WorldWideScience

Sample records for based hydrogeological vulnerability

  1. Index-based groundwater vulnerability mapping models using hydrogeological settings: A critical evaluation

    International Nuclear Information System (INIS)

    Groundwater vulnerability maps are useful for decision making in land use planning and water resource management. This paper reviews the various groundwater vulnerability assessment models developed across the world. Each model has been evaluated in terms of its pros and cons and the environmental conditions of its application. The paper further discusses the validation techniques used for the generated vulnerability maps by various models. Implicit challenges associated with the development of the groundwater vulnerability assessment models have also been identified with scientific considerations to the parameter relations and their selections. - Highlights: • Various index-based groundwater vulnerability assessment models have been discussed. • A comparative analysis of the models and its applicability in different hydrogeological settings has been discussed. • Research problems of underlying vulnerability assessment models are also reported in this review paper

  2. Index-based groundwater vulnerability mapping models using hydrogeological settings: A critical evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Kumar, Prashant, E-mail: prashantkumar@csio.res.in [CSIR-Central Scientific Instruments Organisation, Chandigarh 160030 (India); Academy of Scientific and Innovative Research—CSIO, Chandigarh 160030 (India); Bansod, Baban K.S.; Debnath, Sanjit K. [CSIR-Central Scientific Instruments Organisation, Chandigarh 160030 (India); Academy of Scientific and Innovative Research—CSIO, Chandigarh 160030 (India); Thakur, Praveen Kumar [Indian Institute of Remote Sensing (ISRO), Dehradun 248001 (India); Ghanshyam, C. [CSIR-Central Scientific Instruments Organisation, Chandigarh 160030 (India); Academy of Scientific and Innovative Research—CSIO, Chandigarh 160030 (India)

    2015-02-15

    Groundwater vulnerability maps are useful for decision making in land use planning and water resource management. This paper reviews the various groundwater vulnerability assessment models developed across the world. Each model has been evaluated in terms of its pros and cons and the environmental conditions of its application. The paper further discusses the validation techniques used for the generated vulnerability maps by various models. Implicit challenges associated with the development of the groundwater vulnerability assessment models have also been identified with scientific considerations to the parameter relations and their selections. - Highlights: • Various index-based groundwater vulnerability assessment models have been discussed. • A comparative analysis of the models and its applicability in different hydrogeological settings has been discussed. • Research problems of underlying vulnerability assessment models are also reported in this review paper.

  3. GIS based Hydrogeological Vulnerability Mapping of Groundwater Resources in Jerash Area-Jordan

    Energy Technology Data Exchange (ETDEWEB)

    Hammouri, N [Department of Earth and Environmental Sciences, Faculty of Natural Resources and Environment, Hashemite University, Zarqa (Jordan); El-Naqa, A [Department of Water Management and Environment, Faculty of Natural Resources and Environment, Hashemite University, Zarqa (Jordan)

    2008-04-15

    This paper presents groundwater vulnerability mapping for Jerash area, north Jordan generated using EPIK and DRASTIC models. These models have been implemented using GIS to delineate groundwater protection zones and to suggest a protection plan to improve groundwater quality of the major springs and wells. Most of the groundwater resources in the study area are polluted and bacteria and nitrate levels are high. Different sources of groundwater pollution have been identified. Domestic wastewater is considered as a major source of pollution. Urban runoff, fertilizers from agricultural return flows and solid waste disposal appear to be secondary sources. The most relevant vulnerability class of EPIK map is very high which accounts for about 41 % of the total area. While in the DRASTIC vulnerability map, areas with high vulnerability were only about 23 % of the total area. There is a good correlation between vulnerability maps obtained from both models with microbiological and chemical pollution evidences. There is also a good agreement between the areas classified as highly vulnerable and those that have high levels of pollution. [Spanish] El estudio de vulnerabilidad de aguas subterraneas en la region de Yerash, Jordania fue obtenido mediante las metodologias de EPIK y DRASTIC. Se uso GIS para mapear las zonas protegidas y para sugerir un plan de proteccion para mejorar la calidad del agua subterranea en los principales manantiales y pozos. Los niveles de contaminacion bacteriana y de nitratos son elevados. El efluente domestico es la fuente mas importante de contaminacion; vienen en segundo lugar la precipitacion en zonas urbanas, los fertilizantes agricolas y los desechos solidos. En el mapa de EPIK, la vulnerabilidad extrema abarca hasta 41% del area total; en cambio, en el mapa de DRASTIC las areas de alta vulnerabilidad ocupan solo un 23% del area. La correlacion de los datos de contaminacion microbiana y quimica con ambos mapas der vulnerabilidad es buena

  4. Hydrogeological Charateristics and Vulnerability of Pollution of the Aquifer Grdovski Orman Near Kocani

    OpenAIRE

    Mircovski, Vlado

    2012-01-01

    Master thesis is done defining hydrogeological features of the aquifere Grdovski Orman and vulnerability assessment of his pollution based on filtration characteristics of the water bearing and overlay sediments. Also, it was performed determination the groundwater quality. The definition of the hydrogeological features was done on the basis of the data obtained by making several exploitation wells and pollution vulnerability assessment by hydrogeological data and filtration characteristic...

  5. Evaluation of intrinsic groundwater vulnerability to pollution: COP method for pilot area of Carrara hydrogeological system (Northern Tuscany, Italy)

    Science.gov (United States)

    Baldi, B.; Guastaldi, E.; Rossetto, R.

    2009-04-01

    During the characterization of the Apuan Alps groundwater body ( "Corpo Idrico Sotterraneo Significativo", briefly CISS) (Regione Toscana, 2007) the intrinsic vulnerability has been evaluated for Carrara hydrogeological system (Northern Tuscany, Italy) by means of COP method, developed within COST 620 European Action (Zwalhlen, 2003). This system is both characterized by large data availability and it is considered an highly risky zone since groundwater protection problems (turbidity of the tapped spring waters and hydrocarbons contamination) and anthropic activity (marble quarries). The study area, 20 Km2large, has high relief energy, with elevations ranging from 5 to 1700 m amsl in almost 5 km. Runoff is scarce except during heavy rainfall; due to the presence of carbonate rocks infiltration is high: groundwater discharge at 155-255 m amsl. The area is located in the north-western part of Apuan Alps Metamorphic Complex, characterized by carbonate and non-carbonate rocks belonging to the non-metamorphic Tuscan Units (Carnic-Oligocene), Mesozoic Succession, Middle-Triassic Succession, and metamorphic Paleozoic rocks. The main geological structure of the area is the Carrara Syncline, constituted prevalently by dolostones, marbles and cherty limestones. These carbonate formations define several moderately to highly productive hydrogeological units, characterized by fissured and karst flow. Hydrogeological system may be subdivided in two different subsets, because of both geo-structural set up and area conformation. However, these are hydrogeologically connected since anisotropy and fractures of karst groundwater. The southern boundary of Carrara hydrogeological system shows important dammed springs, defined by low productive units of Massa Unit (Cambriano?-Carnic). COP methodology for evaluating intrinsic vulnerability of karst groundwater is based on three main factors for the definition of vulnerability itself: COPIndex = C (flow Concentration) *O (Overlying layers

  6. HYDROGEOLOGY

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    <正>20111225 Chen Luwang(School of Resource and Environmental Engineering,Hefei University of Technology,Hefei 230009,China);Gui Herong The Standard Type Trace Elements and the Discriminant Model of Water Bursting Source in the Linhuan Coal District(Hydrogeology and Engineering Geology,ISSN1000-3665,CN11-2202/P,37(3),2010,p.17-22,2 illus.,2 tables,11 refs.)Key words:mine environment,water gushing,Anhui It is of great academic and practical significance that hydrogeological information during the sign time of water bursting is captured by means of standard type trace elements which can trace hydrogeological features of different aquifers.On the basis of these standard type trace elements,a Bayes linear discriminant model of water bursting source is built.

  7. HYDROGEOLOGY

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    <正>20080542 Cao Wenbing(School of Water Resources and Environment,China University of Geosciences,Beijing 100083,China);Wan Li Experiments on Osmosis through Clayey Soil under the Condition of Variable Water Levels(Hydrogeology & Engineering Geology,ISSN1000-3665,CN11-2202/P,33(2),2006,p.118-122,6 illus.,1 table,3 refs.,with English abstract)

  8. HYDROGEOLOGY

    Institute of Scientific and Technical Information of China (English)

    2015-01-01

    20150507Gao Dongdong(State Key Laboratory of Geohazard Prevention and Geoenvironment Protection,Chengdu University of Technology,Chengdu 610059,China);Wu Yong Water Cycle and Groundwater Recharge of Small Watershed Rainfall Process in a Mountain Forest System(Hydrogeology and Engineering Geology,ISSN1000-3665,CN11-2202/P,41(1),2014,p.7-14,4illus.,9tables,32refs.)Key words:hydrologic cycle,groundwater recharge,Sichuan Province

  9. An holistic view on aquifer vulnerability based on a distinction of different types of vulnerability

    Science.gov (United States)

    De Luca, Domenico Antonio; Lasagna, Manuela; Franchino, Elisa

    2016-04-01

    AN HOLISTIC VIEW ON AQUIFER VULNERABILITY BASED ON A DISTINCTION OF DIFFERENT TYPES OF VULNERABILITY D.A. De Luca1 , M. Lasagna1, E. Franchino1 1Department of Earth Sciences, University of Turin The concept of vulnerability is certainly useful in the field of groundwater protection. Nevertheless, within the scientific community, the definition of groundwater vulnerability is still debatable and not clear and conclusive. This is probably due to the fact that researchers often have very different experiences and education. A positive effect of it is a constant exchange of ideas, but there are also negative consequences and difficulties in deepening the issue. The different approaches are very important but they are usable only if the concept of vulnerability is standardized: thus, for the sake of clarity, a number of definitions should be laid down, based on the different types of vulnerability. These definitions can then provide the necessary holistic view for the aquifer vulnerability assessment. Nowadays vulnerability methods focus on the degree of vulnerability and the parameters needed for its evaluation, often neglecting to clarify what is the type of vulnerability the proposed methods are referred. The type of vulnerability, indeed, is both logically and hierarchically superior to the degree of vulnerability. More specifically the type of vulnerability represents the evaluation of the hydrogeological conditions considered in the vulnerability assessment and able to influence the way in which the contamination can take place. Currently the only distinction, based on of the type of vulnerability, is referred to intrinsic and specific vulnerability. Intrinsic vulnerability assesses the susceptibility of the receptor based on the natural properties of the land and subsurface; specific vulnerability also includes properties of the analyzed contaminant. This distinction is useful but not exhaustive. In addition to this, e.g., a distinction of vertical vulnerability

  10. Vulnerability and Hydrogeologic Risk of the Guarani Aquifer System in the outcropping area located in Rivera Uruguay

    International Nuclear Information System (INIS)

    The Project named Vulnerability and Hydrogeologic Risk of the Guarani Aquifer System in the outcropping area located in Rivera, Uruguay is developed by the Faculty of Science University of the Republic, together with the Faculty of Natural and Exact Sciences of the University of Buenos Aires, and it is financed by the Guarani Fund of Universities - Project for the Environmental Protection and Sustainable Development of the Guarani Aquifer System. This project has the aim of researching the characteristics and the hydrogeologic behavior of the Guarani Aquifer in the North portion of Uruguay, Department of Rivera (outcropping area). Moreover, to propose measures directed to their preservation through their sustainable use. The Hydrogeologic Study of the Guarani Aquifer System in this area will contribute not only with the best knowledge in its dynamics, but also helping to take measures in the water management and to avoid potential risks of contamination

  11. HYDROGEOLOGY

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    <正>20091907 Bu Hua(Lunan Geological Engineering Investigation Institute,Yanzhou 272100,China);Chen Zhancheng Division of the Drinking Water Source Protection Areas:Taking Shandong Yangzhuang Groundwater Basin as an Example(Geological Survey and Research,ISSN1672-4135,CN12-1353/P,31(3),2008,p.236-241,6 illus.,1 table,8 refs.)Key words:water source field,conservation of groundwater,ShandongBased on the hydrological and geological conditions of water source area,Developing the Utilizing Plan in the Yangzhuang Basin,Shandong Province,the groundwater flow and water quality model is established by using the

  12. GIS-based hydrogeological databases and groundwater modelling

    Science.gov (United States)

    Gogu, Radu Constantin; Carabin, Guy; Hallet, Vincent; Peters, Valerie; Dassargues, Alain

    2001-12-01

    Reliability and validity of groundwater analysis strongly depend on the availability of large volumes of high-quality data. Putting all data into a coherent and logical structure supported by a computing environment helps ensure validity and availability and provides a powerful tool for hydrogeological studies. A hydrogeological geographic information system (GIS) database that offers facilities for groundwater-vulnerability analysis and hydrogeological modelling has been designed in Belgium for the Walloon region. Data from five river basins, chosen for their contrasting hydrogeological characteristics, have been included in the database, and a set of applications that have been developed now allow further advances. Interest is growing in the potential for integrating GIS technology and groundwater simulation models. A "loose-coupling" tool was created between the spatial-database scheme and the groundwater numerical model interface GMS (Groundwater Modelling System). Following time and spatial queries, the hydrogeological data stored in the database can be easily used within different groundwater numerical models. Résumé. La validité et la reproductibilité de l'analyse d'un aquifère dépend étroitement de la disponibilité de grandes quantités de données de très bonne qualité. Le fait de mettre toutes les données dans une structure cohérente et logique soutenue par les logiciels nécessaires aide à assurer la validité et la disponibilité et fournit un outil puissant pour les études hydrogéologiques. Une base de données pour un système d'information géographique (SIG) hydrogéologique qui offre toutes les facilités pour l'analyse de la vulnérabilité des eaux souterraines et la modélisation hydrogéologique a été établi en Belgique pour la région Wallonne. Les données de cinq bassins de rivières, choisis pour leurs caractéristiques hydrogéologiques différentes, ont été introduites dans la base de données, et un ensemble d

  13. GIS-Based Hydrogeological-Parameter Modeling

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    A regression model is proposed to relate the variation of water well depth with topographic properties (area and slope), the variation of hydraulic conductivity and vertical decay factor. The implementation of this model in GIS environment (ARC/TNFO) based on known water data and DEM is used to estimate the variation of hydraulic conductivity and decay factor of different lithoiogy units in watershed context.

  14. Vulnerability and hydrogeologic risk of SAG in the outcroupping zone of Rivera Uruguay

    International Nuclear Information System (INIS)

    The studied area belongs to the outcroupping zone of the Guarani Aquifer in the Department of Rivera, Uruguay. It comprises an approximate area of 2900 Km2. The outcropping Guarani Aquifer (AGa) is formed by two sections, an upper one corresponding to the Rivera Unit (UR) and a lower one corresponding to the Tacuarembo Unit (UT), both with vertical hydraulic continuity. The Rivera Unit is entirely represented by the homonymous formation and it consists of medium to fine sandstones with a mean effective porosity of 14% and mean Transmissivity of 88 m2/dia. The Tacuarembo Unit is constituted by fine to very fine sandstone levels interbedded with pelitic sandstone and shales. This unit behaves like unconfined aquifer in the upper section, where it contains the phreatic layer and it passes to semi-confined as the depth increases. The effective porosity is approximatelly of 9% and mean T 24 m2/dia. Chemically, both units are classified as calcicbicarbonated and magnesic-bicarbonated. To determine the vulnerability, it was applied the GOD method yielding high vulnerability for levels lower than 10m and moderate for levels of water larger than 10m. From the study of risk the conclusions are: high risk of groundwater contamination due to the lack of sewage systems and to the rubbish dump leakage. The industrial activity, cemeteries and mining activity represents moderated risks in most of the cases

  15. Secure Web Development Based on Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Ms. Daljit Kaur Dr. Parminder Kaur

    2012-02-01

    Full Text Available This paper is an effort to develop secure web applications based on known vulnerabilities. It has been seen that in the rapid race of developing web applications in minimum time and budget, security is given least importance as consequence of which web applications are developed and hosted with number of vulnerabilities in them. And in this race, one thing is constant that attackers take advantage of weaknesses existing in technology for financial gain and theft of intellectual property. In this proposed method of secure web development, most common vulnerabilities and their occurrence in development process is discussed. Mapping vulnerabilities to the actions needed to take during development process may help developers to understand vulnerability and avoid vulnerabilities in application.

  16. Secure Web Development Based on Vulnerabilities

    OpenAIRE

    Ms. Daljit Kaur Dr. Parminder Kaur

    2012-01-01

    This paper is an effort to develop secure web applications based on known vulnerabilities. It has been seen that in the rapid race of developing web applications in minimum time and budget, security is given least importance as consequence of which web applications are developed and hosted with number of vulnerabilities in them. And in this race, one thing is constant that attackers take advantage of weaknesses existing in technology for financial gain and theft of intellectual property. In t...

  17. Hydrogeology, Ground-Water-Age Dating, Water Quality, and Vulnerability of Ground Water to Contamination in a Part of the Whitewater Valley Aquifer System near Richmond, Indiana, 2002-2003

    Science.gov (United States)

    Buszka, Paul M.; Watson, Lee R.; Greeman, Theodore K.

    2007-01-01

    Assessments of the vulnerability to contamination of ground-water sources used by public-water systems, as mandated by the Federal Safe Drinking Water Act Amendments of 1996, commonly have involved qualitative evaluations based on existing information on the geologic and hydrologic setting. The U.S. Geological Survey National Water-Quality Assessment Program has identified ground-water-age dating; detailed water-quality analyses of nitrate, pesticides, trace elements, and wastewater-related organic compounds; and assessed natural processes that affect those constituents as potential, unique improvements to existing methods of qualitative vulnerability assessment. To evaluate the improvement from use of these methods, in 2002 and 2003, the U.S. Geological Survey, in cooperation with the City of Richmond, Indiana, compiled and interpreted hydrogeologic data and chemical analyses of water samples from seven wells in a part of the Whitewater Valley aquifer system in a former glacial valley near Richmond. This study investigated the application of ground-water-age dating, dissolved-gas analyses, and detailed water-quality analyses to quantitatively evaluate the vulnerability of ground water to contamination and to identify processes that affect the vulnerability to specific contaminants in an area of post-1972 greenfield development.

  18. Decision Tree based Prediction and Rule Induction for Groundwater Trichloroethene (TCE) Pollution Vulnerability

    Science.gov (United States)

    Park, J.; Yoo, K.

    2013-12-01

    For groundwater resource conservation, it is important to accurately assess groundwater pollution sensitivity or vulnerability. In this work, we attempted to use data mining approach to assess groundwater pollution vulnerability in a TCE (trichloroethylene) contaminated Korean industrial site. The conventional DRASTIC method failed to describe TCE sensitivity data with a poor correlation with hydrogeological properties. Among the different data mining methods such as Artificial Neural Network (ANN), Multiple Logistic Regression (MLR), Case Base Reasoning (CBR), and Decision Tree (DT), the accuracy and consistency of Decision Tree (DT) was the best. According to the following tree analyses with the optimal DT model, the failure of the conventional DRASTIC method in fitting with TCE sensitivity data may be due to the use of inaccurate weight values of hydrogeological parameters for the study site. These findings provide a proof of concept that DT based data mining approach can be used in predicting and rule induction of groundwater TCE sensitivity without pre-existing information on weights of hydrogeological properties.

  19. GIS Based Measurement and Regulatory Zoning of Urban Ecological Vulnerability

    OpenAIRE

    Xiaorui Zhang; Zhenbo Wang; Jing Lin

    2015-01-01

    Urban ecological vulnerability is measured on the basis of ecological sensitivity and resilience based on the concept analysis of vulnerability. GIS-based multicriteria decision analysis (GIS-MCDA) methods are used, supported by the spatial analysis tools of GIS, to define different levels of vulnerability for areas of the urban ecology. These areas are further classified into different types of regulatory zones. Taking the city of Hefei in China as the empirical research site, this study us...

  20. Teaching and learning hydrogeology using a physically-based modelling framework

    Science.gov (United States)

    Frampton, Andrew; Dessirier, Benoit; Pannetier, Romain

    2014-05-01

    Hydrogeology involves studying the occurrence, distribution, movement and quality of water in geological formations. Hydrogeology typically enters in the curriculum of physical geography as well as civil and environmental engineering courses, is a multidisciplinary subject which encompasses several scientific areas including mathematics, physics, geology, geochemistry and numerical analysis. For applications such as resource management, decision and policy making, and an understanding and interpretation of uncertainty and risk assessment is also necessary. Teaching hydrogeology is not only challenged by its multidisciplinary nature, but also since groundwater occurrence and movement is hidden from view in the subsurface, and is generally inaccessible to direct observation. Field experiments are often costly and time consuming, and laboratory experiments limited in scale. However, suitably designed computational systems can help address such issues by providing numerical modelling investigations of field conditions. This contribution presents results from a recent project dedicated to develop an open-source, interactive, visual numerical modelling tool for teaching/learning hydrogeology, based on current pedagogical understanding of learning in higher education. It provides physically-based groundwater flow solutions within an intuitive user-friendly interface, which does not require advanced technical skills to operate. The aim is to be able to improve student's learning by providing immediate and visual feedback on groundwater flow and contaminant transport problems. The development and implementation of the tool as part of a teaching framework to address subsurface flow concepts and phenomena is presented, discussed and evaluated. By linking theoretical problem-solving exercises with modelling tasks in a learn-by-doing approach, we further discuss how student's learning experiences can be enhanced.

  1. Development of a Hydrogeological Site Description Based on a Discrete Fracture Network Concept and the Integration of Geological, Hydrogeological and Hydrochemical Data

    Science.gov (United States)

    Jackson, C.; Hartley, L. J.; Hoch, A.; Holton, D.; Hunter, F. M.; McCarthy, R.; Marsic, N.; Gylling, B.

    2006-12-01

    The Swedish Nuclear Fuel and Waste Management Company (SKB) is carrying out site investigations in two different areas in Sweden with the objective of describing the in-situ conditions for a deep rock repository for spent nuclear fuel. The two candidate areas are Forsmark and Laxemar, both located on the east coast of Sweden. An important aspect of site investigations is to develop and demonstrate an understanding of groundwater flow and solute transport. Since the geology in both candidate areas is comprised of hard crystalline rocks, the groundwater flow is predominantly contained within fractures, and therefore a discrete fracture network (DFN) concept has been applied to describe and model the hydrogeological situation at the sites. Much observed field data from several different disciplines (geology, rock mechanics, geophysics, hydrogeology and hydrochemistry) has been acquired from the sites, including from several deep cored boreholes, to inform an overall description. Many aspects of the site description are brought together in constructing a regional scale hydrogeological model to integrate the concepts and data interpretations, which are then tested against a range of field observations to build confidence that the models are representative. A methodology has been developed based on assembling a regional hydrogeological model from three main components: hydraulic conductor domains (HCD) that represent deterministic large scale deformation zones; hydraulic rock domains (HRD) that use a stochastic DFN model to represent the background rock between the deformation zones; and hydraulic soil domains (HSD) that represent near-surface Quaternary deposits. The HCD are interpreted from geophysical methods, drilling and single-hole hydraulic tests. For the HRD, borehole image- and core-logs, outcrop maps, and short-interval flow-logging are integrated to parameterise a DFN model for specific hydrogeological rock domains. Geological information, statistical analysis

  2. Scenario-based Storm Surge Vulnerability Assessment of Catanduanes

    Science.gov (United States)

    Suarez, J. K. B.

    2015-12-01

    After the devastating storm surge effect of Typhoon Haiyan, the public recognized an improved communication about risks, vulnerabilities and what is threatened by storm surge. This can be provided by vulnerability maps which allow better visual presentations and understanding of the risks and vulnerabilities. Local implementers can direct the resources needed for protection of these areas. Moreover, vulnerability and hazard maps are relevant in all phases of disaster management designed by the National Disaster Risk Reduction Council (NDRRMC) - disaster preparedness, prevention and mitigation and response and recovery and rehabilitation. This paper aims to analyze the vulnerability of Catanduanes, a coastal province in the Philippines, to storm surges in terms of four parameters: population, built environment, natural environment and agricultural production. The vulnerability study relies on the storm surge inundation maps based on the Department of Science and Technology Nationwide Operational Assessment of Hazards' (DOST-Project NOAH) proposed four Storm Surge Advisory (SSA) scenarios (1-2, 3, 4, and 5 meters) for predicting storm surge heights. To determine total percent affected for each parameter elements, an overlay analysis was performed in ArcGIS Desktop. Moreover, vulnerability and hazard maps are generated as a final output and a tool for visualizing the impacts of storm surge event at different surge heights. The result of this study would help the selected province to know their present condition and adapt strategies to strengthen areas where they are found to be most vulnerable in order to prepare better for the future.

  3. Vulnerability curves vs. vulnerability indicators: application of an indicator-based methodology for debris-flow hazards

    Science.gov (United States)

    Papathoma-Köhle, Maria

    2016-08-01

    The assessment of the physical vulnerability of elements at risk as part of the risk analysis is an essential aspect for the development of strategies and structural measures for risk reduction. Understanding, analysing and, if possible, quantifying physical vulnerability is a prerequisite for designing strategies and adopting tools for its reduction. The most common methods for assessing physical vulnerability are vulnerability matrices, vulnerability curves and vulnerability indicators; however, in most of the cases, these methods are used in a conflicting way rather than in combination. The article focuses on two of these methods: vulnerability curves and vulnerability indicators. Vulnerability curves express physical vulnerability as a function of the intensity of the process and the degree of loss, considering, in individual cases only, some structural characteristics of the affected buildings. However, a considerable amount of studies argue that vulnerability assessment should focus on the identification of these variables that influence the vulnerability of an element at risk (vulnerability indicators). In this study, an indicator-based methodology (IBM) for mountain hazards including debris flow (Kappes et al., 2012) is applied to a case study for debris flows in South Tyrol, where in the past a vulnerability curve has been developed. The relatively "new" indicator-based method is being scrutinised and recommendations for its improvement are outlined. The comparison of the two methodological approaches and their results is challenging since both methodological approaches deal with vulnerability in a different way. However, it is still possible to highlight their weaknesses and strengths, show clearly that both methodologies are necessary for the assessment of physical vulnerability and provide a preliminary "holistic methodological framework" for physical vulnerability assessment showing how the two approaches may be used in combination in the future.

  4. GIS Based Measurement and Regulatory Zoning of Urban Ecological Vulnerability

    Directory of Open Access Journals (Sweden)

    Xiaorui Zhang

    2015-07-01

    Full Text Available Urban ecological vulnerability is measured on the basis of ecological sensitivity and resilience based on the concept analysis of vulnerability. GIS-based multicriteria decision analysis (GIS-MCDA methods are used, supported by the spatial analysis tools of GIS, to define different levels of vulnerability for areas of the urban ecology. These areas are further classified into different types of regulatory zones. Taking the city of Hefei in China as the empirical research site, this study uses GIS-MCDA, including the index system, index weights and overlay rules, to measure the degree of its ecological vulnerability on the GIS platform. There are eight indices in the system. Raking and analytical hierarchy process (AHP methods are used to calculate index weights according to the characteristics of the index system. The integrated overlay rule, including selection of the maximum value, and weighted linear combination (WLC are applied as the overlay rules. In this way, five types of vulnerability areas have been classified as follows: very low vulnerability, low vulnerability, medium vulnerability, high vulnerability and very high vulnerability. They can be further grouped into three types of regulatory zone of ecological green line, ecological grey line and ecological red line. The study demonstrates that ecological green line areas are the largest (53.61% of the total study area and can be intensively developed; ecological grey line areas (19.59% of the total area can serve as the ecological buffer zone, and ecological red line areas (26.80% cannot be developed and must be protected. The results indicate that ecological green line areas may provide sufficient room for future urban development in Hefei city. Finally, the respective regulatory countermeasures are put forward. This research provides a scientific basis for decision-making around urban ecological protection, construction and sustainable development. It also provides theoretical method

  5. Road Network Vulnerability Analysis Based on Improved Ant Colony Algorithm

    Directory of Open Access Journals (Sweden)

    Yunpeng Wang

    2014-01-01

    Full Text Available We present an improved ant colony algorithm-based approach to assess the vulnerability of a road network and identify the critical infrastructures. This approach improves computational efficiency and allows for its applications in large-scale road networks. This research involves defining the vulnerability conception, modeling the traffic utility index and the vulnerability of the road network, and identifying the critical infrastructures of the road network. We apply the approach to a simple test road network and a real road network to verify the methodology. The results show that vulnerability is directly related to traffic demand and increases significantly when the demand approaches capacity. The proposed approach reduces the computational burden and may be applied in large-scale road network analysis. It can be used as a decision-supporting tool for identifying critical infrastructures in transportation planning and management.

  6. Hydrogeologic Provinces for California based upon established groundwater basins and watershed polygons.

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Ten hydrogeologic provinces of California are represented by a region- class feature called "provinces" within this digital data set. These provinces were...

  7. Spatial vulnerability units - expert-based spatial modelling of socio-economic vulnerability in the Salzach catchment, Austria

    Science.gov (United States)

    Kienberger, S.; Lang, S.; Zeil, P.

    2009-05-01

    The assessment of vulnerability has moved to centre-stage of the debate between different scientific disciplines related to climate change and disaster risk management. Composed by a combination of social, economical, physical and environmental factors the assessment implies combining different domains as well as quantitative with qualitative data and makes it therefore a challenge to identify an integrated metric for vulnerability. In this paper we define vulnerability in the context of climate change, targeting the hazard "flood". The developed methodology is being tested in the Salzach river catchment in Austria, which is largely prone to floods. The proposed methodology allows the spatial quantification of vulnerability and the identification of vulnerability units. These units build upon the geon concept which acts as a framework for the regionalization of continuous spatial information according to defined parameters of homogeneity. Using geons, we are capable of transforming singular domains of information on specific systemic components to policy-relevant, conditioned information. Considering the fact that vulnerability is not directly measurable and due to its complex dimension and social construction an expert-based approach has been chosen. Established methodologies such as Multicriteria Decision Analysis, Delphi exercises and regionalization approaches are being integrated. The method not only enables the assessment of vulnerability independent from administrative boundaries, but also applies an aggregation mode which reflects homogenous vulnerability units. This supports decision makers to reflect on complex issues such as vulnerability. Next to that, the advantage is to decompose the units to their underlying domains. Feedback from disaster management experts indicates that the approach helps to improve the design of measures aimed at strengthening preparedness and mitigation. From this point of view, we reach a step closer towards validation of the

  8. Vulnerable Genders, Vulnerable Loves

    DEFF Research Database (Denmark)

    Schleicher, Marianne

    2015-01-01

    This chapter analyses religious reflections on vulnerable genders and vulnerable loves from the Hebrew Bible to early Rabbinic literature. It is based on theories by inter alia Donna Haraway on complex identities, Turner and Maryanski on love as a prerequisite for survival, Michel Foucault...

  9. PSA based vulnerability and protectability analysis for NPPs

    International Nuclear Information System (INIS)

    Highlights: ► The paper describes the generation of location sets and protection sets. ► Vulnerability and protectability used to rank location sets and protection sets. ► Ranking helps in adequacy of protection measures employed in various locations. ► The procedure for PSA based vital area identification is demonstrated. ► This method has found practical applicability for Indian NPP. -- Abstract: Identification of vital areas in a facility involves assessing the facility and the locations, whose sabotage can result in undesirable (radiological) consequences. Probabilistic Safety Assessment (PSA) technique can find the component failures leading to core damage (a surrogate for radiological consequence) in a systematic manner, which can be extended to identification of vital areas. This paper describes the procedure for the generation of location sets (set of locations whose sabotage can lead to possible core damage) and protection sets (set of locations that must be protected to prevent possible core damage). In addition, measures such as vulnerability and protectability have been introduced, which can be used to rank location sets and protection sets.

  10. Hydrogeology of northern Sierra de Chiapas, Mexico: a conceptual model based on a geochemical characterization of sulfide-rich karst brackish springs

    Science.gov (United States)

    Rosales Lagarde, Laura; Boston, Penelope J.; Campbell, Andrew R.; Hose, Louise D.; Axen, Gary; Stafford, Kevin W.

    2014-09-01

    Conspicuous sulfide-rich karst springs flow from Cretaceous carbonates in northern Sierra de Chiapas, Mexico. This is a geologically complex, tropical karst area. The physical, geologic, hydrologic and chemical attributes of these springs were determined and integrated into a conceptual hydrogeologic model. A meteoric source and a recharge elevation below 1,500 m are estimated from the spring-water isotopic signature regardless of their chemical composition. Brackish spring water flows at a maximum depth of 2,000 m, as inferred from similar chemical attributes to the produced water from a nearby oil well. Oil reservoirs may be found at depths below 2,000 m. Three subsurface environments or aquifers are identified based on the B, Li+, K+ and SiO2 concentrations, spring water temperatures, and CO2 pressures. There is mixing between these aquifers. The aquifer designated Local is shallow and contains potable water vulnerable to pollution. The aquifer named Northern receives some brackish produced water. The composition of the Southern aquifer is influenced by halite dissolution enhanced at fault detachment surfaces. Epigenic speleogenesis is associated with the Local springs. In contrast, hypogenic speleogenesis is associated with the brackish sulfidic springs from the Northern and the Southern environments.

  11. VuWiki: An Ontology-Based Semantic Wiki for Vulnerability Assessments

    Science.gov (United States)

    Khazai, Bijan; Kunz-Plapp, Tina; Büscher, Christian; Wegner, Antje

    2014-05-01

    The concept of vulnerability, as well as its implementation in vulnerability assessments, is used in various disciplines and contexts ranging from disaster management and reduction to ecology, public health or climate change and adaptation, and a corresponding multitude of ideas about how to conceptualize and measure vulnerability exists. Three decades of research in vulnerability have generated a complex and growing body of knowledge that challenges newcomers, practitioners and even experienced researchers. To provide a structured representation of the knowledge field "vulnerability assessment", we have set up an ontology-based semantic wiki for reviewing and representing vulnerability assessments: VuWiki, www.vuwiki.org. Based on a survey of 55 vulnerability assessment studies, we first developed an ontology as an explicit reference system for describing vulnerability assessments. We developed the ontology in a theoretically controlled manner based on general systems theory and guided by principles for ontology development in the field of earth and environment (Raskin and Pan 2005). Four key questions form the first level "branches" or categories of the developed ontology: (1) Vulnerability of what? (2) Vulnerability to what? (3) What reference framework was used in the vulnerability assessment?, and (4) What methodological approach was used in the vulnerability assessment? These questions correspond to the basic, abstract structure of the knowledge domain of vulnerability assessments and have been deduced from theories and concepts of various disciplines. The ontology was then implemented in a semantic wiki which allows for the classification and annotation of vulnerability assessments. As a semantic wiki, VuWiki does not aim at "synthesizing" a holistic and overarching model of vulnerability. Instead, it provides both scientists and practitioners with a uniform ontology as a reference system and offers easy and structured access to the knowledge field of

  12. A power flow based model for the analysis of vulnerability in power networks

    Science.gov (United States)

    Wang, Zhuoyang; Chen, Guo; Hill, David J.; Dong, Zhao Yang

    2016-10-01

    An innovative model which considers power flow, one of the most important characteristics in a power system, is proposed for the analysis of power grid vulnerability. Moreover, based on the complex network theory and the Max-Flow theorem, a new vulnerability index is presented to identify the vulnerable lines in a power grid. In addition, comparative simulations between the power flow based model and existing models are investigated on the IEEE 118-bus system. The simulation results demonstrate that the proposed model and the index are more effective in power grid vulnerability analysis.

  13. Assessing the Performance of a Classification-Based Vulnerability Analysis Model

    OpenAIRE

    Wang, Tai-Ran; Mousseau, Vincent; Pedroni, Nicola; Zio, Enrico

    2015-01-01

    In this article, a classification model based on the majority rule sorting (MR-Sort) method is employed to evaluate the vulnerability of safety-critical systems with respect to malevolent intentional acts. The model is built on the basis of a (limited-size) set of data representing (a priori known) vulnerability classification examples. The empirical construction of the clas-sification model introduces a source of uncertainty into the vulnerability analysis process: a quantitative assessment ...

  14. Comprehensive Assessment of Eco-environment Vulnerability in Hebei Province Based on ArcGIS

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    [Objective] This study aimed to assess the vulnerability of ecological environment in Hebei Province.[Method] Based on ArcGIS,by using the dominant factor and maximum limits factor method,we established the sensitivity-reality indicator system and assessment model of the eco-environment vulnerability in Hebei Province to quantitatively evaluate its eco-environment vulnerability,and analyzed its spatial distribution.[Result] The status quo of environmental degradation was inconsistent with the sensitivity of...

  15. Comparisons of complex network based models and real train flow model to analyze Chinese railway vulnerability

    International Nuclear Information System (INIS)

    Recently numerous studies have applied complex network based models to study the performance and vulnerability of infrastructure systems under various types of attacks and hazards. But how effective are these models to capture their real performance response is still a question worthy of research. Taking the Chinese railway system as an example, this paper selects three typical complex network based models, including purely topological model (PTM), purely shortest path model (PSPM), and weight (link length) based shortest path model (WBSPM), to analyze railway accessibility and flow-based vulnerability and compare their results with those from the real train flow model (RTFM). The results show that the WBSPM can produce the train routines with 83% stations and 77% railway links identical to the real routines and can approach the RTFM the best for railway vulnerability under both single and multiple component failures. The correlation coefficient for accessibility vulnerability from WBSPM and RTFM under single station failures is 0.96 while it is 0.92 for flow-based vulnerability; under multiple station failures, where each station has the same failure probability fp, the WBSPM can produce almost identical vulnerability results with those from the RTFM under almost all failures scenarios when fp is larger than 0.62 for accessibility vulnerability and 0.86 for flow-based vulnerability

  16. Wi-Fi Protocol Vulnerability Discovery Based on Fuzzy Testing

    Directory of Open Access Journals (Sweden)

    Kunhua Zhu

    2013-08-01

    Full Text Available To detect the wireless network equipment whether there is protocol vulnerability, using the method of modular design and implementation of a new suitable for Wi-Fi protocol vulnerability discovery fuzzy test framework. It can be independent of its transmission medium, produce deformity packet and implementation of the attack on the target system. The author firstly describes the wireless network protocol vulnerability discovery and fuzzy test in this paper,then focused on the test frame technical scheme, detailed technical realization and so on, and its application are analyzed. In the experimental stage the fuzzy test is applied to a wireless networks gateway, the test results show that the fuzzy test framework can be well applied to the wireless network equipment agreement loophole mining work.  

  17. Hydrogeology of Nevada

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — This data set consists of hydrogeology for the State of Nevada. Consolidated rocks and unconsolidated sediments are the two major hydrogeologic units. Consolidated...

  18. AVQS: attack route-based vulnerability quantification scheme for smart grid.

    Science.gov (United States)

    Ko, Jongbin; Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik

    2014-01-01

    A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification.

