comprise basic models in three dimensions with an accompanying text description. Central in the modelling work is the geological model, which provides the geometrical context in terms of a model of deformation zones and the rock mass between the zones. Using the geological and geometrical description models as a basis, descriptive models for other geo-disciplines (hydrogeology, hydro-geochemistry, rock mechanics, thermal properties and transport properties) will be developed. Great care is taken to arrive at a general consistency in the description of the various models and assessment of uncertainty and possible needs of alternative models. Here, a numerical model is developed on a regional-scale (hundreds of square kilometres) to understand the zone of influence for groundwater flow that affects the Forsmark area. Transport calculations are then performed by particle tracking from a local-scale release area (a few square kilometres) to identify potential discharge areas for the site and using greater grid resolution. The main objective of this study is to support the development of a preliminary Site Description of the Forsmark area on a regional-scale based on the available data of 30 June 2004 and the previous Site Description. A more specific

  15. Coastal vulnerability: climate change and natural hazards perspectives

    Science.gov (United States)

    Romieu, E.; Vinchon, C.

    2009-04-01

    Introduction Studying coastal zones as a territorial concept (Integrated coastal zone management) is an essential issue for managers, as they have to consider many different topics (natural hazards, resources management, tourism, climate change…). The recent approach in terms of "coastal vulnerability" studies (since the 90's) is the main tool used nowadays to help them in evaluating impacts of natural hazards on coastal zones, specially considering climate change. This present communication aims to highlight the difficulties in integrating this concept in risk analysis as it is usually practiced in natural hazards sciences. 1) Coastal vulnerability as a recent issue The concept of coastal vulnerability mainly appears in the International panel on climate change works of 1992 (IPCC. 2001), where it is presented as essential for climate change adaptation. The concept has been defined by a common methodology which proposes the assessment of seven indicators, in regards to a sea level rise of 1m in 2100: people affected, people at risk, capital value at loss, land at loss, wetland at loss, potential adaptation costs, people at risk assuming this adaptation. Many national assessments have been implemented (Nicholls, et al. 1995) and a global assessment was proposed for three indicators (Nicholls, et al. 1999). The DINAS-Coast project reuses this methodology to produce the DIVA-tool for coastal managers (Vafeidis, et al. 2004). Besides, many other methodologies for national or regional coastal vulnerability assessments have been developed (review by (UNFCCC. 2008). The use of aggregated vulnerability indicators (including geomorphology, hydrodynamics, climate change…) is widespread: the USGS coastal vulnerability index is used worldwide and was completed by a social vulnerability index (Boruff, et al. 2005). Those index-based methods propose a vulnerability mapping which visualise indicators of erosion, submersion and/or socio economic sensibility in coastal zones

  16. Vulnerability Is Dynamic! Conceptualising a Dynamic Approach to Coastal Tourism Destinations’ Vulnerability

    NARCIS (Netherlands)

    Student, J.R.; Amelung, B.; Lamers, M.A.J.

    2016-01-01

    Coastal regions and islands are among the most popular tourist destinations.
    They are also highly vulnerable to climate change. Much of the literature on
    vulnerability, including IPCC reports, states that vulnerability is dynamic. However,
    vulnerability conceptualisations in the tourism

  17. Measuring vulnerability to disaster displacement

    Science.gov (United States)

    Brink, Susan A.; Khazai, Bijan; Power, Christopher; Wenzel, Friedemann

    2015-04-01

    Large scale disasters can cause devastating impacts in terms of population displacement. Between 2008 and 2013, on average 27 million people were displaced annually by disasters (Yonetani 2014). After large events such as hurricane Katrina or the Port-au-Prince earthquake, images of inadequate public shelter and concerns about large scale and often inequitable migration have been broadcast around the world. Population displacement can often be one of the most devastating and visible impacts of a natural disaster. Despite the importance of population displacement in disaster events, measures to understand the socio-economic vulnerability of a community often use broad metrics to estimate the total socio-economic risk of an event rather than focusing on the specific impacts that a community faces in a disaster. Population displacement is complex and multi-causal with the physical impact of a disaster interacting with vulnerability arising from the response, environmental issues (e.g., weather), cultural concerns (e.g., expectations of adequate shelter), and many individual factors (e.g., mobility, risk perception). In addition to the complexity of the causes, population displacement is difficult to measure because of the wide variety of different terms and definitions and its multi-dimensional nature. When we speak of severe population displacement, we may refer to a large number of displaced people, an extended length of displacement or associated difficulties such as poor shelter quality, risk of violence and crime in shelter communities, discrimination in aid, a lack of access to employment or other difficulties that can be associated with large scale population displacement. We have completed a thorough review of the literature on disaster population displacement. Research has been conducted on historic events to understand the types of negative impacts associated with population displacement and also the vulnerability of different groups to these impacts. We

  18. Hydrogeologic map of the Death Valley regional ground-water flow system, Nevada and California

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — This digital dataset represents the surface hydrogeology of an approximately 45,000 square-kilometer area of the Death Valley regional ground-water flow system...

  19. Hydrogeology, navrock, Published in 2009, 1:24000 (1in=2000ft) scale, Washington County.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This Hydrogeology dataset, published at 1:24000 (1in=2000ft) scale, was produced all or in part from Other information as of 2009. It is described as 'navrock'. Data...

  20. Hydrogeology, naquifer, Published in 2009, 1:24000 (1in=2000ft) scale, Washington County.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This Hydrogeology dataset, published at 1:24000 (1in=2000ft) scale, was produced all or in part from Other information as of 2009. It is described as 'naquifer'....

  1. Altitude of the top of the Upper Hell Creek hydrogeologic unit in the Williston structural basin

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — These data represent the altitude, in feet above North American Vertical Datum of 1988 (NAVD88), of the Upper Hell Creek hydrogeologic unit in the Williston...

  2. Thickness of the middle Fort Union hydrogeologic unit in the Powder River structural basin

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — These data represent the thickness, in feet, of the middle Fort Union hydrogeologic unit in the Powder River basin. The data are presented as ASCII text files that...

  3. A Surficial Hydrogeologic Framework for the Mid-Atlantic Coastal Plain.

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — The hydrogeologic framework was developed from a combination of the physiography and the predominant texture of surficial geologic units in the Mid-Atlantic Coastal...

  4. Hydrogeology, Kennedy-Jenks groundwater recharge report, Published in 2004, Washoe County.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This Hydrogeology dataset, was produced all or in part from Published Reports/Deeds information as of 2004. It is described as 'Kennedy-Jenks groundwater recharge...

  5. Thickness of the Upper Hell Creek hydrogeologic unit in the Powder River structural basin

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — These data represent the thickness, in feet, of the Upper Hell Creek hydrogeologic unit in the Powder River basin. The data are presented as ASCII text files that...

  6. Thickness of the middle Fort Union hydrogeologic unit in the Williston structural basin

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — These data represent the thickness, in feet, of the middle Fort Union hydrogeologic unit in the Williston structural basin. The data are presented as ASCII text...

  7. Altitude of the top of the middle Fort Union hydrogeologic unit in the Williston structural basin

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — These data represent the altitude, in feet above North American Vertical Datum of 1988 (NAVD88), of the middle Fort Union hydrogeologic unit in the Williston...