  19. AVQS: attack route-based vulnerability quantification scheme for smart grid.

    Science.gov (United States)

    Ko, Jongbin; Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik

    2014-01-01

    A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification. PMID:25152923

  20. AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid

    Directory of Open Access Journals (Sweden)

    Jongbin Ko

    2014-01-01

    Full Text Available A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification.

  1. SRS Geology/Hydrogeology Environmental Information Document

    Energy Technology Data Exchange (ETDEWEB)

    Denham, M.E.

    1999-08-31

    The purpose of the Savannah River Site Geology and Hydrogeology Environmental Information Document (EID) is to provide geologic and hydrogeologic information to serve as a baseline to evaluate potential environmental impacts. This EID is based on a summary of knowledge accumulated from research conducted at the Savannah River Site (SRS) and surrounding areas.

  2. SRS Geology/Hydrogeology Environmental Information Document

    International Nuclear Information System (INIS)

    The purpose of the Savannah River Site Geology and Hydrogeology Environmental Information Document (EID) is to provide geologic and hydrogeologic information to serve as a baseline to evaluate potential environmental impacts. This EID is based on a summary of knowledge accumulated from research conducted at the Savannah River Site (SRS) and surrounding areas

  3. Aircraft vulnerability modeling and computation methods based on product structure and CATIA

    Institute of Scientific and Technical Information of China (English)

    Li Jun; Yang Wei; Zhang Yugang; Pei Yang; Ren Yunsong; Wang Wei

    2013-01-01

    Survivability strengthening/vulnerability reduction designs have become one of the most important design disciplines of military aircraft now.Due to progressiveness and complexity of modern combat aircraft,the existing vulnerability modeling and computation methods cannot meet the current engineering application requirements.Therefore,a vulnerability modeling and computation method based on product structure and CATIA is proposed in sufficient consideration of the design characteristics of modern combat aircraft.This method directly constructs the aircraft vulnerability model by CATIA or the digital model database,and manages all the product components of the vulnerability model via aircraft product structure.Using CAA second development,the detailed operations and computation methods of vulnerability analysis are integrated into CATIA software environment.Comprehensive assessment data and visual kill probability Iso-contours can also be presented,which meet the vulnerability analysis requirements of modern combat aircraft effectively.The intact vulnerability model of one hypothetical aircraft is constructed,and the effects of redundant technology to the aircraft vulnerability are assessed,which validate the engineering practicality of the method.

  4. Hydrogeological characterization based on the results of long term monitoring in the Mizunami Underground Research Laboratory Project

    Science.gov (United States)

    Takeuchi, R.; Ohyama, T.; Matsuoka, T.; Saegusa, H.; Takeuchi, S.

    2009-12-01

    The Mizunami Underground Research Laboratory (MIU) is now under construction by the Japan Atomic Energy Agency in the Cretaceous Toki granite in the Tono area of central Japan. Conceptual design of the MIU consists of two 1,000 m shafts (the Main Shaft and the Ventilation Shaft) and horizontal research galleries. The MIU project is a broad scientific study of the deep geological environment as a base for the research and development for geological disposal of nuclear wastes. One of the main goals is to establish comprehensive techniques for investigation, analysis and assessment of the deep geological environment in fractured crystalline rock. The project is being implemented in three overlapping phases: Surface-based Investigation (Phase I), Construction (Phase II) and Operation (Phase III), with a total duration of 20 years. In Phase I, surface investigations were carried out in a stepwise manner in order to obtain information of the geological environment at the site scale (about 2km square). Geological modeling and simulations of various kinds had been carried out in order to synthesize these investigation results. Two NNW-trending faults, which are important for hydrogeological characterization, are included in the model. One of the faults (fault A) strikes through the site in the immediate vicinity of the Main Shaft and another fault (fault B) strikes through the southern part of the MIU construction site. In Phase II, field investigations have been carried out in and around the MIU construction site. For hydrogeological characterization, long term monitoring of hydraulic pressure, surface tilt and self-potential have been carried out on surface and in the research galleries to obtain information on changes of groundwater flow due to shaft excavation. The results of the long term monitoring focused on fault A are as follows: - The hydraulic pressure responses are observed in surface boreholes in and around the MIU construction site and the galleries. The

  5. Socio-economic vulnerability to natural hazards - proposal for an indicator-based model

    Science.gov (United States)

    Eidsvig, U.; McLean, A.; Vangelsten, B. V.; Kalsnes, B.; Ciurean, R. L.; Argyroudis, S.; Winter, M.; Corominas, J.; Mavrouli, O. C.; Fotopoulou, S.; Pitilakis, K.; Baills, A.; Malet, J. P.

    2012-04-01

    Vulnerability assessment, with respect to natural hazards, is a complex process that must consider multiple dimensions of vulnerability, including both physical and social factors. Physical vulnerability refers to conditions of physical assets, and may be modeled by the intensity and magnitude of the hazard, the degree of physical protection provided by the natural and built environment, and the physical robustness of the exposed elements. Social vulnerability refers to the underlying factors leading to the inability of people, organizations, and societies to withstand impacts from the natural hazards. Social vulnerability models can be used in combination with physical vulnerability models to estimate both direct losses, i.e. losses that occur during and immediately after the impact, as well as indirect losses, i.e. long-term effects of the event. Direct impact of a landslide typically includes casualties and damages to buildings and infrastructure while indirect losses may e.g. include business closures or limitations in public services. The direct losses are often assessed using physical vulnerability indicators (e.g. construction material, height of buildings), while indirect losses are mainly assessed using social indicators (e.g. economical resources, demographic conditions). Within the EC-FP7 SafeLand research project, an indicator-based method was proposed to assess relative socio-economic vulnerability to landslides. The indicators represent the underlying factors which influence a community's ability to prepare for, deal with, and recover from the damage associated with landslides. The proposed model includes indicators representing demographic, economic and social characteristics as well as indicators representing the degree of preparedness and recovery capacity. Although the model focuses primarily on the indirect losses, it could easily be extended to include more physical indicators which account for the direct losses. Each indicator is individually

  6. Temperature-based Instanton Analysis: Identifying Vulnerability in Transmission Networks

    Energy Technology Data Exchange (ETDEWEB)

    Kersulis, Jonas [Univ. of Michigan, Ann Arbor, MI (United States); Hiskens, Ian [Univ. of Michigan, Ann Arbor, MI (United States); Chertkov, Michael [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Backhaus, Scott N. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Bienstock, Daniel [Columbia Univ., New York, NY (United States)

    2015-04-08

    A time-coupled instanton method for characterizing transmission network vulnerability to wind generation fluctuation is presented. To extend prior instanton work to multiple-time-step analysis, line constraints are specified in terms of temperature rather than current. An optimization formulation is developed to express the minimum wind forecast deviation such that at least one line is driven to its thermal limit. Results are shown for an IEEE RTS-96 system with several wind-farms.

  7. Hydrogeologic framework of U.S. Marine Corps Base at Camp Lejeune, North Carolina

    Science.gov (United States)

    Cardinell, A.P.; Berg, S.A.; Lloyd, O.B.

    1993-01-01

    The hydrogeologic framework at Camp Lejeune consists of the surficial, Castle Hayne, Beaufort, and Peedee aquifers and intervening confining units. The Castle Hayne aquifer furnishes about 7 million gallons of water per day to Camp Lejeune, but the surficial, Beaufort, and Peedee aquifers, which contain freshwater in places, are not used for supply. The Castle Hayne aquifer is composed of 60 to 90 percent sand and limestone with clay and silt beds, and ranges from 156 to 400 feet thick. Hydraulic conductivity of the aquifer ranges from 14 to 91 feet per day. The Castle Hayne confining unit, which overlies the Castle Hayne aquifer, is composed of silt and sandy clay and averages 9 feet thick where present. This confining unit is incised by the New River and its tributaries, as well as some paleochannels. The effects of pumping from the Castle Hayne aquifer have not significantly affected natural head gradients in the aquifer. However, the potential exists for lateral migration of saltwater where wells are located near streams or paleochannels that have incised the confining unit. Except for one measurement of 960 milligrams per liter chloride in a water sample from the bottom of the Castle Hayne aquifer, dissolved-chloride concentrations in water samples from the Castle Hayne aquifer were less than 120 milligrams per liter. It is not known whether this occurrence of saltwater in the Castle Hayne aquifer is widespread or localized, but its presence indicates a potential for upward movement of saltwater beneath pumped wells.

  8. Development of vulnerability curves to typhoon hazards based on insurance policy and claim dataset

    Science.gov (United States)

    Mo, Wanmei; Fang, Weihua; li, Xinze; Wu, Peng; Tong, Xingwei

    2016-04-01

    Vulnerability refers to the characteristics and circumstances of an exposure that make it vulnerable to the effects of some certain hazards. It can be divided into physical vulnerability, social vulnerability, economic vulnerabilities and environmental vulnerability. Physical vulnerability indicates the potential physical damage of exposure caused by natural hazards. Vulnerability curves, quantifying the loss ratio against hazard intensity with a horizontal axis for the intensity and a vertical axis for the Mean Damage Ratio (MDR), is essential to the vulnerability assessment and quantitative evaluation of disasters. Fragility refers to the probability of diverse damage states under different hazard intensity, revealing a kind of characteristic of the exposure. Fragility curves are often used to quantify the probability of a given set of exposure at or exceeding a certain damage state. The development of quantitative fragility and vulnerability curves is the basis of catastrophe modeling. Generally, methods for quantitative fragility and vulnerability assessment can be categorized into empirical, analytical and expert opinion or judgment-based ones. Empirical method is one of the most popular methods and it relies heavily on the availability and quality of historical hazard and loss dataset, which has always been a great challenge. Analytical method is usually based on the engineering experiments and it is time-consuming and lacks built-in validation, so its credibility is also sometimes criticized widely. Expert opinion or judgment-based method is quite effective in the absence of data but the results could be too subjective so that the uncertainty is likely to be underestimated. In this study, we will present the fragility and vulnerability curves developed with empirical method based on simulated historical typhoon wind, rainfall and induced flood, and insurance policy and claim datasets of more than 100 historical typhoon events. Firstly, an insurance exposure

  9. Vulnerability of hydropower generation to climate change in China: Results based on Grey forecasting model

    International Nuclear Information System (INIS)

    This paper analyzes the long-term relationships between hydropower generation and climate factors (precipitation), hydropower generation capacity (installed capacity of hydropower station) to quantify the vulnerability of renewable energy production in China for the case of hydropower generation. Furthermore, this study applies Grey forecasting model to forecast precipitation in different provinces, and then sets up different scenarios for precipitation based on the IPCC Special Report on Emission Scenarios and results from PRECIS (Providing Regional Climate projections for Impacts Studies) model. The most important result found in this research is the increasing hydropower vulnerability of the poorest regions and the main hydropower generation provinces of China to climate change. Other main empirical results reveal that the impacts of climate change on the supply of hydropower generation in China will be noteworthy for the society. Different scenarios have different effects on hydropower generation, of which A2 scenario (pessimistic, high emission) has the largest. Meanwhile, the impacts of climate change on hydropower generation of every province are distinctly different, of which the Southwest part has the higher vulnerability than the average level while the central part lower. - Highlights: • The hydropower vulnerability will be enlarged with the rapid increase of hydropower capacity. • Modeling the vulnerability of hydropower in different scenarios and different provinces. • The increasing hydropower vulnerability of the poorest regions to climate change. • The increasing hydropower vulnerability of the main hydropower generation provinces. • Rainfall pattern caused by climate change would be the reason for the increasing vulnerability

  10. Groundwater protection and unconventional gas extraction: the critical need for field-based hydrogeological research.

    Science.gov (United States)

    Jackson, R E; Gorody, A W; Mayer, B; Roy, J W; Ryan, M C; Van Stempvoort, D R

    2013-01-01

    Unconventional natural gas extraction from tight sandstones, shales, and some coal-beds is typically accomplished by horizontal drilling and hydraulic fracturing that is necessary for economic development of these new hydrocarbon resources. Concerns have been raised regarding the potential for contamination of shallow groundwater by stray gases, formation waters, and fracturing chemicals associated with unconventional gas exploration. A lack of sound scientific hydrogeological field observations and a scarcity of published peer-reviewed articles on the effects of both conventional and unconventional oil and gas activities on shallow groundwater make it difficult to address these issues. Here, we discuss several case studies related to both conventional and unconventional oil and gas activities illustrating how under some circumstances stray or fugitive gas from deep gas-rich formations has migrated from the subsurface into shallow aquifers and how it has affected groundwater quality. Examples include impacts of uncemented well annuli in areas of historic drilling operations, effects related to poor cement bonding in both new and old hydrocarbon wells, and ineffective cementing practices. We also summarize studies describing how structural features influence the role of natural and induced fractures as contaminant fluid migration pathways. On the basis of these studies, we identify two areas where field-focused research is urgently needed to fill current science gaps related to unconventional gas extraction: (1) baseline geochemical mapping (with time series sampling from a sufficient network of groundwater monitoring wells) and (2) field testing of potential mechanisms and pathways by which hydrocarbon gases, reservoir fluids, and fracturing chemicals might potentially invade and contaminate useable groundwater. PMID:23745972

  11. Identifying typical patterns of vulnerability: A 5-step approach based on cluster analysis

    Science.gov (United States)

    Sietz, Diana; Lüdeke, Matthias; Kok, Marcel; Lucas, Paul; Carsten, Walther; Janssen, Peter

    2013-04-01

    Specific processes that shape the vulnerability of socio-ecological systems to climate, market and other stresses derive from diverse background conditions. Within the multitude of vulnerability-creating mechanisms, distinct processes recur in various regions inspiring research on typical patterns of vulnerability. The vulnerability patterns display typical combinations of the natural and socio-economic properties that shape a systems' vulnerability to particular stresses. Based on the identification of a limited number of vulnerability patterns, pattern analysis provides an efficient approach to improving our understanding of vulnerability and decision-making for vulnerability reduction. However, current pattern analyses often miss explicit descriptions of their methods and pay insufficient attention to the validity of their groupings. Therefore, the question arises as to how do we identify typical vulnerability patterns in order to enhance our understanding of a systems' vulnerability to stresses? A cluster-based pattern recognition applied at global and local levels is scrutinised with a focus on an applicable methodology and practicable insights. Taking the example of drylands, this presentation demonstrates the conditions necessary to identify typical vulnerability patterns. They are summarised in five methodological steps comprising the elicitation of relevant cause-effect hypotheses and the quantitative indication of mechanisms as well as an evaluation of robustness, a validation and a ranking of the identified patterns. Reflecting scale-dependent opportunities, a global study is able to support decision-making with insights into the up-scaling of interventions when available funds are limited. In contrast, local investigations encourage an outcome-based validation. This constitutes a crucial step in establishing the credibility of the patterns and hence their suitability for informing extension services and individual decisions. In this respect, working at

  12. Hydrogeological characteristics of the LILW disposal site

    International Nuclear Information System (INIS)

    Korea Hydro and Nuclear Power Company (KHNP) conducted site investigations for a low and intermediate-level nuclear waste repository in the Gyeong Ju site. The site characterization work constitutes a description of the site, its regional setting and the current state of the geosphere and biosphere. The main objectives of hydrogeological investigation aimed to understand the hydrogeological setting and conditions of the site, and to provide the input parameters for safety evaluation. The hydrogeological characterization of the site was performed from the results of surface based investigations, i.e geological mapping and analysis, drilling works and hydraulic testing, and geophysical survey and interpretation. The hydro-structural model based on the hydrogeological characterization consists of one-Hydraulic Soil Domain, three-Hydraulic Rock Domains and five-Hydraulic Conductor Domains. The hydrogeological framework and the hydraulic values provided for each hydraulic unit over a relevant scale were used as the baseline for the conceptualization and interpretation of flow modeling. The current hydrogeological characteristics based on the surface based investigation include some uncertainties resulted from the basic assumption of investigation methods and field data. Therefore, the reassessment of hydrostructure model and hydraulic properties based on the field data obtained during the construction is necessitated for a final hydrogeological characterization.

  13. Model based on diffuse logic for the construction of indicators of urban vulnerability in natural phenomena

    International Nuclear Information System (INIS)

    Upon considering the vulnerability of a urban system in a holistic way and taking into account some natural, technological and social factors, a model based upon a system of fuzzy logic, allowing to estimate the vulnerability of any system under natural phenomena potentially catastrophic is proposed. The model incorporates quantitative and qualitative variables in a dynamic system, in which variations in one of them have a positive or negative impact over the rest. An urban system model and an indicator model to determine the vulnerability due to natural phenomena were designed

  14. GIS-based modeling of a complex hydrogeological setting in the younger Pleistocene of NE-Germany

    Science.gov (United States)

    Brüning, Torben; Merz, Christoph; van Gasselt, Stephan; Steidl, Jörg

    2016-04-01

    The water balance of the young pleistocene landscape in northeastern Germany is exposed to strong threats by changing climate conditions. During the last two decades the landscape with its many lakes has been impacted by increasing periodic fluctuations of the climate. In addition, anthropogenic influence has been causing significant changes in the landscape in order to improve agriculture and forestry but with negative impact on the groundwater hydrology. For a sustainable ecological and economical water management it is therefore paramount to build precise groundwater data models allowing a complex spatial and multi-temporal data processing. Such models could potentially be used as sources of consistent data providing improved data sets for numerical groundwater modeling and quantitative assessments to avoid unrecoverable damage (e.g. intrusion of highly mineralised groundwater intrusion. Such assessments are cost intensive if data source are heterogeneous and not well-integrated. To allow an hydrogeologically elaborated examination of data, an effective geodata management is needed to homogenize and combine available digital and thematic map information. This work reports on a project conducted for the catchments of two streams, Quillow and Strom, located in the Uckermark, a region in northeastern Germany. The database comprises current geodatasets consisting of hydrological and hydrogeological content and old thematic maps of Quaternary geology. Available geodata, measurements and digitized map series data of this region from environmental agencies of the states Mecklenburg Western Pomerania and Brandenburg were included and homogenized considering publications and technical reports. As a result, a newly developed spatial data basis has been compiled as geodatabase using vector feature classes, raster data, TINs and relationship classes. The resulting three-dimensional image of aquifers and aquitards of the Quaternary deposits exhibit potential interfaces

  15. Development of a summer field-based hydrogeology research experience for undergraduates

    Science.gov (United States)

    Singha, K.

    2011-12-01

    A critical problem in motivating and training the next generation of environmental scientists is providing them with an integrated scientific experience that fosters a depth of understanding and helps them build a network of colleagues for their future. As the education part of an NSF-funded CAREER proposal, I have developed a three-week summer research experience for undergraduate students that links their classroom education with field campaigns aiming to make partial differential equations come "alive" in a practical, applied setting focused on hydrogeologic processes. This course has been offered to freshman- to junior-level undergraduate students from Penn State and also the three co-operating Historically Black Universities (HBUs)--Jackson State University, Fort Valley State University, and Elizabeth City State University-since 2009. Broad learning objectives include applying their knowledge of mathematics, science, and engineering to flow and transport processes in the field and communicating science effectively in poster and oral format. In conjunction with ongoing research about solute transport, students collected field data in the Shale Hills Critical Zone Observatory in Central Pennsylvania, including slug and pumping tests, ground-penetrating radar, electrical resistivity imaging, wireline logging, and optical televiewers, among other instruments. Students conducted tracer tests, where conservative solutes are introduced into a local stream and monitored. Students also constructed numerical models using COMSOL Multiphysics, a research-grade code that can be used to model any physical system; with COMSOL, students create models without needing to be trained in computer coding. With guidance, students built basic models of fluid flow and transport to visualize how heterogeneity of hydraulic and transport properties or variations in forcing functions impact their results. The development of numerical models promoted confidence in predicting flow and

  16. Combining ground-based and airborne EM through Artificial Neural Networks for modelling hydrogeological units under saline groundwater conditions

    Directory of Open Access Journals (Sweden)

    J. L. Gunnink

    2012-03-01

    Full Text Available Airborne Electro Magnetic (EM methods supply data over large areas in a cost-effective way. We used Artificial Neural Networks (ANN to classify the geophysical signal into a meaningful geological parameter. By using examples of known relations between ground-based geophysical data (in this case electrical conductivity, EC, from Electrical Cone Penetration Tests and geological parameters (presence of glacial till, we extracted learning rules that could be applied to map the presence of a glacial till using the EC profiles from the airborne EM data. The saline groundwater in the area was obscuring the EC signal from the till but by using ANN we were able to extract subtle and often non-linear, relations in EC that were representative for the presence of the till. The ANN results were interpreted as the probability of having till and showed a good agreement with drilling data. The glacial till is acting as a layer that inhibits groundwater flow, due to its high clay-content, and is therefore an important layer in hydrogeological modelling and for predicting the effects of climate change on groundwater quantity and quality.

  17. Groundwater geophysics a tool for hydrogeology

    CERN Document Server

    Kirsch, Reinhard

    2006-01-01

    Geophysical techniques can map the underground conditions apart from boreholes. The use of these methods for hydrogeological applications is demonstrated for mapping of porous and structural aquifers, determination of groundwater quality (mineralization), assessment of hydraulic properties, determination of aquifer vulnerability and mapping of contaminated sites. Additionally, a description of geophysical techniques used for groundwater studies is given including seismics, resistivity methods, magnetics, ground penetrating radar and NMR (nuclear magnetic resonance).In this second edition new c

  18. Hydrogeology of Gypsum formations

    Directory of Open Access Journals (Sweden)

    Klimchouk A.

    1996-01-01

    Full Text Available Detailed explanation of hydrogeological characteristics of gypsum aquifers is given in various situations: deep-seated karst-confined conditions, subjacent, entrenched and denuded karst types-semi-confined, phreatic and vadose conditions. The hydrogeological evolution of barren exposed gypsum karst and flow velocities in gypsum karst aquifers is also discussed.

  19. Hydrogeology of Gypsum formations

    OpenAIRE

    Klimchouk A.

    1996-01-01

    Detailed explanation of hydrogeological characteristics of gypsum aquifers is given in various situations: deep-seated karst-confined conditions, subjacent, entrenched and denuded karst types-semi-confined, phreatic and vadose conditions. The hydrogeological evolution of barren exposed gypsum karst and flow velocities in gypsum karst aquifers is also discussed.

  20. The Assessment of Comprehensive Vulnerability of Chemical Industrial Park Based on Entropy Method and Matter-element Extension Model

    Directory of Open Access Journals (Sweden)

    Yan Jingyi

    2016-01-01

    Full Text Available The paper focuses on studying connotative meaning, evaluation methods and models for chemical industry park based on in-depth analysis of relevant research results in China and abroad, it summarizes and states the feature of menacing vulnerability and structural vulnerability and submits detailed influence factors such as personnel vulnerability, infrastructural vulnerability, environmental vulnerability and the vulnerability of safety managerial defeat. Using vulnerability scoping diagram establishes 21 evaluation indexes and an index system for the vulnerability evaluation of chemical industrial park. The comprehensive weights are calculated with entropy method, combining matter-element extension model to make the quantitative evaluation, then apply to evaluate some chemical industrial park successfully. This method provides a new ideas and ways for enhancing overall safety of the chemical industrial park.

  1. Implementation of Similarity Based Kriging in Open Source Software and Application to Uncertainty Quantification and Reduction in Hydrogeological Inversion

    Science.gov (United States)

    Komara, R.; Ginsbourger, D.

    2014-12-01

    We present the implementation of Similarity Based Kriging (SBK). This approach extends Gaussian process regression (GPR) methods, typically restricted to Euclidean spaces, to spaces that are non-Euclidean or perhaps even non-metric. SBK was inspired by problems in aquifer modeling, where inputs of numerical simulations are typically curves and parameter fields, and predicting scalar or vector outputs by Kriging with such very high-dimensional inputs may seem not feasible at first. SBK combines ideas from the distance-based set-up of Scheidt and Caers (2009) with GPR and allows calculating Kriging predictions based only on similarities between inputs rather than on their high-dimensional representation. Written in open source code, this proposed approach includes automated construction of SBK models and provides diagnostics to assess model quality both in terms of covariance fitting and internal/external prediction validation. Covariance hyperparameters can be estimated both by maximum likelihood and leave-one-out cross validation relying in both cases on efficient formulas and a hybrid genetic optimization algorithm using derivatives. The determination of the best dimension for Classical multidimensional scaling (MDS) and non-metric MDS of the data will be investigated. Application of this software to real life data examples in Euclidean and non-Euclidean (dis)similarity settings will be covered and touch on aquifer modeling, hydrogeological forecasting, and sequential inverse problem solving. In the last case, a novel approach where a variant of the expected improvement criterion is used for choosing several points at a time will be presented. This part of the method and the previous covariance hyperparameter estimation parallelize naturally and we demonstrate how to save computation time by optimally distributing function evaluations over multiple cores or processors.

  2. A method proposal for cumulative environmental impact assessment based on the landscape vulnerability evaluation

    International Nuclear Information System (INIS)

    Cumulative environmental impact assessment deals with the occasional use in practical application of environmental impact assessment process. The main reasons are the difficulty of cumulative impact identification caused by lack of data, inability to measure the intensity and spatial effect of all types of impacts and the uncertainty of their future evolution. This work presents a method proposal to predict cumulative impacts on the basis of landscape vulnerability evaluation. For this purpose, qualitative assessment of landscape ecological stability is conducted and major vulnerability indicators of environmental and socio-economic receptors are specified and valuated. Potential cumulative impacts and the overall impact significance are predicted quantitatively in modified Argonne multiple matrixes while considering the vulnerability of affected landscape receptors and the significance of impacts identified individually. The method was employed in the concrete environmental impact assessment process conducted in Slovakia. The results obtained in this case study reflect that this methodology is simple to apply, valid for all types of impacts and projects, inexpensive and not time-consuming. The objectivity of the partial methods used in this procedure is improved by quantitative landscape ecological stability evaluation, assignment of weights to vulnerability indicators based on the detailed characteristics of affected factors, and grading impact significance. - Highlights: • This paper suggests a method proposal for cumulative impact prediction. • The method includes landscape vulnerability evaluation. • The vulnerability of affected receptors is determined by their sensitivity. • This method can increase the objectivity of impact prediction in the EIA process

  3. ESB-Based Sensor Web Integration for the Prediction of Electric Power Supply System Vulnerability

    Directory of Open Access Journals (Sweden)

    Milos Bogdanovic

    2013-08-01

    Full Text Available Electric power supply companies increasingly rely on enterprise IT systems to provide them with a comprehensive view of the state of the distribution network. Within a utility-wide network, enterprise IT systems collect data from various metering devices. Such data can be effectively used for the prediction of power supply network vulnerability. The purpose of this paper is to present the Enterprise Service Bus (ESB-based Sensor Web integration solution that we have developed with the purpose of enabling prediction of power supply network vulnerability, in terms of a prediction of defect probability for a particular network element. We will give an example of its usage and demonstrate our vulnerability prediction model on data collected from two different power supply companies. The proposed solution is an extension of the GinisSense Sensor Web-based architecture for collecting, processing, analyzing, decision making and alerting based on the data received from heterogeneous data sources. In this case, GinisSense has been upgraded to be capable of operating in an ESB environment and combine Sensor Web and GIS technologies to enable prediction of electric power supply system vulnerability. Aside from electrical values, the proposed solution gathers ambient values from additional sensors installed in the existing power supply network infrastructure. GinisSense aggregates gathered data according to an adapted Omnibus data fusion model and applies decision-making logic on the aggregated data. Detected vulnerabilities are visualized to end-users through means of a specialized Web GIS application.

  4. ESB-based Sensor Web integration for the prediction of electric power supply system vulnerability.

    Science.gov (United States)

    Stoimenov, Leonid; Bogdanovic, Milos; Bogdanovic-Dinic, Sanja

    2013-08-15

    Electric power supply companies increasingly rely on enterprise IT systems to provide them with a comprehensive view of the state of the distribution network. Within a utility-wide network, enterprise IT systems collect data from various metering devices. Such data can be effectively used for the prediction of power supply network vulnerability. The purpose of this paper is to present the Enterprise Service Bus (ESB)-based Sensor Web integration solution that we have developed with the purpose of enabling prediction of power supply network vulnerability, in terms of a prediction of defect probability for a particular network element. We will give an example of its usage and demonstrate our vulnerability prediction model on data collected from two different power supply companies. The proposed solution is an extension of the GinisSense Sensor Web-based architecture for collecting, processing, analyzing, decision making and alerting based on the data received from heterogeneous data sources. In this case, GinisSense has been upgraded to be capable of operating in an ESB environment and combine Sensor Web and GIS technologies to enable prediction of electric power supply system vulnerability. Aside from electrical values, the proposed solution gathers ambient values from additional sensors installed in the existing power supply network infrastructure. GinisSense aggregates gathered data according to an adapted Omnibus data fusion model and applies decision-making logic on the aggregated data. Detected vulnerabilities are visualized to end-users through means of a specialized Web GIS application.

  5. Groundwater Resource Vulnerability for Small Island Developing States

    Science.gov (United States)

    Allen, D. M.; Holding, S.

    2015-12-01

    Groundwater constitutes the majority of naturally-occurring freshwater supply on many small islands. However, in addition to potential impacts of climate change and population growth that may compromise water supply and demand on small islands, Small Island Developing States (SIDS) often lack hydrogeological data for characterizing aquifers and have limited institutional means for managing the groundwater resource. As part of UNESCO-IHP's Transboundary Water Assessment Programme (TWAP), an assessment of groundwater systems on 43 SIDS was undertaken. This SIDS assessment represents the first baseline global assessment of the status of groundwater in SIDS, covering all major island states of the world with an area less than 50,000 km2. As many SIDS comprise multiple islands with different hydrogeologic settings, a representative island from each SIDS was chosen to represent the majority of the population. Data were compiled from publications, accessible datasets and a questionnaire distributed to collect local expertise. A total of 74 variables were defined for each SIDS, according to the level of confidence in the data (i.e. high confidence when based on specific studies and low confidence when inferred). These variables represent the current hydrogeologic conditions for each island and were used to define indicators that characterise vulnerability. Recharge was modelled for both current and future projected climate change for the 2060s using regionally downscaled data for each SIDS to identify islands likely to experience significant stress due to changes in recharge. The assessment results were categorized based on island type to identify trends in hydrogeologic conditions and vulnerability for similar island types. Despite limitations and uncertainty in the data used in the assessment, the results provide a broad assessment of current and future groundwater resource vulnerability for SIDS throughout the world.

  6. A Real-Life Based Evaluation Method of Deployable Vulnerable Road User Protection Systems

    NARCIS (Netherlands)

    Fredriksson, R.; Dahlgren, M.; Schijndel-de Nooij, M. van; Hair-Buijssen, S.H.H.M. de; Montfort, S. van

    2014-01-01

    Objective: The aim of this study was to develop a real-life-based evaluation method, incorporating vulnerable road user (VRU) full-body loading to a vehicle with a deployable protection system in relevant test setups, and use this method to evaluate a prototype pedestrian and cyclist protection syst

  7. Decision Aid Tool and Ontology-Based Reasoning for Critical Infrastructure Vulnerabilities and Threats Analysis

    Science.gov (United States)

    Choraś, Michał; Flizikowski, Adam; Kozik, Rafał; Hołubowicz, Witold

    In this paper, a decision aid tool (DAT) for Critical Infrastructure threats analysis and ranking is presented. We propose the ontology-based approach that provides classification, relationships and reasoning about vulnerabilities and threats of the critical infrastructures. Our approach is a part of research within INSPIRE project for increasing security and protection through infrastructure resilience.

  8. A landscape-based assessment of climate change vulnerability for all native Hawaiian plants

    Science.gov (United States)

    Fortini, Lucas; Price, Jonathan; Jacobi, James; Vorsino, Adam; Burgett, Jeff; Brinck, Kevin W.; Amidon, Fred; Miller, Steve; `Ohukani`ohi`a Gon, Sam; Koob, Gregory; Paxton, Eben

    2013-01-01

    In Hawaiʽi and elsewhere, research efforts have focused on two main approaches to determine the potential impacts of climate change on individual species: estimating species vulnerabilities and projecting responses of species to expected changes. We integrated these approaches by defining vulnerability as the inability of species to exhibit any of the responses necessary for persistence under climate change (i.e., tolerate projected changes, endure in microrefugia, or migrate to new climate-compatible areas, but excluding evolutionary adaptation). To operationalize this response-based definition of species vulnerability within a landscape-based analysis, we used current and future climate envelopes for each species to define zones across the landscape: the toleration zone; the microrefugia zone; and the migration zone. Using these response zones we calculated a diverse set of factors related to habitat area, quality, and distribution for each species, including the amount of habitat protection and fragmentation and areas projected to be lost to sea-level rise. We then calculated the probabilities of each species exhibiting these responses using a Bayesian network model and determined the overall climate change vulnerability of each species by using a vulnerability index. As a first iteration of a response-based species vulnerability assessment (VA), our landscape-based analysis effectively integrates species-distribution models into a Bayesian network-based VA that can be updated with improved models and data for more refined analyses in the future. Our results show that the species most vulnerable to climate change also tend to be species of conservation concern due to non-climatic threats (e.g., competition and predation from invasive species, land-use change). Also, many of Hawaiʽi’s taxa that are most vulnerable to climate change share characteristics with species that in the past were found to be at risk of extinction due to non-climatic threats (e

  9. Web based remote monitoring and controlling system for vulnerable environments

    Science.gov (United States)

    Thomas, Aparna; George, Minu

    2016-03-01

    The two major areas of concern in industrial establishments are monitoring and security. The remote monitoring and controlling can be established with the help of Web technology. Managers can monitor and control the equipment in the remote area through a web browser. The targeted area includes all type of susceptible environment like gas filling station, research and development laboratories. The environmental parameters like temperature, light intensity, gas etc. can be monitored. Security is a very important factor in an industrial setup. So motion detection feature is added to the system to ensure the security. The remote monitoring and controlling system makes use of the latest, less power consumptive and fast working microcontroller like S3C2440. This system is based on ARM9 and Linux operating system. The ARM9 will collect the sensor data and establish real time video monitoring along with motion detection feature. These captured video data as well as environmental data is transmitted over internet using embedded web server which is integrated within the ARM9 board.

  10. Hydrogeology and Water Quality of the Pepacton Reservoir Watershed in Southeastern New York. Part 3. Responses of Stream Base-Flow Chemistry to Hydrogeologic Factors and Nonpoint-Sources of Contamination

    Science.gov (United States)

    Heisig, Paul M.; Phillips, Patrick J.

    2004-01-01

    Base-flow samples were collected seasonally from 20 small streams in the 372-square-mile Pepacton Reservoir watershed to evaluate the effects of hydrogeologic factors and nonpoint sources of contamination on the chemical composition of ground-water discharge. The reservoir provides part of New York City?s water supply. The subbasins represented one of three general types of land use, each with at least 45 percent forested area (mostly on the hillsides): farmed (dairy) land, formerly farmed land with low-density residential development, or forested land with little or no development. The subbasin areas ranged from 0.38 to 10.23 square miles. All streams were sampled in December 2000 and in May, July, and October 2001. Three of the sites were designated as landuse- index sites and were sampled as many as five additional times during the study. No samples exceeded state or federal drinking-water standards for chloride, sodium, nitrate, orthophosphate, herbicides, or herbicide degradates. The chemical composition of base-flow samples was classified into major-ion water types, which were broadly defined as naturally occurring and road-salt-affected water types. About one-third of the base-flow samples were roadsalt- affected types. Natural water types were differentiated as dilute or evolved. Dilute waters have bicarbonate and sulfate as dominant anions and evolved waters have only bicarbonate as a dominant anion. Dilute water types indicate relatively short ground-water residence times or contact with unreactive aquifer material. Evolved waters have either longer ground-water residence time or contact with more reactive aquifer material than dilute ground waters. The larger subbasins with wider valley-bottom areas were more likely to have evolved water types than small subbasins with little floodplain development. Positive correlations between selected constituents and the intensity of nonpoint sources emphasize the connection between land use, shallow ground

  11. On the combination of isotope hydrogeology with regional flow and transport modelling

    International Nuclear Information System (INIS)

    Many different methods and tools can be used when trying to improve the information basis on which decisions are made for maintaining a quantitatively and qualitatively safe, long-term use of groundwater resources. In this thesis, classical hydrogeological examinations, hydrochemical investigations, environmental isotope studies, computerized groundwater flow modelling and radioisotope transport modelling have been applied to the large system of reservoirs in the sedimentary deposits of southwestern Scania, Sweden. The stable isotopes 2H, 18O and 13C and the radioactive 3H and 14C have been measured and the results obtained can improve the estimations of the periods of recharge and the average circulation times of the groundwater reservoirs studied. A groundwater flow model based on finite difference techniques and a continuum approach has been modified by data from traditional hydrogeological studies. The computer code, NEWSAM, has been used to simulate steady-state and transient isotope transport in the area studied, taking into account advective transport with radioactive decay. The interacting groundwater resevoirs studied have been represented by a three-dimensional system of grids in the numerical model. A major merit of this combination of isotope hydrogeology and regional flow and transport modelling is that the isotope transport simulations help to demonstrate where zones particularly vulnerable to pollution are situated. These locations are chiefly the results of the hydrogeological characteristics traditionally examined, but they are revealed by means of the transport model. Subsequent, more detailed investigations can then be focussed primarily on these vulnerable zones. High contents of radioisotopes in the main aquifer of southwestern Scania may indicate that groundwater withdrawals have stimulated recharge from shallow aquifers and surface waters and that the risk of pollution has increased. (196 refs.) (au)

  12. Vulnerability Assessment of Snow Disaster Based on Traffic System: A Case Study of Chenzhou City in Hunan Province, China

    Institute of Scientific and Technical Information of China (English)

    Xu Xiaoge; Wang Jingai

    2009-01-01

    The article establishes the patterns of urban snow di-saster system and disaster chain based on the theory of regional disaster system. The patterns indicate that urban snow disaster is exacerbated mainly through the traffic system. In addition, the paper sets up the vulnerability assessment index system and synthetically vulnerability assessment model of urban snow disaster which are mainly based on traffic system, and applies them in Chenzhou City. The results of assessment indicate that obvious geographical differences exist in the vulnerability of snow disaster bearing bodies: vulnerability of Chenzhou section of the Beijing-Zhuhai expressway is the highest in Chenzhou City, and the southeastern counties are more vulnerable than the northwest region. Furthermore, according to the snow disaster vulnerability dynamic process analysis, the vulnerability of Chenzhou City obviously increased in 2008 winter compared with that in 2007. Finally, the paper presents some suggestions for the locations of the emergency commands and the reserves of relief materials based on the evaluation results, and points out that disaster monitoring and relevant technical level should be strengthened for the minimization of traffic system's vulner-ability.

  13. Uncertainty Management in Seismic Vulnerability Assessment Using Granular Computing Based on Covering of Universe

    Science.gov (United States)

    Khamespanah, F.; Delavar, M. R.; Zare, M.

    2013-05-01

    Earthquake is an abrupt displacement of the earth's crust caused by the discharge of strain collected along faults or by volcanic eruptions. Earthquake as a recurring natural cataclysm has always been a matter of concern in Tehran, capital of Iran, as a laying city on a number of known and unknown faults. Earthquakes can cause severe physical, psychological and financial damages. Consequently, some procedures should be developed to assist modelling the potential casualties and its spatial uncertainty. One of these procedures is production of seismic vulnerability maps to take preventive measures to mitigate corporeal and financial losses of future earthquakes. Since vulnerability assessment is a multi-criteria decision making problem depending on some parameters and expert's judgments, it undoubtedly is characterized by intrinsic uncertainties. In this study, it is attempted to use Granular computing (GrC) model based on covering of universe to handle the spatial uncertainty. Granular computing model concentrates on a general theory and methodology for problem solving as well as information processing by assuming multiple levels of granularity. Basic elements in granular computing are subsets, classes, and clusters of a universe called elements. In this research GrC is used for extracting classification rules based on seismic vulnerability with minimum entropy to handle uncertainty related to earthquake data. Tehran was selected as the study area. In our previous research, Granular computing model based on a partition model of universe was employed. The model has some kinds of limitations in defining similarity between elements of the universe and defining granules. In the model similarity between elements is defined based on an equivalence relation. According to this relation, two objects are similar based on some attributes, provided for each attribute the values of these objects are equal. In this research a general relation for defining similarity between

  14. Vulnerable bodies, vulnerable systems

    OpenAIRE

    Philippopoulos-Mihalopoulos, Andreas; Webb, Tom

    2015-01-01

    In this paper we examine the concept of vulnerability as it relates to the materiality of systems, the exclusion of human physical corporeality, and social exclusion in Luhmann’s theory of social autopoiesis. We ask whether a concept of vulnerability can be included in autopoiesis in order to better conceptualise social exclusion and the excluded, with a view to understanding how, if at all, the dangers posed by this exclusion are mitigated by autopoietic processes. We are emphatically not re...

  15. Studies on Some Nitramine based Low Vulnerability Ammunition Propellants with Cellulose Acetate as a Binder

    Directory of Open Access Journals (Sweden)

    A.G.A. Pillai

    1996-04-01

    Full Text Available Several formulations of propellants based on RDX as an energetic solid ingredients and cellulose acetate (CA as a binder were processed using either dioctyl pthalate(DOP or tracetin(TA as plastisizer and a small amount of nitrocellulose(NC. The Performance of these propellants was evaluated on the basis of closed vessel firing data. The vulnerability aspects of these formulations were compared with those of conventional picrite propellant, NQ on the basis of their ignition temperatures and sensitivity to friction and impact. Triacetin was found to be better plasticizer than DOP for CA binder. Some RDX/CA/TA/NC/-based propellants were found to have energy levels comparable with NQ propellant and had less sensitivity to heat, impact and friction, and therefore have the potential for being used as low-vulnerability ammunition propellants for gun applications.

  16. Home and Community-Based Service Use by Vulnerable Older Adults

    OpenAIRE

    Weaver, Raven Hannah

    2014-01-01

    Home and community based services (HCBS) are designed to provide services that meet the increasing and diverse needs of the older adult population who wish to age-in-place for as long as possible in their homes and community. Yet, little is known about the choices people make when selecting services. The purpose of this study was to assess HCBS use among vulnerable older adults. Andersen’s (1995) behavioral model of health services use provided theoretical guidance for selecting and explainin...

  17. UNCERTAINTY MANAGEMENT IN SEISMIC VULNERABILITY ASSESSMENT USING GRANULAR COMPUTING BASED ON COVERING OF UNIVERSE

    Directory of Open Access Journals (Sweden)

    F. Khamespanah

    2013-05-01

    Granular computing model concentrates on a general theory and methodology for problem solving as well as information processing by assuming multiple levels of granularity. Basic elements in granular computing are subsets, classes, and clusters of a universe called elements. In this research GrC is used for extracting classification rules based on seismic vulnerability with minimum entropy to handle uncertainty related to earthquake data. Tehran was selected as the study area. In our previous research, Granular computing model based on a partition model of universe was employed. The model has some kinds of limitations in defining similarity between elements of the universe and defining granules. In the model similarity between elements is defined based on an equivalence relation. According to this relation, two objects are similar based on some attributes, provided for each attribute the values of these objects are equal. In this research a general relation for defining similarity between elements of universe is proposed. The general relation is used for defining similarity and instead of partitioning the universe, granulation is done based on covering of universe. As a result of the study, a physical seismic vulnerability map of Tehran has been produced based on granular computing model. The accuracy of the seismic vulnerability map is evaluated using granular computing model based on covering of universe. The comparison between this model and granular computing model based on partition model of universe is undertaken which verified the superiority of the GrC based on covering of the universe in terms of the match between the achieved results with those confirmed by the related experts' judgments.

  18. Estimation of groundwater vulnerability to pollution based on DRASTIC in the Niipele sub-basin of the Cuvelai Etosha Basin, Namibia

    Science.gov (United States)

    Hamutoko, J. T.; Wanke, H.; Voigt, H. J.

    2016-06-01

    Surface water is a scarce resource in Namibia with about sixty percent of Namibia's population dependent on groundwater for drinking purposes. With increasing population, the country faces water challenges and thus groundwater resources need to be managed properly. One important aspect of Integrated Water Resources Management is the protection of water resources, including protection of groundwater from contamination and over-exploitation. This study explores vulnerability mapping as a basic tool for protecting groundwater resources from pollution. It estimates groundwater vulnerability to pollution in the upper Niipele sub-basin of the Cuvelai-Etosha in Northern Namibia using the DRASTIC index. The DRASTIC index uses GIS to estimate groundwater vulnerability by overlaying different spatially referenced hydrogeological parameters that affect groundwater contamination. The study assesses the discontinuous perched aquifer (KDP) and the Ohangwena multi-layered aquifer 1 (KOH-1). For perched aquifers, point data was regionalized by a hydrotope approach whereas for KOH-1 aquifer, inverse distance weighting was used. The hydrotope approach categorized different parts of the hydrogeological system with similar properties into five hydrotopes. The result suggests that the discontinuous perched aquifers are more vulnerable than Ohangwena multi-layered aquifer 1. This implies that vulnerability increases with decreasing depth to water table because contaminants have short travel time to reach the aquifer when they are introduced on land surface. The nitrate concentration ranges between 2 and 288 mg/l in perched aquifers while in Ohangwena multi-layered aquifer 1, it ranges between 1 and 133 mg/l. It was observed that perched aquifers have high nitrate concentrations than Ohangwena 1 aquifer, which correlates well with the vulnerability results.

  19. The Structured Assessment Approach: A microcomputer-based insider-vulnerability analysis tool

    Energy Technology Data Exchange (ETDEWEB)

    Patenaude, C.J.; Sicherman, A.; Sacks, I.J.

    1986-01-01

    The Structured Assessment Approach (SAA) was developed to help assess the vulnerability of safeguards systems to insiders in a staged manner. For physical security systems, the SAA identifies possible diversion paths which are not safeguarded under various facility operating conditions and insiders who could defeat the system via direct access, collusion or indirect tampering. For material control and accounting systems, the SAA identifies those who could block the detection of a material loss or diversion via data falsification or equipment tampering. The SAA, originally designed to run on a mainframe computer, has been converted to run on a personal computer. Many features have been added to simplify and facilitate its use for conducting vulnerability analysis. The SAA microcomputer based approach is discussed in this paper.

  20. Tsunami damages assessment: vulnerability functions on buildings based on field and earth observation survey.

    Science.gov (United States)

    Gauraz, A. L.; Valencia, N.; Koscielny, M.; Guillande, R.; Gardi, A.; Leone, F.; Salaun, T.

    2009-04-01

    The assessment of damages caused by tsunami scenarios on coastal buildings requires using vulnerability matrixes or functions to carry out a relation between the magnitude of the phenomena and the damage expected. These functions represent the probability for a building belonging to a class of vulnerability to suffer from a mean damage level. The physical vulnerability of buildings depends on two parameters: the solicitation level applied by the tsunami on buildings and their resistance capacity. According to the authors after post-tsunami observations (Reese et al. 2007; Ruangrassamee et al. 2006; Leone et al. 2006; Peiris 2006), the level of damage is clearly linked to the water elevation of the inundated areas and the type of observed buildings. Very few works propose relations based on velocity or hydrodynamic pressure of the waves. An approach developed for the estimation of the building vulnerability consists in deriving empirical damage functions starting from field observations. As part of the SCHEMA European Project on the vulnerability assessment for tsunami hazards in the Atlantic and Mediterranean area, vulnerability functions have been elaborated for different classes of buildings in order to produce vulnerability maps for exposed areas with emphasis on extraction of building characteristics using remote sensing data. The damage detection has been carried out by field data collected after the 24 December 2006 tsunami event on the southwest area of Banda Aceh (Sumatra, Thailand) completed by photo-interpretation of satellite images to get representative functions with large population of samples. The building classes consist in several categories depending mainly on the type of construction material (timber/bamboo, traditional brick, reinforced concrete …), the type of structure (beam, pillars, etc) and the number of storeys. The level of damage has been also classified in five categories, from D0 (no damage) to D5 (total destruction). Vulnerability

  1. Remote Sensing Based Vulnerability Assessment of Desertification in Mongolia and Myanmar

    Science.gov (United States)

    Lim, C. H.; Lee, E. J.; Song, C.; Lee, W. K.; Jeon, S. W.

    2015-12-01

    Desertification is one of the global threatening problems in respect of society, economy, and environment, and the assessment of desertification is essential for land planning and management. However desertification is a process that encompasses various factors in various aspects, having difficulties to assess qualitatively. The main purpose of the research is to qualitatively assess sensitivity of land to desertification, and detect the most vulnerable land to desertification in Mongolia and Myanmar using the Mediterranean Desertification and Land Use (MEDALUS) approach. MEDALUS approach aims to provide a manual on key indicators of desertification and mapping environmentally sensitive areas to desertification in the Mediterranean countries. However in this research, MEDALUS approach is implemented and reviewed on the countries located in the Middle Asia; Mongolia and Myanmar. MEDALUS approach identifies regions with the highest risk of desertification with 4 quality index; climate, soil, vegetation, management. Within the four quality index are several regional scale indicators for Mongolia and Myanmar, which gives effect with increasing or decreasing risk of desertification. MODIS satellite images, Digital Elevation Model (DEM), and climatic and geographical data were used to calculate the indicators. The weighting of each indicator ranged from 1 to 2; the higher weight the more vulnerable to desertification. The weighted indicators were allocated to 4 quality index, and the four quality index was summed to calculate Environmentally Sensitive Area Index (ESAI) representing the vulnerability of land degradation to desertification. As a result, the Middle East region of Mongolia showed the highest sensitivity, thus the most vulnerable to desertification. Based on the result of this study, it is useful to identify the current state of affairs and the necessity of land planning in Mongolia and Myanmar, one tool that can be utilized for combating desertification. The

  2. Ecological and hydrogeological problems in areas adjoining to the tailings Kryvbas fnd ways of solving

    Directory of Open Access Journals (Sweden)

    Yevhrashkina H.P.

    2011-11-01

    Full Text Available Reviewed and analyzed the geological and hydrogeological conditions and negative geo-ecological processes occurring in the zone of influence of the North Tailings Mining and Processing Plant. Based on predictive calculations carried out analysis of the impact on the eco-tailing hydrogeological conditions of neighborhoods and proposed environmental protection measures hydrogeological directions.

  3. Teaching hydrogeology: a review of current practice

    Science.gov (United States)

    Gleeson, T.; Allen, D. M.; Ferguson, G.

    2012-07-01

    Hydrogeology is now taught in a broad spectrum of departments and institutions to students with diverse backgrounds. Successful instruction in hydrogeology thus requires a variety of pedagogical approaches depending on desired learning outcomes and the background of students. We review the pedagogical literature in hydrogeology to highlight recent advances and analyze a 2005 survey among 68 hydrogeology instructors. The literature and survey results suggest there are only ~ 15 topics that are considered crucial by most hydrogeologists and > 100 other topics that are considered crucial by some hydrogeologists. The crucial topics focus on properties of aquifers and fundamentals of groundwater flow, and should likely be part of all undergraduate hydrogeology courses. Other topics can supplement and support these crucial topics, depending on desired learning outcomes. Classroom settings continue to provide a venue for emphasizing fundamental knowledge. However, recent pedagogical advances are biased towards field and laboratory instruction with a goal of bolstering experiential learning. Field methods build on the fundamentals taught in the classroom and emphasize the collection of data, data uncertainty, and the development of vocational skills. Laboratory and computer-based exercises similarly build on theory, and offer an opportunity for data analysis and integration. The literature suggests curricula at all levels should ideally balance field, laboratory, and classroom pedagogy into an iterative and integrative whole. An integrated, iterative and balanced approach leads to greater student motivation and advancement of theoretical and vocational knowledge.

  4. Assessment of groundwater vulnerability and risk to pollution in Kathmandu Valley, Nepal.

    Science.gov (United States)

    Shrestha, Sangam; Semkuyu, Dickson John; Pandey, Vishnu P

    2016-06-15

    Groundwater vulnerability and risk assessment is a useful tool for groundwater pollution prevention and control. In this study, GIS based DRASTIC model have been used to assess intrinsic aquifer vulnerability to pollution whereas Groundwater Risk Assessment Model (GRAM) was used to assess the risk to groundwater pollution in the groundwater basin of Kathmandu Valley. Seven hydrogeological factors were used in DRASTIC model to produce DRASTIC Index (DI) map which represent intrinsic groundwater vulnerability to pollution of the area. The seven hydrogeological factors used were depth to water, net recharge, aquifer media, soil media, topography, impact of vadose zone, and hydraulic conductivity of aquifer. GIS based GRAM was used to produce likelihood of release of hazards, likelihood of detection of hazards, consequence of hazards and residual risk of groundwater contamination in terms of nitrate in the groundwater basin. It was found that more than 50% of the groundwater basin area in the valley is susceptible to groundwater pollution and these areas are mostly in Northern groundwater district Low and very low vulnerable areas account for only 13% and are located in Central and Southern groundwater districts. However after taking into account the barriers to groundwater pollution and likelihood of hazards release and detection, it was observed that most areas i.e. about 87% of the groundwater basin are at moderate residual risk to groundwater pollution. The resultant groundwater vulnerability and risk map provides a basis for policy makers and planner's ability to use information effectively for decision making at protecting the groundwater from pollutants.

  5. Assessment of groundwater vulnerability and risk to pollution in Kathmandu Valley, Nepal.

    Science.gov (United States)

    Shrestha, Sangam; Semkuyu, Dickson John; Pandey, Vishnu P

    2016-06-15

    Groundwater vulnerability and risk assessment is a useful tool for groundwater pollution prevention and control. In this study, GIS based DRASTIC model have been used to assess intrinsic aquifer vulnerability to pollution whereas Groundwater Risk Assessment Model (GRAM) was used to assess the risk to groundwater pollution in the groundwater basin of Kathmandu Valley. Seven hydrogeological factors were used in DRASTIC model to produce DRASTIC Index (DI) map which represent intrinsic groundwater vulnerability to pollution of the area. The seven hydrogeological factors used were depth to water, net recharge, aquifer media, soil media, topography, impact of vadose zone, and hydraulic conductivity of aquifer. GIS based GRAM was used to produce likelihood of release of hazards, likelihood of detection of hazards, consequence of hazards and residual risk of groundwater contamination in terms of nitrate in the groundwater basin. It was found that more than 50% of the groundwater basin area in the valley is susceptible to groundwater pollution and these areas are mostly in Northern groundwater district Low and very low vulnerable areas account for only 13% and are located in Central and Southern groundwater districts. However after taking into account the barriers to groundwater pollution and likelihood of hazards release and detection, it was observed that most areas i.e. about 87% of the groundwater basin are at moderate residual risk to groundwater pollution. The resultant groundwater vulnerability and risk map provides a basis for policy makers and planner's ability to use information effectively for decision making at protecting the groundwater from pollutants. PMID:26971207

  6. Vulnerability analysis for airport networks based on fuzzy soft sets: From the structural and functional perspective

    Directory of Open Access Journals (Sweden)

    Li Shanmei

    2015-06-01

    Full Text Available Recently, much attention has been paid to the reliability and vulnerability of critical infrastructure. In air traffic systems, the vulnerability analysis for airport networks can be used to guide air traffic administrations in their prioritization of the maintenance and repair of airports, as well as to avoid unnecessary disturbances in the planning of flight schedules. In this paper, the evaluation methods of airport importance and network efficiency are established. Firstly, the evaluation indices of airport importance are proposed from both the topological and functional perspectives. The topological characteristics come from the structure of airport network and the functional features stem from the traffic flow distribution taking place inside the network. Secondly, an integrated evaluation method based on fuzzy soft set theory is proposed to identify the key airports, which can fuse together importance indices over different time intervals. Thirdly, an airport network efficiency method is established for the purpose of assessing the accuracy of the evaluation method. Finally, empirical studies using real traffic data of US and China’s airport networks show that the evaluation method proposed in this paper is the most accurate. The vulnerability of US and China’s airport networks is compared. The similarities and differences between airport geography distribution and airport importance distribution are discussed here and the dynamics of airport importance is studied as well.

  7. Design And Validation Of Specification Based Ids For Power Enhancement Related Vulnerabilities In AODV

    Directory of Open Access Journals (Sweden)

    Utpal Biswas

    2012-10-01

    Full Text Available Wireless sensor network (WSN is basically a wireless network, comprised of a large number of sensornodes which are densely deployed, small in size, lightweight and portable. AODV is a well known,standardized routing protocol used in WSNs. AODV is subject to several attacks like black hole, wormhole, mad in the middle etc. Several Intrusion detection systems (IDS have been proposed whichsuccessfully detect these attacks. Among these IDSs signature based and anomaly based are simple innature but generate false alarms. To cater to this issue, recently specification based IDS is proposed forWSNs which have low false alarms yet detect most of the attacks. Lots of works have been reported onenhancement of AODV to improve throughput, PDR, NRO, End to End delay, power etc. Power AwareAODV (POW-AODV, enhances WNSs from the perspective of lifetime of nodes (in terms of power. Inthis paper we show that POW-AODV gets subject to more vulnerability, compared to AODV, in the effortto reduce power. Such attacks reduce life time of nodes instead of increasing them. Following that wepropose a specification based IDS for this protocol to detect these vulnerabilities. We also show a usingNS-2 simulation that using the IDS POW-AODV leads to increase in lifetime of nodes, even in presence ofattacks.

  8. A watershed-based method for environmental vulnerability assessment with a case study of the Mid-Atlantic region

    International Nuclear Information System (INIS)

    The paper presents a method for environmental vulnerability assessment with a case study of the Mid-Atlantic region. The method is based on the concept of “self-/peer-appraisal” of a watershed in term of vulnerability. The self-/peer-appraisal process is facilitated by two separate linear optimization programs. The analysis provided insights on the environmental conditions, in general, and the relative vulnerability pattern, in particular, of the Mid-Atlantic region. The suggested method offers a simple but effective and objective way to perform a regional environmental vulnerability assessment. Consequently the method can be used in various steps in environmental assessment and planning. - Highlights: ► We present a method for regional environmental vulnerability assessment. ► It is based on the self-/peer-appraisal concept in term of vulnerability. ► The analysis is facilitated by two separate linear optimization programs. ► The method provides insights on the regional relative vulnerability pattern.

  9. Software Vulnerability Taxonomy Consolidation

    Energy Technology Data Exchange (ETDEWEB)

    Polepeddi, S

    2004-12-08

    In today's environment, computers and networks are increasing exposed to a number of software vulnerabilities. Information about these vulnerabilities is collected and disseminated via various large publicly available databases such as BugTraq, OSVDB and ICAT. Each of these databases, individually, do not cover all aspects of a vulnerability and lack a standard format among them, making it difficult for end-users to easily compare various vulnerabilities. A central database of vulnerabilities has not been available until today for a number of reasons, such as the non-uniform methods by which current vulnerability database providers receive information, disagreement over which features of a particular vulnerability are important and how best to present them, and the non-utility of the information presented in many databases. The goal of this software vulnerability taxonomy consolidation project is to address the need for a universally accepted vulnerability taxonomy that classifies vulnerabilities in an unambiguous manner. A consolidated vulnerability database (CVDB) was implemented that coalesces and organizes vulnerability data from disparate data sources. Based on the work done in this paper, there is strong evidence that a consolidated taxonomy encompassing and organizing all relevant data can be achieved. However, three primary obstacles remain: lack of referencing a common ''primary key'', un-structured and free-form descriptions of necessary vulnerability data, and lack of data on all aspects of a vulnerability. This work has only considered data that can be unambiguously extracted from various data sources by straightforward parsers. It is felt that even with the use of more advanced, information mining tools, which can wade through the sea of unstructured vulnerability data, this current integration methodology would still provide repeatable, unambiguous, and exhaustive results. Though the goal of coalescing all available data

  10. Software Vulnerability Taxonomy Consolidation

    Energy Technology Data Exchange (ETDEWEB)

    Polepeddi, Sriram S. [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2004-12-07

    In today's environment, computers and networks are increasing exposed to a number of software vulnerabilities. Information about these vulnerabilities is collected and disseminated via various large publicly available databases such as BugTraq, OSVDB and ICAT. Each of these databases, individually, do not cover all aspects of a vulnerability and lack a standard format among them, making it difficult for end-users to easily compare various vulnerabilities. A central database of vulnerabilities has not been available until today for a number of reasons, such as the non-uniform methods by which current vulnerability database providers receive information, disagreement over which features of a particular vulnerability are important and how best to present them, and the non-utility of the information presented in many databases. The goal of this software vulnerability taxonomy consolidation project is to address the need for a universally accepted vulnerability taxonomy that classifies vulnerabilities in an unambiguous manner. A consolidated vulnerability database (CVDB) was implemented that coalesces and organizes vulnerability data from disparate data sources. Based on the work done in this paper, there is strong evidence that a consolidated taxonomy encompassing and organizing all relevant data can be achieved. However, three primary obstacles remain: lack of referencing a common ''primary key'', un-structured and free-form descriptions of necessary vulnerability data, and lack of data on all aspects of a vulnerability. This work has only considered data that can be unambiguously extracted from various data sources by straightforward parsers. It is felt that even with the use of more advanced, information mining tools, which can wade through the sea of unstructured vulnerability data, this current integration methodology would still provide repeatable, unambiguous, and exhaustive results. Though the goal of coalescing all available data

  11. Karst groundwaters vulnerability assessment methods

    Directory of Open Access Journals (Sweden)

    Marius Vlaicu

    2008-01-01

    Full Text Available A major socio-economic and scientific issue is represented by karst hydrostructures vulnerability mapping, which qualitatively and quantitatively highlights their exposure degree. Two research trends have been developed, one taking into account the environment features exclusively – the aquifer and protective cover type, permeability, aquifer depth, recharge rate, etc. (intrinsic vulnerability, the other focused on the types and quantities of pollutants (specific vulnerability. MAGIERA (2000 described and compared 69 methods, grouped in 5 types: hydrogeological complex and setting methods, index models and analogical relations (AF, AVI, Ekv, ΔhT’, parametric system models (DRASTIC, DWSAP, SINTACS, EPPNA, GOD, EPIK, REKS, PI, GSI, GLA, mathematical models (VULK, FAVA and statistical methods (CALVUL. However, it is also possible to classify the methods on the basis of other criteria, such as scale (local, regional, national, aim (land use planning, protection zoning, site assessment and target (source or resource vulnerability.

  12. A New Method for Reclamation Planning in Coastal Areas Based on Vulnerability Assessment to Typhoon Storm Surge Inundation

    Science.gov (United States)

    Dong, S.

    2015-12-01

    Rapid urban expansion in mega-cities (cities with populations over 10 million) leads to increased land demand and vulnerability to hazards as often significant numbers of people are economically and social disadvantaged. An effective way to create new flat land for further development is land reclamation and this has reached 511.71 km2 in the period of 1990 - 2009 along the Shanghai coast. This, in turn, leads to a potential increase in the vulnerability of the new coastal area to natural hazards. This is typically represented by typhoon storms that have the potential to be the most destructive natural hazard and therefore pose a significant threat to both infrastructure and livelihood in Shanghai. Due to insufficient knowledge of vulnerability of land use to typhoon storms and current planning, the reclaimed land is becoming one of the most vulnerable parts of the coastal low-land. While it is tempting to claim there is an increasing vulnerability to typhoon-inundation in Shanghai, this must be weighed against the socio-political response, where it is likely that city authorities will undertake rational land use planning to protect the reclamation from the inundation, sea level rise, and ground subsidence. Therefore, this research present a new method for reclamation planning based on vulnerability assessment to typhoon- inundation. First, MIKE21 was used to simulate the inundation scenario of two typhoon events in 1997 and 2007 respectively. Then, the vulnerability of 7 land use types with a set of hazard-proxies to these two typhoon inundations was assessed and verified by a new stage-damage curve system. Based on the above vulnerability assessment, this research will provide a planning tool for reclamation along Shanghai coastal area. This work is part of a larger study on the response of vulnerability to land use and land cover change.

  13. Assessing groundwater vulnerability to agrichemical contamination in the Midwest US

    Science.gov (United States)

    Burkart, M.R.; Kolpin, D.W.; James, D.E.

    1999-01-01

    Agrichemicals (herbicides and nitrate) are significant sources of diffuse pollution to groundwater. Indirect methods are needed to assess the potential for groundwater contamination by diffuse sources because groundwater monitoring is too costly to adequately define the geographic extent of contamination at a regional or national scale. This paper presents examples of the application of statistical, overlay and index, and process-based modeling methods for groundwater vulnerability assessments to a variety of data from the Midwest U.S. The principles for vulnerability assessment include both intrinsic (pedologic, climatologic, and hydrogeologic factors) and specific (contaminant and other anthropogenic factors) vulnerability of a location. Statistical methods use the frequency of contaminant occurrence, contaminant concentration, or contamination probability as a response variable. Statistical assessments are useful for defining the relations among explanatory and response variables whether they define intrinsic or specific vulnerability. Multivariate statistical analyses are useful for ranking variables critical to estimating water quality responses of interest. Overlay and index methods involve intersecting maps of intrinsic and specific vulnerability properties and indexing the variables by applying appropriate weights. Deterministic models use process-based equations to simulate contaminant transport and are distinguished from the other methods in their potential to predict contaminant transport in both space and time. An example of a one-dimensional leaching model linked to a geographic information system (GIS) to define a regional metamodel for contamination in the Midwest is included.

  14. Social Adversity in Adolescence Increases the Physiological Vulnerability to Job Strain in Adulthood : A Prospective Population-Based Study

    OpenAIRE

    Westerlund, Hugo; Per E. Gustafsson; Theorell, Tores; Janlert, Urban; Hammarström, Anne

    2012-01-01

    Background: It has been argued that the association between job strain and health could be confounded by early life exposures, and studies have shown early adversity to increase individual vulnerability to later stress. We therefore investigated if early life exposure to adversity increases the individual's physiological vulnerability job strain in adulthood. Methodology/Principal Findings: In a population-based cohort (343 women and 330 men, 83% of the eligible participants), we examined the...

  15. The physical vulnerability of elements at risk: a methodology based on fluid and classical mechanics

    Science.gov (United States)

    Mazzorana, B.; Fuchs, S.; Levaggi, L.

    2012-04-01

    The impacts of the flood events occurred in autumn 2011 in the Italian regions Liguria and Tuscany revived the engagement of the public decision makers to enhance in synergy flood control and land use planning. In this context, the design of efficient flood risk mitigation strategies and their subsequent implementation critically relies on a careful vulnerability analysis of both, the immobile and mobile elements at risk potentially exposed to flood hazards. Based on fluid and classical mechanics notions we developed computation schemes enabling for a dynamic vulnerability and risk analysis facing a broad typological variety of elements at risk. The methodological skeleton consists of (1) hydrodynamic computation of the time-varying flood intensities resulting for each element at risk in a succession of loading configurations; (2) modelling the mechanical response of the impacted elements through static, elasto-static and dynamic analyses; (3) characterising the mechanical response through proper structural damage variables and (4) economic valuation of the expected losses as a function of the quantified damage variables. From a computational perspective we coupled the description of the hydrodynamic flow behaviour and the induced structural modifications of the elements at risk exposed. Valuation methods, suitable to support a correct mapping from the value domains of the physical damage variables to the economic loss values are discussed. In such a way we target to complement from a methodological perspective the existing, mainly empirical, vulnerability and risk assessment approaches to refine the conceptual framework of the cost-benefit analysis. Moreover, we aim to support the design of effective flood risk mitigation strategies by diminishing the main criticalities within the systems prone to flood risk.

  16. Bedrock hydrogeology Forsmark. Site descriptive modelling, SDM-Site Forsmark

    Energy Technology Data Exchange (ETDEWEB)

    Follin, Sven (SF GeoLogic AB, Taeby (Sweden))

    2008-12-15

    The Swedish Nuclear Fuel and Waste Management Company (SKB) has conducted site investigations at two different locations, the Forsmark and Laxemar-Simpevarp areas, with the objective of siting a final repository for spent nuclear fuel according to the KBS-3 concept. Site characterisation should provide all data required for an integrated evaluation of the suitability of the investigated site and an important component in the characterisation work is the development of a hydrogeological model. The hydrogeological model is used by repository engineering to design the underground facility and to develop a repository layout adapted to the site. It also provides input to the safety assessment. Another important use of the hydrogeological model is in the environmental impact assessment. This report presents the understanding of the hydrogeological conditions of the bedrock at Forsmark reached following the completion of the surface-based investigations and provides a summary of the bedrock hydrogeological model and the underlying data supporting its development. It constitutes the main reference on bedrock hydrogeology for the site descriptive model concluding the surface-based investigations at Forsmark, SDM-site, and is intended to describe the hydraulic properties and hydrogeological conditions of the bedrock at the site and to give the information essential for demonstrating understanding

  17. Bedrock hydrogeology Forsmark. Site descriptive modelling, SDM-Site Forsmark

    International Nuclear Information System (INIS)

    The Swedish Nuclear Fuel and Waste Management Company (SKB) has conducted site investigations at two different locations, the Forsmark and Laxemar-Simpevarp areas, with the objective of siting a final repository for spent nuclear fuel according to the KBS-3 concept. Site characterisation should provide all data required for an integrated evaluation of the suitability of the investigated site and an important component in the characterisation work is the development of a hydrogeological model. The hydrogeological model is used by repository engineering to design the underground facility and to develop a repository layout adapted to the site. It also provides input to the safety assessment. Another important use of the hydrogeological model is in the environmental impact assessment. This report presents the understanding of the hydrogeological conditions of the bedrock at Forsmark reached following the completion of the surface-based investigations and provides a summary of the bedrock hydrogeological model and the underlying data supporting its development. It constitutes the main reference on bedrock hydrogeology for the site descriptive model concluding the surface-based investigations at Forsmark, SDM-site, and is intended to describe the hydraulic properties and hydrogeological conditions of the bedrock at the site and to give the information essential for demonstrating understanding

  18. A metric-based assessment of flood risk and vulnerability of rural communities in the Lower Shire Valley, Malawi

    Science.gov (United States)

    Adeloye, A. J.; Mwale, F. D.; Dulanya, Z.

    2015-06-01

    In response to the increasing frequency and economic damages of natural disasters globally, disaster risk management has evolved to incorporate risk assessments that are multi-dimensional, integrated and metric-based. This is to support knowledge-based decision making and hence sustainable risk reduction. In Malawi and most of Sub-Saharan Africa (SSA), however, flood risk studies remain focussed on understanding causation, impacts, perceptions and coping and adaptation measures. Using the IPCC Framework, this study has quantified and profiled risk to flooding of rural, subsistent communities in the Lower Shire Valley, Malawi. Flood risk was obtained by integrating hazard and vulnerability. Flood hazard was characterised in terms of flood depth and inundation area obtained through hydraulic modelling in the valley with Lisflood-FP, while the vulnerability was indexed through analysis of exposure, susceptibility and capacity that were linked to social, economic, environmental and physical perspectives. Data on these were collected through structured interviews of the communities. The implementation of the entire analysis within GIS enabled the visualisation of spatial variability in flood risk in the valley. The results show predominantly medium levels in hazardousness, vulnerability and risk. The vulnerability is dominated by a high to very high susceptibility. Economic and physical capacities tend to be predominantly low but social capacity is significantly high, resulting in overall medium levels of capacity-induced vulnerability. Exposure manifests as medium. The vulnerability and risk showed marginal spatial variability. The paper concludes with recommendations on how these outcomes could inform policy interventions in the Valley.

  19. Project for study of seismic-hydrogeological phenomena in Balkan area

    International Nuclear Information System (INIS)

    The International Project of UNESCO - Bulgarian Academy of Sciences has the title 'Seismic - hydrogeological vulnerability of the geoenvironment and the population in the Balkan area'. The Project has a responsible task to make a study of the seismic-hydrogeological phenomena in seven Balkan countries. The study includes the collection of information for these phenomena, its analysis, documentation and comparison. The primary information will contribute also to solving several transboundary problems in the area. The obtained data will be applied for the creation of a database about the studied seismic-hydrogeological phenomena. It will be used for the primary mapping of established seismic-hydrogeological manifestations and supposed ones. On the basis of the obtained information we will go to the assessment of the seismic-hydrogeological vulnerability of the geological environment and the population in the investigated territories. The Project investigations could be used also for several recommendations related to the reduction of negative effects of the seismic-hydrogeological phenomena in seven Balkan countries. The Balkan experts will try to propose also more rational exploration of the rare positive effects of the seismic-hydrogeological manifestations. (authors)

  20. Mapping the groundwater vulnerability for pollution at the pan African scale

    Science.gov (United States)

    Ouedraogo, Issoufou; Defourny, Pierre; Vanclooster, Marnik

    2015-04-01

    We mapped the pan-African intrinsic and specific vulnerability of groundwater systems towards pollution. We compiled the most recent continental scale information on soil, land use, geology, hydrogeology and climate in a Geographical Information System (GIS) at the resolution of 15kmx15km and the 1:60,000,000 scale and implemented an indicator vulnerability model based on the DRASTIC method. The intrinsic vulnerability map reveals that groundwater is highly vulnerable in Central, West and some areas of North Africa, where the watertable is very low. The intrinsic vulnerability is very low in the large sedimentary basins of the African deserts where groundwater situates in very deep aquifers. The specific vulnerability is obtained by overlaying the intrinsic vulnerability with current land use. The specific vulnerability is high in North, Central, and West Africa and strongly related to water table depths and development of agricultural activities. Subsequently, we performed a sensitivity analysis to evaluate the relative importance of each indicator parameter on groundwater vulnerability for pollution. The sensitivity analysis indicated that the removal of the vadose zone impact, the depth of the groundwater, the hydraulic conductivity and the net recharge causes a large variation in the vulnerability index. The pan African assessment of groundwater vulnerability presented in this paper is expected to be of particular value for water policy and for designing water resources management programmes. We expect, however, that this assessment can be strongly improved when pan African monitoring data on groundwater pollution will be integrated in the assessment methodology. Keywords: groundwater vulnerability, pan-Africa, DRASTIC method, Sensitivity analysis, GIS

  1. Identifying the world's most climate change vulnerable species: a systematic trait-based assessment of all birds, amphibians and corals.

    Science.gov (United States)

    Foden, Wendy B; Butchart, Stuart H M; Stuart, Simon N; Vié, Jean-Christophe; Akçakaya, H Resit; Angulo, Ariadne; DeVantier, Lyndon M; Gutsche, Alexander; Turak, Emre; Cao, Long; Donner, Simon D; Katariya, Vineet; Bernard, Rodolphe; Holland, Robert A; Hughes, Adrian F; O'Hanlon, Susannah E; Garnett, Stephen T; Sekercioğlu, Cagan H; Mace, Georgina M

    2013-01-01

    Climate change will have far-reaching impacts on biodiversity, including increasing extinction rates. Current approaches to quantifying such impacts focus on measuring exposure to climatic change and largely ignore the biological differences between species that may significantly increase or reduce their vulnerability. To address this, we present a framework for assessing three dimensions of climate change vulnerability, namely sensitivity, exposure and adaptive capacity; this draws on species' biological traits and their modeled exposure to projected climatic changes. In the largest such assessment to date, we applied this approach to each of the world's birds, amphibians and corals (16,857 species). The resulting assessments identify the species with greatest relative vulnerability to climate change and the geographic areas in which they are concentrated, including the Amazon basin for amphibians and birds, and the central Indo-west Pacific (Coral Triangle) for corals. We found that high concentration areas for species with traits conferring highest sensitivity and lowest adaptive capacity differ from those of highly exposed species, and we identify areas where exposure-based assessments alone may over or under-estimate climate change impacts. We found that 608-851 bird (6-9%), 670-933 amphibian (11-15%), and 47-73 coral species (6-9%) are both highly climate change vulnerable and already threatened with extinction on the IUCN Red List. The remaining highly climate change vulnerable species represent new priorities for conservation. Fewer species are highly climate change vulnerable under lower IPCC SRES emissions scenarios, indicating that reducing greenhouse emissions will reduce climate change driven extinctions. Our study answers the growing call for a more biologically and ecologically inclusive approach to assessing climate change vulnerability. By facilitating independent assessment of the three dimensions of climate change vulnerability, our approach can

  2. Identifying the world's most climate change vulnerable species: a systematic trait-based assessment of all birds, amphibians and corals.