  8. Thickness of the Upper Hell Creek hydrogeologic unit in the Williston structural basin

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — These data represent the thickness, in feet, of the Upper Hell Creek hydrogeologic unit in the Williston structural basin. The data are presented as ASCII text...

  9. Research on security vulnerability of chip

    Science.gov (United States)

    Chen, Zhifeng; Li, Qingbao; Li, Zhou

    2013-03-01

    The 21st century is the information era. IC (Integrated Circuit) is the basis of the modern information industry. The security vulnerability or back door of IC is directly related to the entire information system security. From the perspective of information security, security vulnerability of chip is led out through the practical examples and then the importance of security vulnerability of chip is emphasized. By comparing the security vulnerability of chip with the software virus, the characteristics of the chip vulnerabilities are summed up. Moreover, this paper describes the security vulnerability models of different control logic chips, combinational and sequential logic chips models. Finally it puts forward two kinds of detecting methods of security vulnerability of chip against the two models.

  10. Vulnerability of families with children with intestinal stomas

    Directory of Open Access Journals (Sweden)

    Clara Ferraz Lazarini Zacarin

    2014-06-01

    Full Text Available Intestinal stomas cause transformations in the body and create specific and continuous needs for care that imply in hospitalization and surgeries. In this context, we applied the concept of family vulnerability in order to identify the vulnerability of the family living with a child who has intestinal stoma. It is a qualitative study which interviewed the mothers of children with this chronic condition. We used narrative analysis based on the concept of family vulnerability. The results display that the family has gone through previous noteworthy experiences associated with the child’s condition. The family cares for the child on their own and seeks ways to control the situation and regain autonomy, hoping for stoma reversal. Based on the concept of vulnerability, we observed that these families can be considered vulnerable, for they experience threats to their autonomy, but are moved by the hope of reversal and intestinal tract reconstruction. doi: 10.5216/ree.v16i2.26639.

  11. Betweenness as a Tool of Vulnerability Analysis of Power System

    Science.gov (United States)

    Rout, Gyanendra Kumar; Chowdhury, Tamalika; Chanda, Chandan Kumar

    2016-12-01

    Complex network theory finds its application in analysis of power grid as both share some common characteristics. By using this theory finding critical elements in power network can be achieved. As vulnerabilities of elements of the network decide the vulnerability of the total network, in this paper, vulnerability of each element is studied using two complex network models—betweenness centrality and extended betweenness. The betweenness centrality considers only topological structure of power system whereas extended betweenness is based on both topological and physical properties of the system. In the latter case, some of the electrical properties such as electrical distance, line flow limits, transmission capacities of lines and PTDF matrix are included. The standard IEEE 57 bus system has been studied based upon the above mentioned indices and following conclusions have been discussed.

  12. West Siberian basin hydrogeology - regional framework for contaminant migration from injected wastes

    Energy Technology Data Exchange (ETDEWEB)

    Foley, M.G.

    1994-05-01

    Nuclear fuel cycle activities of the former Soviet Union (FSU) have resulted in massive contamination of the environment in western Siberia. We are developing three-dimensional numerical models of the hydrogeology and potential contaminant migration in the West Siberian Basin. Our long-term goal at Pacific Northwest Laboratory is to help determine future environmental and human impacts given the releases that have occurred to date and the current waste management practices. In FY 1993, our objectives were to (1) refine and implement the hydrogeologic conceptual models of the regional hydrogeology of western Siberia developed in FY 1992 and develop the detailed, spatially registered digital geologic and hydrologic databases to test them, (2) calibrate the computer implementation of the conceptual models developed in FY 1992, and (3) develop general geologic and hydrologic information and preliminary hydrogeologic conceptual models relevant to the more detailed models of contaminated site hydrogeology. Calibration studies of the regional hydrogeologic computer model suggest that most precipitation entering the ground-water system moves in the near-surface part of the system and discharges to surface waters relatively near its point of infiltration. This means that wastes discharged to the surface and near-surface may not be isolated as well as previously thought, since the wastes may be carried to the surface by gradually rising ground waters.

  13. A hydrogeologic map of the Death Valley region, Nevada, and California, developed using GIS techniques

    Energy Technology Data Exchange (ETDEWEB)

    Faunt, C.C.; D`Agnese, F.A.; Turner, A.K.

    1997-12-31

    In support of Yucca Mountain site characterization studies, a hydrogeologic framework was developed, and a hydrogeologic map was constructed for the Death Valley region. The region, covering approximately 100,000 km{sup 2} along the Nevada-California border near Las Vegas, is characterized by isolated mountain ranges juxtaposed against broad, alluvium-filled valleys. Geologic conditions are typical of the Basin and Range Province; a variety of sedimentary and igneous intrusive and extrusive rocks have been subjected to both compressional and extensional deformation. The regional ground-water flow system can best be described as a series of connected intermontane basins in which ground-water flow occurs in basin-fill deposits, carbonate rocks, clastic rocks, and volcanic rocks. Previous investigations have developed more site-specific hydrogeologic relationships; however, few have described all the lithologies within the Death Valley regional ground-water flow system. Information required to characterize the hydrogeologic units in the region was obtained from regional geologic maps and reports. Map data were digitized from regional geologic maps and combined into a composite map using a geographic information system. This map was simplified to show 10 laterally extensive hydrogeologic units with distinct hydrologic properties. The hydraulic conductivity values for the hydrogeologic units range over 15 orders of magnitude due to the variability in burial depth and degree of fracturing.

  14. Hydrogeology of the gray limestone aquifer in southern Florida

    Science.gov (United States)

    Reese, Ronald S.; Cunningham, Kevin J.

    2000-01-01

    Results from 35 new test coreholes and aquifer-test, water-level, and water-quality data were combined with existing hydrogeologic data to define the extent, thickness, hydraulic properties, and degree of confinement of the gray limestone aquifer in southern Florida. This aquifer, previously known to be present only in southeastern Florida (Miami-Dade, Broward, and Palm Beach Counties) below, and to the west of, the Biscayne aquifer, extends over most of central-south Florida, including eastern and central Collier County and southern Hendry County; it is the same as the lower Tamiami aquifer to the north, and it becomes the water-table aquifer and the upper limestone part of the lower Tamiami aquifer to the west. The aquifer generally is composed of gray, shelly, lightly to moderately cemented limestone with abundant shell fragments or carbonate sand, abundant skeletal moldic porosity, and minor quartz sand. The gray limestone aquifer comprises the Ochopee Limestone of the Tamiami Formation, and, in some areas, the uppermost permeable part of an unnamed formation principally composed of quartz sand. Underlying the unnamed formation is the Peace River Formation of the upper Hawthorn Group, the top of which is the base of the surficial aquifer system. Overlying the aquifer and providing confinement in much of the area is the Pinecrest Sand Member of the Tamiami Formation. The thickness of the aquifer is comparatively uniform, generally ranging from 30 to 100 feet. The unnamed formation part of the aquifer is up to 20 feet thick. The Ochopee Limestone accumulated in a carbonate ramp depositional system and contains a heterozoan carbonate-particle association. The principal rock types of the aquifer are pelecypod lime rudstones and floatstones and permeable quartz sands and sandstones. The pore types are mainly intergrain and separate vug (skeletal-moldic) pore spaces. The rock fabric and associated primary and secondary pore spaces combine to form a dual diffuse