    Directory of Open Access Journals (Sweden)

    Wendy B Foden

    Full Text Available Climate change will have far-reaching impacts on biodiversity, including increasing extinction rates. Current approaches to quantifying such impacts focus on measuring exposure to climatic change and largely ignore the biological differences between species that may significantly increase or reduce their vulnerability. To address this, we present a framework for assessing three dimensions of climate change vulnerability, namely sensitivity, exposure and adaptive capacity; this draws on species' biological traits and their modeled exposure to projected climatic changes. In the largest such assessment to date, we applied this approach to each of the world's birds, amphibians and corals (16,857 species. The resulting assessments identify the species with greatest relative vulnerability to climate change and the geographic areas in which they are concentrated, including the Amazon basin for amphibians and birds, and the central Indo-west Pacific (Coral Triangle for corals. We found that high concentration areas for species with traits conferring highest sensitivity and lowest adaptive capacity differ from those of highly exposed species, and we identify areas where exposure-based assessments alone may over or under-estimate climate change impacts. We found that 608-851 bird (6-9%, 670-933 amphibian (11-15%, and 47-73 coral species (6-9% are both highly climate change vulnerable and already threatened with extinction on the IUCN Red List. The remaining highly climate change vulnerable species represent new priorities for conservation. Fewer species are highly climate change vulnerable under lower IPCC SRES emissions scenarios, indicating that reducing greenhouse emissions will reduce climate change driven extinctions. Our study answers the growing call for a more biologically and ecologically inclusive approach to assessing climate change vulnerability. By facilitating independent assessment of the three dimensions of climate change vulnerability

  3. Assessment of agricultural drought vulnerability in the Philippines using remote sensing and GIS-based techniques

    International Nuclear Information System (INIS)

    Drought is a recurrent extreme climate event that can cause crop damage and yield loss, thereby inflicting negative socioeconomic impacts all over the world. According to several climate studies, drought events may be more frequent and more severe as global warming progresses. As an agricultural country, the Philippines is highly susceptible to adverse impacts of drought using remotely sensed information and geographic processing techniques. An agricultural drought vulnerability map identifying croplands that are least vulnerable, moderately vulnerable, and most vulnerable to crop water-related stress, was developed. Vulnerability factors, including land use system, irrigation support. Available soil-water holding capacity, as well as satellite-derived evapotranspiration and rainfall, were taken into consideration in classifying and mapping agricultural drought vulnerability at a national level. (author)

  4. How Nature-Based Tourism Might Increase Prey Vulnerability to Predators.

    Science.gov (United States)

    Geffroy, Benjamin; Samia, Diogo S M; Bessa, Eduardo; Blumstein, Daniel T

    2015-12-01

    Tourism can be deleterious for wildlife because it triggers behavioral changes in individuals with cascading effects on populations and communities. Among these behavioral changes, animals around humans often reduce their fearfulness and antipredator responses towards humans. A straightforward prediction is that habituation to humans associated with tourism would negatively influence reaction to predators. This could happen indirectly, where human presence decreases the number of natural predators and thus prey become less wary, or directly, where human-habituated individuals become bolder and thus more vulnerable to predation. Building on ideas from the study of traits associated with domestication and urbanization, we develop a framework to understand how behavioral changes associated with nature-based tourism can impact individual fitness, and thus the demographic trajectory of a population. PMID:26475119

  5. How Nature-Based Tourism Might Increase Prey Vulnerability to Predators.

    Science.gov (United States)

    Geffroy, Benjamin; Samia, Diogo S M; Bessa, Eduardo; Blumstein, Daniel T

    2015-12-01

    Tourism can be deleterious for wildlife because it triggers behavioral changes in individuals with cascading effects on populations and communities. Among these behavioral changes, animals around humans often reduce their fearfulness and antipredator responses towards humans. A straightforward prediction is that habituation to humans associated with tourism would negatively influence reaction to predators. This could happen indirectly, where human presence decreases the number of natural predators and thus prey become less wary, or directly, where human-habituated individuals become bolder and thus more vulnerable to predation. Building on ideas from the study of traits associated with domestication and urbanization, we develop a framework to understand how behavioral changes associated with nature-based tourism can impact individual fitness, and thus the demographic trajectory of a population.

  6. Integrating indicator-based geostatistical estimation and aquifer vulnerability of nitrate-N for establishing groundwater protection zones

    Science.gov (United States)

    Jang, Cheng-Shin; Chen, Shih-Kai

    2015-04-01

    Groundwater nitrate-N contamination occurs frequently in agricultural regions, primarily resulting from surface agricultural activities. The focus of this study is to establish groundwater protection zones based on indicator-based geostatistical estimation and aquifer vulnerability of nitrate-N in the Choushui River alluvial fan in Taiwan. The groundwater protection zones are determined by univariate indicator kriging (IK) estimation, aquifer vulnerability assessment using logistic regression (LR), and integration of the IK estimation and aquifer vulnerability using simple IK with local prior means (sIKlpm). First, according to the statistical significance of source, transport, and attenuation factors dominating the occurrence of nitrate-N pollution, a LR model was adopted to evaluate aquifer vulnerability and to characterize occurrence probability of nitrate-N exceeding 0.5 mg/L. Moreover, the probabilities estimated using LR were regarded as local prior means. IK was then used to estimate the actual extent of nitrate-N pollution. The integration of the IK estimation and aquifer vulnerability was obtained using sIKlpm. Finally, groundwater protection zones were probabilistically determined using the three aforementioned methods, and the estimated accuracy of the delineated groundwater protection zones was gauged using a cross-validation procedure based on observed nitrate-N data. The results reveal that the integration of the IK estimation and aquifer vulnerability using sIKlpm is more robust than univariate IK estimation and aquifer vulnerability assessment using LR for establishing groundwater protection zones. Rigorous management practices for fertilizer use should be implemented in orchards situated in the determined groundwater protection zones.

  7. DRASTIC-based vulnerability evaluation for groundwater environment in Kunming City

    Institute of Scientific and Technical Information of China (English)

    Changming WANG; Jianping CHEN; Pulin LI; Hao ZHANG; Lijian YANG

    2006-01-01

    Groundwater pollution has serious influences on programming and development for a city. So it has a special importance to assess reasonably the vulnerability to pollution for urban groundwater. DRASTIC is an effective method for groundwater vulnerability assessment, which has been adapted in USA and Europe countries. In this paper, DRASTIC method is applied in vulnerability assessment of shallow groundwater environment in Kunming. A total of 1 339 units are divided in this area and the grade of each unit for seven indexes is determined. Then vulnerability zones are divided in the area by DRASTIC value, which has an important meaning to city programming.

  8. Social media and gamification: Engaging vulnerable parents in an online evidence-based parenting program.

    Science.gov (United States)

    Love, Susan M; Sanders, Matthew R; Turner, Karen M T; Maurange, Marianne; Knott, Theresa; Prinz, Ronald; Metzler, Carol; Ainsworth, Andrew T

    2016-03-01

    The aim of this study was to examine the feasibility (accessibility, engagement and impact) of adding social media and gaming features (e.g., social sharing with anonymity, badges to incentivize skills practice, an accredited facilitator for support) and access via smartphones to an evidenced-based parenting program, Triple P Online. The highly vulnerable population included 155 disadvantaged, high-risk parents (e.g., 76% had a family annual income of less than $15,000; 41% had been incarcerated; 38% were in drug/alcohol treatment; and 24% had had a child removed due to maltreatment). The ethnic groups most commonly identified were African American (24%) and Hispanic (66%). Respondents were primarily mothers (86%) from five community programs in Los Angeles. The study used a single group repeated measures design (pre, post, 6-month follow-up). Data collected included standardized self-report measures, post-intervention focus groups and interviews, website usage reports, and Google Analytics. Significant multivariate ANOVA time effects were found, demonstrating reductions in child behavioral problems, reduced lax/permissive and over-reactive parenting, and decreased parental stress. No effects were found for parental confidence, attributions, or depression and anxiety (which were in the normal range at baseline). Positive effects were maintained or improved at 6-month follow-up. The participants engaged in the online community and valued its flexibility, anonymity, and shared learning. This foundational implementation trial provides support for future rigorous evaluation of social media and gaming features as a medium for increasing parental engagement in evidence-based parenting programs online--a public health approach to protect and improve the development of vulnerable children. PMID:26880281

  9. Vulnerability assessment in a participatory approach to design and implement community based adaptation to drought in the Peruvian Andes

    Science.gov (United States)

    Lasage, Ralph; Muis, Sanne; Sardella, Carolina; van Drunen, Michiel; Verburg, Peter; Aerts, Jeroen

    2015-04-01

    The livelihoods of people in the Andes are expected to be affected by climate change due to their dependence on glacier meltwater during the growing season. The observed decrease in glacier volume over the last few decades is likely to accelerate during the current century, which will affect water availability in the region. This paper presents the implementation of an approach for the participatory development of community-based adaptation measures to cope with the projected impacts of climate change, which was implemented jointly by the local community and by a team consisting of an NGO, Peruvian ministry of environment, research organisations and a private sector organisation. It bases participatory design on physical measurements, modelling and a vulnerability analysis. Vulnerability to drought is made operational for households in a catchment of the Ocoña river basin in Peru. On the basis of a household survey we explore how a vulnerability index (impacts divided by the households' perceived adaptive capacity) can be used to assess the distribution of vulnerability over households in a sub catchment. The socio-economic factors water entitlement, area of irrigated land, income and education are all significantly correlate with this vulnerability to drought. The index proved to be appropriate for communicating about vulnerability to climate change and its determining factors with different stakeholders. The water system research showed that the main source of spring water is local rainwater, and that water use efficiency in farming is low. The adaptation measures that were jointly selected by the communities and the project team aimed to increase water availability close to farmland, and increase water use efficiency, and these will help to reduce the communities vulnerability to drought.

  10. Vulnerability before, during, and after a major depressive episode - A 3-wave population-based study

    NARCIS (Netherlands)

    Ormel, J; Oldehinkel, AJ; Vollebergh, W

    2004-01-01

    Background: Vulnerability as defined by high levels of neuroticism, low self-esteem, and poor coping skills characterizes individuals with a history of major depressive episodes (MDEs). Objective: To separate postmorbid vulnerability into (1) trait effects (ie, the continuation of premorbid vulnerab

  11. Rice Production Vulnerability to Climate Change in Indonesia: An Overview on Community-based Adaptation

    Science.gov (United States)

    Komaladara, A. A. S. P.; Budiasa, I. W.; Ambarawati, I. G. A. A.

    2015-12-01

    Rice remains to be a major crop and staple food in Indonesia. The task to ensure that rice production meets the demand of a growing population continues to engage the attention of national planners and policy makers. However, the adverse effects of climate change on agriculture production have presented Indonesia with yet another significant challenge. The exposure of rice crops to climate-related hazards such as temperature stress, floods, and drought, may lead to lower yield and self-sufficiency rate. This study explores the vulnerability of rice production to the effects of climate change in Indonesia. Considering the vast geographical span of the country and varying exposure, sensitivity, and adaptive capacity to climate change at regional level, this study emphasize the importance of community-based adaptation. Results from a simulation based on production and climate data from 1984 to 2014 indicates that rice production is sensitive to variation in growing season temperature and precipitation. A projection of these climate factors in 2050 has a significant impact on the major rice crop. To manage the impact of climate change, this study turns to the potential roles of farmer organizations, such as Subak, in adaptation strategies. The Subak in Bali is recognized for its cultural and organizational framework that highlights the sharing of knowledge and local wisdom in rice production. This is demonstrated by its efficient community-based irrigation management system, leading to sustainable rice production. Keywords: rice production, climate change, community-based adaptation, Indonesia

  12. Are individual based models a suitable approach to estimate population vulnerability? - a case study

    Directory of Open Access Journals (Sweden)

    Eva Maria Griebeler

    2011-04-01

    Full Text Available European populations of the Large Blue Butterfly Maculinea arion have experienced severe declines in the last decades, especially in the northern part of the species range. This endangered lycaenid butterfly needs two resources for development: flower buds of specific plants (Thymus spp., Origanum vulgare, on which young caterpillars briefly feed, and red ants of the genus Myrmica, whose nests support caterpillars during a prolonged final instar. I present an analytically solvable deterministic model to estimate the vulnerability of populations of M. arion. Results obtained from the sensitivity analysis of this mathematical model (MM are contrasted to the respective results that had been derived from a spatially explicit individual based model (IBM for this butterfly. I demonstrate that details in landscape configuration which are neglected by the MM but are easily taken into consideration by the IBM result in a different degree of intraspecific competition of caterpillars on flower buds and within host ant nests. The resulting differences in mortalities of caterpillars lead to erroneous estimates of the extinction risk of a butterfly population living in habitat with low food plant coverage and low abundance in host ant nests. This observation favors the use of an individual based modeling approach over the deterministic approach at least for the management of this threatened butterfly.

  13. Evaluating Aquatic invertebrate vulnerability to insecticides based on intrinsic sensitivuty, biological traits, and toxic mode of action

    NARCIS (Netherlands)

    Rico, A.; Brink, van den P.J.

    2015-01-01

    In the present study, the authors evaluated the vulnerability of aquatic invertebrates to insecticides based on their intrinsic sensitivity and their population-level recovery potential. The relative sensitivity of invertebrates to 5 different classes of insecticides was calculated at the genus, fam

  14. Hydrogeology, Pesticide DRASTIC for the Surficial Aquifer. Pesticide DRASTIC coverage for the Surficial Aquifer System. Drastic maps are most useful as a generalized tool to assess regional potential aquifer vulnerability., Published in 1998, 1:24000 (1in=2000ft) scale, Florida Department of Environmental Protection.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This Hydrogeology dataset, published at 1:24000 (1in=2000ft) scale, was produced all or in part from Other information as of 1998. It is described as 'Pesticide...

  15. Hydrogeology, Pesticide DRASTIC for the Intermediate Aquifer. Pesticide DRASTIC coverage for the Intermediate Aquifer System. Drastic maps are most useful as a generalized tool to assess regional potential aquifer vulnerability., Published in 1998, 1:24000 (1in=2000ft) scale, Florida Department of Environmental Protection.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This Hydrogeology dataset, published at 1:24000 (1in=2000ft) scale, was produced all or in part from Other information as of 1998. It is described as 'Pesticide...

  16. Hydrogeology, Pesticide DRASTIC for the Floridan Aquifer . Pesticide DRASTIC coverage for the Floridan Aquifer System. Drastic maps are most useful as a generalized tool to assess regional potential aquifer vulnerability., Published in 1998, 1:24000 (1in=2000ft) scale, Florida Department of Environmental Protection.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This Hydrogeology dataset, published at 1:24000 (1in=2000ft) scale, was produced all or in part from Other information as of 1998. It is described as 'Pesticide...

  17. Social Vulnerability Index (SoVI) for South Carolina based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of South Carolina census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  18. A landscape-based assessment of climate change vulnerability for native Hawaiian plants

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — One common way to conduct species vulnerability assessments (VA) to climate change (CC) is to model species distributions and predict CC-related range shifts....

  19. Social Vulnerability Index (SoVI) for New York based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of New York census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  20. Social Vulnerability Index (SoVI) for Indiana based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Indiana census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  1. Social Vulnerability Index (SoVI) for Maine based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Maine census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  2. Social Vulnerability Index (SoVI) for Rhode Island based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Rhode Island census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  3. Social Vulnerability Index (SoVI) for Mississippi based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Mississippi census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  4. Social Vulnerability Index (SoVI) for Hawaii based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Hawaii census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  5. Social Vulnerability Index (SoVI) for Washington based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Washington census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  6. Social Vulnerability Index (SoVI) for Florida based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Florida census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  7. Social Vulnerability Index (SoVI) for Michigan based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Michigan census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  8. Social Vulnerability Index (SoVI) for Maryland based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Maryland census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  9. Social Vulnerability Index (SoVI) for California based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of California census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  10. Social Vulnerability Index (SoVI) for New Jersey based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of New Jersey census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  11. Social Vulnerability Index (SoVI) for Pennsylvania based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Pennsylvania census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  12. Social Vulnerability Index (SoVI) for Alaska based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Alaska census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  13. Social Vulnerability Index (SoVI) for Wisconsin based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Wisconsin census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  14. Social Vulnerability Index (SoVI) for Oregon based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Oregon census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  15. Social Vulnerability Index (SoVI) for Minnesota based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Minnesota census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  16. Social Vulnerability Index (SoVI) for Alabama based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Alabama census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  17. Social Vulnerability Index (SoVI) for Delaware based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Delaware census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  18. Social Vulnerability Index (SoVI) for Coastal States based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of coastal states census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  19. Social Vulnerability Index (SoVI) for Massachusetts based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Massachusetts census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  20. Social Vulnerability Index (SoVI) for Ohio based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Ohio census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  1. Social Vulnerability Index (SoVI) for Illinois based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Illinois census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  2. Social Vulnerability Index (SoVI) for Louisiana based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Louisiana census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  3. Social Vulnerability Index (SoVI) for Georgia based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Georgia census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  4. Social Vulnerability Index (SoVI) for North Carolina based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of North Carolina census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  5. Social Vulnerability Index (SoVI) for Texas based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Texas census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  6. Social Vulnerability Index (SoVI) for Connecticut based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Connecticut census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  7. Social Vulnerability Index (SoVI) for Virginia based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of Virginia census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  8. Social Vulnerability Index (SoVI) for New Hampshire based on 2000 Census Block Groups

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — This data depicts the social vulnerability of New Hampshire census block groups to environmental hazards. Data were culled primarily from the 2000 Decennial Census.

  9. Exploring drought vulnerability in Africa: an indicator based analysis to inform early warning systems

    Directory of Open Access Journals (Sweden)

    G. Naumann

    2013-10-01

    Full Text Available Drought vulnerability is a complex concept that includes both biophysical and socio-economic drivers of drought impact that determine capacity to cope with drought. In order to develop an efficient drought early warning system and to be prepared to mitigate upcoming drought events it is important to understand the drought vulnerability of the affected regions. We propose a composite Drought Vulnerability Indicator (DVI that reflects different aspects of drought vulnerability evaluated at Pan-African level in four components: the renewable natural capital, the economic capacity, the human and civic resources, and the infrastructure and technology. The selection of variables and weights reflects the assumption that a society with institutional capacity and coordination, as well as with mechanisms for public participation is less vulnerable to drought; furthermore we consider that agriculture is only one of the many sectors affected by drought. The quality and accuracy of a composite indicator depends on the theoretical framework, on the data collection and quality, and on how the different components are aggregated. This kind of approach can lead to some degree of scepticism; to overcome this problem a sensitivity analysis was done in order to measure the degree of uncertainty associated with the construction of the composite indicator. Although the proposed drought vulnerability indicator relies on a number of theoretical assumptions and some degree of subjectivity, the sensitivity analysis showed that it is a robust indicator and hence able of representing the complex processes that lead to drought vulnerability. According to the DVI computed at country level, the African countries classified with higher relative vulnerability are Somalia, Burundi, Niger, Ethiopia, Mali and Chad. The analysis of the renewable natural capital component at sub-basin level shows that the basins with high to moderate drought vulnerability can be subdivided in three

  10. The ancient Chinese notes on hydrogeology

    Science.gov (United States)

    Zhou, Yu; Zwahlen, François; Wang, Yanxin

    2011-08-01

    The ancient Chinese notes on hydrogeology are summarized and interpreted, along with records of some related matters, like groundwater exploration and utilization, karst springs, water circulation, water conservation and saline-land transformation, mine drainage, and environmental hydrogeology. The report focuses only on the earliest recorded notes, mostly up until the Han Dynasty (206 BC - AD 25). Besides the references cited, the discussion in this report is based mainly on archaeological material, the preserved written classic literature, and some assumptions and/or conclusions that have been handed down in legends to later ages. Although most material relates to ancient China, the lessons learned may have practical significance worldwide. Compared to other contemporary parts of the world, ancient China, without doubt, took the lead in the field of groundwater hydrology. The great achievements and experience of the Chinese ancestors should provide motivation and inspiration for hydrogeologists to carry out their scientific research and exploration passionately and actively.

  11. Bedrock Hydrogeology - Groundwater flow modelling. Site investigation SFR

    Energy Technology Data Exchange (ETDEWEB)

    Oehman, Johan [Geosigma AB, Uppsala (Sweden); Follin, Sven [SF GeoLogic AB, Taeby (Sweden); Oden, Magnus [SKB, Stockholm (Sweden)

    2013-05-15

    The hydrogeological model developed for the SFR extension project (PSU) consists of 40 geologically modelled deformation zones (DZ) and 8 sub-horizontal structural-hydraulic features, called SBAstructures, not defined in the geological model. However, some of the SBA-structures coincide with what is defined as unresolved possible deformation zones (Unresolved PDZ) in the geological modelling. In addition, the hydrogeological model consists of a stochastic discrete fracture network (DFN) model intended for the less fractured rock mass volumes (fracture domains) between the zones and the SBA-structures, and a stochastic fracture model intended to handle remaining Unresolved PDZs in the geological modelling not modelled as SBA-structures in the hydrogeological modelling. The four structural components of the bedrock in the hydrogeological model, i.e. DZ, SBA, Unresolved PDZ and DFN, are assigned hydraulic properties in the hydrogeological model based on the transmissivities interpreted from single-hole hydraulic tests. The main objective of the present work is to present the characteristics of the hydrogeological model with regard to the needs of the forthcoming safety assessment SR-PSU. In concrete words, simulated data are compared with measured data, i.e. hydraulic heads in boreholes and tunnel inflow to the existing repository (SFR). The calculations suggest that the available data for flow model calibration cannot be used to motivate a substantial adjustment of the initial hydraulic parameterisation (assignment of hydraulic properties) of the hydrogeological model. It is suggested that uncertainties in the hydrogeological model are studied in the safety assessment SR-PSU by means of a large number of calculation cases. These should address hydraulic heterogeneity of deterministic structures (DZ and SBA) and realisations of stochastic fractures/fracture networks (Unresolved PDZ and DFN) within the entire SFR Regional model domain.

  12. Aquifer Vulnerability Assessment Based on Sequence Stratigraphic and ³⁹Ar Transport Modeling.

    Science.gov (United States)

    Sonnenborg, Torben O; Scharling, Peter B; Hinsby, Klaus; Rasmussen, Erik S; Engesgaard, Peter

    2016-03-01

    A large-scale groundwater flow and transport model is developed for a deep-seated (100 to 300 m below ground surface) sedimentary aquifer system. The model is based on a three-dimensional (3D) hydrostratigraphic model, building on a sequence stratigraphic approach. The flow model is calibrated against observations of hydraulic head and stream discharge while the credibility of the transport model is evaluated against measurements of (39)Ar from deep wells using alternative parameterizations of dispersivity and effective porosity. The directly simulated 3D mean age distributions and vertical fluxes are used to visualize the two-dimensional (2D)/3D age and flux distribution along transects and at the top plane of individual aquifers. The simulation results are used to assess the vulnerability of the aquifer system that generally has been assumed to be protected by thick overlaying clayey units and therefore proposed as future reservoirs for drinking water supply. The results indicate that on a regional scale these deep-seated aquifers are not as protected from modern surface water contamination as expected because significant leakage to the deeper aquifers occurs. The complex distribution of local and intermediate groundwater flow systems controlled by the distribution of the river network as well as the topographical variation (Tóth 1963) provides the possibility for modern water to be found in even the deepest aquifers.

  13. Prediction of Radionuclide transfer based on soil parameters: application to vulnerability studies

    International Nuclear Information System (INIS)

    The multi factorial character of the radiocaesium and radiostrontium soil-to-plan transfer, which depends on the radionuclide level in the soil solution amplified by a plant factor, prevents from establishing univariate relationships between transfer factors and soil and/or plant parameters. The plant factor is inversely proportional to the level of competitive species in the soil solution (Ca and Mg, for radiostrontium, and K and NH4 for radiocaesium). Radionuclide level in soil solution depends on the radionuclide available fraction and its distribution coefficient. For radiostrontium, this may be obtained from the Cationic Exchange Capacity (CEC), whereas for radiocaesium the Specific Interception Potential should be calculate, both corrected by the concentrations of the competitive species and selectivity coefficients. Therefore, the transfer factor eventually depends on soil solution composition, the available fraction and the number of sorption sites, as well as on the plant factor. For a given plant, a relative sequence of transfer can be set up based solely on soil parameters, since the plant factor is cancelled. This prediction model has been compared with transfer data from experiments with Mediterranean, mineral soils, contaminated with a thermo generated aerosol, and with podzolic and organic soils, contaminated by the Chernobyl fallout. These studies revealed that it was possible to predict a relative scale of transfer for any type of soil, also allowing a scale of soil vulnerability to radiostrontium and radiocaesium contamination to be set up. (Author)

  14. Assessment of intrinsic vulnerability of an alluvial aquifer under anthropogenic pressure: cross comparison of 4 index-based groundwater vulnerability mapping models within the Biguglia lagoon watershed (Corsica, France).

    Science.gov (United States)

    Jaunat, Jessy; Huneau, Frédéric; Garel, Emilie; Devos, Alain; Lejeune, Olivier

    2016-04-01

    KEYWORDS: Alluvial aquifer, Vulnerability mapping, Index-based methods, DRASTIC, SINTACS, SI, GOD The geographical position of the Biguglia lagoon watershed south of the Bastia city (80 000 inhabitants), lead to a highly vulnerable hydrosystem setting. This littoral plain is the unique territory available for the urbanisation and for the agriculture activities (cattle breeding). All the activities developed are likely to have a qualitative impact on water infiltration and therefore on groundwater, which is in hydraulic connection with the lagoon system. Beyond this ecological issue, groundwater of this watershed is intensively used as drinking water supply. It appears essential to control the long-term groundwater quality of the Biguglia plain which is the major economic zone of Corsica. Achievement of this issue requires the identification of the areas where the alluvial aquifer is mostly vulnerable to anthropogenic activities. The results given by 4 of the most popular index-based vulnerability mapping methods (DRASTIC, SI, SINTACS and GOD) are compared. The water table, net recharge, aquifer and soils properties, topography, vadose zone and land uses have been precisely mapped and numerically translated in GIS with a 25m precision. 4 final maps were finally compiled according to the weighting factors of each methods. Hydrochemical investigations were also carried out on 30 sampling points (major ions and anthropogenic tracers) to evaluate the effect of anthropogenic activities on groundwater quality and also to validate the results of the vulnerability mapping. A comparison between the parametric models shows a significant agreement between the DRASTIC, SINTACS and SI results (2% to 5% of the total area in very low vulnerability class, 10% to 13% in low vulnerability, 16% to 23% in medium vulnerability, 31% to 53% in high vulnerability and 14% to 23% in very high vulnerability). The two first methods are quite similar, which explains the proximity of the

  15. Resilience and vulnerability to a natural hazard: A mathematical framework based on viability theory

    Science.gov (United States)

    Rougé, Charles; Mathias, Jean-Denis; Deffuant, Guillaume

    2013-04-01

    This deals with the response of a coupled human and natural system (CHANS) to a natural hazard by using the concepts of resilience and vulnerability within the mathematical framework of viability theory. This theory applies to time-evolving systems such as CHANS and assumes that their desirable properties can be defined as a subset of their state space. Policies can also apply to influence the dynamics of such systems: viability theory aims at finding the policies which keep the properties of a controlled dynamical system for so long as no disturbance hits it. The states of the system such that the properties are guaranteed constitute what is called the viability kernel. This viability framework has been extended to describe the response to a perturbation such as a natural hazard. Resilience describes the capacity of the CHANS to recover by getting back in the viability kernel, where its properties are guaranteed until the onset of the next major event. Defined for a given controlled trajectory that the system may take after the event ends, resilience is (a) whether the system comes back to the viability kernel within a given budget such as a time constraint, but also (b) a decreasing function of vulnerability. Computed for a given trajectory as well, vulnerability is a measure of the consequence of violating a property. We propose a family of functions from which cost functions and other vulnerability indicators can be derived for a certain trajectory. There can be several vulnerability functions, representing for instance social, economic or ecological vulnerability, and each representing the violation of an associated property, but these functions need to be ultimately aggregated as a single indicator. Computing the resilience and vulnerability of a trajectory enables the viability framework to describe the response of both deterministic and stochastic systems to hazards. In the deterministic case, there is only one response trajectory for a given action policy

  16. Climate vulnerability of drinking water supplies

    Science.gov (United States)

    Selmeczi, Pál; Homolya, Emese; Rotárné Szalkai, Ágnes

    2016-04-01

    Extreme weather conditions in Hungary led to difficulties in drinking water management on diverse occasions in the past. Due to reduced water resources and the coexisting high demand for drinking water in dry summer periods the availability of a number of water supplies became insufficient therefore causing limitations in water access. In some other cases, as a result of floods and flash floods over karstic areas evolving in consequence of excessive precipitation, several water supplies had to be excluded in order to avoid the risk of infections. More frequent occurrence of extreme weather conditions and further possible changes in the future induce the necessity for an analysis of the vulnerability of drinking water resources to climate change. Since 95% of the total drinking water supply in Hungary originates from subsurface layers, significance of groundwater resources is outstanding. The aim of our work carried out in the frames of the NAGiS (National Adaptation Geo-information System) project was to build up a methodology for the study and determination of the vulnerability of drinking water supplies to climate. The task covered analyses of climatic parameters influencing drinking water supplies principally and hydrogeological characteristics of the geological media that significantly determines vulnerability. Effects on drinking water resources and their reduction or exclusion may imply societal and economic consequences therefore we extended the analyses to the investigation of possibilities concerning the adaptation capacity to changed conditions. We applied the CIVAS (Climate Impact and Vulnerability Assessment Scheme) model developed in the frames of the international climate research project CLAVIER (Climate Change and Variability: Impact on Central and Eastern Europe) to characterize climate vulnerability of drinking water supplies. The CIVAS model, being based on the combined evaluation of exposure, sensitivity and adaptability, provides a unified

  17. Hydrogeologic barriers to the infiltration of treated wastewater at the Joint Base McGuire-Dix-Lakehurst Land Application Site, Burlington County, New Jersey

    Science.gov (United States)

    Fiore, Alex R.

    2016-09-02

    For the final phase of wastewater treatment operations at Joint Base McGuire-Dix-Lakehurst in Burlington County, New Jersey, treated effluent is pumped to 12 infiltration basins on a Land Application Site to recharge the unconfined Kirkwood-Cohansey aquifer system. Two of the 12 infiltration basins are operationally ineffective because discharged effluent fails to percolate and remains ponded on the basin surfaces. A study conducted by the U.S. Geological Survey, in cooperation with the U.S. Department of Defense, investigated the potential hydrogeologic conditions preventing infiltration in these basins by testing the geophysical, lithological, and hydraulic characteristics of the aquifer material underlying the site. Saturated sand, sandy clay, and unsaturated sand were encountered in succession through the upper 4 feet of sediment below land surface at the two ineffective basins. Water levels in auger borings penetrating the clay and underlying dry sand were measured as deeper than water levels in nested auger borings in the saturated sand overlying the clay, which indicates a downward vertical gradient was established after removal of the clay in the deeper borings created a conduit for drainage from the surficial saturated sands. Ground-penetrating radar surveys and additional water levels measured in piezometer wells adjacent to the infiltration basins indicated a lack of connectivity between the ponded basin water and the regional water table, and demonstrated that perched conditions were not present in native formation materials outside the inoperable basins. Therefore, the near-surface low permeability clay is likely preventing infiltration from the basin surface and causes the ineffectiveness of the two basins for wastewater land application operations.

  18. Identifying Vulnerable Nodes of Complex Networks in Cascading Failures Induced by Node-Based Attacks

    Directory of Open Access Journals (Sweden)

    Shudong Li

    2013-01-01

    Full Text Available In the research on network security, distinguishing the vulnerable components of networks is very important for protecting infrastructures systems. Here, we probe how to identify the vulnerable nodes of complex networks in cascading failures, which was ignored before. Concerned with random attack (RA and highest load attack (HL on nodes, we model cascading dynamics of complex networks. Then, we introduce four kinds of weighting methods to characterize the nodes of networks including Barabási-Albert scale-free networks (SF, Watts-Strogatz small-world networks (WS, Erdos-Renyi random networks (ER, and two real-world networks. The simulations show that, for SF networks under HL attack, the nodes with small value of the fourth kind of weight are the most vulnerable and the ones with small value of the third weight are also vulnerable. Also, the real-world autonomous system with power-law distribution verifies these findings. Moreover, for WS and ER networks under both RA and HL attack, when the nodes have low tolerant ability, the ones with small value of the fourth kind of weight are more vulnerable and also the ones with high degree are easier to break down. The results give us important theoretical basis for digging the potential safety loophole and making protection strategy.

  19. The Hydrogeological Classification of A Certain Mine in Liujiang Basin%柳江盆地某矿井水文地质类型划分探讨

    Institute of Scientific and Technical Information of China (English)

    范珊珊; 刘冀闽; 周佳鑫

    2016-01-01

    通过对井田内水文地质特征及矿井充水因素进行分析,认为该矿井水文地质条件复杂,开采易受水害威胁。依据规范中矿井水文地质类型各单项指标的分类要求,从受采掘破坏或影响的含水层及水体、矿井涌水量、矿井开采受水害影响程度以及防治水工作难易程度等方面,对各单项指标所属类别进行判定,从而确定矿井水文地质类型。结果表明该矿井水文地质类型为复杂。%Based on the analysis on the minefield hydrogeological characteristics and mine water filling factor, considered that the mine hydrogeological conditions were complex, and mine security was vulnerable to water threat. According to the requirements of mine hydrogeological type classification for each single index, mainly from the mining damage or effects of the aquifer and water, mine water inflow, mine exploiting under water effect degree and water prevention degree of difficulty, identified the category for each index to determine the mine hydrogeological type. The result showed that the mine hydrogeological type was complex.

  20. Community-based mental health support for orphans and vulnerable children in South Africa: A triangulation study.

    Science.gov (United States)

    Marais, Lochner; Sharp, Carla; Pappin, Michelle; Rani, Kholisa; Skinner, Donald; Lenka, Molefi; Cloete, Jan; Serekoane, Joe

    2014-01-01

    Community-based care is receiving increasing global attention as a way to support children who are orphaned or vulnerable due to the HIV/AIDS pandemic. Using both qualitative and quantitative methodology, this study assesses community-based responses to the well-being of orphans and vulnerable children (OVC) and compares these responses with the actual mental health of OVC in order to evaluate the South African government's approach of funding community-based organisations (CBOs) that support and care for OVC. The study results show that the activities of CBOs mainly extend government services and address poverty. Although this should not be seen as insignificant, the paper argues that CBOs give very little attention to the mental health of OVC.

  1. Waterborne toxoplasmosis investigated and analyzed under hydrogeological assessment: new data and perspectives for further research

    Science.gov (United States)

    We present a set of data on human and chicken Toxoplasma gondii seroprevalence that was investigated and analyzed in light of groundwater vulnerability information in an area of endemic waterborne toxoplasmosis in Brazil. Hydrogeological assessment was undertaken to conduct water collection from wel...

  2. DS926 Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system in Florida and parts of Georgia, Alabama, and South Carolina -- Point features used for the base of the Floridan aquifer system

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system were developed to define an updated hydrogeologic framework as part...

  3. DS926 Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system in Florida and parts of Georgia, Alabama, and South Carolina -- Geologic units forming the base of the Floridan aquifer system

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system were developed to define an updated hydrogeologic framework as part...

  4. DS926 Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system in Florida and parts of Georgia, Alabama, and South Carolina -- Raster surface depicting the base of the Floridan aquifer system

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system were developed to define an updated hydrogeologic framework as part...

  5. DS926 Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system in Florida and parts of Georgia, Alabama, and South Carolina -- Polygon regions of low permeability units forming the base of the Upper Floridan aquifer

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system were developed to define an updated hydrogeologic framework as part...

  6. Physical Vulnerability Assessment Based on Fluid and Classical Mechanics to Support Cost-Benefit Analysis of Flood Risk Mitigation Strategies

    Directory of Open Access Journals (Sweden)

    Claudio Volcan

    2012-02-01

    Full Text Available The impacts of flood events that occurred in autumn 2011 in the Italian regions of Liguria and Tuscany revived the engagement of the public decision-maker to enhance the synergy of flood control and land use planning. In this context, the design of efficient flood risk mitigation strategies and their subsequent implementation critically relies on a careful vulnerability analysis of the fixed and mobile elements exposed to flood hazard. In this paper we develop computation schemes enabling dynamic vulnerability and risk analyses for a broad typological variety of elements at risk. To show their applicability, a series of prime examples are discussed in detail, e.g. a bridge deck impacted by the flood and a car, first displaced and subsequently exposed to collision with fixed objects. We hold the view that it is essential that the derivation of the computational schemes to assess the vulnerability of endangered objects should be based on classical and fluid mechanics. In such a way, we aim to complement from a methodological perspective the existing, mainly empirical, vulnerability and risk assessment approaches and to support the design of effective flood risk mitigation strategies by defusing the main criticalities within the systems prone to flood risk.

  7. A GIS-based vulnerability assessment tool for the quantification of natural risk in mountain and coastal areas

    Science.gov (United States)

    Puissant, A.; Schlosser, A.; Gazo, A.; -P., Malet J.; Lissak, C.; Goutiere, M.; Peltier, A.; Houet, T.

    2015-04-01

    Decision-makers need friendly tools for estimating natural risk for different future scenarios and for designing risk reduction strategies. In this work, a flexible GIS-based tool is presented in order to estimate vulnerability indicators (physical, economical, social) over territories of different size and at different scales. The tool has been designed in order to meet the requests of several categories of users (e.g. risk managers, decision planners, scientists). The tool is dedicated to the assessment of the vulnerability from several natural hazards (rock fall, landslide, flood, coastal erosion). On the basis of a database on the elements at risk, the user first selects the analysis scale (micro at the scale of the element at risk; meso at the scale of the municipality; macro at the scale of the catchment). Then, the calculation of vulnerability indicators is performed from this selection. The functionalities of the tool will be presented, and example of vulnerability indicators for some communities exposed will be discussed. The tool is developed within the ANR Project SAMCO.

  8. Topological Vulnerability Evaluation Model Based on Fractal Dimension of Complex Networks.

    Science.gov (United States)

    Gou, Li; Wei, Bo; Sadiq, Rehan; Sadiq, Yong; Deng, Yong

    2016-01-01

    With an increasing emphasis on network security, much more attentions have been attracted to the vulnerability of complex networks. In this paper, the fractal dimension, which can reflect space-filling capacity of networks, is redefined as the origin moment of the edge betweenness to obtain a more reasonable evaluation of vulnerability. The proposed model combining multiple evaluation indexes not only overcomes the shortage of average edge betweenness's failing to evaluate vulnerability of some special networks, but also characterizes the topological structure and highlights the space-filling capacity of networks. The applications to six US airline networks illustrate the practicality and effectiveness of our proposed method, and the comparisons with three other commonly used methods further validate the superiority of our proposed method.

  9. Topological Vulnerability Evaluation Model Based on Fractal Dimension of Complex Networks.

    Directory of Open Access Journals (Sweden)

    Li Gou

    Full Text Available With an increasing emphasis on network security, much more attentions have been attracted to the vulnerability of complex networks. In this paper, the fractal dimension, which can reflect space-filling capacity of networks, is redefined as the origin moment of the edge betweenness to obtain a more reasonable evaluation of vulnerability. The proposed model combining multiple evaluation indexes not only overcomes the shortage of average edge betweenness's failing to evaluate vulnerability of some special networks, but also characterizes the topological structure and highlights the space-filling capacity of networks. The applications to six US airline networks illustrate the practicality and effectiveness of our proposed method, and the comparisons with three other commonly used methods further validate the superiority of our proposed method.

  10. Vulnerability of the Vulnerability Thesis.

    Science.gov (United States)

    Lutz, Frank W.