  15. Meteorological, hydrological and hydrogeological monitoring data and near-surface hydrogeological properties data from Laxemar-Simpevarp. Site descriptive modelling SDM-Site Laxemar

    Energy Technology Data Exchange (ETDEWEB)

    Werner, Kent (EmpTec, Taeby (Sweden)); Oehman, Johan (Golder Associates AB, Stockholm (Sweden)); Holgersson, Bjoern (SWECO VIAK, Stockholm (Sweden)); Roennback, Kristoffer (Aqualog AB, Goeteborg (Sweden)); Marelius, Fredrick (WSP Sverige, Stockholm (Sweden))

    2008-12-15

    This report presents and analyses meteorological, hydrological and hydrogeological time-series data and near-surface hydrogeological properties data from the Laxemar-Simpevarp area, available in SKB's Sicada database at time of the Laxemar 2.3 data freeze (Aug. 31, 2007). The meteorological data set includes data from two local stations, located on the island of Aespoe and at Plittorp, located further inland. In addition, the data evaluation uses a longer-term data set from 7 surrounding stations, operated by SMHI. As part of this study, a time series is constructed of the water content of snow. According to the data evaluation, the site-average annual precipitation and potential evapotranspiration can be estimated to be on the order of 600 and 535 mm, respectively. In particular, precipitation demonstrates a near-coastal gradient, with less precipitation at the coast compared to areas further inland. The surface-water level data set includes data from 4 lake-level gauging stations and 3 sea-level gauging stations. All lakes are located above sea level, including the near-coastal Lake Soeraa. Hence, no intrusion of sea water to lakes takes place. There is a strong co-variation among the monitored lake-water levels, typically with maxima during spring and minima during late summer and early autumn. Concerning the sea as a hydraulic boundary, the maximum and minimum sea levels (daily averages) during the site-investigation period were -0.52 and 0.71 metres above sea level, respectively, whereas the average sea level was 0.03 metres above sea level (RHB 70). The data set on stream discharge, surface-water temperature and electrical conductivity includes data from 9 discharge-gauging stations in 7 streams. Based on the discharge data, the site-average specific discharge for the years 2005-2007 can be estimated to 165 mm/y, which is within the interval of the estimated long-term average. Overall, discharge-data errors are likely to be small. The hydrogeological

  16. Wireless LAN Security Threats & Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Md. Waliullah

    2014-01-01

    Full Text Available Wireless LANs are everywhere these days from home to large enterprise corporate networks due to the ease of installation, employee convenience, avoiding wiring cost and constant mobility support. However, the greater availability of wireless LANs means increased danger from attacks and increased challenges to an organisation, IT staff and IT security professionals. This paper discusses the various security issues and vulnerabilities related to the IEEE 802.11 Wireless LAN encryption standard and common threats/attacks pertaining to the home and enterprise Wireless LAN system and provide overall guidelines and recommendation to the home users and organizations.

  17. Symbian `vulnerability' and Mobile Threats

    CERN Document Server

    Gharibi, Wajeb

    2012-01-01

    Modern technologies are becoming ever more integrated with each other. Mobile phones are becoming increasing intelligent, and handsets are growing ever more like computers in functionality. We are entering a new era - the age of smart houses, global advanced networks which encompass a wide range of devices, all of them exchanging data with each other. Such trends clearly open new horizons to malicious users, and the potential threats are self evident. In this paper, we study and discuss one of the most famous mobile operating systems 'Symbian'; its vulnerabilities and recommended protection technologies.

  18. [Neuroethics and Human Vulnerability in Philosophical Perspective].

    Science.gov (United States)

    Marcos, Alfredo

    2015-01-01

    This article tries to assess the potentials and limits of neuroethics. It argues that neuroscience and ethics should collaborate each other with mutual respect and preservation of their respective identities, scientific in the first case and philosophical in the second one ( neuroethics as cooperation). The text develops also a criticism in front of any attempt to replace the philosophical ethics by the neurosciences ( neuroethics as substitution). Consequently, the most appropriate ontological and anthropological foundations are explored to develop a cooperative neuroethics. These foundations refer to the Aristotelian hylomorphic conception of the substances. On such foundations it is possible to develop a collaborative neuroethics which includes two aspects: on the one hand, we have an ethics of neuroscience and, on the other one, a neuroscience of ethics. The first one shows us how to conduct neuroscience while preserving human dignity. The second one teaches us about the neurobiological basis of our moral agency. These bases enable our moral behavior without determining it. By studying them our vulnerability as moral agents emerges as evidence. This vulnerability, which is rooted in the very human nature, must be, as it is argued along the last pages of the text, recognized as well as mitigated.

  19. Evaluating operating system vulnerability to memory errors.

    Energy Technology Data Exchange (ETDEWEB)

    Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Mueller, Frank (North Carolina State University); Fiala, David (North Carolina State University); Brightwell, Ronald Brian

    2012-05-01

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  20. 基于运行可靠性模型的连锁故障模拟及薄弱环节分析%The Power System Cascading Outage Simulation and Vulnerability Analysis Based on Operational Reliability Model

    Institute of Scientific and Technical Information of China (English)

    程林; 刘满君; 易俊; 何剑; 贺庆

    2016-01-01

    提出一种基于运行可靠性模型的连锁故障模拟及系统薄弱环节分析方法。该方法结合影响连锁故障各个阶段的关键因素不同,将触发事件与后继发展事件独立,建立发现触发事件的初始故障概率模型,并重点分析后继发展事件的传播特性;其中,根据线路运行可靠性模型,考虑在连锁故障快速发展阶段系统潮流变化对线路停运的影响,从而发现后续发展事件以及连锁故障事件间的相关性;结合运行可靠性模型,搜索系统在不同初始故障下的连锁故障事件,并形成连锁故障事件集;基于连锁故障事件集分析系统薄弱环节及事件相关性,发现系统关键元件。结合算例,通过模拟系统在不同初始故障下的连锁故障事件并分析系统薄弱环节,可以提出相应的系统改造方案,预防连锁故障发生,并可以在事件发展过程中发现后继事件,以便阻止连锁事件进一步演化发展。%This paper proposed a power system cascading outage simulation and vulnerability analysis method based on an operational reliability model. This method firstly considered different factors in different cascading outage stages, and then classified outage events into initial outage and subsequent outage, an initial outage model was given and subsequent outage property was highlighted later. Based on the operational reliability model, impact of load level on transmission lines was taken into consideration in fast outage stage. This model could be used to analyze subsequent outages and interactions between outage events. Cascading outage events for different initial outages were simulated and vulnerability analysis was presented to locate critical component of power system. Case study results showed that this method could simulate cascading outages for different initial outages and find out vulnerable components of power system, some more system improvement measures

  1. GIS-based study on vulnerability to rainstorm inundation in Pudong of Shanghai%基于GIS的上海浦东暴雨内涝灾害脆弱性研究

    Institute of Scientific and Technical Information of China (English)