    1996-01-01

    Reexamines Callahan's book, "Education and the Cult of Efficiency" (1962), and his vulnerability thesis regarding school superintendents, discussing recommendations it made and highlighting public education in the 1990s. Callahan's recommendations were well-received but not well-heeded, and the vulnerability thesis did not provide the stimulus for…

  11. Indicator-based model to assess vulnerability to landslides in urban areas. Case study of Husi city (Eastern Romania)

    Science.gov (United States)

    Grozavu, Adrian; Ciprian Margarint, Mihai; Catalin Stanga, Iulian

    2013-04-01

    In the last three or four decades, vulnerability evolved from physical fragility meanings to a more complex concept, being a key element of risk assessment. In landslide risk assessment, there are a large series of studies regarding landslide hazard, but far fewer researches focusing on vulnerability measurement. Furthermore, there is still no unitary understanding on the methodological framework, neither any internationally agreed standard for landslide vulnerability measurements. The omnipresent common element is the existence of elements at risk, but while some approaches are limited to exposure, other focus on the degree of losses (human injuries, material damages and monetary losses, structural dysfunctions etc.). These losses are differently assessed using both absolute and relative values on qualitative or quantitative scales and they are differently integrated to provide a final vulnerability value. This study aims to assess vulnerability to landslides at local level using an indicator-based model applied to urban areas and tested for Husi town (Eastern Romania). The study region is characterized by permeable and impermeable alternating sedimentary rocks, monoclinal geological structure and hilly relief with impressive cuestas, continental temperate climate, and precipitation of about 500 mm/year, rising to 700 m and even more in some rainy years. The town is a middle size one (25000 inhabitants) and it had an ascending evolution in the last centuries, followed by an increasing human pressure on lands. Methodologically, the first step was to assess the landslide susceptibility and to identify in this way those regions within which any asset would be exposed to landslide hazards. Landslide susceptibility was assessed using the logistic regression approach, taking into account several quantitative and qualitative factors (elements of geology, morphometry, rainfall, land use etc.). The spatial background consisted in the Digital Elevation Model and all derived

  12. Hydrogeology, simulated ground-water flow, and ground-water quality, Wright-Patterson Air Force Base, Ohio

    Science.gov (United States)

    Dumouchelle, D.H.; Schalk, C.W.; Rowe, G.L.; De Roche, J.T.

    1993-01-01

    Ground water is the primary source of water in the Wright-Patterson Air Force Base area. The aquifer consists of glacial sands and gravels that fill a buried bedrock-valley system. Consolidated rocks in the area consist of poorly permeable Ordovician shale of the Richmondian stage, in the upland areas, the Brassfield Limestone of Silurian age. The valleys are filled with glacial sediments of Wisconsinan age consisting of clay-rich tills and coarse-grained outwash deposits. Estimates of hydraulic conductivity of the shales based on results of displacement/recovery tests range from 0.0016 to 12 feet per day; estimates for the glacial sediments range from less than 1 foot per day to more than 1,000 feet per day. Ground water flow from the uplands towards the valleys and the major rivers in the region, the Great Miami and the Mad Rivers. Hydraulic-head data indicate that ground water flows between the bedrock and unconsolidated deposits. Data from a gain/loss study of the Mad River System and hydrographs from nearby wells reveal that the reach of the river next to Wright-Patterson Air Force Base is a ground-water discharge area. A steady-state, three-dimensional ground-water-flow model was developed to simulate ground-water flow in the region. The model contains three layers and encompasses about 100 square miles centered on Wright-Patterson Air Force Base. Ground water enters the modeled area primarily by river leakage and underflow at the model boundary. Ground water exits the modeled area primarily by flow through the valleys at the model boundaries and through production wells. A model sensitivity analysis involving systematic changes in values of hydrologic parameters in the model indicates that the model is most sensitive to decreases in riverbed conductance and vertical conductance between the upper two layers. The analysis also indicates that the contribution of water to the buried-valley aquifer from the bedrock that forms the valley walls is about 2 to 4

  13. Applying the Flood Vulnerability Index as a Knowledge base for flood risk assessment

    NARCIS (Netherlands)

    Balica, S-F.

    2012-01-01

    Floods are one of the most common and widely distributed natural risks to life and property worldwide. An important part of modern flood risk management is to evaluate vulnerability to floods. This evaluation can be done only by using a parametric approach. Worldwide there is a need to enhance our

  14. Numerical modeling of ADA system for vulnerable road users protection based on radar and vision sensing

    NARCIS (Netherlands)

    Garate, V.R.; Bours, R.C.H.; Kietlinski, K.

    2012-01-01

    The protection of vulnerable road users (VRU) remains one of the most challenging problems for our society and several governmental and consumer organization has set targets to reduce the VRU fatality and injury rates. The automotive industry is, therefore, developing pedestrian and cyclist detectio

  15. Simulate speleogenesis processes with an approach based on fracturing and hydrogeological processes: effect of various hydraulic boundary conditions

    Science.gov (United States)

    Lafare, A.; Jourde, H.; Leonardi, V.; Pistre, S.; Dörfliger, N.

    2012-04-01

    Several numerical modeling approaches attempted to simulate the processes of karst conduit genesis. These existing methods are mainly based on the physical and chemical laws driving the carbonate dissolution processes (taking account of calcite saturation of the water and the partial pressure of carbon dioxide). As a consequence, these works bring a well-documented knowledge on the kinetics of the carbonate dissolution processes in karst systems. Nevertheless, these models are mainly applied on simplified initial void networks, which do not match the fracturing and geological reality. Considering that the initial geometry of the void network (fractures, bedding planes) would have an influence on the final pattern of the speleological network, taking account of it could improve the understanding of speleogenesis. In the aim to take into account the geometry of the initial void network (fracture networks of several orders), a numerical model is developed, which involves a pseudo-statistic fracturing generator (REZO3D, Jourde 1999, Josnin et al. 2002, Jourde et al. 2002) coupled to a finite element groundwater simulator (GROUNDWATER, F. Cornaton, CHYN, University of Neuchâtel). The principle of the modeling of the genesis of the karst drainage system is based on an analogical empirical polynomial equation considering the pore velocity and the mean age of the water as main parameters. The computation is carried out on the basis of a time step, whose duration depends on the simulated scenario (from 100 to 5000 years). The mean age of the water is used in order to simulate the decrease of the chemical dissolving potential of the water within the aquifer, in contact with the carbonate rock. The first simulator -REZO3D- allows producing three-dimensional discrete fracture networks constituted by plane fractures, whose spatial distribution respects mechanical and statistical laws. These networks are then processed in order to write finite element meshes which constitute

  16. Aespoe Hard Rock Laboratory. Analysis of fracture networks based on the integration of structural and hydrogeological observations on different scales

    International Nuclear Information System (INIS)

    Fracture networks at Aespoe have been studied for several rock types exhibiting different degrees of ductile and brittle deformation, as well as on different scales. Mesoscopic fault systems have been characterised and classified in an earlier report, this report focuses mainly on fracture networks derived on smaller scales, but also includes mesoscopic and larger scales. The TRUE-1 block has been selected for detailed structural analysis on a small scale due to the high density of relevant information. In addition to the data obtained from core materials, structural maps, BIP data and the results of hydro tests were synthesised to derive a conceptual structural model. The approach used to derive this conceptual model is based on the integration of deterministic structural evidence, probabilistic information and both upscaling and downscaling of observations and concepts derived on different scales. Twelve fracture networks mapped at different sites and scales and exhibiting various styles of tectonic deformation were analysed for fractal properties and structural and hydraulic interconnectedness. It was shown that these analysed fracture networks are not self-similar. An important result is the structural and hydraulic interconnectedness of fracture networks on all scales in the Aespoe rocks, which is further corroborated by geochemical evidence. Due to the structural and hydraulic interconnectedness of fracture systems on all scales at Aespoe, contaminants from waste canisters placed in tectonically low deformation environments would be transported - after having passed through the engineered barriers -from low-permeability fractures towards higher permeability fractures and may thus eventually reach high-permeability features

  17. Aespoe Hard Rock Laboratory. Analysis of fracture networks based on the integration of structural and hydrogeological observations on different scales

    Energy Technology Data Exchange (ETDEWEB)

    Bossart, P. [Geotechnical Inst. Ltd., Bern (Switzerland); Hermanson, Jan [Golder Associates, Stockholm (Sweden); Mazurek, M. [Univ. of Bern (Switzerland)

    2001-05-01

    Fracture networks at Aespoe have been studied for several rock types exhibiting different degrees of ductile and brittle deformation, as well as on different scales. Mesoscopic fault systems have been characterised and classified in an earlier report, this report focuses mainly on fracture networks derived on smaller scales, but also includes mesoscopic and larger scales. The TRUE-1 block has been selected for detailed structural analysis on a small scale due to the high density of relevant information. In addition to the data obtained from core materials, structural maps, BIP data and the results of hydro tests were synthesised to derive a conceptual structural model. The approach used to derive this conceptual model is based on the integration of deterministic structural evidence, probabilistic information and both upscaling and downscaling of observations and concepts derived on different scales. Twelve fracture networks mapped at different sites and scales and exhibiting various styles of tectonic deformation were analysed for fractal properties and structural and hydraulic interconnectedness. It was shown that these analysed fracture networks are not self-similar. An important result is the structural and hydraulic interconnectedness of fracture networks on all scales in the Aespoe rocks, which is further corroborated by geochemical evidence. Due to the structural and hydraulic interconnectedness of fracture systems on all scales at Aespoe, contaminants from waste canisters placed in tectonically low deformation environments would be transported - after having passed through the engineered barriers -from low-permeability fractures towards higher permeability fractures and may thus eventually reach high-permeability features.

  18. Assessment of groundwater vulnerability to nitrates from agricultural sources using a GIS-compatible logic multicriteria model.

    Science.gov (United States)

    Rebolledo, Boris; Gil, Antonia; Flotats, Xavier; Sánchez, José Ángel

    2016-04-15

    In the present study an overlay method to assess groundwater vulnerability is proposed. This new method based on multicriteria decision analysis (MCDA) was developed and validated using an appropriate case study in Aragon area (NE Spain). The Vulnerability Index to Nitrates from Agricultural Sources (VINAS) incorporates a novel Logic Scoring of Preferences (LSP) approach, and it has been developed using public geographic information from the European Union. VINAS-LSP identifies areas with five categories of vulnerability, taking into account the hydrogeological and environmental characteristics of the territory as a whole. The resulting LSP map is a regional screening tool that can provide guidance on the potential risk of nitrate pollution, as well as highlight areas where specific research and farming planning policies are required. PMID:26874616

  19. Early-life stress is associated with gender-based vulnerability to epileptogenesis in rat pups.

    Directory of Open Access Journals (Sweden)

    Sébastien Desgent

    Full Text Available During development, the risk of developing mesial temporal lobe epilepsy (MTLE increases when the developing brain is exposed to more than one insult in early life. Early life insults include abnormalities of cortical development, hypoxic-ischemic injury and prolonged febrile seizures. To study epileptogenesis, we have developed a two-hit model of MTLE characterized by two early-life insults: a freeze lesion-induced cortical malformation at post-natal day 1 (P1, and a prolonged hyperthermic seizure (HS at P10. As early life stressors lead to sexual dimorphism in both acute response and long-term outcome, we hypothesized that our model could lead to gender-based differences in acute stress response and long-term risk of developing MTLE. Male and female pups underwent a freeze-lesion induced cortical microgyrus at P1 and were exposed to HS at P10. Animals were monitored by video-EEG from P90 to P120. Pre and post-procedure plasma corticosterone levels were used to measure stress response at P1 and P10. To confirm the role of sex steroids, androgenized female pups received daily testosterone injections to the mother pre-natally and post-natally for nine days while undergoing both insults. We demonstrated that after both insults females did not develop MTLE while all males did. This correlated with a rise in corticosterone levels at P1 following the lesion in males only. Interestingly, all androgenized females showed a similar rise in corticosterone at P1, and also developed MTLE. Moreover, we found that the cortical lesion significantly decreased the latency to generalized convulsion during hyperthermia at P10 in both genders. The cortical dysplasia volumes at adulthood were also similar between male and female individuals. Our data demonstrate sexual dimorphism in long-term vulnerability to develop epilepsy in the lesion + hyperthermia animal model of MTLE and suggest that the response to early-life stress at P1 contributes significantly to

  20. Intravascular photoacoustic detection of vulnerable plaque based on constituent selected imaging

    Energy Technology Data Exchange (ETDEWEB)

    Zhang Jian; Xing Da, E-mail: xingda@scnu.edu.cn [MOE Key Laboratory of Laser Life Science and Institute of Laser Life Science, College of Biophotonics, South China Normal University, Guangzhou 510631 (China)

    2011-01-01

    Atherosclerosis, a disease of the large arteries, is the primary cause of heart disease and stroke. Over decades, atherosclerosis is characterized by thickening of the walls of the arteries, only advanced atherosclerotic disease could be observed. Photoacoustic imaging is a hybrid imaging technique that combines the advantages of high spatial resolution of ultrasound with contrast of optical absorption. In this paper, we present an intravascular photoacoustic (IVPA) imaging system to characterize vulnerable plaques by using the optical absorption contrast between different constituents. Epidemiological studies have revealed several important plaque constituents associated with early atherosclerosis, such as macrophage, cholesterol, lipid, calcification, and so on. We chose a section of lipid rich atherosclerosis artery and a section of normal artery as the phantom. Two IVPA images of them are given to show the difference between sick and normal. As a new method of detecting vulnerable plaque, IVPA constituents imaging will provide more details for diagnosis that offer an enticing prospect in early detecting of atherosclerosis.

  1. A method for detecting code security vulnerability based on variables tracking with validated-tree

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    SQL injection poses a major threat to the application level security of the database and there is no systematic solution to these attacks.Different from traditional run time security strategies such as IDS and fire wall,this paper focuses on the solution at the outset;it presents a method to find vulnerabilities by analyzing the source codes.The concept of validated tree is developed to track variables referenced by database operations in scripts.By checking whether these variables are influenced by outside inputs,the database operations are proved to be secure or not.This method has advantages of high accuracy and efficiency as well as low costs,and it is universal to any type of web application platforms.It is implemented by the SOftware code vulnerabilities of SQL injection detector(CVSID).The validity and efficiency are demonstrated with an example.

  2. Structured Assessment Approach: a microcomputer-based insider-vulnerability analysis tool

    Energy Technology Data Exchange (ETDEWEB)

    Patenaude, C.J.; Sicherman, A.; Sacks, I.J.

    1986-01-01

    The Structured Assessment Approach (SAA) was developed to help assess the vulnerability of safeguards systems to insiders in a staged manner. For physical security systems, the SAA identifies possible diversion paths which are not safeguarded under various facility operating conditions and insiders who could defeat the system via direct access, collusion or indirect tampering. For material control and accounting systems, the SAA identifies those who could block the detection of a material loss or diversion via data falsification or equipment tampering. The SAA, originally desinged to run on a mainframe computer, has been converted to run on a personal computer. Many features have been added to simplify and facilitate its use for conducting vulnerability analysis. For example, the SAA input, which is a text-like data file, is easily readable and can provide documentation of facility safeguards and assumptions used for the analysis.

  3. Flowing with the changing needs of hydrogeology instruction

    Science.gov (United States)

    Gleeson, T.; Allen, D. M.; Ferguson, G.

    2012-01-01

    Hydrogeology is now taught in a broad spectrum of departments and institutions to students with diverse backgrounds. Successful instruction in hydrogeology thus requires a variety of pedagogical approaches depending on desired learning outcomes and the diverse background of students. We review the pedagogical literature in hydrogeology to highlight recent advances and analyze a 2005 survey of 68 hydrogeology instructors. The literature and survey results suggest there are ~15 topics that are considered crucial by most hydrogeologists and >100 other topics that are considered crucial by some hydrogeologists. The crucial topics focus on properties of aquifers and fundamentals of groundwater flow, and should likely be part of all undergraduate hydrogeology courses. Other topics can supplement and support these crucial topics, depending on desired learning outcomes. Classroom settings continue to provide a venue for emphasizing fundamental knowledge. However, recent pedagogical advances are biased towards field and laboratory instruction with a goal of bolstering experiential learning. Field methods build on the fundamentals taught in the classroom and emphasize the collection of data, data uncertainty, and the development of vocational skills. Laboratory and computer-based exercises similarly build on theory, and offer an opportunity for data analysis and integration. The literature suggests curricula at all levels should ideally balance field, laboratory, and classroom pedagogy into an iterative and integrative whole. An integrated approach leads to greater student motivation and advancement of theoretical and vocational knowledge.

  4. Climate change, impacts and vulnerability in Europe 2012. An indicator-based report

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-11-15

    This European Environment Agency (EEA) report presents information on past and projected climate change and related impacts in Europe, based on a range of indicators. The report also assesses the vulnerability of society, human health and ecosystems in Europe and identifies those regions in Europe most at risk from climate change. Furthermore, the report discusses the principle sources of uncertainty for the indicators and notes how monitoring and scenario development can improve our understanding of climate change, its impacts and related vulnerabilities. Some key findings: The last decade (2002-2011) was the warmest on record in Europe, with European land temperature 1.3 deg. C warmer than the pre-industrial average. Various model projections show that Europe could be 2.5-4 deg. C warmer in the later part of the 21st Century, compared to the 1961-1990 average. Heat waves have increased in frequency and length, causing tens of thousands of deaths over the last decade. The projected increase in heat waves could increase the number of related deaths over the next decades, unless societies adapt, the report says. However, cold-related deaths are projected to decrease in many countries. While precipitation is decreasing in southern regions, it is increasing in northern Europe, the report says. These trends are projected to continue. Climate change is projected to increase river flooding, particularly in northern Europe, as higher temperatures intensify the water cycle. However, it is difficult to discern the influence of climate change in flooding data records for the past. River flow droughts appear to have become more severe and frequent in southern Europe. Minimum river flows are projected to decrease significantly in summer in southern Europe but also in many other parts of Europe to varying degrees. The Arctic is warming faster than other regions. Record low sea ice was observed in the Arctic in 2007, 2011 and 2012, falling to roughly half the minimum extent seen

  5. Redistributing vulnerabilities

    DEFF Research Database (Denmark)

    Seeberg, Jens; Padmawati, Retna Siwi

    2015-01-01

    attention to the social processes whereby vulnerability is modified and renegotiated during the post-disaster period where resources for disaster alleviation and reconstruction enter local communities. Specifically, we explore the social dynamics of house damage classification in the wake of the 2006...... Central Java earthquake, and we explore relations between citizens and the state during post-disaster house reconstruction. We argue that disastrous outcomes of catastrophic events do not follow pre-existing fault lines of vulnerability in a simple or predictable manner, and that the social process...

  6. Exploring participant appreciation of group-based principles for action in community-based physical activity programs for socially vulnerable groups in the Netherlands

    NARCIS (Netherlands)

    Herens, Marion; Wagemakers, Annemarie; Vaandrager, Lenneke; Koelen, Maria

    2015-01-01

    Background: Physical inactivity is a core risk factor for non-communicable diseases. In the Netherlands, socially vulnerable groups are relatively less active than groups with higher socio-economic status. Community-based health-enhancing physical activity (CBHEPA) programs aim to empower sociall

  7. Assessing vulnerability

    NARCIS (Netherlands)

    Hellmuth, M.; Kabat, P.

    2003-01-01

    It is in the shantytowns and rural villages of the Third World that floods and droughts strike hardest and deepest. Vulnerability to the vagaries of climate depends not only on location, but, crucially, on the capacity of the victims to cope with the impacts of extreme weather. So, where are the peo

  8. Microzonation of seismic risk in a low-rise Latin American city based on the macroseismic evaluation of the vulnerability of residential buildings: Colima city, México

    OpenAIRE

    Zobin, V. M.; Cruz-Bravo, A. A.; Ventura-Ramírez, F.

    2010-01-01

    A macroseismic methodology of seismic risk microzonation in a low-rise city based on the vulnerability of residential buildings is proposed and applied to Colima city, Mexico. The seismic risk microzonation for Colima consists of two elements: the mapping of residential blocks according to their vulnerability level and the calculation of an expert-opinion based damage probability matrix (DPM) for a given level of earthquake intensity and a given type of residential block. A specified exposure...

  9. Sondierbohrung Boettstein: Hydrogeological testing of crystalline rocks

    International Nuclear Information System (INIS)

    In addition to comprehensive studies in geology, geophysics, hydrochemistry and rock mechanics, a three-phased program for (1) drilling (2) testing and (3) monitoring of the twelve boreholes was proposed. The Boettstein borehole is located in the central part of the target areas. It was the first borehole to be drilled. Drilling in the crystalline granitic basement rocks started at a depth of 315 m below ground surface in November 1982 and was completed in December 1983. The monitoring phase is on-going at this time. The study reported herein describes the hydrogeologic testing of the crystalline rocks and results of the work done by Gartner Lee AG (GLAG) in the Boettstein borehole on behalf of Nationale Genossenschaft Fuer Die Lagerung Radioaktiver Abfaelle (NAGRA). This report describes testing equipment and performance. Also included are sections on the testing and analysis methods that were used to determine the hydrogeologic results. Testing was conducted using single and double packer tools with associated down hole and surface electronic equipment. Down hole information from pressure transducers and thermistors were converted from frequency signals to pressure and temperature readings that were printed, plotted and stored on magnetic tape at the surface facility. All the testing equipment worked well. In summary, the hydrogeologic testing activities at the Boettstein borehole were successful in providing information for NAGRA's regional assessment of the crystalline basement rocks. In addition, water samples could be obtained from discrete intervals for geochemical characterization. Continuing ground water monitoring activities at this borehole will add to the data base provided by this report. (author)

  10. The KINDRA H2020 Project: a knowledge inventory for hydrogeology research

    Science.gov (United States)

    Petitta, Marco; Bodo, Balazs; Caschetto, Mariachiara; Correia, Victor; Cseko, Adrienn; Fernandez, Isabel; Hartai, Eva; Hinsby, Klaus; Madarasz, Tamas; Garcia Padilla, Mercedes; Szucs, Peter

    2015-04-01

    Hydrogeology-related research activities cover a wide spectrum of research areas at EU and national levels. This fact is due to the intrinsic nature of the "water" topic, representing a key-aspect of the modern society: water is not only necessary for human, biological and environmental requirements, but it is one basic "engine" of several interconnected research topics, including energy, health, climate, food, security and others as exemplified by the water-food-energy-climate nexus described by e.g. the World Economic Forum. With respect to the water cycle, the management of groundwater brings additional challenges to the implementation of the Water Framework Directive (WFD) and climate change adaptation (such as integrated transboundary management of groundwater resources). This fact is related to the nature of groundwater, which represents the "hidden" part of the water cycle, difficult to evaluate, communicate and appreciate, although it sustains the health of both humans and ecosystems as well as industrial and agricultural production. In general, groundwater has been considered mainly for its relationships with surface waters, influencing river flow, e-flows, GDE (groundwater-dependent ecosystems), pollutant fate, agricultural practices, water scarcity and others. In this framework, the importance of groundwater inside the WFD has been reinforced by the daughter directive on groundwater. In the last years, particular insights have been developed on surface waters/groundwater interactions and several related research projects have been carried out. Nevertheless, a specific focus on hydrogeology, the science branch studying groundwater, has not looked into until now, despite of its utmost importance as renewable, high-quality, naturally protected (but still vulnerable) resource. At the same time the European knowledge-base that has been acquired on this important topic is widespread into several projects, plans, actions, realized at national and fragmented

  11. Trait-based diet selection: prey behaviour and morphology predict vulnerability to predation in reef fish communities.

    Science.gov (United States)

    Green, Stephanie J; Côté, Isabelle M

    2014-11-01

    Understanding how predators select their prey can provide important insights into community structure and dynamics. However, the suite of prey species available to a predator is often spatially and temporally variable. As a result, species-specific selectivity data are of limited use for predicting novel predator-prey interactions because they are assemblage specific. We present a method for predicting diet selection that is applicable across prey assemblages, based on identifying general morphological and behavioural traits of prey that confer vulnerability to predation independent of species identity. We apply this trait-based approach to examining prey selection by Indo-Pacific lionfish (Pterois volitans and Pterois miles), invasive predators that prey upon species-rich reef fish communities and are rapidly spreading across the western Atlantic. We first generate hypotheses about morphological and behavioural traits recurring across fish species that could facilitate or deter predation by lionfish. Constructing generalized linear mixed-effects models that account for relatedness among prey taxa, we test whether these traits predict patterns of diet selection by lionfish within two independent data sets collected at different spatial scales: (i) in situ visual observations of prey consumption and availability for individual lionfish and (ii) comparisons of prey abundance in lionfish stomach contents to availability on invaded reefs at large. Both analyses reveal that a number of traits predicted to affect vulnerability to predation, including body size, body shape, position in the water column and aggregation behaviour, are important determinants of diet selection by lionfish. Small, shallow-bodied, solitary fishes found resting on or just above reefs are the most vulnerable. Fishes that exhibit parasite cleaning behaviour experience a significantly lower risk of predation than non-cleaning fishes, and fishes that are nocturnally active are at significantly

  12. Hydrogeology of the Islamic Republic of Mauritania

    Science.gov (United States)

    Friedel, Michael J.; Finn, Carol

    2008-01-01

    Hydrogeologic maps were constructed for the Islamic Republic of Mauritania. The ground-water flow system in the country can best be described as two interconnected regional systems: the porous Continental Terminal coastal system and the interior, fractured sedimentary Taoudeni Basin system. In these systems, ground-water flow occurs in fill deposits and carbonate, clastic, metasedimentary, and metavolcanic rocks. Based on an evaluation of the potentiometric surface, there are three areas of ground-water recharge in the Taoudeni Basin system. One region occurs in the northwest at the edge of the Shield, one occurs to the south overlying the Tillites, and one is centered at the city of Tidjikdja. In contrast to the flow system in the Taoudeni Basin, the potentiometric surfaces reveal two areas of discharge in the Continental Terminal system but no localized recharge areas; the recharge is more likely to be areal. In addition to these recharge and discharge areas, ground water flows across the country's borders. Specifically, ground water from the Atlantic Ocean flows into Mauritania, transporting dissolved sodium from the west as a salt water intrusion, whereas fresh ground water discharges from the east into Mali. To the north, there is a relatively low gradient with inflow of fresh water to Mauritania, whereas ground-water flow discharges to the Senegal River to the south. A geographical information system (GIS) was used to digitize, manage, store, and analyze geologic data used to develop the hydrogeologic map. The data acquired for map development included existing digital GIS files, published maps, tabulated data in reports and public-access files, and the SIPPE2 Access database. Once in digital formats, regional geologic and hydrologic features were converted to a common coordinate system and combined into one map. The 42 regional geologic map units were then reclassified into 13 hydrogeologic units, each having considerable lateral extent and distinct

  13. A spatial DB model to simulate the road network efficiency in hydrogeological emergency

    Science.gov (United States)

    Michele, Mangiameli; Giuseppe, Mussumeci

    2015-12-01

    We deal with the theme of the simulation of risk analysis using a technological approach based on the integration of exclusively free and open source tools: PostgreSQL as Database Management System (DBMS) and Quantum GIS-GRASS as Geographic Information System (GIS) platform. The case study is represented by a seismic land in Sicily characterized by steep slopes and frequent instability phenomena. This area includes a city of about 30.000 inhabitants (Enna) that lies on the top of a mountain at about 990 m a.s.l.. The access to the city is assured by few and very winding roads that are also highly vulnerable to seismic and hydrogeological hazards. When exceptional rainfall events occur, the loss of efficiency of these roads should compromise timeliness and effectiveness of rescue operations. The data of the sample area have been structured into the adopted DBMS, and the connection to the GIS functionalities allows simulating the exceptional events. We analyzed the hazard, vulnerability and exposure related to these events and calculated the final risk defining three classes for each scenario: low (L), medium (M) and high (H). This study can be a valuable tool to prioritize risk levels and set priorities for intervention to the main road networks..

  14. A spatial DB model to simulate the road network efficiency in hydrogeological emergency

    International Nuclear Information System (INIS)

    We deal with the theme of the simulation of risk analysis using a technological approach based on the integration of exclusively free and open source tools: PostgreSQL as Database Management System (DBMS) and Quantum GIS-GRASS as Geographic Information System (GIS) platform. The case study is represented by a seismic land in Sicily characterized by steep slopes and frequent instability phenomena. This area includes a city of about 30.000 inhabitants (Enna) that lies on the top of a mountain at about 990 m a.s.l.. The access to the city is assured by few and very winding roads that are also highly vulnerable to seismic and hydrogeological hazards. When exceptional rainfall events occur, the loss of efficiency of these roads should compromise timeliness and effectiveness of rescue operations. The data of the sample area have been structured into the adopted DBMS, and the connection to the GIS functionalities allows simulating the exceptional events. We analyzed the hazard, vulnerability and exposure related to these events and calculated the final risk defining three classes for each scenario: low (L), medium (M) and high (H). This study can be a valuable tool to prioritize risk levels and set priorities for intervention to the main road networks.

  15. A spatial DB model to simulate the road network efficiency in hydrogeological emergency

    Energy Technology Data Exchange (ETDEWEB)

    Michele, Mangiameli, E-mail: michele.mangiameli@dica.unict.it; Giuseppe, Mussumeci [Dept. of Civil Engineering and Architecture, University of Catania, Catania (Italy)

    2015-12-31

    We deal with the theme of the simulation of risk analysis using a technological approach based on the integration of exclusively free and open source tools: PostgreSQL as Database Management System (DBMS) and Quantum GIS-GRASS as Geographic Information System (GIS) platform. The case study is represented by a seismic land in Sicily characterized by steep slopes and frequent instability phenomena. This area includes a city of about 30.000 inhabitants (Enna) that lies on the top of a mountain at about 990 m a.s.l.. The access to the city is assured by few and very winding roads that are also highly vulnerable to seismic and hydrogeological hazards. When exceptional rainfall events occur, the loss of efficiency of these roads should compromise timeliness and effectiveness of rescue operations. The data of the sample area have been structured into the adopted DBMS, and the connection to the GIS functionalities allows simulating the exceptional events. We analyzed the hazard, vulnerability and exposure related to these events and calculated the final risk defining three classes for each scenario: low (L), medium (M) and high (H). This study can be a valuable tool to prioritize risk levels and set priorities for intervention to the main road networks.

  16. Social Vulnerability Index (SoVI) for the U.S. Coastal States based on the 2010 Census Tracts

    Data.gov (United States)

    National Oceanic and Atmospheric Administration, Department of Commerce — The Social Vulnerability Index (SoVI) 2006-10 measures the social vulnerability of U.S. counties to environmental hazards. The index is a comparative metric that...

  17. Developing a national food defense guideline based on a vulnerability assessment of intentional food contamination in Japanese food factories using the CARVER+Shock vulnerability assessment tool.

    Science.gov (United States)

    Kanagawa, Yoshiyuki; Akahane, Manabu; Hasegawa, Atsushi; Yamaguchi, Kentaro; Onitake, Kazuo; Takaya, Satoshi; Yamamoto, Shigeki; Imamura, Tomoaki

    2014-12-01

    The awareness of food terrorism has increased following the September 11, 2001 terrorist attacks in New York City, United States, and many measures and policies dealing with this issue have been established worldwide. Suspected deliberate food-poisoning crimes have occurred in Japan, although they are not regarded as acts of food terrorism. One area of concern is that the small- to medium-sized companies that dominate Japan's food industry are extremely vulnerable to deliberate food poisoning. We conducted a literature research on food defense measures undertaken by the World Health Organization and in the United States and Europe. Using the Carver+Shock vulnerability assessment tool, eight food factories and related facilities in Japan were evaluated and we found the level of awareness of food defense to be low and the measures inappropriate. On the basis of this evaluation, we developed a set of guidelines that Japanese food companies can use to help develop their food defense strategies and to serve as a reference in considering specific measures. PMID:25496071

  18. Identification of top contributors to system vulnerability via an ordinal optimization based method

    International Nuclear Information System (INIS)

    This paper presents a novel approach to identify top contributors to power systems failure when considering cascade failure events. Implementation of this approach can help for a better system understanding to system stakeholders, provide internal and external situational awareness to operators, and help as a diagnostic support tool. Given the few studies that concurrently consider cascade models with models for identifying top contributors to load shed, this paper presents a novel hybrid approach combining an evaluation phase – a cascade model together with an approximate evaluation of the damage induced (in terms of load shed) by a collapse event – and an ordinal optimization perspective, to identify top component failure contributors. The approach is implemented in the Italian high-voltage (380 kV) electrical transmission network and results are compared against current topological measures of system vulnerability

  19. Ethics in Community-Based Research with Vulnerable Children: Perspectives from Rwanda.

    Science.gov (United States)

    Betancourt, Theresa; Smith Fawzi, Mary C; Stevenson, Anne; Kanyanganzi, Fredrick; Kirk, Catherine; Ng, Lauren; Mushashi, Christina; Bizimana, Justin I; Beardslee, William; Raviola, Giuseppe; Smith, Stephanie; Kayiteshonga, Yvonne; Binagwaho, Agnes

    2016-01-01

    A "risk of harm" protocol to identify youth in need of immediate emergency assistance in a study on mental health and HIV in Rwanda among 680 youth ages 10-17 is described. Cases are presented that describe the experience in using this protocol to ensure safety of participants, with ethical and logistical challenges considered. Among the population of the study, 3.2% were deemed "risk of harm." The most prevalent presenting problem was non-fatal suicidal behavior (91% of risk of harm cases), with 36% having a history of a reported previous attempt. Challenges included: acute food insecurity/significant poverty; lack of support/adequate supervision from family members; family violence; alcohol abuse; and HIV-related stigma. Development of a "risk of harm" protocol and collaboration between study staff, community leadership, health authorities, and health workers are critical to ensuring participants' safety in research among vulnerable populations. PMID:27351337

  20. Ethics in Community-Based Research with Vulnerable Children: Perspectives from Rwanda.

    Directory of Open Access Journals (Sweden)

    Theresa Betancourt

    Full Text Available A "risk of harm" protocol to identify youth in need of immediate emergency assistance in a study on mental health and HIV in Rwanda among 680 youth ages 10-17 is described. Cases are presented that describe the experience in using this protocol to ensure safety of participants, with ethical and logistical challenges considered. Among the population of the study, 3.2% were deemed "risk of harm." The most prevalent presenting problem was non-fatal suicidal behavior (91% of risk of harm cases, with 36% having a history of a reported previous attempt. Challenges included: acute food insecurity/significant poverty; lack of support/adequate supervision from family members; family violence; alcohol abuse; and HIV-related stigma. Development of a "risk of harm" protocol and collaboration between study staff, community leadership, health authorities, and health workers are critical to ensuring participants' safety in research among vulnerable populations.

  1. Vulnerable Hunter

    Directory of Open Access Journals (Sweden)

    Md.Asha Begum

    2016-05-01

    Full Text Available This project "VULNERABLE HUNTER" application main aim is to detect risk in our mobile applications. This application contains modules like Fetch Application, Generate Score, Uninstall and Display Graph. Through this application it detects risk so that this application is very useful to smart phone users Now-a-days so many people are using smart phones and people are crazy about new apps. But by installing all the applications into our mobile may reduce its performance. Some apps contain more risk. But user may not know the effects that are caused by the app which is installed until the performance of mobile is reduced. With the prosperity of the Android app economy, many apps have been published and sold in various markets. However, short development applications and insufficient security development apps have led to many vulnerable apps. So to reduce these type of problems Vulnerable Hunter is proposed. Through the proposed application user can see which application is risky and then the user may uninstall that application. The main advantage of designing this app is without internet also the users will use this application. Users also feel more convenient to work with mobile apps.

  2. Study on the drought risk of maize in the farming-pastoral ecotone in Northern China based on physical vulnerability assessment

    OpenAIRE

    Wang, Zhiqiang; Jiang, Jingyi; Ma,Qing

    2016-01-01

    Climate change is affecting every aspect of human activities, especially the agriculture. In China, extreme drought events caused by climate change have posed great threaten to food safety. In this work we aimed to study the drought risk of maize in the farming-pastoral ecotone in Northern China based on physical vulnerability assessment. The physical vulnerability curve was constructed from the relationship between drought hazard intensity index and yield loss rate. The risk assessment of ag...

  3. Hydrogeological challenges in a low carbon economy

    OpenAIRE

    Younger, Paul L.

    2014-01-01

    Hydrogeology has traditionally been regarded as the province of the water industry, but it is increasingly finding novel applications in the energy sector. Hydrogeology has a longstanding role in geothermal energy exploration and management. Although aquifer management methods can be directly applied to most high-enthalpy geothermal reservoirs, hydrogeochemical inference techniques differ somewhat owing to peculiarities of high-temperature processes. Hydrogeological involvement in the develop...

  4. Vulnerability-Based Critical Neurons, Synapses, and Pathways in the Caenorhabditis elegans Connectome.

    Science.gov (United States)

    Kim, Seongkyun; Kim, Hyoungkyu; Kralik, Jerald D; Jeong, Jaeseung

    2016-08-01

    Determining the fundamental architectural design of complex nervous systems will lead to significant medical and technological advances. Yet it remains unclear how nervous systems evolved highly efficient networks with near optimal sharing of pathways that yet produce multiple distinct behaviors to reach the organism's goals. To determine this, the nematode roundworm Caenorhabditis elegans is an attractive model system. Progress has been made in delineating the behavioral circuits of the C. elegans, however, many details are unclear, including the specific functions of every neuron and synapse, as well as the extent the behavioral circuits are separate and parallel versus integrative and serial. Network analysis provides a normative approach to help specify the network design. We investigated the vulnerability of the Caenorhabditis elegans connectome by performing computational experiments that (a) "attacked" 279 individual neurons and 2,990 weighted synaptic connections (composed of 6,393 chemical synapses and 890 electrical junctions) and (b) quantified the effects of each removal on global network properties that influence information processing. The analysis identified 12 critical neurons and 29 critical synapses for establishing fundamental network properties. These critical constituents were found to be control elements-i.e., those with the most influence over multiple underlying pathways. Additionally, the critical synapses formed into circuit-level pathways. These emergent pathways provide evidence for (a) the importance of backward locomotion, avoidance behavior, and social feeding behavior to the organism; (b) the potential roles of specific neurons whose functions have been unclear; and PMID:27540747

  5. Groundwater vulnerability to pollution mapping of Ranchi district using GIS

    Science.gov (United States)

    Krishna, R.; Iqbal, J.; Gorai, A. K.; Pathak, G.; Tuluri, F.; Tchounwou, P. B.

    2015-12-01

    Groundwater pollution due to anthropogenic activities is one of the major environmental problems in urban and industrial areas. The present study demonstrates the integrated approach with GIS and DRASTIC model to derive a groundwater vulnerability to pollution map. The model considers the seven hydrogeological factors [Depth to water table ( D), net recharge ( R), aquifer media ( A), soil media ( S), topography or slope ( T), impact of vadose zone ( I) and hydraulic Conductivity( C)] for generating the groundwater vulnerability to pollution map. The model was applied for assessing the groundwater vulnerability to pollution in Ranchi district, Jharkhand, India. The model was validated by comparing the model output (vulnerability indices) with the observed nitrate concentrations in groundwater in the study area. The reason behind the selection of nitrate is that the major sources of nitrate in groundwater are anthropogenic in nature. Groundwater samples were collected from 30 wells/tube wells distributed in the study area. The samples were analyzed in the laboratory for measuring the nitrate concentrations in groundwater. A sensitivity analysis of the integrated model was performed to evaluate the influence of single parameters on groundwater vulnerability index. New weights were computed for each input parameters to understand the influence of individual hydrogeological factors in vulnerability indices in the study area. Aquifer vulnerability maps generated in this study can be used for environmental planning and groundwater management.

  6. Vulnerability-Based Critical Neurons, Synapses, and Pathways in the Caenorhabditis elegans Connectome

    Science.gov (United States)

    Kim, Seongkyun; Kim, Hyoungkyu; Kralik, Jerald D.; Jeong, Jaeseung

    2016-01-01

    Determining the fundamental architectural design of complex nervous systems will lead to significant medical and technological advances. Yet it remains unclear how nervous systems evolved highly efficient networks with near optimal sharing of pathways that yet produce multiple distinct behaviors to reach the organism’s goals. To determine this, the nematode roundworm Caenorhabditis elegans is an attractive model system. Progress has been made in delineating the behavioral circuits of the C. elegans, however, many details are unclear, including the specific functions of every neuron and synapse, as well as the extent the behavioral circuits are separate and parallel versus integrative and serial. Network analysis provides a normative approach to help specify the network design. We investigated the vulnerability of the Caenorhabditis elegans connectome by performing computational experiments that (a) “attacked” 279 individual neurons and 2,990 weighted synaptic connections (composed of 6,393 chemical synapses and 890 electrical junctions) and (b) quantified the effects of each removal on global network properties that influence information processing. The analysis identified 12 critical neurons and 29 critical synapses for establishing fundamental network properties. These critical constituents were found to be control elements—i.e., those with the most influence over multiple underlying pathways. Additionally, the critical synapses formed into circuit-level pathways. These emergent pathways provide evidence for (a) the importance of backward locomotion, avoidance behavior, and social feeding behavior to the organism; (b) the potential roles of specific neurons whose functions have been unclear; and (c) both parallel and serial design elements in the connectome—i.e., specific evidence for a mixed architectural design. PMID:27540747

  7. Hydrogeology of Valley-Fill Aquifers and Adjacent Areas in Eastern Chemung County, New York

    Science.gov (United States)

    Heisig, Paul M.

    2015-10-19

    The extent, hydrogeologic framework, and potential well yields of valley-fill aquifers within a 151-square-mile area of eastern Chemung County, New York, were investigated, and the upland distribution of till thickness over bedrock was characterized. The hydrogeologic framework of these valleyfill aquifers was interpreted from multiple sources of surficial and subsurface data and an interpretation of the origin of the glacial deposits, particularly during retreat of glacial ice from the region. Potential yields of screened wells are based on the hydrogeologic framework interpretation and existing well-yield data, most of which are from wells finished with open-ended well casing.

  8. Map Your Hazards! - an Interdisciplinary, Place-Based Educational Approach to Assessing Natural Hazards, Social Vulnerability, Risk and Risk Perception.

    Science.gov (United States)

    Brand, B. D.; McMullin-Messier, P. A.; Schlegel, M. E.

    2014-12-01

    'Map your Hazards' is an educational module developed within the NSF Interdisciplinary Teaching about Earth for a Sustainable Future program (InTeGrate). The module engages students in place-based explorations of natural hazards, social vulnerability, and the perception of natural hazards and risk. Students integrate geoscience and social science methodologies to (1) identify and assess hazards, vulnerability and risk within their communities; (2) distribute, collect and evaluate survey data (designed by authors) on the knowledge, risk perception and preparedness within their social networks; and (3) deliver a PPT presentation to local stakeholders detailing their findings and recommendations for development of a prepared, resilient community. 'Map your Hazards' underwent four rigorous assessments by a team of geoscience educators and external review before being piloted in our classrooms. The module was piloted in a 300-level 'Volcanoes and Society' course at Boise State University, a 300-level 'Environmental Sociology' course at Central Washington University, and a 100-level 'Natural Disasters and Environmental Geology' course at the College of Western Idaho. In all courses students reported a fascination with learning about the hazards around them and identifying the high risk areas in their communities. They were also surprised at the low level of knowledge, inaccurate risk perception and lack of preparedness of their social networks. This successful approach to engaging students in an interdisciplinary, place-based learning environment also has the broad implications of raising awareness of natural hazards (survey participants are provided links to local hazard and preparedness information). The data and preparedness suggestions can be shared with local emergency managers, who are encouraged to attend the student's final presentations. All module materials are published at serc.carleton.edu/integrate/ and are appropriate to a wide range of classrooms.

  9. Hydrogeological characterization of the Stripa site

    International Nuclear Information System (INIS)

    This study was initiated in January, 1986, to determine a) if the permeability of the rock mass in the immediate mine area was anisotropic, b) the effective and total fracture porosity distributions based on field and laboratory data and c) the three-dimensional configuration of the groundwater flow system at Stripa in order to properly interpret the hydrogeological, geochemical and isotopic data. The total and flow porosities of single fractures from Stripa were determined in the laboratory using a resin impregnation technique. The three-dimensional numerical model gave mine inflows that were consistent with the measured mine inflows with perturbations extending to at least 3,000 m of depth. (orig./DG)

  10. Spatiotemporal variation of long-term drought propensity through reliability-resilience-vulnerability based Drought Management Index

    Science.gov (United States)

    Chanda, Kironmala; Maity, Rajib; Sharma, Ashish; Mehrotra, Rajeshwar

    2014-10-01

    This paper characterizes the long-term, spatiotemporal variation of drought propensity through a newly proposed, namely Drought Management Index (DMI), and explores its predictability in order to assess the future drought propensity and adapt drought management policies for a location. The DMI was developed using the reliability-resilience-vulnerability (RRV) rationale commonly used in water resources systems analysis, under the assumption that depletion of soil moisture across a vertical soil column is equivalent to the operation of a water supply reservoir, and that drought should be managed not simply using a measure of system reliability, but should also take into account the readiness of the system to bounce back from drought to a normal state. Considering India as a test bed, 5 year long monthly gridded (0.5° Lat × 0.5° Lon) soil moisture data are used to compute the RRV at each grid location falling within the study domain. The Permanent Wilting Point (PWP) is used as the threshold, indicative of transition into water stress. The association between resilience and vulnerability is then characterized through their joint probability distribution ascertained using Plackett copula models for four broad soil types across India. The joint cumulative distribution functions (CDF) of resilience and vulnerability form the basis for estimating the DMI as a five-yearly time series at each grid location assessed. The status of DMI over the past 50 years indicate that drought propensity is consistently low toward northern and north eastern parts of India but higher in the western part of peninsular India. Based on the observed past behavior of DMI series on a climatological time scale, a DMI prediction model comprising deterministic and stochastic components is developed. The predictability of DMI for a lead time of 5 years is found to vary across India, with a Pearson correlation coefficient between observed and predicted DMI above 0.6 over most of the study area

  11. Assessing the vulnerability of human and biological communities to changing ecosystem services using a GIS-based multi-criteria decision support tool

    Science.gov (United States)

    Villarreal, Miguel; Norman, Laura M.; Labiosa, William B.

    2012-01-01

    In this paper we describe an application of a GIS-based multi-criteria decision support web tool that models and evaluates relative changes in ecosystem services to policy and land management decisions. The Santa Cruz Watershed Ecosystem Portfolio (SCWEPM) was designed to provide credible forecasts of responses to ecosystem drivers and stressors and to illustrate the role of land use decisions on spatial and temporal distributions of ecosystem services within a binational (U.S. and Mexico) watershed. We present two SCWEPM sub-models that when analyzed together address bidirectional relationships between social and ecological vulnerability and ecosystem services. The first model employs the Modified Socio-Environmental Vulnerability Index (M-SEVI), which assesses community vulnerability using information from U.S. and Mexico censuses on education, access to resources, migratory status, housing situation, and number of dependents. The second, relating land cover change to biodiversity (provisioning services), models changes in the distribution of terrestrial vertebrate habitat based on multitemporal vegetation and land cover maps, wildlife habitat relationships, and changes in land use/land cover patterns. When assessed concurrently, the models exposed some unexpected relationships between vulnerable communities and ecosystem services provisioning. For instance, the most species-rich habitat type in the watershed, Desert Riparian Forest, increased over time in areas occupied by the most vulnerable populations and declined in areas with less vulnerable populations. This type of information can be used to identify ecological conservation and restoration targets that enhance the livelihoods of people in vulnerable communities and promote biodiversity and ecosystem health.

  12. An integrated theoretical and practical approach for teaching hydrogeology

    Science.gov (United States)

    Bonomi, Tullia; Fumagalli, Letizia; Cavallin, Angelo

    2013-04-01

    their limitations; C) by an evaluation process whose results contribute to the final examination, so that the students are evaluated on the basis of their ability to discuss theoretical subjects and/or projects and to resolving exercises and case studies either by hand calculations or by modelling. The applied hydrogeology examination is an example of the evaluation process. It involves development of a plan to resolve a real hydrogeological issue, such as the design of a hydraulic barrier for a landfill, the design of a well field to meet the supply requirements of a muncipality, or the control of possible seepage from a contaminated site close to to sensitive discharge features such as wells, springs, rivers. The students are allowed to work on computers for three consecutive mornings for a total 15 hours, and in the end are required to produce a technical report and a hydrogeological model. Obviously their solutions are neither unique nor completely optimized (just as in the real world), but the comparisons and debates among the students are important portals to learning and improvement. A second example: the groundwater pollution and remediation examination is based on the discussion of a remediation project elaborated in stages during the course, with the addition of increasing complex types of data and information. The students have one hour a week, during the course, to submit to the teacher their analysis of the problem and possible solutions. In ten years of experience all students have considered this method of examination a challenge, and found it engaging and helpful, even if unusual, at least in Italy. The University of Milano Bicocca has recently drilled a piezometric well both to monitor the flow of groundwater and to allow students to perform aquifer tests and to conduct standard groundwater sampling procedure, without any longer needing to rely on outside private donors for access to a field site. The overall approach, which includes, lectures

  13. Bedrock Hydrogeology - Site investigation SFR

    Energy Technology Data Exchange (ETDEWEB)

    Oehman, Johan [Geosigma AB, Stockholm (Sweden); Bockgaard, Niclas [Golder Assoes AB, Stockholm (Sweden); Follin, Sven [SF GeoLogic AB, Taeby (Sweden)

    2012-06-15

    The Swedish Nuclear Fuel and Waste Management Company (SKB) has conducted site investigations for a planned extension of the existing final repository for short-lived radioactive waste (SFR). This report presents an integrated analysis and interpretation of the historic data from the existing SFR (1980 - 1986), as well as, from the recent investigations for the planned extension of SFR (2008 - 2009). The primary objective is to establish a conceptual hydrogeological model of the bedrock for safety assessment and design analyses. Analyses and interpretations of all (old and new) hydraulic data are analysed with regard to the recently developed geological deformation zone model of the SFR model domain (Curtis et al. 2011). The methodology used by Curtis et al. (2011) has focussed on magnetic anomalies and deformation zone intercepts with ground surface greater than 300 m. In the hydrogeological modelling, however, it has been considered important to also explore the occurrence and characteristics of shallow horizontal to sub-horizontal structures (sheet joints) inside the SFR model domain. Such structures are of considerable importance for the hydrogeology in the uppermost c. 150 m of bedrock in SDM-Site Forsmark; hence the term Shallow Bedrock Aquifer was used to emphasise their hydraulic significance. In this study, the acronym SBA-structure is used for horizontal structures identified in the hydrogeological modelling. In addition to the predominantly steeply dipping geological deformation zones, eight so-called SBA-structures are modelled deterministically in the hydrogeological model. The SBA-structures are envisaged as hydraulically heterogeneous and composed of clusters of minor gently dipping to horizontal fractures rather than extensive single features. A type of structures that is partly included in the definition of the SBA-structures is the Unresolved Possible Deformations Zone (Unresolved PDZ) intercepts identified by Curtis et al. (2011). The Unresolved

  14. HYDROGEOLOGY

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    <正>20081223 Chen Jiansheng(State Key Laboratory of Hydrology-Water Resources and Hydraulic Engineering,Hohai University,Nanjing 210098,China);Zhao Xia Isotope Method for Confined Groundwater Recharge of the Lower Reaches of the Heihe Riv

  15. HYDROGEOLOGY

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    <正>20111985 Chen Dengqi(Geo-Engineering Investigation Institute of Guizhou Province,Guiyang 550008,China)Development and Utilization of Karst Water of Underground River System in the Exposed Karst Area Kaidechang Underground River in Jiangkou County,Guizhou Province(Guizhou Geology,ISSN1000-5943,CN52-1059/P,27(3),2010,p.217-222,4 illus.,2 tables,5 refs.)Key words:karst water,underground streams,groundwater exploitation,Guizhou Province Exposed karst area has special karst water formation and distribution law according special geologic environment.There is abundant

  16. HYDROGEOLOGY

    Institute of Scientific and Technical Information of China (English)

    2013-01-01

    <正>20131276 Chen Dengqi (Guizhou Institute of Geological Engineering Exploration , Guiyang 550008 , China); Song Xiaoqing The Reasons of Sifangjing Karst Spring Drying-Up in Zhijin of Guizhou Province (Guizhou Geology , ISSN1000-5943 , CN52-1059/P , 29 (2), 2012 , p.94-98 , 2illus. , 6refs.) Key words : karst water

  17. HYDROGEOLOGY

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    <正>20102002 He Shiyi (Key Laboratory of Karst Dynamics,MRL,Institute of Karst Geology,CAGS,Guilin 541004,China);Michele High Precision Underground Water Tracing Test Technique and Its Applications:A Case Study in Maocun Karst System,Guilin,Guangxi

  18. HYDROGEOLOGY

    Institute of Scientific and Technical Information of China (English)

    2014-01-01

    <正>20141756 Chen Ruige(Mathematical College,China University of Geosciences,Beijing100083,China);Zhou Xun Numerical Simulation of Groundwater Level Fluctuation in a Coastal Confined Aquifer with Sloping Initial Groundwater Level Induced by the Tide(Geological Bulletin of China,ISSN1671-2552,CN11-4648/P,32(7),2013,p.1099-1104,6 illus.,16 refs.) Key words:confined water,groundwater level

  19. HYDROGEOLOGY

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    <正>20102620 Chen Chuanfang(Southeastern Fujian Geology Party of Fujian Province,Quanzhou 362021,China)Preestimation of Flowing Yield from the Mine Pits of the Pantian Minefield in Anxi County,Fujian Province(Geology of Fujian,ISSN1001-3970,CN35-1080/P,28(4),2009,p.315-319,1 illus.,2 tables,with English abstract)Key words:estimating water yield of mine,Fujian

  20. HYDROGEOLOGY

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    <正>20110546 Chen Chuanfang(Southeastern Geology Party of Fujian Province,Quanzhou 362021,China)Primary Influencing Factors of Mine Drainage in the Karst Area of the Pantian Iron Minefield,Fujian Province(Geology of Fujian,ISSN1001-3970,CN35-1080/P,29(1),2010,p.42-45,1 illus.)Key words:mine drainage,Fujian Province The Pantian marble and iron mining area in Anxi County has the mixture conditio

  1. Hydrogeology of the West Siberian Basin

    International Nuclear Information System (INIS)

    Nuclear fuel cycle activities of the former Soviet Union (FSU) have resulted in significant contamination of the environment in western Siberia. The radioactive releases to surface waters and the surficial environment from the Mayak site are the largest known in the world. However, they are dwarfed by the amounts of liquid wastes injected into the subsurface at Tomsk and Krasnoyarsk since the early 1960s. This paper provides the status of efforts by Pacific Northwest National Laboratory to quantify the regional hydrogeologic context for potential contaminant migration from areas in western Siberia. The West Siberian Basin is the largest platformal basin and region of low relief on earth. Ground water in the West Siberian Basin is contained in a single geologic structure (i.e., a single basin). Hydrogeologic cross sections indicate that freshwater wedges are present in both unconfined and confined aquifers (as well as in Paleozoic rocks) in the highland regions that rim the basin. The authors developed a 13-layer, finite-element computer model of the West Siberian Basin primarily based on GIS integration of data from geologic studies. The top of the hydrologic system was assumed to coincide with a water table derived from smoothed topography and surface-water occurrences; precipitation supplied the water, and the topographic gradient of the water table supplied the driving force for ground-water flow. The general directions of calculated ground-water flow suggest that (1) the major rivers act as discharge areas, with upwelling below the rivers extending down into the basement rocks; and (2) ground-water divides that penetrate the entire thickness of the model are evident between the major rivers. Their results suggest that contaminants entering the confined aquifer system may eventually migrate to the surface, discharging within major rivers, rather than remaining confined for long travel distances within the basin sediments

  2. A new GIS-based tsunami risk evaluation: MeTHuVA (METU tsunami human vulnerability assessment) at Yenikapı, Istanbul

    Science.gov (United States)

    Cankaya, Zeynep Ceren; Suzen, Mehmet Lutfi; Yalciner, Ahmet Cevdet; Kolat, Cagil; Zaytsev, Andrey; Aytore, Betul

    2016-07-01

    Istanbul is a mega city with various coastal utilities located on the northern coast of the Sea of Marmara. At Yenikapı, there are critical vulnerable coastal utilities, structures, and active metropolitan life. Fishery ports, commercial ports, small craft harbors, passenger terminals of intercity maritime transportation, waterfront commercial and/or recreational structures with residential/commercial areas and public utility areas are some examples of coastal utilization that are vulnerable to marine disasters. Therefore, the tsunami risk in the Yenikapı region is an important issue for Istanbul. In this study, a new methodology for tsunami vulnerability assessment for areas susceptible to tsunami is proposed, in which the Yenikapı region is chosen as a case study. Available datasets from the Istanbul Metropolitan Municipality and Turkish Navy are used as inputs for high-resolution GIS-based multi-criteria decision analysis (MCDA) evaluation of tsunami risk in Yenikapı. Bathymetry and topography database is used for high-resolution tsunami numerical modeling where the tsunami hazard, in terms of coastal inundation, is deterministically computed using the NAMI DANCE numerical code, considering earthquake worst case scenarios. In order to define the tsunami human vulnerability of the region, two different aspects, vulnerability at location and evacuation resilience maps were created using the analytical hierarchical process (AHP) method of MCDA. A vulnerability at location map is composed of metropolitan use, geology, elevation, and distance from shoreline layers, whereas an evacuation resilience map is formed by slope, distance within flat areas, distance to buildings, and distance to road networks layers. The tsunami risk map is then computed by the proposed new relationship which uses flow depth maps, vulnerability at location maps, and evacuation resilience maps.

  3. Assessment of vulnerability to future marine processes of urbanized coastal environments by a GIS-based approach: expected scenario in the metropolitan area of Bari (Italy)

    Science.gov (United States)

    Mancini, F.; Ceppi, C.; Christopulos, V.

    2013-12-01

    Literature concerning the risk assessment procedures after extreme meteorological events is generally focused on the establishing of relationship between actual severe weather conditions and impact detected over the involved zones. Such an events are classified on the basis of measurements and observation able to assess the magnitude of phenomena or on the basis of related effects on the affected area, the latter being deeply connected with the overall physical vulnerability. However such assessment almost never do consider scenario about expected extreme event and possible pattern of urbanization at the time of impact and nor the spatial and temporal uncertainty of phenomena are taken into account. The drawn of future scenario about coastal vulnerability to marine processes is therefore difficult. This work focuses the study case of the Metropoli Terra di Bari (metropolitan area of Bari, Apulia, Italy) where a coastal vulnerability analysis due to climate changes expected on the basis of expert opinions coming from the scientific community was carried out. Several possible impacts on the coastal environments were considered, in particular sea level rise inundation, flooding due to storm surge and coastal erosion. For such a purpose the methodology base on SRES (Special Report on Emission Scenario) produced by the IPCC (Intergovernmental Panel on Climate Change) was adopted after a regionalization procedure as carried out by Verburgh and others (2006) at the European scale. The open source software SLEUTH, base on the cellular automate principle, was used and the reliability of obtained scenario verified through the Monte Carlo method. Once these scenario were produced, a GIS-based multicriteria methodology was implemented to evaluate the vulnerability of the urbanized coastal area of interest. Several vulnerability maps related are therefore available for different scenario able to consider the degree of hazards and potential development of the typology and extent

  4. Analyzing driving forces behind changes in energy vulnerability of Spanish electricity generation through a Divisia index-based method

    International Nuclear Information System (INIS)

    Highlights: • We propose and develop the LMDI approach to factorize changes in electricity bill vulnerability. • Spanish vulnerability (1995–2011) markedly grew mainly by increasing gas dependence. • Fuel price increase and growing importance of electricity damage energy security. • Energy intensity advances & fuel diversification: insufficient to drive vulnerability. • Main recommendation: enhance internal energy market and common external EU strategy. - Abstract: High energy dependence on fossil raises vulnerability concerns about security of supply and energy cost. This research examines the impact of high dependence of imported fuels for power generation in Spain through the quantification and analysis of the driving forces behind the change in its electricity bill. Following logarithmic mean Divisia indexes approach, we present and perform a new method that enables a complete decomposition of changes in electricity vulnerability into contributions from several drivers. In fact, we identify five predefined factors behind the variations in vulnerability in Spain during the 1998–2011 period: fuel price, average heat rate, fuel dependence, degree of electricity importance and energy intensity. The application of this approach reveals a significant increase in Spanish vulnerability in the last two decades, promoted by increments in fuel price and importance of electricity over the primary energy consumption, but especially by increasing fuel dependence (particularly gas dependence). Therefore, findings mainly advocate for those strategies aimed at reducing Spanish energy dependence. Also those improving thermal efficiency and energy intensity are indicated

  5. “The Impact of Community-based Capital Cash Transfers on the Schooling of Orphaned and Vulnerable Children in Kenya”

    DEFF Research Database (Denmark)

    Skovdal, Morten; Webale, A.; Mwasiaji, W.;

    2013-01-01

    In this article we report on a community-based capital cash transfer initiative (CCCT) in Kenya that sought to mobilise and enable HIV-affected communities to respond to the needs of orphaned and vulnerable children. With bilateral funding, the Social Services Department in Kenya provided 80...... communities across ten districts with advice and resources to set up social enterprises for the support of vulnerable children. A wide range of food and income generating activities were initiated by the communities, whose produce or profits contributed to the improved school attendance and performance...

  6. Groundwater vulnerability assessment in Jaworzynka's Valley catchment basin (Tatra Mountains, Poland)

    Science.gov (United States)

    Cypel, M.

    2012-04-01

    During the research an attempt was made to assess an intrinsic groundwater vulnerability to contamination in Tatra Mountains (Poland. Assessment of the degree of hazard of permeating pollutions from land surface directly to the ground water table was the main target of the research. The Jaworzynka's Valley in West Tatra Mountains was chosen as the exact research area. Jaworzynka's Valley is a typical karst catchment basin. Location of study area wasn't accidental, because in the north part of the valley there is a well which is being used as drinking water intake for the whole Zakopane City. This is the reason, why the quality of ground water is so important. The method used in this research, entitled KARSTIC, wasn't applied in Poland before. This is a parametric method of groundwater vulnerability assessment. KARSTIC is a modification of much better known DRASTIC method, specialized for specific karst terrain. KARSTIC method created by A. Davis and others (1994), was used for the first time, during a research in the Black Hills Mountains, USA. Research in Jaworzynka's Valley was based on the Black Hills study. In order to apply this method in Tatra Mountains, it was necessary to make a few changes in relation to original area. Applying KARSTIC method consists of successive stages. Schematization of hydrogeological conditions is an inseparable part of KARSTIC method. The first step bases on collecting all of available data such as maps, databases and documentations. Next stage consists of classifying all parameters employed in this method and then assigning a ratings and weights for this parameters. Subsequently it is necessary to use a mathematical formula, named Pollution Potential Index, which presents a ground water vulnerability in each point. The final step is visualization on the ground water vulnerability map. The result of research displays the high vulnerability in close proximity of the drinking water intake. The most vulnerable areas in Jaworzynka

  7. Sandia National Laboratories site-wide hydrogeologic characterization project calendar year 1992 annual report

    Energy Technology Data Exchange (ETDEWEB)

    Crowson, D.; Gibson, J.D.; Haase, C.S.; Holt, R.; Hyndman, D.; Krumhansl, J.; Lauffer, F.; McCord, J.P.; McCord, J.T.; Neel, D. [and others

    1993-10-01

    The Sandia National Laboratories, New Mexico (SNL/NM) Site-Wide Hydrogeologic Characterization (SWHC) project has been implemented as part of the SNL/NM Environmental Restoration (ER) Program to develop the regional hydrogeologic framework and baseline for the approximately 100 mi of Kirtland Air Force Base (KAFB) and adjacent withdrawn public lands upon which SNL/NM has performed research and development activities. Additionally, the SWHC project will investigate and characterize generic hydrogeologic issues associated with the 172 ER sites owned by SNL/NM across its facilities on KAFB. As called for in the Hazardous and Solid Waste Amendments (HSWA) to the Resource Conservation and Recovery Act (RCRA) Part B permit agreement between the U.S. Environmental Protection Agency (EPA) as the permitter and the U.S. Department of Energy (DOE) and SNL/NM as the permittees, an annual report is to be prepared by the SWHC project team. This document serves two primary purposes: (1) to identify and describe the conceptual framework for the hydrogeologic system underlying SNL/NM and (2) to describe characterization activities undertaken in the preceding year that add to our understanding (reduce our uncertainties) regarding the conceptual and quantitative hydrogeologic framework. This SWHC project annual report focuses primarily on purpose 1, providing a summary description of the current {open_quotes}state of knowledge{close_quotes} of the Sandia National Laboratories/Kirtland Air Force Base (SNL/KAFB) hydrogeologic setting.

  8. Supply Chain Vulnerability Analysis Using Scenario-Based Input-Output Modeling: Application to Port Operations.

    Science.gov (United States)

    Thekdi, Shital A; Santos, Joost R

    2016-05-01

    Disruptive events such as natural disasters, loss or reduction of resources, work stoppages, and emergent conditions have potential to propagate economic losses across trade networks. In particular, disruptions to the operation of container port activity can be detrimental for international trade and commerce. Risk assessment should anticipate the impact of port operation disruptions with consideration of how priorities change due to uncertain scenarios and guide investments that are effective and feasible for implementation. Priorities for protective measures and continuity of operations planning must consider the economic impact of such disruptions across a variety of scenarios. This article introduces new performance metrics to characterize resiliency in interdependency modeling and also integrates scenario-based methods to measure economic sensitivity to sudden-onset disruptions. The methods will be demonstrated on a U.S. port responsible for handling $36.1 billion of cargo annually. The methods will be useful to port management, private industry supply chain planning, and transportation infrastructure management.

  9. Supply Chain Vulnerability Analysis Using Scenario-Based Input-Output Modeling: Application to Port Operations.

    Science.gov (United States)

    Thekdi, Shital A; Santos, Joost R

    2016-05-01

    Disruptive events such as natural disasters, loss or reduction of resources, work stoppages, and emergent conditions have potential to propagate economic losses across trade networks. In particular, disruptions to the operation of container port activity can be detrimental for international trade and commerce. Risk assessment should anticipate the impact of port operation disruptions with consideration of how priorities change due to uncertain scenarios and guide investments that are effective and feasible for implementation. Priorities for protective measures and continuity of operations planning must consider the economic impact of such disruptions across a variety of scenarios. This article introduces new performance metrics to characterize resiliency in interdependency modeling and also integrates scenario-based methods to measure economic sensitivity to sudden-onset disruptions. The methods will be demonstrated on a U.S. port responsible for handling $36.1 billion of cargo annually. The methods will be useful to port management, private industry supply chain planning, and transportation infrastructure management. PMID:26271771

  10. Identifying the World's Most Climate Change Vulnerable Species: A Systematic Trait-Based Assessment of all Birds, Amphibians and Corals

    OpenAIRE

    Foden, Wendy B.; Stuart H M Butchart; Simon N Stuart; Jean-Christophe Vié; H Resit Akçakaya; Ariadne Angulo; DeVantier, Lyndon M.; Alexander Gutsche; Emre Turak; Long Cao; Donner, Simon D.; Vineet Katariya; Rodolphe Bernard; Holland, Robert A.; Hughes, Adrian F.

    2013-01-01

    Climate change will have far-reaching impacts on biodiversity, including increasing extinction rates. Current approaches to quantifying such impacts focus on measuring exposure to climatic change and largely ignore the biological differences between species that may significantly increase or reduce their vulnerability. To address this, we present a framework for assessing three dimensions of climate change vulnerability, namely sensitivity, exposure and adaptive capacity; this draws on specie...

  11. Teacher training in multicultural educational institutions and vulnerable. Base to build inclusive and intercultural citizenship

    Directory of Open Access Journals (Sweden)

    Iván Manuel Sánchez Fontalvo

    2014-07-01

    Full Text Available Education for an inclusive and intercultural citizenship has recreate in all educational institutions, since the nature of the sociocultural reality in their daily requests for urgent manner the formation of competent citizens to interact with diverse individuals and groups that make and build local, political and cultural communities. It is within reach mutual exchange of goods and cultural values, based on the active promotion of respect and interdependence, allowing the development of projects that benefit the common good, which together different people involved. It is necessary, point and carry out processes of teacher training in their own institutions which are dimensional development of critical judgment to problems hindering social welfare, allowing sensitize people towards assume e introspecten suspicion and evidence of marginalization and exclusion. In this altruistic line is required to learn or awaken the ability to identify the voices of people and groups involved in the processes of social injustice and sociocultural, economic and educational backwardness, be flexible and put us alongside them in their emancipation justified in the research standing reach their dignity and freedom.

  12. Development and implementation of a GIS-based tool for spatial modeling of seismic vulnerability of Tehran

    Directory of Open Access Journals (Sweden)

    M. Hashemi

    2012-12-01

    Full Text Available Achieving sustainable development in countries prone to earthquakes is possible with taking effective measures to reduce vulnerability to earthquakes. In this context, damage assessment of hypothetical earthquakes and planning for disaster management are important issues. Having a computer tool capable of estimating structural and human losses from earthquakes in a specific region may facilitate the decision-making process before and during disasters. Interoperability of this tool with wide-spread spatial analysis frameworks will expedite the data transferring process. In this study, the earthquake damage assessment (EDA software tool is developed as an embedded extension within a GIS (geographic information system environment for the city of Tehran, Iran. This GIS-based extension provides users with a familiar environment to estimate and observe the probable damages and fatalities of a deterministic earthquake scenario. The productivity of this tool is later demonstrated for southern Karoon parish, Region 10, Tehran. Three case studies for three active faults in the area and a comparison of the results with other research substantiated the reliability of this tool for additional earthquake scenarios.

  13. Stochastic Hydrogeology: What Professionals Really Need?

    OpenAIRE

    Renard, Philippe

    2008-01-01

    Quantitative hydrogeology celebrated its 150th anniversary in 2006. Geostatistics is younger but has had a very large impact in hydrogeology. Today, geostatistics is used routinely to interpolate deterministically most of the parameters that are required to analyze a problem or make a quantitative analysis. In a small number of cases, geostatistics is combined with deterministic approaches to forecast uncertainty. At a more academic level, geostatistics is used extensively to study physical p...

  14. Prefrontal cortex markers of suicidal vulnerability in mood disorders: a model-based structural neuroimaging study with a translational perspective.

    Science.gov (United States)

    Ding, Y; Lawrence, N; Olié, E; Cyprien, F; le Bars, E; Bonafé, A; Phillips, M L; Courtet, P; Jollant, F

    2015-01-01

    The vulnerability to suicidal behavior has been modeled in deficits in both valuation and cognitive control processes, mediated by ventral and dorsal prefrontal cortices. To uncover potential markers of suicidality based on this model, we measured several brain morphometric parameters using 1.5T magnetic resonance imaging in a large sample and in a specifically designed study. We then tested their classificatory properties. Three groups were compared: euthymic suicide attempters with a past history of mood disorders and suicidal behavior (N=67); patient controls with a past history of mood disorders but not suicidal behavior (N=82); healthy controls without any history of mental disorder (N=82). A hypothesis-driven region-of-interest approach was applied targeting the orbitofrontal cortex (OFC), ventrolateral (VLPFC), dorsal (DPFC) and medial (including anterior cingulate cortex; MPFC) prefrontal cortices. Both voxel-based (SPM8) and surface-based morphometry (Freesurfer) analyses were used to comprehensively evaluate cortical gray matter measure, volume, surface area and thickness. Reduced left VLPFC volume in attempters vs both patient groups was found (P=0.001, surviving multiple comparison correction, Cohen's d=0.65 95% (0.33-0.99) between attempters and healthy controls). In addition, reduced measures in OFC and DPFC, but not MPFC, were found with moderate effect sizes in suicide attempters vs healthy controls (Cohen's d between 0.34 and 0.52). Several of these measures were correlated with suicidal variables. When added to mood disorder history, left VLPFC volume increased within-sample specificity in identifying attempters in a significant but limited way. Our study, therefore, confirms structural prefrontal alterations in individuals with histories of suicide attempts. A future clinical application of these markers will, however, necessitate further research. PMID:25710122

  15. The implication of fractal dimension in hydrogeology and rock mechanics. Version 1.1

    International Nuclear Information System (INIS)

    Since much of geology and hydrogeology is controlled by the geometry of geologic features such as faults, fractures and stratigraphy, many researchers have proposed the use of fractal dimension as an index for comparing hydrogeologic environments. This report describes an investigation carried out by Golder Associates Geosystem AB to evaluate the use of fractal measures within the SKB site selection, evaluation, and characterization process. This report defines fractal dimension and the methods available for calculating fractal dimension. The report then summarizes a literature survey carried out to identify and evaluate applications of fractal methods in hydrogeology. Preliminary hydrogeological fractal numerical simulations carried out with the FracMan package are then presented and discussed. These numerical simulations evaluate the application of fractal methods within the context of other geometric measures such as connectivity measures, percolation probability, and block size measures. Based upon the literature survey and numerical simulations, recommendations are presented regarding the potential usefulness of fractal approaches. Fractal dimension can be used to distinguish hydrogeologic environments, provided the limitations of the approach are explicitly recognized. Recommendations are made for fractal dimension calculation procedures, specification of fractal dimension, and the use of fractal dimension in conjunction with other measures of hydrogeologic structure and heterogeneity. (135 refs.) (au)

  16. Classification of hydrogeologic areas and hydrogeologic flow systems in the basin and range physiographic province, southwestern United States

    Science.gov (United States)

    Anning, David W.; Konieczki, Alice D.

    2005-01-01

    The hydrogeology of the Basin and Range Physiographic Province in parts of Arizona, California, New Mexico, Utah, and most of Nevada was classified at basin and larger scales to facilitate information transfer and to provide a synthesis of results from many previous hydrologic investigations. A conceptual model for the spatial hierarchy of the hydrogeology was developed for the Basin and Range Physiographic Province and consists, in order of increasing spatial scale, of hydrogeologic components, hydrogeologic areas, hydrogeologic flow systems, and hydrogeologic regions. This hierarchy formed a framework for hydrogeologic classification. Hydrogeologic areas consist of coincident ground-water and surface-water basins and were delineated on the basis of existing sets of basin boundaries that were used in past investigations by State and Federal government agencies. Within the study area, 344 hydrogeologic areas were identified and delineated. This set of basins not only provides a framework for the classification developed in this report, but also has value for regional and subregional purposes of inventory, study, analysis, and planning throughout the Basin and Range Physiographic Province. The fact that nearly all of the province is delineated by the hydrogeologic areas makes this set well suited to support regional-scale investigations. Hydrogeologic areas are conceptualized as a control volume consisting of three hydrogeologic components: the soils and streams, basin fill, and consolidated rocks. The soils and streams hydrogeologic component consists of all surface-water bodies and soils extending to the bottom of the plant root zone. The basin-fill hydrogeologic component consists of unconsolidated and semiconsolidated sediment deposited in the structural basin. The consolidated-rocks hydrogeologic component consists of the crystalline and sedimentary rocks that form the mountain blocks and basement rock of the structural basin. Hydrogeologic areas were

  17. Forecasting the effects of EU policy measures on the nitrate pollution of groundwater based on a coupled agroeconomic - hydro(geo)logic model (Invited)

    Science.gov (United States)

    Wendland, F.