    尹占娥; 暴丽杰; 殷杰

    2011-01-01

    随着全球气候变化和城市化进程的加速发展,城市暴雨洪涝灾害的频度和强度不断加强.灾害脆弱性研究是当前灾害研究的热点,基于灾损率的脆弱性分析方法是当前灾害脆弱性研究的重要课题点与前沿.采用GIS和遥感技术,依据20年、50年、100年、200年、500年、1000年一遇的6个重现期情景,对上海浦东新区开展了基于灾损曲线的脆弱性研究.研究中修正了上海地区的径流模型,基于GIS栅格编制了不同重现期的淹没深度图,实地调查了研究区暴雨内涝灾害的灾损率数据,确定了研究区的脆弱性等级划分,并利用GIS编制了基于不同重现期情景的上海浦东脆弱性图.研究中提出的方法对于沿海城市开展暴雨内涝等自然灾害脆弱性研究具有借鉴意义,研究结果可供区域灾害风险评估和防灾减灾规划参考.%With global climate change and rapid urbanization process, rainstorm flood disaster has become major issues and severe challenges faced by human society and economic development. Vulnerability assessment is important basic content of risk assessment, which is a hot points research of international disaster prevention and mitigation. The authors utilized a revised SCS model to calculate heavy rain runoff by DEM and the depth of flood inundation for different return periods. Based on six return periods of 20, 50,100,200,500 and 1000 years ,we select Pudong New Area as case study and apply GIS and remote sensing technology to carry out hazards analysis and vulnerability analysis in this paper. Base on the grid, we re-classify and draw up the inundation depth maps for different return periods. The data on disaster loss rate of minstorm inundation in study area was surveied and the vulnerability classification for study area was carried out. The obtained results give a reference to assessment of regional disaster and planning of disaster prevention and reduction.

  2. Alligator Rivers Analogue project. Hydrogeological modelling. Final Report - Volume 6

    Energy Technology Data Exchange (ETDEWEB)

    Townley, L.R.; Trefry, M.G.; Barr, A.D. [CSIRO Div of Water Resources, PO Wembley, WA (Australia); Braumiller, S. [Univ of Arizona, Tucson, AZ (United States). Dept of Hydrology and Water Resources; Kawanishi, M. [Central Research Institute of Electric Power Industry, Abiko-Shi, Chiba-Ken (Japan)] [and others

    1992-12-31

    This volume describes hydrogeological modelling carried out as part of the Alligator Rivers Analogue Project. Hydrogeology has played a key integrating role in the Project, largely because water movement is believed to have controlled the evolution of the Koongarra uranium Orebody and therefore affects field observations of all types at all scales. Aquifer testing described uses the concept of transmissivity in its interpretation of aquifer response to pumping. The concept of an aquifer, a layer transmitting significant quantities of water in a mainly horizontal direction, seems hard to accept in an environment as heterogeneous as that at Koongarra. But modelling of aquifers both in one dimension and two dimensionally in plan has contributed significantly to our understanding of the site. A one-dimensional model with three layers (often described as a quasi two dimensional model) was applied to flow between the Fault and Koongarra Creek. Being a transient model, this model was able to show that reverse flows can indeed occur back towards the Fault, but only if there is distributed recharge over the orebody as well as a mechanism for the Fault, or a region near the Fault, to remove water from the simulated cross-section. The model also showed clearly that the response of the three-layered system, consisting of a highly weathered zone, a fractured transmissive zone and a less conductive lower schist zone, is governed mainly by the transmissivity and storage coefficient of the middle layer. The storage coefficient of the higher layer has little effect. A two-dimensional model in plan used a description of anisotropy to show that reverse flows can also occur even without a conducting Fault. Modelling of a three-dimensional region using discrete fractures showed that it is certainly possible to simulate systems like that observed at Koongarra, but that large amounts of data are probably needed to obtain realistic descriptions of the fracture networks. Inverse modelling

  3. Hydrogeologic framework of fractured sedimentary rock, Newark Basin, New Jersey

    Science.gov (United States)

    Lacombe, Pierre J.; Burton, William C.

    2010-01-01

    The hydrogeologic framework of fractured sedimentary bedrock at the former Naval Air Warfare Center (NAWC), Trenton, New Jersey, a trichloroethylene (TCE)-contaminated site in the Newark Basin, is developed using an understanding of the geologic history of the strata, gamma-ray logs, and rock cores. NAWC is the newest field research site established as part of the U.S. Geological Survey Toxic Substances Hydrology Program, Department of Defense (DoD) Strategic Environmental Research and Development Program, and DoD Environmental Security Technology Certification Program to investigate contaminant remediation in fractured rock. Sedimentary bedrock at the NAWC research site comprises the Skunk Hollow, Byram, and Ewing Creek Members of the Lockatong Formation and Raven Rock Member of the Stockton Formation. Muds of the Lockatong Formation that were deposited in Van Houten cycles during the Triassic have lithified to form the bedrock that is typical of much of the Newark Basin. Four lithotypes formed from the sediments include black, carbon-rich laminated mudstone, dark-gray laminated mudstone, light-gray massive mudstone, and red massive mudstone. Diagenesis, tectonic compression, off-loading, and weathering have altered the rocks to give some strata greater hydraulic conductivity than other strata. Each stratum in the Lockatong Formation is 0.3 to 8 m thick, strikes N65 degrees E, and dips 25 degrees to 70 degrees NW. The black, carbon-rich laminated mudstone tends to fracture easily, has a relatively high hydraulic conductivity and is associated with high natural gamma-ray count rates. The dark-gray laminated mudstone is less fractured and has a lower hydraulic conductivity than the black carbon-rich laminated mudstone. The light-gray and the red massive mudstones are highly indurated and tend to have the least fractures and a low hydraulic conductivity. The differences in gamma-ray count rates for different mudstones allow gamma-ray logs to be used to correlate and

  4. Feedbacks Between Numerical and Analytical Models in Hydrogeology

    Science.gov (United States)

    Zlotnik, V. A.; Cardenas, M. B.; Toundykov, D.; Cohn, S.

    2012-12-01

    Hydrogeology is a relatively young discipline which combines elements of Earth science and engineering. Mature fundamental disciplines (e.g., physics, chemistry, fluid mechanics) have centuries-long history of mathematical modeling even prior to discovery of Darcy's law. Thus, in hydrogeology, relatively few classic analytical models (such those by Theis, Polubarinova-Kochina, Philip, Toth, Henry, Dagan, Neuman) were developed by the early 1970's. The advent of computers and practical demands refocused mathematical models towards numerical techniques. With more diverse but less mathematically-oriented training, most hydrogeologists shifted from analytical methods to use of standardized computational software. Spatial variability in internal properties and external boundary conditions and geometry, and the added complexity of chemical and biological processes will remain major challenges for analytical modeling. Possibly, analytical techniques will play a subordinate role to numerical approaches in many applications. On the other hand, the rise of analytical element modeling of groundwater flow is a strong alternative to numerical models when data demand and computational efficiency is considered. The hallmark of analytical models - transparency and accuracy - will remain indispensable for scientific exploration of complex phenomena and for benchmarking numerical models. Therefore, there will always be feedbacks and complementarities between numerical and analytical techniques, as well as a certain ideological schism among various views to modeling. We illustrate the idea of feedbacks by reviewing evolution of Joszef Toth's analytical model of gravity driven flow systems. Toth's (1963) approach was to reduce the flow domain to a rectangle which allowed for closed-form solution of the governing equations. Succeeding numerical finite-element models by Freeze and Witherspoon (1966-1968) explored the effects of geometry and heterogeneity on regional groundwater flow

  5. Hydrogeological and geochemical modeling of hydrothermal fluids circulation in active ultramafic-hosted systems under CAST3M

    Science.gov (United States)

    Perez, F.; Mugler, C.; Jean-Baptiste, P.; Charlou, J. L.; Donval, J.; Vidal, O.; Marcailloux, C.; Munoz, M.

    2010-12-01

    Hydrothermal circulation at mid-ocean ridges is a fundamental process that impacts the transfer of energy and water from the interior of the Earth to the Crust, Hydrosphere and biosphere. Along the Mid-Atlantic Ridge (MAR), at precisely located ultramafic-hosted systems, important fluxes of heat, hydrogen and Iron are observed (Charlou et al., 2010 AGU Monograph series). It is now demonstrated that high and low-temperature hydrothermal activity and mantle degassing are indicators of ongoing serpentinization process. For a real understanding of this process and to estimate heat and hydrogen fluxes, numerical modeling leant on field data and laboratory experiments can yield results of interest. We thus developed a thermo-hydrogeological numerical model using a Finite Volume method to simulate heat driven fluid flows in geological layers, encoded under CAST3M, and presented here. For homogeneous medias, we successfully obtained exiting fluid temperatures that natural hydrothermal fluids usually reach. Considering laboratory experiments, we coupled, under CAST3M, our thermo-hydrogeological model to a geochemical model of serpentinization reaction. This last model is based on a reaction front velocity model calibrated by laboratory experiments. Primary results are presented here.

  6. Hydrogeological and geophysical study for deeper groundwater resource in quartzitic hard rock ridge region from 2D resistivity data

    Indian Academy of Sciences (India)

    Dewashish Kumar; V Ananda Rao; V S Sarma

    2014-04-01

    Electrical resistivity method is a versatile and economical technique for groundwater prospecting in different geological settings due to wide spectrum of resistivity compared to other geophysical parameters. Exploration and exploitation of groundwater, a vital and precious resource, is a challenging task in hard rock, which exhibits inherent heterogeneity. In the present study, two-dimensional Electrical Resistivity Tomography (2D-ERT) technique using two different arrays, viz., pole–dipole and pole–pole, were deployed to look into high signal strength data in a tectonically disturbed hard rock ridge region for groundwater. Four selected sites were investigated. 2D subsurface resistivity tomography data were collected using Syscal Pro Switch-10 channel system and covered a 2 km long profile in a tough terrain. The hydrogeological interpretation based on resistivity models reveal the water horizons trap within the clayey sand and weathered/fractured quartzite formations. Aquifer resistivity lies between ∼3–35 and 100–200 m. The results of the resistivity models decipher potential aquifer lying between 40 and 88 m depth, nevertheless, it corroborates with the static water level measurements in the area of study. The advantage of using pole–pole in conjunction with the pole–dipole array is well appreciated and proved worth which gives clear insight of the aquifer extent, variability and their dimension from shallow to deeper strata from the hydrogeological perspective in the present geological context.

  7. Vulnerabilities of Electronics Communication: solution mechanism through script

    Directory of Open Access Journals (Sweden)

    Arun Kumar Singh

    2011-05-01

    Full Text Available World trade and related business ventures are more or less dependent on communication. Information content of communication is to be protected as mis-communication or incorrect information may ruin any business prospect. Communication using Internet or any other electronic communication is having various kinds of threat and vulnerability. Information should be packaged for communication in such a way that these vulnerabilities are reduced to a minimum. With the increased use of networked computers for critical systems, network security is attracting increasing attention. This paper focuses on the most common attacks to paralyze computer and network resources, in order to stop essential communication services. The paper provides methods, ways and means for obtaining network traces of malicious traffic and strategies for providing countermeasures. Analysis of packet captured in a network traffic is a common method of deletion of countermeasure of communication based vulnerabilities. Analysis of http based network traffic allows to intercept sensitive information such as the user's name and password. The ideal approach for secured communication is to remove all security flaws from individual hosts. A tradeoff between overheads (computational and business and efficiency of securing mechanism of communication may be achieved by using the script based solutions. This paper presents the communication based vulnerabilities and their script based solution.

  8. Seismic Vulnerability Analysis of Multiage Steel Frame Structures Based on Time-varying Seismic Damage Model%基于时变地震损伤模型的多龄期钢框架结构易损性分析

    Institute of Scientific and Technical Information of China (English)

    王晓飞; 王鹏飞; 贾虎; 郑伟花; 田进

    2016-01-01

    In recent years,because of the frequency of earthquakes,steel has been widely used in the construction of civilian residential structures owing to its excellent seismic performance.How-ever,considering that steel structures are widely used,there is a durability problem because of steel corrosion,which has become increasingly serious.Corrosion weakens steel member cross-sec-tions and reduces steel's mechanical properties,ultimately affecting the seismic performance of steel structures.Seismic vulnerability analysis can be used to predict the damage probability at dif-ferent levels of a structure under earthquakes of different magnitudes.As such,it has an important application value in seismic design,reinforcement,and maintenance decisions regarding structures. Seismic vulnerability research methods include empirical,testing,and analytical methods or a combination of two of these methods.For the most seismic hazard data,empirical vulnerability is the most accurate method,but not all areas experience an adequate number of earthquakes for re-searchers to obtain sufficient data to evaluate the structural damage probability at all levels.Ex-perimental study methods of vulnerability analysis are also credible,but their costs are relatively high.Compared with the abovementioned two methods,an advantage of the analytical method of determining vulnerability is that it is a rapid and low-cost approach.The main factors that affect the seismic vulnerability of building structures are structural type,architectural age (including specifications and construction period of building design),intensity of fortification,site class,and number of layers.While research on the seismic vulnerability of various structures is quite ma-ture,there has been scant consideration of the impact of service age on the seismic vulnerability of building structures or fragility curves of multiage structures.Based on the time-varying seismic damage model,we propose the use of an analysis method that

  9. Dynamics of immune system vulnerabilities

    Science.gov (United States)

    Stromberg, Sean P.

    The adaptive immune system can be viewed as a complex system, which adapts, over time, to reflect the history of infections experienced by the organism. Understanding its operation requires viewing it in terms of tradeoffs under constraints and evolutionary history. It typically displays "robust, yet fragile" behavior, meaning common tasks are robust to small changes but novel threats or changes in environment can have dire consequences. In this dissertation we use mechanistic models to study several biological processes: the immune response, the homeostasis of cells in the lymphatic system, and the process that normally prevents autoreactive cells from entering the lymphatic system. Using these models we then study the effects of these processes interacting. We show that the mechanisms that regulate the numbers of cells in the immune system, in conjunction with the immune response, can act to suppress autoreactive cells from proliferating, thus showing quantitatively how pathogenic infections can suppress autoimmune disease. We also show that over long periods of time this same effect can thin the repertoire of cells that defend against novel threats, leading to an age correlated vulnerability. This vulnerability is shown to be a consequence of system dynamics, not due to degradation of immune system components with age. Finally, modeling a specific tolerance mechanism that normally prevents autoimmune disease, in conjunction with models of the immune response and homeostasis we look at the consequences of the immune system mistakenly incorporating pathogenic molecules into its tolerizing mechanisms. The signature of this dynamic matches closely that of the dengue virus system.