    2010-12-01

    The fundamental objectives of the European Union-Water Framework Directive and the EU Groundwater Directive are to attain a good status of water and groundwater resources in the member states of the EU by 2015. For river basins, whose good status cannot be guaranteed by 2015, catchment wide operational plans and measurement programs have to be drafted and implemented until 2009. In the river basin district Weser, Germany, which comprises a catchment area of ca. 49.000 km2, the achievement of the good status is unclear, or rather unlikely for 63% of the groundwater bodies. Inputs from diffuse sources and most of all nitrate losses from agriculturally used land have been identified as the main reasons for exceeding the groundwater threshold value for nitrate (50 mg/l) and for failing the good qualitative status of groundwater. The achievement of good qualitative status of groundwater bodies entails a particular challenge as the complex ecological, hydrological, hydrogeological and agro-economic relationships have to be considered simultaneously. We used an interdisciplinary model network to predict the nitrogen intakes into groundwater at the regional scale using an area differentiated approach. The model system combines the agro-economic model RAUMIS for estimating nitrogen surpluses from agriculture and the hydrological models GROWA/DENUZ/WEKU for describing the reactive nitrate transport in the soil-groundwater system. In a first step the model is used to analyze the present situation using N surpluses from agriculture for the year 2003. In many region of the Weser basin, particularly in the northwestern part which is characterized by high livestock densities, predicted nitrate concentrations in percolation water exceed the EU groundwater quality standard of 50 mg/L by far. In a second step the temporal and spatial impacts of the common agricultural policy (CAP) of the EU, already implemented agri-environmental measures of the Federal States and the expected

  18. Manual on mathematical models in isotope hydrogeology

    International Nuclear Information System (INIS)

    Methodologies based on the use of naturally occurring isotopes are, at present, an integral part of studies being undertaken for water resources assessment and management. Quantitative evaluations based on the temporal and/or spatial distribution of different isotopic species in hydrological systems require conceptual mathematical formulations. Different types of model can be employed depending on the nature of the hydrological system under investigation, the amount and type of data available, and the required accuracy of the parameter to be estimated. This manual provides an overview of the basic concepts of existing modelling approaches, procedures for their application to different hydrological systems, their limitations and data requirements. Guidance in their practical applications, illustrative case studies and information on existing PC software are also included. While the subject matter of isotope transport modelling and improved quantitative evaluations through natural isotopes in water sciences is still at the development stage, this manual summarizes the methodologies available at present, to assist the practitioner in the proper use within the framework of ongoing isotope hydrological field studies. In view of the widespread use of isotope methods in groundwater hydrology, the methodologies covered in the manual are directed towards hydrogeological applications, although most of the conceptual formulations presented would generally be valid. Refs, figs, tabs

  19. A Vulnerability Evaluation of the Phreatic Water in the Plain Area of the Junggar Basin, Xinjiang Based on the VDEAL Model

    Directory of Open Access Journals (Sweden)

    Ruiliang Jia

    2014-11-01

    Full Text Available A VDEAL (V is the lithology of the vadose zone, D is the groundwater depth, E is the degree of groundwater exploitation, A is the aquifer characteristics and L is the land use pattern. model, which is suitable for a vulnerability evaluation of the groundwater in arid inland areas, and that is based on the GOD (G is the groundwater status, O is overburden feature and D is groundwater depth method and DRASTIC (D is the depth of water-table, R is the net recharge, A is the aquifer media, S is the soil media, T is the topography, I is the impact of the vadose and C is the conductivity of the aquifer. model is proposed in this paper. Five indicators were selected by reference to the DRAV (D is the depth of water-table, R is the net recharge, A is the aquifer media and V is the impact of the vadose. and VLDA (V is the lithology of the vadose zone , L is the land use pattern, D is the groundwater depth and A is the aquifer characteristics and. models, namely, the lithology of the vadose zone (V, the groundwater depth (D, the degree of groundwater exploitation (E, the aquifer characteristics (A and the land use pattern (L. According to monitoring data from 2003 and 2011, the variations of phreatic water quality in the plain area of the Junggar Basin were divided into three types: the water quality may have deteriorated, be unchanged or improved. Four groups of indicator weights were configured to calculate the vulnerability index using the VDEAL model. The changes of phreatic water quality were then compared against the vulnerability index. The normalized weights of V, D, E, A, and L were respectively 0.15, 0.25, 0.10, 0.10, and 0.40; this is according to the principle that the sampling sites of deteriorated water quality are generally distributed in a high-vulnerability region, and the sites of unchanged and improved water quality are distributed in middle vulnerability, low vulnerability and invulnerable regions. The evaluation results of phreatic

  20. Youth Empowerment for the Most Vulnerable: A Model Based on the Pedagogy of Freire and Experiences in the Field

    Science.gov (United States)

    Mohajer, Nicole; Earnest, Jaya

    2009-01-01

    Purpose: This paper aims to review global adolescent empowerment programmes and develops and proposes a model that can be used with vulnerable adolescents. The model reflects theory and experience drawn from the literature. Design/methodology/approach: The review is a synthesis of articles on empowerment theory, models and programme evaluations.…

  1. Emerging Challenges and "Weird" Models in Hydrogeology

    Science.gov (United States)

    Carrera, J.

    2015-12-01

    Hydrogeological research and practice have dealt in recent years with problems related to groundwater quantity and quality. Models have been used for water flow, solute transport and, at most, chemical reactions, which were required to address issues such as water resources assessment, artificial recharge, seawater intrusion, impact of public works, and the like. "Weird" (i.e., outside the mainstream practical hydrogeology, restricted to academy) models were virtually restricted to spatial variability of permeability and the problems it imposed on transport (i.e., scale dependence of dispersivity, mixing, etc.). Yet, a broad gap has grown between academy and practical hydrogeology. Energy demands have created a new suite of problems that need to be solved to address CO2 storage, shale gas impacts or enhanced geothermal systems. These require solving mechanical and thermal equations. We contend, and will use example from our own work for illustration, that (1) these problems are not so new (hydrogeologists started working on them some 40 years ago), (2) hydrogeological tools are as needed to solve energy problems as they were for water problems (permeability remains the key parameter for most of them), (3) collaboration with sister Earth Sciences remains essential (the problems are highly coupled and no one can master all disciplines involved). The real challenge is not so much whether hydrogeology can address these problems, it can, as whether hydrogeologists can reduce the gap between academy and practice, which will be strongly stretched by these emerging problems.

  2. Hydrogeological assessment of the Thar lignite prospect

    Energy Technology Data Exchange (ETDEWEB)

    Singh, R.N.; Stace, R. [Nottingham Centre of Geomechanics (United Kingdom). Dept. of Civil Engineering, Faculty of Engineering; Pathan, A.G. [Mehran Univ. of Engineering and Technology, Shahrood (Iran, Islamic Republic of). Faculty of Mining, Petroleum and Geophysics; Atkins, A.S. [Staffordshire Univ., Stafford (United Kingdom). Faculty of Computing, Engineering and Technology

    2010-07-01

    This paper described a hydrogeological appraisal conducted at a proposed mine site in the Thar lignite field in Pakistan. The field contains an estimate 9 billion tonnes of lignite reserves. Three aquifers surrounding the lignite seams are inducing pore pressure in the rock mass and creating hazardous conditions at the site's high wall slopes. Groundwater inflow predictions were conducted using a finite element-based software package. The study was conducted to calculate dewatering quantities in order to ensure stability during excavation activities. Pumping tests conducted in boreholes at the bottom aquifer were used to determine permeability coefficients. Pumping rates from the 3 aquifers were calculated using the equivalent well approach. Results of the simulations were used to predict groundwater inflow from the bottom aquifer to the fully penetrating pit of the mine under steady state flow conditions. Results of the study indicated that 20 pumping out wells equipped with 150 mm diameter motor pumps will be required over a period of 10 years to achieve an overall dewatering rate of 0.6 m{sup 3}/s for the top aquifer. High head borehole pumps are needed for the intermediate and bottom-confined aquifers. 6 refs., 2 tabs., 2 figs.

  3. Logistic regression modeling to assess groundwater vulnerability to contamination in Hawaii, USA

    Science.gov (United States)

    Mair, Alan; El-Kadi, Aly I.

    2013-10-01

    Capture zone analysis combined with a subjective susceptibility index is currently used in Hawaii to assess vulnerability to contamination of drinking water sources derived from groundwater. In this study, we developed an alternative objective approach that combines well capture zones with multiple-variable logistic regression (LR) modeling and applied it to the highly-utilized Pearl Harbor and Honolulu aquifers on the island of Oahu, Hawaii. Input for the LR models utilized explanatory variables based on hydrogeology, land use, and well geometry/location. A suite of 11 target contaminants detected in the region, including elevated nitrate (> 1 mg/L), four chlorinated solvents, four agricultural fumigants, and two pesticides, was used to develop the models. We then tested the ability of the new approach to accurately separate groups of wells with low and high vulnerability, and the suitability of nitrate as an indicator of other types of contamination. Our results produced contaminant-specific LR models that accurately identified groups of wells with the lowest/highest reported detections and the lowest/highest nitrate concentrations. Current and former agricultural land uses were identified as significant explanatory variables for eight of the 11 target contaminants, while elevated nitrate was a significant variable for five contaminants. The utility of the combined approach is contingent on the availability of hydrologic and chemical monitoring data for calibrating groundwater and LR models. Application of the approach using a reference site with sufficient data could help identify key variables in areas with similar hydrogeology and land use but limited data. In addition, elevated nitrate may also be a suitable indicator of groundwater contamination in areas with limited data. The objective LR modeling approach developed in this study is flexible enough to address a wide range of contaminants and represents a suitable addition to the current subjective approach.

  4. Regularities in changes hydrogeological conditions in the territories adjacent to the tailings "Gully Stukanova" in the Western Donbass

    Directory of Open Access Journals (Sweden)

    Yevhrashkina H.P.

    2012-09-01

    Full Text Available The mathematical model changes hydrogeological conditions of the territory in the zone of tailings «Balka Stukanova».It is based on the hydrodynamic grid and contains 2 parts – filtration and migration. Estimated filtration tasks solved method by the double superposition. Migration processes are investigated based on the theory of physicochemical hydrodynamics of porous medias. Research results should be used for scientific study of environmental activities hydrogeological direction.

  5. Uncertainty in geological and hydrogeological data

    Directory of Open Access Journals (Sweden)

    B. Nilsson

    2007-09-01

    Full Text Available Uncertainty in conceptual model structure and in environmental data is of essential interest when dealing with uncertainty in water resources management. To make quantification of uncertainty possible is it necessary to identify and characterise the uncertainty in geological and hydrogeological data. This paper discusses a range of available techniques to describe the uncertainty related to geological model structure and scale of support. Literature examples on uncertainty in hydrogeological variables such as saturated hydraulic conductivity, specific yield, specific storage, effective porosity and dispersivity are given. Field data usually have a spatial and temporal scale of support that is different from the one on which numerical models for water resources management operate. Uncertainty in hydrogeological data variables is characterised and assessed within the methodological framework of the HarmoniRiB classification.

  6. A Contamination Vulnerability Assessment for the Sacramento Area Groundwater Basin

    Energy Technology Data Exchange (ETDEWEB)

    Moran, J E; Hudson, G B; Eaton, G F; Leif, R

    2004-03-10

    In response to concerns expressed by the California Legislature and the citizenry of the State of California, the State Water Resources Control Board (SWRCB), implemented a program to assess groundwater quality, and provide a predictive capability for identifying areas that are vulnerable to contamination. The program was initiated in response to concern over public supply well closures due to contamination by chemicals such as MtBE from gasoline, and solvents from industrial operations. As a result of this increased awareness regarding groundwater quality, the Supplemental Report of the 1999 Budget Act mandated the SWRCB to develop a comprehensive ambient groundwater-monitoring plan, and led to the initiation of the Ambient Groundwater Monitoring and Assessment (GAMA) Program. The primary objective of the GAMA Program is to assess the water quality and to predict the relative susceptibility to contamination of groundwater resources throughout the state of California. Under the GAMA program, scientists from Lawrence Livermore National Laboratory (LLNL) collaborate with the SWRCB, the U.S. Geological Survey, the California Department of Health Services (DHS), and the California Department of Water Resources (DWR) to implement the groundwater assessment program in cooperation with local water purveyors. In 2001 and 2002, LLNL carried out this vulnerability study in the groundwater basin of Sacramento suburban area, located to the north of the American River and to the east of the Sacramento River. The goal of the study is to provide a probabilistic assessment of the relative vulnerability of groundwater used for the public water supply to contamination from surface sources. This assessment of relative contamination vulnerability is made based on the results of two types of analyses that are not routinely carried out at public water supply wells: ultra low-level measurement of volatile organic compounds (VOCs), and groundwater age dating (using the tritium-helium-3

  7. SRP Baseline Hydrogeologic Investigation, Phase 3

    Energy Technology Data Exchange (ETDEWEB)

    Bledsoe, H.W.

    1988-08-01

    The SRP Baseline Hydrogeologic Investigation was implemented for the purpose of updating and improving the knowledge and understanding of the hydrogeologic systems underlying the SRP site. Phase III, which is discussed in this report, includes the drilling of 7 deep coreholes (sites P-24 through P-30) and the installation of 53 observation wells ranging in depth from approximately 50 ft to more than 970 ft below the ground surface. In addition to the collection of geologic cores for lithologic and stratigraphic study, samples were also collected for the determination of physical characteristics of the sediments and for the identification of microorganisms.

  8. Prediction of Floor Water Inrush: The Application of GIS-Based AHP Vulnerable Index Method to Donghuantuo Coal Mine, China

    Science.gov (United States)

    Wu, Qiang; Liu, Yuanzhang; Liu, Donghai; Zhou, Wanfang

    2011-09-01

    Floor water inrush represents a geohazard that can pose significant threat to safe operations for instance in coal mines in China and elsewhere. Its occurrence is controlled by many factors, and the processes are often not amenable to mathematical expressions. To evaluate the water inrush risk, the paper proposes the vulnerability index approach by coupling the analytic hierarchy process (AHP) and geographic information system (GIS). The detailed procedures of using this innovative approach are shown in a case study in China (Donghuantuo Coal Mine). The powerful spatial data analysis functions of GIS was used to establish the thematic layer of each of the six factors that control the water inrush, and the contribution weights of each factor was determined with the AHP method. The established AHP evaluation model was used to determine the threshold value for each risk level with a histogram of the water inrush vulnerability index. As a result, the mine area was divided into five regions with different vulnerability levels which served as general guidelines for the mine operations. The prediction results were further corroborated with the actual mining data, and the evaluation result is satisfactory.

  9. Design of Service Oriented Architecture(SOA)-based Software Vulnerability Analysis Method for Digital I and C System in NPP

    International Nuclear Information System (INIS)

    Diverse cyber security issues due to the vulnerability of the digital control systems have been brought up in the existing IT environments while advancement and propagation of digital I and C systems have improved convenience through automation. The recent example of Stuxnet proved that stability in the digital I and C system could not be secured due to an air gap of physical security elements. Therefore, it is required to discover new approaches toward cyber security that will overcome the limitation on security in a closed environment. In particular, there is a rapid increase in the importance of cyber security seen in guidelines published by IAEA and U.S. NRC shows that cyber security as well as physical security draws worldwide attention as a key component for nuclear system safety. To incorporate the new guide requirement, cyber security threats are analyzed by ITbase security elements for finding best practice approaches. The vulnerabilities identified by the general security threats and defined mitigation activities can include many different methods and strategies. This research suggests a method for analyzing vulnerability and assessment the nuclear digital I and C cyber security

  10. The study of past damaging hydrogeological events for damage susceptibility zonation

    Directory of Open Access Journals (Sweden)

    O. Petrucci

    2008-08-01

    Full Text Available Damaging Hydrogeological Events are defined as periods during which phenomena, such as landslides, floods and secondary floods, cause damage to people and the environment.

    A Damaging Hydrogeological Event which heavily damaged Calabria (Southern Italy between December 1972, and January 1973, has been used to test a procedure to be utilised in the zonation of a province according to damage susceptibility during DHEs. In particular, we analyzed the province of Catanzaro (2391 km2, an administrative district composed of 80 municipalities, with about 370 000 inhabitants.

    Damage, defined in relation to the reimbursement requests sent to the Department of Public Works, has been quantified using a procedure based on a Local Damage Index. The latter, representing classified losses, has been obtained by multiplying the value of the damaged element and the percentage of damage affecting it.

    Rainfall has been described by the Maximum Return Period of cumulative rainfall, for both short (1, 3, 5, 7, 10 consecutive days and long duration (30, 60, 90, 180 consecutive days, recorded during the event.

    Damage index and population density, presumed to represent the location of vulnerable elements, have been referred to Thiessen polygons associated to rain gauges working at the time of the event.

    The procedure allowed us to carry out a preliminary classification of the polygons composing the province according to their susceptibility to damage during DHEs. In high susceptibility polygons, severe damage occurs during rainfall characterised by low return periods; in medium susceptibility polygons maximum return period rainfall and induced damage show equal levels of exceptionality; in low susceptibility polygons, high return period rainfall induces a low level of damage.

    The east and west sectors of the province show the highest susceptibility, while polygons of the N-NE sector show the lowest

  11. Health-Related Quality of Life, Self-Efficacy and Enjoyment Keep the Socially Vulnerable Physically Active in Community-Based Physical Activity Programs: A Sequential Cohort Study.

    Science.gov (United States)

    Herens, Marion; Bakker, Evert Jan; van Ophem, Johan; Wagemakers, Annemarie; Koelen, Maria

    2016-01-01

    Physical inactivity is most commonly found in socially vulnerable groups. Dutch policies target these groups through community-based health-enhancing physical activity (CBHEPA) programs. As robust evidence on the effectiveness of this approach is limited, this study investigated whether CBHEPA programs contribute to an increase in and the maintenance of physical activity in socially vulnerable groups. In four successive cohorts, starting at a six-month interval, 268 participants from 19 groups were monitored for twelve months in seven CBHEPA programs. Data collection was based on repeated questionnaires. Socio-economic indicators, program participation and coping ability were measured at baseline. Physical activity, health-related quality of life and on-going program participation were measured three times. Self-efficacy and enjoyment were measured at baseline and at twelve months. Statistical analyses were based on a quasi-RCT design (independent t-tests), a comparison of participants and dropouts (Mann-Whitney test), and multilevel modelling to assess change in individual physical activity, including group level characteristics. Participants of CBHEPA programs are socially vulnerable in terms of low education (48.6%), low income (52.4%), non-Dutch origin (64.6%) and health-related quality of life outcomes. Physical activity levels were not below the Dutch average. No increase in physical activity levels over time was observed. The multilevel models showed significant positive associations between health-related quality of life, self-efficacy and enjoyment, and leisure-time physical activity over time. Short CBHEPA programs (10-13 weeks) with multiple trainers and gender-homogeneous groups were associated with lower physical activity levels over time. At twelve months, dropouts' leisure-time physical activity levels were significantly lower compared to continuing participants, as were health-related quality of life, self-efficacy and enjoyment outcomes. BMI and

  12. Health-Related Quality of Life, Self-Efficacy and Enjoyment Keep the Socially Vulnerable Physically Active in Community-Based Physical Activity Programs: A Sequential Cohort Study.

    Science.gov (United States)

    Herens, Marion; Bakker, Evert Jan; van Ophem, Johan; Wagemakers, Annemarie; Koelen, Maria

    2016-01-01

    Physical inactivity is most commonly found in socially vulnerable groups. Dutch policies target these groups through community-based health-enhancing physical activity (CBHEPA) programs. As robust evidence on the effectiveness of this approach is limited, this study investigated whether CBHEPA programs contribute to an increase in and the maintenance of physical activity in socially vulnerable groups. In four successive cohorts, starting at a six-month interval, 268 participants from 19 groups were monitored for twelve months in seven CBHEPA programs. Data collection was based on repeated questionnaires. Socio-economic indicators, program participation and coping ability were measured at baseline. Physical activity, health-related quality of life and on-going program participation were measured three times. Self-efficacy and enjoyment were measured at baseline and at twelve months. Statistical analyses were based on a quasi-RCT design (independent t-tests), a comparison of participants and dropouts (Mann-Whitney test), and multilevel modelling to assess change in individual physical activity, including group level characteristics. Participants of CBHEPA programs are socially vulnerable in terms of low education (48.6%), low income (52.4%), non-Dutch origin (64.6%) and health-related quality of life outcomes. Physical activity levels were not below the Dutch average. No increase in physical activity levels over time was observed. The multilevel models showed significant positive associations between health-related quality of life, self-efficacy and enjoyment, and leisure-time physical activity over time. Short CBHEPA programs (10-13 weeks) with multiple trainers and gender-homogeneous groups were associated with lower physical activity levels over time. At twelve months, dropouts' leisure-time physical activity levels were significantly lower compared to continuing participants, as were health-related quality of life, self-efficacy and enjoyment outcomes. BMI and

  13. Health-Related Quality of Life, Self-Efficacy and Enjoyment Keep the Socially Vulnerable Physically Active in Community-Based Physical Activity Programs: A Sequential Cohort Study.

    Directory of Open Access Journals (Sweden)

    Marion Herens

    Full Text Available Physical inactivity is most commonly found in socially vulnerable groups. Dutch policies target these groups through community-based health-enhancing physical activity (CBHEPA programs. As robust evidence on the effectiveness of this approach is limited, this study investigated whether CBHEPA programs contribute to an increase in and the maintenance of physical activity in socially vulnerable groups. In four successive cohorts, starting at a six-month interval, 268 participants from 19 groups were monitored for twelve months in seven CBHEPA programs. Data collection was based on repeated questionnaires. Socio-economic indicators, program participation and coping ability were measured at baseline. Physical activity, health-related quality of life and on-going program participation were measured three times. Self-efficacy and enjoyment were measured at baseline and at twelve months. Statistical analyses were based on a quasi-RCT design (independent t-tests, a comparison of participants and dropouts (Mann-Whitney test, and multilevel modelling to assess change in individual physical activity, including group level characteristics. Participants of CBHEPA programs are socially vulnerable in terms of low education (48.6%, low income (52.4%, non-Dutch origin (64.6% and health-related quality of life outcomes. Physical activity levels were not below the Dutch average. No increase in physical activity levels over time was observed. The multilevel models showed significant positive associations between health-related quality of life, self-efficacy and enjoyment, and leisure-time physical activity over time. Short CBHEPA programs (10-13 weeks with multiple trainers and gender-homogeneous groups were associated with lower physical activity levels over time. At twelve months, dropouts' leisure-time physical activity levels were significantly lower compared to continuing participants, as were health-related quality of life, self-efficacy and enjoyment

  14. Parental perceptions of child vulnerability in a community-based sample: Association with chronic illness and health-related quality of life.

    Science.gov (United States)

    Houtzager, Bregje A; Möller, Eline L; Maurice-Stam, Heleen; Last, Bob F; Grootenhuis, Martha A

    2015-12-01

    The study aimed to assess the prevalence of parental perceptions of a child's vulnerability (PPCV) in a Dutch community-based sample and its relationship with children's health and health-related quality of life (HRQoL). Parents completed the Child Vulnerability Scale and a socio-demographic questionnaire. The Pediatric Quality of Life Inventory 4.0 was administered to measure HRQoL. The prevalence of PPCV was assessed in relation to socio-demographic and health-related characteristics. In a three-step multiple hierarchical regression model, the mediational role of PPCV in the association between chronic illness and HRQoL was investigated. Participants were 520 Dutch children aged 5-18 years from nine Dutch schools. In all, 69 (13.3%) had a chronic illness; 1.9% was perceived vulnerable, 3.0% in groups 5-7 and 1.7% in groups 8-12 and 13-18. Younger age of the child, presence of a chronic illness and low HRQoL were associated with PPCV. PPCV partially mediated the negative association between chronic illness and HRQoL. In conclusion, PPCV is associated with adjustment to chronic illness. More research is needed regarding the mechanisms through which PPCV affects HRQoL and to examine whether PPCV can be targeted in parenting interventions. PMID:24842887

  15. Extraction of lidar-based dune-crest elevations for use in examining the vulnerability of beaches to inundation during hurricanes

    Science.gov (United States)

    Stockdon, H.F.; Doran, K.S.; Sallenger, A.H., Jr.

    2009-01-01

    The morphology of coastal sand dunes plays an important role in determining how a beach will respond to a hurricane. Accurate measurements of dune height and position are essential for assessing the vulnerability of beaches to extreme coastal change during future landfalls. Lidar topographic surveys provide rapid, accurate, high-resolution datasets for identifying the location, position, and morphology of coastal sand dunes over large stretches of coast. An algorithm has been developed for identification of the crest of the most seaward sand dune that defines the landward limit of the beach system. Based on changes in beach slope along cross-shore transects of lidar data, dune elevation and location can automatically be extracted every few meters along the coastline. Dune elevations in conjunction with storm-induced water levels can be used to predict the type of coastal response (e.g., beach erosion, dune erosion, overwash, or inundation) that may be expected during hurricane landfall. The vulnerability of the beach system at Fire Island National Seashore in New York to the most extreme of these changes, inundation, is assessed by comparing lidar-derived dune elevations to modeled wave setup and storm surge height. The vulnerability of the beach system to inundation during landfall of a Category 3 hurricane is shown to be spatially variable because of longshore variations in dune height (mean elevation 5.44 m, standard deviation 1.32 m). Hurricane-induced mean water levels exceed dune elevations along 70 of the coastal park, making these locations more vulnerable to inundation during a Category 3 storm. ?? 2009 Coastal Education and Research Foundation.

  16. DS926 Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system in Florida and parts of Georgia, Alabama, and South Carolina -- Polygon regions depicting saline areas within low-permeability rocks near base of the Oldsmar permeable zone

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system were developed to define an updated hydrogeologic framework as part...

  17. DS926 Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system in Florida and parts of Georgia, Alabama, and South Carolina -- Point features used for the top of the regional middle confining unit (base of Upper Floridan aquifer)

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system were developed to define an updated hydrogeologic framework as part...

  18. DS926 Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system in Florida and parts of Georgia, Alabama, and South Carolina -- Raster surface depicting the top of the regional middle confining unit (base of Upper Floridan aquifer)

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system were developed to define an updated hydrogeologic framework as part...

  19. DS926 Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system in Florida and parts of Georgia, Alabama, and South Carolina -- Point features used for the top of the regional middle confining unit (base of Upper Floridan aquifer), constrained

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system were developed to define an updated hydrogeologic framework as part...

  20. Description of hydrogeological data in SKB's database GEOTAB

    International Nuclear Information System (INIS)

    Since 1977 Swedish Nuclear Fuel and Waste Management Co., SKB has been performing a research and development programme for final disposal and spent nuclear fuel. The purpose of the programme is to acquire knowledge and data of radioactive waste. Measurement for the characterisation of geological, geophysical, hydrogeological and hydrochemical conditions are performed in specific site investigations as well as for geoscientific projects. A database, called GEOTAB, was investigated. It is based on a concept from Mimer Information System, and have been further developed by Ergo-Data. The hardware is a VAX 750 computer located at KRAB (Kraftverksbolagens Redovisningsavdelning AB) in Stockholm. (orig./DG)

  1. Hydrogeologic study of Cafam area. Melgar (Tolima)

    International Nuclear Information System (INIS)

    The hydrogeologic study covers an area of 50 km2 with the objectives of to determine the possibility of use of the underground waters and to locate places to carry out exploratory perforations in lands of Cafam, equally the elaboration of a hydrogeologic map of the region; for the effect it was carried out cartography geologic scale 1:10.000, inventory and sampling of water point, geoelectric prospecting and some permeability tests. In the area the exploitation of underground water is incipient, alone there are 20 points of water, of which none produce more than 1L/seg. The water has in general good physical chemistry quality for the human consumption. Geologically was recognized the groups Guadalupe and Gualanday, also some quaternary deposits; the previous ones were subdivided in 11 geological units for its composition and morphology, which are framed structurally in the E flank of the synclinal of Carmen de Apicala and displaced by traverse faults with address E-W and N-W. From the point of hydrogeologic view the units were grouped in 8 aquifer systems, of which four are considered of hydrogeologic importance for the area; the sector with better possibilities to capture these aquifer systems is the W of the area (in the terraces area) that extends to the Sumapaz River. For the Cafam sector a place was selected to build an exploratory well of 200 mts. of depth that would capture an aquifer of low transmissivity, corresponding to the Unit T3

  2. Analysis and Exploit of CSRSS Vulnerabilities based on Windows%基于Windows的CSRSS进程漏洞分析与利用

    Institute of Scientific and Technical Information of China (English)

    李孟哲; 武学礼; 张涛; 伟平

    2014-01-01

    With advances in technology, Windows operating system has improved steadily. The combination of many memory protection mechanisms makes the traditional buffer-overflow-based attacks to be more useless. In this case, the kernel vulnerabilities can be used to break through the security line of defense as a starting point. If these vulnerabilities are used by viruses and Trojans, the defense of security software will be collapsed. That means a heavy blow to the system security. Since the Microsoft Windows NT's development, the operating system has been designed to support a number of different subsystems, such as POSIX or OS/2. This paper opens a series of CSRSS-oriented study, aiming at describing the uncovered CSRSS mechanism internals. Although some great research has already been carried out by some articles, no thorough case study is available until now. This paper covers both the very basic ideas and their implementations, as well as the recent CSRSS changes applied in modern operating systems. In addition, standing on the point of safety, in this paper, the Windows kernel vulnerabilities are classified, a set of vulnerability research process is presented. According to the process, this article studies local privilege escalation vulnerability and denial of service vulnerability about CSRSS. Through the analysis of the CVE-2011-1281 vulnerability, use-after-free exploit not only appears in the browser vulnerabilities, but also in the software of the system.%随着技术的进步,Windows 操作系统日益完善,多种内存保护技术的结合使得传统的基于缓冲区溢出攻击越来越困难。在这种情况下,内核漏洞往往可以作为突破安全防线的切入点,一旦漏洞被病毒、木马利用,将会彻底瓦解安全软件的所有防御,沉重打击系统安全。随着 Windows NT 的开发,操作系统被设计成可以支持多个子系统,包括 POSIX、OS/2以及Windows 子系统(也被称为客户端/服

  3. Hydrogeological modeling for improving groundwater monitoring network and strategies

    Science.gov (United States)

    Thakur, Jay Krishna

    2016-09-01

    The research aimed to investigate a new approach for spatiotemporal groundwater monitoring network optimization using hydrogeological modeling to improve monitoring strategies. Unmonitored concentrations were incorporated at different potential monitoring locations into the groundwater monitoring optimization method. The proposed method was applied in the contaminated megasite, Bitterfeld/Wolfen, Germany. Based on an existing 3-D geological model, 3-D groundwater flow was obtained from flow velocity simulation using initial and boundary conditions. The 3-D groundwater transport model was used to simulate transport of α-HCH with an initial ideal concentration of 100 mg/L injected at various hydrogeological layers in the model. Particle tracking for contaminant and groundwater flow velocity realizations were made. The spatial optimization result suggested that 30 out of 462 wells in the Quaternary aquifer (6.49 %) and 14 out of 357 wells in the Tertiary aquifer (3.92 %) were redundant. With a gradual increase in the width of the particle track path line, from 0 to 100 m, the number of redundant wells remarkably increased, in both aquifers. The results of temporal optimization showed different sampling frequencies for monitoring wells. The groundwater and contaminant flow direction resulting from particle tracks obtained from hydrogeological modeling was verified by the variogram modeling through α-HCH data from 2003 to 2009. Groundwater monitoring strategies can be substantially improved by removing the existing spatio-temporal redundancy as well as incorporating unmonitored network along with sampling at recommended interval of time. However, the use of this model-based method is only recommended in the areas along with site-specific experts' knowledge.

  4. Hydrogeological Prognosis with Regard to Realisation of the New Colle Di Tenda Road Tunnel

    Directory of Open Access Journals (Sweden)

    Cinzia Banzato

    2011-01-01

    Full Text Available Problem statement: The doubling of Tenda pass road tunnel jointing SW France to Piedmont (Italy was planned to penetrate a complicate rock structure in which several complex play an hydrogeologic role including carbonate-Karst aquifer between flysch impervious complexes. The main problem of the project is the presence of an hydraulic circulation feeding a spring of social and economic great importance discharging into a railroad tunnel below. Approach: The authors was charged by ANAS, Italian National Roads Authority, to execute a complete hydrogeologic prognosis of the situation that will be determinate by the excavation of the new tunnel and forecast as well as possible the hazard for the tapped spring. Results: Two years research have included a complete hydrogeologic and hydrochemical survey all the hypothesized structure feeding the spring, with several bore holes used as observation wells, the use of several monitoring device for the discharge and the chemical characters of spring, a lot of laboratory tests on cements and micro-cements and other materials used in waterproofing and sustain the rocks during the excavation and the concrete lining of the tunnel. Conclusion: The study ends with the evaluation of the vulnerability of the spring and the forecasting of contamination and depletion of the spring.

  5. Intrinsic vulnerability assessment of the aquifer in the Rižana spring chatcment by method SINTACS

    Directory of Open Access Journals (Sweden)

    2002-12-01

    Full Text Available In this paper is presented intrinsic vulnerability assessment of the aquifer in the Rižana spring chatcment by the method SINTACS. It is parametric method that takes into consideration seven parameters (depth to ground water, effective infiltration action, unsaturatedzone attenuation capacity, soil/overburden attenuation capacity, hydrogeological characteristics of the aquifer, hydraulic conductivity range of aquifer, hydrologic role of the topographic slope. Parameters are presented in grid information layers that wereelaborated on the basis of interpretation and GIS processing of geological, hydrogeological,speleological, topographical, meteorological and pedological data. According to the parametersimportance for vulnerability assessment, a multiplier (importance weight was assigned to each parameter. Final map of vulnerability is a result of overlaying (summing of weighted information layers (parameters and shows the catchment area of the Rižanaspring subdivided into six vulnerability classes.

  6. Guideline on the System Vulnerability : Analysis of the Baltic Sea Region Vulnerability to the Impact of Climate Change

    OpenAIRE

    Hjerpe, Mattias; Schauser, Inke; Alberth, Johan

    2013-01-01

    This report elaborates an integrated vulnerability assessment concept, intended as a knowledge brokerage tool for decision-makers in the Baltic Sea Region. By developing an integrated vulnerability concept, in line with advances in regional and local vulnerability and adaptation research and based on the project’s review of the scope and quality of current vulnerability assessments, the report supports discussions on what is needed for a systematic assessment of vulnerability in the region. T...

  7. Enhancing the usability of seasonal to decadal (S2D) climate information - an evidence-based framework for the identification and assessment of sector-specific vulnerabilities

    Science.gov (United States)

    Funk, Daniel

    2016-04-01

    The successful provision of from seasonal to decadal (S2D) climate service products to sector-specific users is dependent on specific problem characteristics and individual user needs and decision-making processes. Climate information requires an impact on decision making to have any value (Rodwell and Doblas-Reyes, 2006). For that reason the knowledge of sector-specific vulnerabilities to S2D climate variability is very valuable information for both, climate service producers and users. In this context a concept for a vulnerability assessment framework was developed to (i) identify climate events (and especially their temporal scales) critical for sector-specific problems to assess the basic requirements for an appropriate climate-service product development; and to (ii) assess the potential impact or value of related climate information for decision-makers. The concept was developed within the EUPORIAS project (European Provision of Regional Impacts Assessments on Seasonal and Decadal Timescales) based on ten project-related case-studies from different sectors all over Europe. In the prevalent stage the framework may be useful as preliminary assessment or 'quick-scan' of the vulnerability of specific systems to climate variability in the context of S2D climate service provision. The assessment strategy of the framework is user-focused, using predominantly a bottom-up approach (vulnerability as state) but also a top-down approach (vulnerability as outcome) generally based on qualitative data (surveys, interviews, etc.) and literature research for system understanding. The starting point of analysis is a climate-sensitive 'critical situation' of the considered system which requires a decision and is defined by the user. From this basis the related 'critical climate conditions' are assessed and 'climate information needs' are derived. This mainly refers to the critical period of time of the climate event or sequence of events. The relevant period of time of problem

  8. Regional hydrogeological simulations using CONECTFLOW. Preliminary site description. Laxemar sub area - version 1.2

    International Nuclear Information System (INIS)

    The main objective of this study is to support the development of a preliminary Site Description of the Laxemar subarea on a regional-scale based on the available data of November 2004 (Data Freeze L1.2). A more specific objective of this study is to assess the role of both known and less quantified hydrogeological conditions in determining the present-day distribution of saline groundwater in the Laxemar subarea on a regional-scale. An improved understanding of the palaeo-hydrogeology is necessary in order to gain credibility for the Site Description in general and the hydrogeological description in particular. This is to serve as a basis for describing the present hydrogeological conditions on a local-scale, as well as predictions of future hydrogeological conditions. Another objective is to assess the flow-paths from the local-scale model domain, based on the present-day flow conditions, to assess the distribution of discharge and recharge areas connected to the flow at the approximate repository depth to inform the Preliminary Safety Evaluation. Significant new features incorporated in the modelling include: a depth variation in hydraulic properties within the deformation zones; a dependence on rock domain and depth in the rock mass properties in regional-scale models; a more detailed model of the overburden in terms of a layered system of spatially variable thickness made up of several different types of Quaternary deposits has been implemented; and several variants on the position of the watertable have been tried. The motivation for introducing a dependence on rock domain was guided by the hydrogeological interpretation with the aim of honouring the observed differences in hydraulic properties measured at the boreholes

  9. Far-field hydrogeological model of Paks NPP

    International Nuclear Information System (INIS)

    Complete text of publication follows. The settlements in the vicinity of Paks NPP gain the drinking water from the lower Pannonian aquifers. Uncontrolled releases from the NPP enter into the shallow ground-water and they are transported to the Danube in the Quaternary alluvial sandy gravel layer. The hydraulic potential in the area increases with the depth, so leakage from the upper gravel layer to the lower aquifer is not possible in undisturbed circumstances. The question is that an overexploitation of drinking water can change the pressure conditions so that the contaminated water can enter from the upper gravel layer into the lower aquifer. To answer this question the Visual MODFLOW program was used to simulate the groundwater w, providing quantitative estimates of w rates, w paths and travel times. The simulation was designed to represent average steady-state w conditions. A mathematical model is a representation of a real system or process. The subsurface environment constitutes a complex, three-dimensional, heterogeneous hydrogeologic setting, which strongly influences groundwater flow and transport, and it can be described through careful hydrogeologic practice in the field. The conceptual model of the hydrogeological system in the surroundings of Paks NPP was constructed from the available geologic, hydrogeological, geographical and meteorological data. To obtain a unique solution of a generic model corresponding to a given area, additional information about the physical state of the system is required (boundary and initial conditions). The model was constructed on a 20km x 22km area, its eastern boundary is Danube, the others are defined as no w boundaries. The model consists of 5 main layers: upper sequences of Pleistocene alluvial sediments (sandy layer, Kx,y = 10-4m/s); lower sequences of Pleistocene alluvial sediments (gravel, Kx,y = 10-3m/s); upper Pannonian sediments of restricted transmissivity (Kx,y = 5 x 10-6m/s); Pannonian aquifer (Kx,y = 10-4m

  10. A GIS-based vulnerability assessment of brine contamination to aquatic resources from oil and gas development in eastern Sheridan County, Montana.

    Science.gov (United States)

    Preston, Todd M; Chesley-Preston, Tara L; Thamke, Joanna N

    2014-02-15

    Water (brine) co-produced with oil in the Williston Basin is some of the most saline in the nation. The Prairie Pothole Region (PPR), characterized by glacial sediments and numerous wetlands, covers the northern and eastern portion of the Williston Basin. Sheridan County, Montana, lies within the PPR and has a documented history of brine contamination. Surface water and shallow groundwater in the PPR are saline and sulfate dominated while the deeper brines are much more saline and chloride dominated. A Contamination Index (CI), defined as the ratio of chloride concentration to specific conductance in a water sample, was developed by the Montana Bureau of Mines and Geology to delineate the magnitude of brine contamination in Sheridan County. Values >0.035 indicate contamination. Recently, the U.S. Geological Survey completed a county level geographic information system (GIS)-based vulnerability assessment of brine contamination to aquatic resources in the PPR of the Williston Basin based on the age and density of oil wells, number of wetlands, and stream length per county. To validate and better define this assessment, a similar approach was applied in eastern Sheridan County at a greater level of detail (the 2.59 km(2) Public Land Survey System section grid) and included surficial geology. Vulnerability assessment scores were calculated for the 780 modeled sections and these scores were divided into ten equal interval bins representing similar probabilities of contamination. Two surface water and two groundwater samples were collected from the section with the greatest acreage of Federal land in each bin. Nineteen of the forty water samples, and at least one water sample from seven of the ten selected sections, had CI values indicating contamination. Additionally, CI values generally increased with increasing vulnerability assessment score, with a stronger correlation for groundwater samples (R(2)=0.78) than surface water samples (R(2)=0.53). PMID:24364993

  11. A GIS-based vulnerability assessment of brine contamination to aquatic resources from oil and gas development in eastern Sheridan County, Montana

    Science.gov (United States)

    Preston, Todd M.; Chesley-Preston, Tara L.; Thamke, Joanna N.