  10. Scenarios for coastal vulnerability assessment

    Science.gov (United States)

    Nicholls, Robert J.; Woodroffe, Colin D.; Burkett, Virginia; Hay, John; Wong, Poh Poh; Nurse, Leonard; Wolanski, Eric; McLusky, Donald S.

    2011-01-01

    Coastal vulnerability assessments tend to focus mainly on climate change and especially on sea-level rise. Assessment of the influence of nonclimatic environmental change or socioeconomic change is less well developed and these drivers are often completely ignored. Given that the most profound coastal changes of the twentieth century due to nonclimate drivers are likely to continue through the twenty-first century, this is a major omission. It may result in not only overstating the importance of climate change but also overlooking significant interactions of climate change and other drivers. To support the development of policies relating to climate change and coastal management, integrated assessments of climatic change in coastal areas are required, including the effects of all the relevant drivers. This chapter explores the development of scenarios (or "plausible futures") of relevant climate and nonclimate drivers that can be used for coastal analysis, with an emphasis on the nonclimate drivers. It shows the importance of analyzing the impacts of climate change and sea-level rise in a broader context of coastal change and all its drivers. This will improve the analysis of impacts, key vulnerabilities, and adaptation needs and, hence, inform climate and coastal policy. Stakeholder engagement is important in the development of scenarios, and the underlying assumptions need to be explicit, transparent, and open to scientific debate concerning their uncertainties/realism and likelihood.

  11. Cascade vulnerability for risk analysis of water infrastructure.

    Science.gov (United States)

    Sitzenfrei, R; Mair, M; Möderl, M; Rauch, W

    2011-01-01

    One of the major tasks in urban water management is failure-free operation for at least most of the time. Accordingly, the reliability of the network systems in urban water management has a crucial role. The failure of a component in these systems impacts potable water distribution and urban drainage. Therefore, water distribution and urban drainage systems are categorized as critical infrastructure. Vulnerability is the degree to which a system is likely to experience harm induced by perturbation or stress. However, for risk assessment, we usually assume that events and failures are singular and independent, i.e. several simultaneous events and cascading events are unconsidered. Although failures can be causally linked, a simultaneous consideration in risk analysis is hardly considered. To close this gap, this work introduces the term cascade vulnerability for water infrastructure. Cascade vulnerability accounts for cascading and simultaneous events. Following this definition, cascade risk maps are a merger of hazard and cascade vulnerability maps. In this work cascade vulnerability maps for water distribution systems and urban drainage systems based on the 'Achilles-Approach' are introduced and discussed. It is shown, that neglecting cascading effects results in significant underestimation of risk scenarios.

  12. Deriving vulnerability indicators for crop production regions in Indonesia

    Science.gov (United States)

    Perdinan; Atmaja, Tri; Sehabuddin, Ujang; Sugiarto, Yon; Febrianti, Lina; Farysca Adi, Ryco

    2017-01-01

    Food supply is considered as one of the most vulnerable to the effects of climate change. Higher temperature and changes in rainfall patterns and intensity may adversely impact crop production, which will eventually affect the food supply. Consequently, adaptation strategies should be devised to minimize the potential adverse impacts and maximize its potential benefits. The adaptation strategies should be devised by considering factors contributed to causing vulnerability following the concept of food supply chain, starting from production to consumption. This study focuses on identifying the contributed factors to vulnerability of crop production regions in Indonesia. The contributed factors were identified by defining indicators for each component of the food supply chain using an example of crop production centers in Indonesia, the West Java Province. The identification considers existing issues of the food supply chain, covering aspects of production, post-harvest and storage, distribution, and consumption, based on the field surveys conducted in Indramayu district of the West Java, the main grower of paddy production, and Garut district of the West Java, the main grower of corn production. The selection of the vulnerability indicators was also considered the data availability for the study area. The analysis proposed a list of indicators classified into production, post-harvest and storage, distribution and consumption that are proposed to assess the regional vulnerability of crop production regions in Indonesia. This result is expected to contribute in understanding the process of devising climate change adaptation intended for enhancing food supply resilience to climate change.

  13. Flood vulnerability of critical infrastructure in Cork, Ireland

    Directory of Open Access Journals (Sweden)

    de Bruijn Karin M.

    2016-01-01

    Full Text Available Recent flood events in Ireland and particularly in County Cork have caused significant disruption to health service provisions, interruption of water and power supplies, and damage to roads and other transportation infrastructure, affecting the lives of hundreds of thousands of people over a prolonged period of weeks. These events clearly reveal- the vulnerability of the critical infrastructure to flooding and the dependence of society on critical infrastructure. In order to reduce the flood vulnerability and increase the resilience of the critical infrastructure networks in the future, detailed evidence-based analysis and assessment is essential. To this end a case study has been carried out on Cork City which analyses this vulnerability as it was in 2009, and as it is currently, and identifies adaptation options to reduce the future vulnerability of critical infrastructure to flooding and to build a more resilient society. This paper describes the storyline approach and CIrcle tool and their application to Cork City which focused on the analysis of the flood vulnerability of critical infrastructure and the impacts of failure of the infrastructure for other critical functions and on society.

  14. Hydrogeologic Setting and Ground-Water Flow in the Leetown Area, West Virginia

    Science.gov (United States)

    Kozar, Mark D.; Weary, David J.; Paybins, Katherine S.; Pierce, Herbert A.

    2007-01-01

    The Leetown Science Center is a research facility operated by the U.S. Geological Survey that occupies approximately 455-acres near Kearneysville, Jefferson County, West Virginia. Aquatic and fish research conducted at the Center requires adequate supplies of high-quality, cold ground water. Three large springs and three production wells currently (in 2006) supply water to the Center. The recent construction of a second research facility (National Center for Cool and Cold Water Aquaculture) operated by the U.S. Department of Agriculture and co-located on Center property has placed additional demands on available water resources in the area. A three-dimensional steady-state finite-difference ground-water flow model was developed to simulate ground-water flow in the Leetown area and was used to assess the availability of ground water to sustain current and anticipated future demands. The model also was developed to test a conceptual model of ground-water flow in the complex karst aquifer system in the Leetown area. Due to the complexity of the karst aquifer system, a multidisciplinary research study was required to define the hydrogeologic setting. Geologic mapping, surface- and borehole-geophysical surveys, stream base-flow surveys, and aquifer tests were conducted to provide the hydrogeologic data necessary to develop and calibrate the model. It would not have been possible to develop a numerical model of the study area without the intensive data collection and methods developments components of the larger, more comprehensive hydrogeologic investigation. Results of geologic mapping and surface-geophysical surveys verified the presence of several prominent thrust faults and identified additional faults and other complex geologic structures (including overturned anticlines and synclines) in the area. These geologic structures are known to control ground-water flow in the region. Results of this study indicate that cross-strike faults and fracture zones are major

  15. Groundwater development effects on different scale hydrogeological systems using head, hydrochemical and isotopic data and implications for water resources management: The Selva basin (NE Spain)

    Science.gov (United States)

    Folch, A.; Menció, A.; Puig, R.; Soler, A.; Mas-Pla, J.

    2011-06-01

    SummaryHydrogeological resources in regional, large-scale groundwater systems are conditioned by their specific geological setting, which defines their capacity to supply human demand and their potential to recover from human-induced stress factors such as water withdrawal. In this paper, the hydrogeology of a range-and-basin hydrogeological system is described, based on potentiometric, hydrochemical and isotopic data, in order to fulfill a twofold objective: to characterize the alteration brought about in the hydrogeological system by intensive groundwater withdrawal, where tectonic elements such as fault zones play a significant role in the flow behaviour, and to define groundwater hydrodynamics under current human pressures as a necessary step to achieve appropriate groundwater management. Hydraulic head data indicate the relationships between geological formations in the range areas and the sedimentary infill of the basin. In this set-up, fault zones and a fracture network have a direct effect on the recharge, and allow upward vertical flow from the basement to the sedimentary aquifers. Hydrochemical and isotopic data support this observation. The use of fluoride and nitrate as tracers for the contribution of deep and shallow flow systems provides a detailed portrait of the effects of pumping on the flow path distribution. Isotopic data depict seasonal trends in the water captured by wells. In this connection, we can differentiate between two distinct flow systems: a regional, large-scale, longer residence time system, originating in the surrounding ranges, and a local flow system constituted by infiltration in the lower areas of the basin. The two systems, with specific water qualities, contribute differently to the resources that are withdrawn, and their specific contributions, in the frame of the basin water budget, determine the potential for present sustainable water exploitation.

  16. Watch what I do, not what I say I do: Computer-based avatars to assess behavioral inhibition, a vulnerability factor for anxiety disorders.

    Science.gov (United States)

    Myers, Catherine E; Kostek, John A; Ekeh, Barbara; Sanchez, Rosanna; Ebanks-Williams, Yasheca; Krusznis, Ann L; Weinflash, Noah; Servatius, Richard J

    2016-02-01

    Behavioral inhibition (BI), a tendency to withdraw from or avoid novel social and non-social situations, is a personality trait which can confer risk for anxiety disorders. Like many personality traits, BI is often assessed via self-report questionnaires where respondents rate themselves for frequency of certain behaviors or feelings. However, questionnaires have inherent limitations, particularly in psychiatric populations where there may be unawareness of deficit. A viable alternative may be virtual environments, in which the participant guides an on-screen "avatar" through a series of onscreen events meant to simulate real-world situations. Here, we report on initial development of such an assessment tool, involving several onscreen scenarios with choice points where the participant can select from response options corresponding to inhibited or uninhibited behaviors. In two experiments involving over 300 college students, scores on the computer-based task were strongly correlated with BI scores attained through self-report questionnaire (r>.780, p<.001); this relationship held regardless of participant gender and experience with computer games. The results suggest that virtual environments may hold promise as alternative formats for assessment of personality traits in populations unsuited to traditional paper-and-pencil questionnaire formats due to psychopathology, limited attention span, or poor vocabulary and/or literacy skills.

  17. Assessment of goods and services, vulnerability, and conservation status of European seabed biotopes: a stepping stone towards ecosystem-based marine spatial management

    Directory of Open Access Journals (Sweden)

    M. SALOMIDI

    2012-12-01

    Full Text Available The goal of ecosystem-based marine spatial management is to maintain marine ecosystems in a healthy, productive and resilient condition; hence, they can sustainably provide the needed goods and services for human welfare. However, the increasing pressures upon the marine realm threaten marine ecosystems, especially seabed biotopes, and thus a well-planned approach of managing use of marine space is essential to achieve sustainability. The relative value of seabed biotopes, evaluated on the basis of goods and services, is an important starting point for the spatial management of marine areas. Herein, 56 types of European seabed biotopes and their related goods, services, sensitivity issues, and conservation status were compiled, the latter referring to management and protection tools which currently apply for these biotopes at European or international level. Fishing activities, especially by benthic trawls, and marine pollution are the main threats to European seabed biotopes. Increased seawater turbidity, dredged sediment disposal, coastal constructions, biological invasions, mining, extraction of raw materials, shipping-related activities, tourism, hydrocarbon exploration, and even some practices of scientific research, also exert substantial pressure. Although some first steps have been taken to protect the European sea beds through international agreements and European and national legislation, a finer scale of classification and assessment of marine biotopes is considered crucial in shaping sound priorities and management guidelines towards the effective conservation and sustainability of European marine resources.

  18. Web Application Scanning and Identification of Vulnerabilities for Different Attacks

    Directory of Open Access Journals (Sweden)

    Haridas V.Kanure,

    2014-05-01

    Full Text Available Now days there are lots of websites present in internet. And providing different services to the client is not only important task for website owner but also protecting their website from different attacks. Now days Identification of vulnerabilities in web application is becoming serious issue. Protecting website by identifying vulnerabilities and taking important attack prevention steps is very much important task.Different vulnerabilities identification is based on different test cases which we have and which we are going to build by use of this tool. Those test cases come from combination of some effective code. SQL injection test case can work with effective database query. And Cross site scripting can works with some java script code or other scripting language code etc.

  19. Vulnerability Resilience in the Major Watersheds of the Korean Peninsula

    Directory of Open Access Journals (Sweden)

    Yong Jung

    2014-01-01

    Full Text Available Water resources management requires policy enforcement in a changing environment. Climate change must be considered in major watershed river restorations in Korea. The aim of river restorations is to provide better water resource control - now and in the future. To aid in policy making in the government sector, ¡§vulnerability-resilience indexes¡¨ (VRIs with a Delphi survey method have been adopted to provide a possible reference. The Delphi survey offers prioritized vulnerability proxy variables based on expert opinions regarding the changing environment in terms of climate change and river restorations. The VRIs of watersheds were improved after river restorations, with the exception of some locations. However, when climate change was taken into consideration in the analysis of conditions after the restorations were completed, the results showed that governments need to provide better mitigation strategies to increase vulnerability resilience in the face of climate change.

  20. Vulnerability Analysis and Evaluation of Urban Road System in Tianjin

    Science.gov (United States)

    Liu, Y. Q.; Wu, X.

    In recent years, with the development of economy, the road construction of our country has entered into a period of rapid growth. The road transportation network has been expanding and the risk of disasters is increasing. In this paper we study the vulnerability of urban road system in Tianjin. After analyzed many risk factors of the urban road system security, including road construction, road traffic and the natural environment, we proposed an evaluation index of vulnerability of urban road system and established the corresponding evaluation index system. Based on the results of analysis and comprehensive evaluation, appropriate improvement measures and suggestions which may reduce the vulnerability of the road system and improve the safety and reliability of the road system are proposed.

  1. Reducing US oil vulnerability: Energy policy for the 1980's

    Science.gov (United States)

    1980-11-01

    Current Federal energy policies and programs are asked in light of recent events and in light of what are believed to be the most reliable available projections of the future. Additional steps are outlined that could reduce our vulnerability to an oil import disruption during the next decade. Specifically, the study seeks to answer three questions: as a base case, what levels of US energy consumption, production, and imports might we anticipate for 1985 and 1990 under existing statutes, policies, and programs; considering both our own and our allies dependence on oil imports, how vulnerable does this leave the United States to foreign supply disruptions; considering the likely effects of government policies and programs which already exist to reduce our vulnerability (through reduction of US oil imports or by any other means), are there additional initiatives that could be undertaken to give us greater protection - especially between now and 1990.

  2. Power Transmission System Vulnerability Assessment Using Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    E. Karimi

    2012-11-01

    Full Text Available Recent blackouts in power systems have shown the necessity of vulnerability assessment. Among all factors, transmission system components have a more important role. Power system vulnerability assessment could capture cascading outages which result in large blackouts and is an effective tool for power system engineers for defining power system bottlenecks and weak points. In this paper a new method based on fault chains concept is developed which uses new measures. Genetic algorithm with an effective structure is used for finding vulnerable branches in a practical power transmission system. Analytic hierarchy process is a technique used to determine the weighting factors in fitness function of genetic algorithm. Finally, the numerical results for Isfahan Regional Electric Company are presented which verifies the effectiveness and precision of the proposed method according to the practical expriments.

  3. Assessment of sexual risk behaviors and perception of vulnerability to sexually transmitted diseases/acquired immunodeficiency syndrome in women, 1999–2012: a population based survey in a medium-sized Brazilian city

    Directory of Open Access Journals (Sweden)

    Marilia Arndt Mesenburg

    2014-08-01

    Full Text Available Sexual behavior is a key factor for susceptibility to sexually transmitted diseases. An evaluation of the sexual behavior of women at reproductive age was conducted in 1999. A replication of this study aims to evaluate the current situation and identify changes in sexual behavior, 13 years later. This is a population-based cross-sectional study, conducted with 1071 women in Pelotas, Brazil. Compared to the 1999 study, a 14% increase in early sexual debut and an 8% decrease in the non-use of condoms were observed in 2012. The proportion of women who reported anal sex doubled between these periods. There was no trend of increase or decrease in the prevalence of behaviors with distinct patterns being observed for each of them. Reduction of non-use of condoms may be an indicator of the effectiveness of campaigns to promote safe sex. However, the increased prevalence of early sexual debut and anal sex indicates the need for campaigns to continue and to expand their focus, especially among vulnerable groups.

  4. Assessment of sexual risk behaviors and perception of vulnerability to sexually transmitted diseases/acquired immunodeficiency syndrome in women, 1999-2012: a population based survey in a medium-sized Brazilian city.

    Science.gov (United States)

    Mesenburg, Marilia Arndt; Muniz, Ludmila Correa; Silveira, Mariângela Freitas

    2014-01-01

    Sexual behavior is a key factor for susceptibility to sexually transmitted diseases. An evaluation of the sexual behavior of women at reproductive age was conducted in 1999. A replication of this study aims to evaluate the current situation and identify changes in sexual behavior, 13 years later. This is a population-based cross-sectional study, conducted with 1071 women in Pelotas, Brazil. Compared to the 1999 study, a 14% increase in early sexual debut and an 8% decrease in the non-use of condoms were observed in 2012. The proportion of women who reported anal sex doubled between these periods. There was no trend of increase or decrease in the prevalence of behaviors with distinct patterns being observed for each of them. Reduction of non-use of condoms may be an indicator of the effectiveness of campaigns to promote safe sex. However, the increased prevalence of early sexual debut and anal sex indicates the need for campaigns to continue and to expand their focus, especially among vulnerable groups.

  5. Hydrogeology of the Clifton Park area, Saratoga County, New York

    Science.gov (United States)

    Reynolds, Richard J.

    1985-01-01

    The hydrogeology of the 75-square mile Clifton Park suburban area near Albany, N.Y., is presented in six maps at 1:24,000 scale. The maps show: (1) location of wells and test holes; (2) bedrock topography; (3) surficial geology and geologic sections; (4) saturated thickness of the confined aquifer; (5) generalized soil permeability; and (6) land use. The aquifers in the Clifton Park area serve approximately 22,000 people through 32 public distribution systems. Average daily pumpage from these systems is approximately 1.85 million gallons per day. The most productive aquifer is the Colonie Channel aquifer, a confined, buried bedrock channel aquifer of glacial material from which wells may yield more than 500 gallons per minute. A water-table aquifer of fine sand is present over most of the area and is separated from the confined aquifer by a thick sequence of lacustrine silt and clay. Recharge to the confined aquifer occurs primarily where kame-delta deposits that are exposed at land surface are hydraulically connected to the buried aquifer. Saturated thickness of the confined aquifer varies from less than 5 feet to approximately 70 feet. In recharge areas, where the aquifer is locally under water-table conditions, saturated thickness may exceed 100 feet. Pumping interference between wells tapping the confined aquifer has been observed over distances of 3/4 mile. (USGS)

  6. Hydrogeology of the Krafla geothermal system, northeast Iceland

    DEFF Research Database (Denmark)

    Pope, Emily Catherine; Bird, D. K.; Arnórsson, S.

    2016-01-01

    The Krafla geothermal system is located in Iceland's northeastern neovolcanic zone, within the Krafla central volcanic complex. Geothermal fluids are superheated steam closest to the magma heat source, two-phase at higher depths, and sub-boiling at the shallowest depths. Hydrogen isotope ratios o...... the benefits of combining phase segregation effects in two-phase systems during analysis of wellhead fluid data with stable isotope values of hydrous alteration minerals when evaluating the complex hydrogeology of volcano-hosted geothermal systems.......The Krafla geothermal system is located in Iceland's northeastern neovolcanic zone, within the Krafla central volcanic complex. Geothermal fluids are superheated steam closest to the magma heat source, two-phase at higher depths, and sub-boiling at the shallowest depths. Hydrogen isotope ratios...... towards the southeast, up to 5.4 wt% (~57% by volume). Hydrothermal epidote sampled from 900 to 2500 m depth has δD values from -127 to -108‰, and δ18O from -13.0 to -9.6‰. Fluids in equilibrium with epidote have isotope compositions similar to those calculated for the vapor phase of two-phase aquifer...

  7. The deep hydrogeologic flow system underlying the Oak Ridge Reservation

    Energy Technology Data Exchange (ETDEWEB)

    Nativ, R. [Hebrew Univ., Jerusalem (IL); Hunley, A.E. [Oak Ridge National Lab., TN (United States)

    1993-07-01

    The deep hydrogeologic system underlying the Oak Ridge Reservation contains some areas contaminated with radionuclides, heavy metals, nitrates, and organic compounds. The groundwater at that depth is saline and has previously been considered stagnant. On the basis of existing and newly collected data, the nature of flow of the saline groundwater and its potential discharge into shallow, freshwater systems was assessed. Data used for this purpose included (1) spatial and temporal pressures and hydraulic heads measured in the deep system, (2) hydraulic parameters of the formations in question, (3) spatial temperature variations, and (4) spatial and temporal chemical and isotopic composition of the saline groundwater. In addition, chemical analyses of brine in adjacent areas in Tennessee, Kentucky, Ohio, Pennsylvania, and West Virginia were compared with the deep water underlying the reservation to help assess the origin of the brine. Preliminary conclusions suggest that the saline water contained at depth is o