    2014-01-01

    Water (brine) co-produced with oil in the Williston Basin is some of the most saline in the nation. The Prairie Pothole Region (PPR), characterized by glacial sediments and numerous wetlands, covers the northern and eastern portion of the Williston Basin. Sheridan County, Montana, lies within the PPR and has a documented history of brine contamination. Surface water and shallow groundwater in the PPR are saline and sulfate dominated while the deeper brines are much more saline and chloride dominated. A Contamination Index (CI), defined as the ratio of chloride concentration to specific conductance in a water sample, was developed by the Montana Bureau of Mines and Geology to delineate the magnitude of brine contamination in Sheridan County. Values > 0.035 indicate contamination. Recently, the U.S. Geological Survey completed a county level geographic information system (GIS)-based vulnerability assessment of brine contamination to aquatic resources in the PPR of the Williston Basin based on the age and density of oil wells, number of wetlands, and stream length per county. To validate and better define this assessment, a similar approach was applied in eastern Sheridan County at a greater level of detail (the 2.59 km2 Public Land Survey System section grid) and included surficial geology. Vulnerability assessment scores were calculated for the 780 modeled sections and these scores were divided into ten equal interval bins representing similar probabilities of contamination. Two surface water and two groundwater samples were collected from the section with the greatest acreage of Federal land in each bin. Nineteen of the forty water samples, and at least one water sample from seven of the ten selected sections, had CI values indicating contamination. Additionally, CI values generally increased with increasing vulnerability assessment score, with a stronger correlation for groundwater samples (R2 = 0.78) than surface water samples (R2 = 0.53).

  12. Assessment of the desertification vulnerability of the Cappadocian district (Central Anatolia, Turkey based on aridity and climate-process system

    Directory of Open Access Journals (Sweden)

    Murat Türkeş

    2011-03-01

    Full Text Available The present study discusses climate of the Cappadocian district in Turkey on the basis of Thornthwaite’s climate classification and water budget, Erinç’s aridity index and United Nations Convention to Combat Desertification (UNCCD aridity index, along with the spatial and inter-seasonal variations of precipitation and air temperatures. Vulnerability of the Cappadocia to desertification processes was also investigated with respect to the aridity, lithology dominated by tuffs and climate-process system and present land-use features of the district. The data analysis revealed that coefficients of variation (CV of the mean and maximum temperatures are the greatest in summer and the smallest in winter. Nevşehir and Kayseri environs are the most continental parts of the Cappadocia with a high inter-annual variability and low temperatures. Cappadocia is characterized with a continental rainfall regime having a maximum precipitation in spring. Variability of summer precipitation totals is greater than that of other seasons, varying from 65.7% to 78%. The CVs of the annual precipitation totals are about 18% at north and about 20% at south. Semi-arid and dry sub-humid or semi-humid climate types prevail over Cappadocia according to Thornthwaite’s moisture and Erinç’s aridity indices. Steppe is the dominant vegetation formation with sparse dry trees. The Cappadocia is vulnerable to the desertification processes due to both natural factors (e.g. degree of aridity, climate-process system, weathering of tuffs, erosion, climate change, etc. and human-involvement (e.g. land degradation and intensive tourism, etc.. In order to mitigate desertification and to preserve the historical and cultural heritages in Cappadocia, sustainable land-use management and tourism planning applications are urgently needed.

  13. Assessment of the desertification vulnerability of the Cappadocian district (Central Anatolia, Turkey based on aridity and climate-process system

    Directory of Open Access Journals (Sweden)

    Murat Türkeş

    2011-03-01

    Full Text Available The present study discusses climate of the Cappadocian district in Turkey on the basis of Thornthwaite’s climate classification and water budget, Erinç’s aridity index and United Nations Convention to Combat Desertification (UNCCD aridity index, along with the spatial and inter-seasonal variations of precipitation and air temperatures. Vulnerability of the Cappadocia to desertification processes was also investigated with respect to the aridity, lithology dominated by tuffs and climate-process system and present land-use features of the district. The data analysis revealed that coefficients of variation (CV of the mean and maximum temperatures are the greatest in summer and the smallest in winter. Nevşehir and Kayseri environs are the most continental parts of the Cappadocia with a high inter-annual variability and low temperatures. Cappadocia is characterized with a continental rainfall regime having a maximum precipitation in spring. Variability of summer precipitation totals is greater than that of other seasons, varying from 65.7% to 78%. The CVs of the annual precipitation totals are about 18% at north and about 20% at south. Semi-arid and dry sub-humid or semi-humid climate types prevail over Cappadocia according to Thornthwaite’s moisture and Erinç’s aridity indices. Steppe is the dominant vegetation formation with sparse dry forests. The Cappadocia is vulnerable to the desertification processes due to both natural factors (e.g. degree of aridity, climate-process system, weathering of tuffs, erosion, climate change, etc. and human-involvement (e.g. land degradation and intensive tourism, etc.. In order to mitigate desertification and to preserve the historical and cultural heritages in Cappadocia, sustainable land-use management and tourism planning applications are urgently needed.

  14. Mining Bug Databases for Unidentified Software Vulnerabilities

    Energy Technology Data Exchange (ETDEWEB)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  15. National security vulnerability database classification based on an LDA topic model%基于LDA主题模型的安全漏洞分类

    Institute of Scientific and Technical Information of China (English)

    廖晓锋; 王永吉; 范修斌; 吴敬征

    2012-01-01

    The current vulnerabilities in China are analyzed using a dataset from the China National Vulnerability Database of Information Security(CNNVD),with a combined latent Dirichlet allocation(LDA) topic model and a support vector machine(SVM) to construct a classifier in the topic vector space.Tests show that the classifier based on topic vectors has about 8% better classification performance than that based on text vectors.%采用隐含Dirichlet分布主题模型(latent Dirichletallocation,LDA)和支持向量机(support vector machine,SVM)相结合的方法,在主题向量空间构建一个自动漏洞分类器。以中国国家信息安全漏洞库(CNNVD)中漏洞记录为实验数据。实验表明:基于主题向量构建的分类器的分类准确度比直接使用词汇向量构建的分类器有8%的提高。

  16. The physical hydrogeology of ore deposits

    Science.gov (United States)

    Ingebritsen, Steven E.; Appold, M.S.

    2012-01-01

    Hydrothermal ore deposits represent a convergence of fluid flow, thermal energy, and solute flux that is hydrogeologically unusual. From the hydrogeologic perspective, hydrothermal ore deposition represents a complex coupled-flow problem—sufficiently complex that physically rigorous description of the coupled thermal (T), hydraulic (H), mechanical (M), and chemical (C) processes (THMC modeling) continues to challenge our computational ability. Though research into these coupled behaviors has found only a limited subset to be quantitatively tractable, it has yielded valuable insights into the workings of hydrothermal systems in a wide range of geologic environments including sedimentary, metamorphic, and magmatic. Examples of these insights include the quantification of likely driving mechanisms, rates and paths of fluid flow, ore-mineral precipitation mechanisms, longevity of hydrothermal systems, mechanisms by which hydrothermal fluids acquire their temperature and composition, and the controlling influence of permeability and other rock properties on hydrothermal fluid behavior. In this communication we review some of the fundamental theory needed to characterize the physical hydrogeology of hydrothermal systems and discuss how this theory has been applied in studies of Mississippi Valley-type, tabular uranium, porphyry, epithermal, and mid-ocean ridge ore-forming systems. A key limitation in the computational state-of-the-art is the inability to describe fluid flow and transport fully in the many ore systems that show evidence of repeated shear or tensional failure with associated dynamic variations in permeability. However, we discuss global-scale compilations that suggest some numerical constraints on both mean and dynamically enhanced crustal permeability. Principles of physical hydrogeology can be powerful tools for investigating hydrothermal ore formation and are becoming increasingly accessible with ongoing advances in modeling software.

  17. Recent hydrogeologic study of the Vis island

    Directory of Open Access Journals (Sweden)

    Janislav Kapelj

    2002-12-01

    Full Text Available The Vis Island belongs to the group of the Middle Dalmatian islands. It comprises an area of about 90.2 km2. Morphologically, three belts of highlands and two depressions with karst poljes are significant. The highest point on the island is Hum with 587 m a.s.l. theisland’s water supply is organized from the water-supply station “Korita”, situated in the central part of island, in tectonically formed depression. There are two additional capturedobjects: the well K-1 above the Komiža town and the spring “Pizdica”. The most important hydrogeological role on the island have two hydrogeological barriers, one in the KomižaBay, completely made of impermeable igneous and clastic rocks, and another one, the recently recognized relative barrier in the area of Dra~evo, Plisko and Velo polje. Since the island karst aquifer is in permanent dynamic relation with seawater, classical geologic,structural and hydrogeologic investigations have been performed with application of hydrogeochemical methods taking into account the natural chemical tracer content of groundwater and its variations in different hydrologic and vegetation conditions. Precipitationregime is very unfavorable with regard to the recharging of island’s aquifer, because dry periods are usually very long. During the summer tourist season, when the number of inhabitants and fresh water consumption considerably increase, amounts of island’sgroundwater suitable for water supply and irrigation rapidly decrease. Sometimes, insufficient quantity of fresh water on the Vis Island causes restrictions. Concerning the development of tourist potential and the present agricultural activities, summer lack ofwater is a serious restrictive factor. Some results of the performed hydrogeological study, important as a basis for island’s fresh water potential assessment, will be presented.

  18. Hydrogeology, waste disposal, science and politics: Proceedings

    International Nuclear Information System (INIS)

    A total of 48 papers were presented at the Engineering Geology and Geotechnical Engineering 30th Symposium. These papers are presented in this proceedings under the following headings: site characterization--Pocatello area; site characterization--Boise Area; site assessment; Idaho National Engineering Laboratory; geophysical methods; remediation; geotechnical engineering; and hydrogeology, northern and western Idaho. Individual papers have been processed separately for inclusion in the Energy Science and Technology Database

  19. Hydrogeology, waste disposal, science and politics: Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    Link, P.K. [ed.

    1994-07-01

    A total of 48 papers were presented at the Engineering Geology and Geotechnical Engineering 30th Symposium. These papers are presented in this proceedings under the following headings: site characterization--Pocatello area; site characterization--Boise Area; site assessment; Idaho National Engineering Laboratory; geophysical methods; remediation; geotechnical engineering; and hydrogeology, northern and western Idaho. Individual papers have been processed separately for inclusion in the Energy Science and Technology Database.

  20. A compilation of subsurface hydrogeologic data

    International Nuclear Information System (INIS)

    This report presents a compilation of both fracture properties and hydrogeological parameters relevant to the flow of groundwater in fractured rock systems. Methods of data acquisition as well as the scale of and conditions during the measurement are recorded. Measurements and analytical techniques for each of the parameters under consideration have been reviewed with respect to their methodology, assumptions and accuracy. Both the rock type and geologic setting associated with these measurements have also been recorded. 373 refs

  1. 基于Peach的模糊测试样本变异策略研究%Research on Mutation Strategy in Vulnerability Discovery based on Peach

    Institute of Scientific and Technical Information of China (English)

    丁迪; 薛质

    2014-01-01

    With the rapid development of the software industry, the size and logical complexity of software are greatly increased. Po-tential vulnerabilities that exist in the software threaten the information security of more and more personal computers, corporate and e-ven government. Therefore people are paying attention on vulnerability discovery. In vulnerability discovery, how to construct the sam-ple is critically related to abnormal test efficiency. In this issue, the Fuzzing technology based on Peach is discussed. And then the pol-icy of sample mutation in Peach is analyzed. At last, an optimization method of sample mutation is proposed, by which the efficiency of fuzz test can be increased.%随着软件产业的迅速发展,软件的规模和逻辑复杂度大大增加,软件中存在的潜在漏洞也越来越多,威胁着个人计算机甚至企业、政府的信息安全,漏洞挖掘正在被越来越多的人重视。漏洞挖掘工作中,如何构造畸形样本是关乎测试效率的至关重要的问题。文章首先对基于Peach的模糊测试技术进行介绍。其次研究Peach在漏洞挖掘中的样本变异策略。最后提出了对样本变异策略的优化方法,并通过实验验证了优化方法能够提高模糊测试的效率。

  2. Stochastic hydrogeology: what professionals really need?

    Science.gov (United States)

    Renard, Philippe

    2007-01-01

    Quantitative hydrogeology celebrated its 150th anniversary in 2006. Geostatistics is younger but has had a very large impact in hydrogeology. Today, geostatistics is used routinely to interpolate deterministically most of the parameters that are required to analyze a problem or make a quantitative analysis. In a small number of cases, geostatistics is combined with deterministic approaches to forecast uncertainty. At a more academic level, geostatistics is used extensively to study physical processes in heterogeneous aquifers. Yet, there is an important gap between the academic use and the routine applications of geostatistics. The reasons for this gap are diverse. These include aspects related to the hydrogeology consulting market, technical reasons such as the lack of widely available software, but also a number of misconceptions. A change in this situation requires acting at different levels. First, regulators must be convinced of the benefit of using geostatistics. Second, the economic potential of the approach must be emphasized to customers. Third, the relevance of the theories needs to be increased. Last, but not least, software, data sets, and computing infrastructure such as grid computing need to be widely available. PMID:17760580

  3. Vulnerability assessment of karst aquifer feeding Pertuso Spring (Central Italy): comparison between different applications of COP method

    Science.gov (United States)

    Sappa, Giuseppe; Ferranti, Flavia; Luciani, Giulia

    2016-04-01

    Vulnerability assessment of karst aquifers and vulnerability mapping are important tools for improved sustainable management and protection of karst groundwater resources. In this paper, to estimate the vulnerability degree of the karst aquifer feeding Pertuso Spring in Central Italy, two different implementations of COP method, supported by an open source GIS, were tested and a comparison of the vulnerability maps is proposed. The study area is a highly karstified carbonate aquifer located in the Upper Valley of the Aniene River, in the south-east part of Latium Region. The hydrogeological basin covers about 50 km2 and the karst aquifer provides a water supply of about 120.000 m3d-1. The well-developed karst features in this hydrogeological system is responsible of the fast infiltration of rainfall in the saturated zone and, consequently, of the high discharge rate of Pertuso Spring (up to 3 m3/s). Thus, in the aim of emphasizing the presence of these karst features, due to which, there are limited attenuation processes in the unsaturated zone, in this work COP method has been applied by the implementation of a new discretization methodology of the hydrogeological basin using polygonal layer. Therefore, the hydrogeological catchment basin has been divided into 52 polygonal layer, representative of outcropping lithology and karst features, to which COP method has been applied. The intrinsic vulnerability maps, produced using a GIS approach, has been examinated and compared with the maps obtained using traditional vulnerability assessment method, which provides the discretization of the study area generating a grid map to which associate the Vulnerability Indexes. The results of this study highlight vulnerability from low to very high. The maximum vulnerability degree is due to karstic features responsible of high recharge and high hydraulic conductivity. The new proposed discretization of the hydrogeological basin using polygonal layer raise four vulnerability

  4. Superintendent Vulnerability and Mobility.

    Science.gov (United States)

    Parker, Phyllis

    1996-01-01

    Examined Callahan's vulnerability thesis to determine its ability to explain the mobility of superintendents in Texas between 1985 and 1990. Questionnaire and interview data indicated that, at least in Texas where superintendent mobility reached 50% in that time period, vulnerability did not appear to account for much of superintendent mobility.…

  5. 基于Fuzzing的ActiveX控件漏洞挖掘技术研究%Vulnerability Detection in ActiveX Controls Based on Fuzzing Technology

    Institute of Scientific and Technical Information of China (English)

    杨丁宁; 肖晖; 张玉清

    2012-01-01

    Vulnerabilities in ActiveX controls are large in number and tend to exhibit high level of severity. They are frequently exploited in Web based attacks to compromise client computers, thus motivating the research into techniques for discovering such flaws automatically. In this work, the authors propose and implement an ActiveX vulnerability detection tool named ActiveX-Fuzzer. It is a blackbox fuzzing tool that automatically feeds the interface exposed by an ActiveX control with crafted semi-valid data, attempting to identify potential vulnerabilities including buffer overflow, integer overflow and format string flaws. The tool is tested against a broad range of commonly used ActiveX controls and detects a number of highly severe vulnerabilities that are previously undiscovered, affecting Tencent QQ, WinZip, Microsoft Office and other software products, as well as online services from several major banks. The test result well proves the effectiveness of such an approach.%ActiveX控件漏洞存在广泛且往往具有较高的威胁等级,有必要对此类漏洞的挖掘技术展开研究,发现并修复漏洞,从而杜绝安全隐患.在对ActiveX控件特性进行分析的基础上,设计并实现了ActiveX控件漏洞挖掘工具-ActiveX-Fuzzer.它基于黑盒Fuzzing测试技术,能够自动地构造半有效数据对控件接口展开测试,尝试发现潜在的缓冲区溢出、整数溢出及格式化字符串错误等安全问题.通过使用该工具对常用ActiveX控件进行广泛的测试,发现多个未公布的高危漏洞,受影响的软件包括腾讯QQ、WinZip、微软Office等国内外重要软件,以及部分知名银行的网上服务中使用的控件.该测试结果表明了ActiveX-Fuzzer的有效性和先进性.

  6. Hydrogeology and Water Quality of the Pepacton Reservoir Watershed in Southeastern New York. Part 4. Quantity and Quality of Ground-Water and Tributary Contributions to Stream Base Flow in Selected Main-Valley Reaches

    Science.gov (United States)

    Heisig, Paul M.

    2004-01-01

    Estimates of the quantity and quality of ground-water discharge from valley-fill deposits were calculated for nine valley reaches within the Pepacton watershed in southeastern New York in July and August of 2001. Streamflow and water quality at the upstream and downstream end of each reach and at intervening tributaries were measured under base-flow conditions and used in mass-balance equations to determine quantity and quality of ground-water discharge. These measurements and estimates define the relative magnitudes of upland (tributary inflow) and valley-fill (ground-water discharge) contributions to the main-valley streams and provide a basis for understanding the effects of hydrogeologic setting on these contributions. Estimates of the water-quality of ground-water discharge also provide an indication of the effects of road salt, manure, and human wastewater from villages on the water quality of streams that feed the Pepacton Reservoir. The most common contaminant in ground-water discharge was chloride from road salt; concentrations were less than 15 mg/L. Investigation of ground-water quality within a large watershed by measurement of stream base-flow quantity and quality followed by mass-balance calculations has benefits and drawbacks in comparison to direct ground-water sampling from wells. First, sampling streams is far less expensive than siting, installing, and sampling a watershed-wide network of wells. Second, base-flow samples represent composite samples of ground-water discharge from the most active part of the ground-water flow system across a drainage area, whereas a well network would only be representative of discrete points within local ground-water flow systems. Drawbacks to this method include limited reach selection because of unfavorable or unrepresentative hydrologic conditions, potential errors associated with a large number of streamflow and water-quality measurements, and limited ability to estimate concentrations of nonconservative

  7. Environmental tests of a digital safety channel: An investigation of stress-related vulnerabilities of computer-based safety system

    International Nuclear Information System (INIS)

    This article presents the results of environmental stress tests performed on an experimental digital safety channel (EDSC) assembled at the Oak Ridge National Laboratory as part of the Qualification of Advanced Instrumentation and Controls Systems Research program, which was sponsored by the US Nuclear Regulatory Commission. The program is expected to provide recommendations for environmental qualification of digital safety systems. The purpose of the study was to investigate potential vulnerabilities of distributed computer systems used in safety applications when subjected to environmental stressors. The EDSC assembled for the tests employs technologies and digital subsystems representative of those proposed for use in advanced light-water reactors or as retrofits in existing plants. Subsystems include computers, electrical and optical serial communication links, fiber-optic network links, analog-to-digital and digital-to-analog converters, and multiplexers. The EDSC was subjected to selected stressors that are a potential risk to digital equipment in a mild environment. The selected stressors were electromagnetic and radiofrequency interferences (EMI-RFI), temperature, humidity, and smoke exposure. The stressors were applied at levels of intensity considerably higher than the safety channel is likely to experience in a normal nuclear power plant environment. Ranges of stress were selected at a sufficiently high level to induce errors so that failure modes that are characteristic of the technologies employed could be identified. On the basis of the incidence of functional errors observed during testing, EMI-RFI, smoke exposure, and high temperature coupled with high relative humidity, in that order, were found to have the greatest impact of the stressors investigated. The most prevalent stressor-induced upsets, as well as the most severe, were found to occur during the EMI-RFI tests

  8. Performance assessment of nitrate leaching models for highly vulnerable soils used in low-input farming based on lysimeter data.

    Science.gov (United States)

    Groenendijk, Piet; Heinen, Marius; Klammler, Gernot; Fank, Johann; Kupfersberger, Hans; Pisinaras, Vassilios; Gemitzi, Alexandra; Peña-Haro, Salvador; García-Prats, Alberto; Pulido-Velazquez, Manuel; Perego, Alessia; Acutis, Marco; Trevisan, Marco

    2014-11-15

    The agricultural sector faces the challenge of ensuring food security without an excessive burden on the environment. Simulation models provide excellent instruments for researchers to gain more insight into relevant processes and best agricultural practices and provide tools for planners for decision making support. The extent to which models are capable of reliable extrapolation and prediction is important for exploring new farming systems or assessing the impacts of future land and climate changes. A performance assessment was conducted by testing six detailed state-of-the-art models for simulation of nitrate leaching (ARMOSA, COUPMODEL, DAISY, EPIC, SIMWASER/STOTRASIM, SWAP/ANIMO) for lysimeter data of the Wagna experimental field station in Eastern Austria, where the soil is highly vulnerable to nitrate leaching. Three consecutive phases were distinguished to gain insight in the predictive power of the models: 1) a blind test for 2005-2008 in which only soil hydraulic characteristics, meteorological data and information about the agricultural management were accessible; 2) a calibration for the same period in which essential information on field observations was additionally available to the modellers; and 3) a validation for 2009-2011 with the corresponding type of data available as for the blind test. A set of statistical metrics (mean absolute error, root mean squared error, index of agreement, model efficiency, root relative squared error, Pearson's linear correlation coefficient) was applied for testing the results and comparing the models. None of the models performed good for all of the statistical metrics. Models designed for nitrate leaching in high-input farming systems had difficulties in accurately predicting leaching in low-input farming systems that are strongly influenced by the retention of nitrogen in catch crops and nitrogen fixation by legumes. An accurate calibration does not guarantee a good predictive power of the model. Nevertheless all

  9. Groundwater Vulnerability Regions of Iowa

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — The regions onThis map represent areas with similar hydrogeologic characteristics thought to represent similar potentials for contamination of groundwater and/or...

  10. Unified Approach to Vulnerability Analysis of Web Applications

    Science.gov (United States)

    Le, H. T.; Loh, P. K. K.

    2008-11-01

    Web vulnerabilities in web-based applications may be detected, classified and documented. Several Web scanners exist for vulnerabilities in Web applications implemented via different technologies. However, none of them provides the technology-independent, generic coverage of possible vulnerabilities. In this project that is funded by Mindef Singapore, we propose a new approach for Web application security and vulnerability analysis. The design addresses the categorization of scanner results with a generic data model and the design of a language-independent rule-based engine that detects, analyses and reports suspected vulnerabilities in web-based applications.

  11. Site- and bond-percolation thresholds in Kn ,n-based lattices: Vulnerability of quantum annealers to random qubit and coupler failures on chimera topologies

    Science.gov (United States)

    Melchert, O.; Katzgraber, Helmut G.; Novotny, M. A.

    2016-04-01

    We estimate the critical thresholds of bond and site percolation on nonplanar, effectively two-dimensional graphs with chimeralike topology. The building blocks of these graphs are complete and symmetric bipartite subgraphs of size 2 n , referred to as Kn ,n graphs. For the numerical simulations we use an efficient union-find-based algorithm and employ a finite-size scaling analysis to obtain the critical properties for both bond and site percolation. We report the respective percolation thresholds for different sizes of the bipartite subgraph and verify that the associated universality class is that of standard two-dimensional percolation. For the canonical chimera graph used in the D-Wave Systems Inc. quantum annealer (n =4 ), we discuss device failure in terms of network vulnerability, i.e., we determine the critical fraction of qubits and couplers that can be absent due to random failures prior to losing large-scale connectivity throughout the device.

  12. Risk Assessment of Drought Hazards based on Water Resource Vulnerability under Climate Change - A case study in Guangdong province, South China

    Science.gov (United States)

    Hua, D.; Chen, Y. D.

    2015-12-01

    The extreme climatic events are becoming more and more frequent and intensive owing to climate change. Droughts have caused a variety of problems and threats, such as water shortage, salinity intrusion, water quality deterioration, and etc., which can seriously hamper the rapid socio-economic development. The proposed study aims to develop a joint system of assessing the risk of drought hazards from physical dimension to the socioeconomic dimension. For the former dimension, the research will focus on characterizing the changing properties of droughts in both time and space. For the latter dimension, the water resource vulnerability will be assessed based on the typical regional water demanding and supply indicators. The combination research will enable us to not only advance the state-of-the-art of drought research, but also produce many results and findings for sustainable management and adaptation of water resources resilient to the changing climate and socioeconomic development in the Guangdong province.

  13. Selective vulnerability in brain hypoxia

    DEFF Research Database (Denmark)

    Cervos-Navarro, J.; Diemer, Nils Henrik

    1991-01-01

    Neuropathology, selective vulnerability, brain hypoxia, vascular factors, excitotoxicity, ion homeostasis......Neuropathology, selective vulnerability, brain hypoxia, vascular factors, excitotoxicity, ion homeostasis...

  14. Arizona - Social Vulnerability Index

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Social Vulnerability Index is derived from the 2000 US Census data. The fields included are percent minority, median household income, age (under 18 and over...

  15. Web Application Vulnerabilities

    OpenAIRE

    Yadav, Bhanu

    2014-01-01

    Web application security has been a major issue in information technology since the evolvement of dynamic web application. The main objective of this project was to carry out a detailed study on the top three web application vulnerabilities such as injection, cross site scripting, broken authentication and session management, present the situation where an application can be vulnerable to these web threats and finally provide preventative measures against them. ...

  16. A near real time scenario at regional scale for the hydrogeological risk

    Science.gov (United States)

    Ponziani, F.; Stelluti, M.; Zauri, R.; Berni, N.; Brocca, L.; Moramarco, T.; Salciarini, D.; Tamagnini, C.

    2012-04-01

    The early warning systems dedicated to landslides and floods represent the Umbria Region Civil Protection Service new generation tools for hydraulic and hydrogeological risk reduction. Following past analyses performed by the Functional Centre (part of the civil protection service dedicated to the monitoring and the evaluation of natural hazards) on the relationship between saturated soil conditions and rainfall thresholds, we have developed an automated early warning system for the landslide risk, called LANDWARN, which generates daily and 72h forecast risk matrix with a dense mesh of 100 x 100m, throughout the region. The system is based on: (a) the 20 days -observed and 72h -predicted rainfall, provided by the local meteorological network and the Local scale Meteorological Model COSMO ME, (b) the assessment of the saturation of soils by: daily extraction of ASCAT satellite data, data from a network of 16 TDR sensors, and a water balance model (developed by the Research Institute for Geo-Hydrological Protection, CNR, Perugia, Italy) that allows for the prediction of a saturation index for each point of the analysis grid up to a window of 72 h, (c) a Web-GIS platform that combines the data grids of calculated hazard indicators with layers of landslide susceptibility and vulnerability of the territory, in order to produce dynamic risk scenarios. The system is still under development and it's implemented at different scales: the entire region, and a set of known high-risk landslides in Umbria. The system is monitored and regularly reviewed through the back analysis of landslide reports for which the activation date is available. Up to now, the development of the system involves: a) the improvement of the reliability assessment of the condition of soil saturation, a key parameter which is used to dynamically adjust the values of rainfall thresholds used for the declaration of levels of landslide hazard. For this purpose, a procedure was created for the ASCAT

  17. Hydrogeology of the basalts in the Uruguayan NW

    International Nuclear Information System (INIS)

    This work is about the hydrogeological aspects in the NW Uruguayan basaltic area. The results of this research are the main geological, morphological and hydrogeological aspects of the area as well as the characteristics and the color of the basalt and sandstones

  18. Hydrogeological Methods for Assessing Feasibility of Artificial Recharge

    Science.gov (United States)

    Kim, Y.; Koo, M.; Lee, K.; Moon, D.; Barry, J. M.

    2009-12-01

    This study presents the hydrogeological methods to assess the feasibility of artificial recharge in Jeju Island, Korea for securing both sustainable groundwater resources and severe floods. Jeju-friendly Aquifer Recharge Technology (J-ART) in this study is developing by capturing ephemeral stream water with no interference in the environments such as natural recharge or eco-system, storing the flood water in the reservoirs, recharging it through designed borehole after appropriate water treatment, and then making it to be used at down-gradient production wells. Many hydrogeological methods, including physico-chemical surface water and groundwater monitoring, geophysical survey, stable isotope analysis, and groundwater modeling have been employed to predict and assess the artificially recharged surface waters flow and circulation between recharge area and discharge area. In the study of physico-chemical water monitoring survey, the analyses of surface water level and velocity, of water qualities including turbidity, and of suspended soil settling velocity were performed. For understanding subsurface hydrogeologic characteristics the injection test was executed and the results are 118-336 m2/day of transmissivity and 4,367-11,032 m3/day of the maximum intake water capacity. Characterizing groundwater flow from recharge area to discharge area should be achieved to assess the efficiency of J-ART. The resistivity logging was carried out to predict water flow in unsaturated zone during artificial recharge based on the inverse modeling and resistivity change patterns. Stable isotopes of deuterium and oxygen-18 of surface waters and groundwaters have been determined to interpret mixing and flow in groundwaters impacted by artificial recharge. A numerical model simulating groundwater flow and heat transport to assess feasibility of artificial recharge has been developed using the hydraulic properties of aquifers, groundwater levels, borehole temperatures, and meteorological

  19. Digital elevations and extents of regional hydrogeologic units in the Northern Atlantic Coastal Plain aquifer system from Long Island, New York, to North Carolina

    Science.gov (United States)

    Pope, Jason P.; Andreasen, David C.; Mcfarland, E. Randolph; Watt, Martha K.

    2016-08-31

    Digital geospatial datasets of the extents and top elevations of the regional hydrogeologic units of the Northern Atlantic Coastal Plain aquifer system from Long Island, New York, to northeastern North Carolina were developed to provide an updated hydrogeologic framework to support analysis of groundwater resources. The 19 regional hydrogeologic units were delineated by elevation grids and extent polygons for 20 layers: the land and bathymetric surface at the top of the unconfined surficial aquifer, the upper surfaces of 9 confined aquifers and 9 confining units, and the bedrock surface that defines the base of all Northern Atlantic Coastal Plain sediments. The delineation of the regional hydrogeologic units relied on the interpretive work from source reports for New York, New Jersey, Delaware and Maryland, Virginia, and North Carolina rather than from re-analysis of fundamental hydrogeologic data. This model of regional hydrogeologic unit geometries represents interpolation, extrapolation, and generalization of the earlier interpretive work. Regional units were constructed from available digital data layers from the source studies in order to extend units consistently across political boundaries and approximate units in offshore areas.Though many of the Northern Atlantic Coastal Plain hydrogeologic units may extend eastward as far as the edge of the Atlantic Continental Shelf, the modeled boundaries of all regional hydrogeologic units in this study were clipped to an area approximately defined by the furthest offshore extent of fresh to brackish water in any part of the aquifer system, as indicated by chloride concentrations of 10,000 milligrams per liter. Elevations and extents of units that do not exist onshore in Long Island, New York, were not included north of New Jersey. Hydrogeologic units in North Carolina were included primarily to provide continuity across the Virginia-North Carolina State boundary, which was important for defining the southern edge of

  20. Discovery and research of network security vulnerabilities based on Web application%基于Web应用的网络安全漏洞发现与研究

    Institute of Scientific and Technical Information of China (English)

    张晓双; 徐依凌; 刘渊

    2016-01-01

    Web安全漏洞可分为2类,即基于Web平台和基于Web自身应用的安全漏洞。通过分析Web应用网络安全漏洞的攻击原理和攻击过程,研究了包括反射型、存储型和文档对象模型(DOM,document object model)的跨站脚本(XSS,cross site scripting)漏洞和结构化查询语言(SQL,structured query language)注入漏洞,以及会话认证管理漏洞,提出了基于3种不同漏洞的相应的防范措施。%Web security vulnerabilities can be divided into two categories, including security vulnerabilities Web platform and Web their own application. By analyzing the attack principle and process of Web application network security vulnerabilities, XSS vulnerability including type of the reflective, stored, and DOM, SQL injection vulner-ability and session authentication management vulnerability were studied. The corresponding preventive measures of the three kinds of vulnerabilities were put forward.

  1. SRS baseline hydrogeologic investigation: Summary report

    Energy Technology Data Exchange (ETDEWEB)

    Bledsoe, H.W.; Aadland, R.K. [Westinghouse Savannah River Co., Aiken, SC (United States); Sargent, K.A. [Furman Univ., Greenville, SC (United States). Dept. of Geology

    1990-11-01

    Work on the Savannah River Site (SRS) Baseline Hydrogeologic Investigation began in 1983 when it was determined that the knowledge of the plant hydrogeologic systems needed to be expanded and improved in response to changing stratigraphic and hydrostratigraphic terminology and increased involvement by regulatory agencies (Bledsoe, 1984). Additionally, site-wide data were needed to determine flow paths, gradients, and velocities associated with the different aquifers underlying the plant site. The program was divided into three phases in order to allow the results of one phase to be evaluated and necessary changes and improvements incorporated into the following phases. This report summarizes the results of all three phases and includes modified graphic logs, lithologic descriptions of the different geologic formations, profiles of each cluster site, hydrostratigraphic cross sections, hydrographs of selected wells within each cluster for the first full year of uninterrupted water level measurements, potentiometric maps developed from data collected from all clusters, completion diagrams for each well, and a summary of laboratory tests. Additionally, the proposed new classification of hydrostratigraphic units at SRS (Aadland and Bledsoe, 1990) has been incorporated.

  2. 软件脆弱性分析%Software Vulnerability Analysis

    Institute of Scientific and Technical Information of China (English)

    李新明; 李艺; 徐晓梅; 韩存兵

    2003-01-01

    Software vulnerability is the root reason that cause computer system security problem. It' s a new researchtopic to analyze vulnerability based on the essence of software vulnerability. This paper analyzes the main definitionsand taxonomies of vulnerability,studies vulnerability database and tools for vulnerability analysis and detection,andgives the details about what caused the most common vnlnerabilities in the LINUX/UNIX operating systems.

  3. Gender vulnerabilities, spousal abuse and the incidence of HIV in Lesotho:a case for an integrative rights-based approach.

    Science.gov (United States)

    Olowu, 'Dejo

    2011-09-01

    The article posits that imbalances in gender relations are influencing two distinctive yet connected crises for women in Lesotho: the HIV epidemic and spousal abuse. The overarching premise is that as spousal abuse is increasingly recognised and as HIV infections spread, responses to the phenomenon do not reflect the related risks and consequences in married women's lives. This article underscores the nexus of connections between HIV and spousal abuse in Lesotho, identifying potential areas for pragmatic state-led responses. Applying a rights-based approach, it assesses women's vulnerability to each problem at the individual, societal and programmatic levels, noting that there are both direct and underlying factors heightening risks for women. The article asks, what is the value added by a rights-based approach to the subject under discourse? And, how can a rights-based approach be translated into practical tools for planning, monitoring and evaluating projects and programmes aimed at tackling the multifaceted risks and challenges of HIV and spousal abuse confronting women in Lesotho? In response to these questions, the author identifies three trajectories of opportunities for an integrated, comprehensive response. The unmistakable anchor of the article's propositions is the rights-based approach. Although the discussion focuses on Lesotho, the implications for the broader African region cannot be overemphasised in light of commonly shared experiences pertaining to the severe difficulties posed by spousal abuse and HIV.

  4. Facility Environmental Vulnerability Assessment

    International Nuclear Information System (INIS)

    From mid-April through the end of June 2001, a Facility Environmental Vulnerability Assessment (FEVA) was performed at Oak Ridge National Laboratory (ORNL). The primary goal of this FEVA was to establish an environmental vulnerability baseline at ORNL that could be used to support the Laboratory planning process and place environmental vulnerabilities in perspective. The information developed during the FEVA was intended to provide the basis for management to initiate immediate, near-term, and long-term actions to respond to the identified vulnerabilities. It was expected that further evaluation of the vulnerabilities identified during the FEVA could be carried out to support a more quantitative characterization of the sources, evaluation of contaminant pathways, and definition of risks. The FEVA was modeled after the Battelle-supported response to the problems identified at the High Flux Beam Reactor at Brookhaven National Laboratory. This FEVA report satisfies Corrective Action 3A1 contained in the Corrective Action Plan in Response to Independent Review of the High Flux Isotope Reactor Tritium Leak at the Oak Ridge National Laboratory, submitted to the Department of Energy (DOE) ORNL Site Office Manager on April 16, 2001. This assessment successfully achieved its primary goal as defined by Laboratory management. The assessment team was able to develop information about sources and pathway analyses although the following factors impacted the team's ability to provide additional quantitative information: the complexity and scope of the facilities, infrastructure, and programs; the significantly degraded physical condition of the facilities and infrastructure; the large number of known environmental vulnerabilities; the scope of legacy contamination issues [not currently addressed in the Environmental Management (EM) Program]; the lack of facility process and environmental pathway analysis performed by the accountable line management or facility owner; and poor

  5. Facility Environmental Vulnerability Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Van Hoesen, S.D.

    2001-07-09

    From mid-April through the end of June 2001, a Facility Environmental Vulnerability Assessment (FEVA) was performed at Oak Ridge National Laboratory (ORNL). The primary goal of this FEVA was to establish an environmental vulnerability baseline at ORNL that could be used to support the Laboratory planning process and place environmental vulnerabilities in perspective. The information developed during the FEVA was intended to provide the basis for management to initiate immediate, near-term, and long-term actions to respond to the identified vulnerabilities. It was expected that further evaluation of the vulnerabilities identified during the FEVA could be carried out to support a more quantitative characterization of the sources, evaluation of contaminant pathways, and definition of risks. The FEVA was modeled after the Battelle-supported response to the problems identified at the High Flux Beam Reactor at Brookhaven National Laboratory. This FEVA report satisfies Corrective Action 3A1 contained in the Corrective Action Plan in Response to Independent Review of the High Flux Isotope Reactor Tritium Leak at the Oak Ridge National Laboratory, submitted to the Department of Energy (DOE) ORNL Site Office Manager on April 16, 2001. This assessment successfully achieved its primary goal as defined by Laboratory management. The assessment team was able to develop information about sources and pathway analyses although the following factors impacted the team's ability to provide additional quantitative information: the complexity and scope of the facilities, infrastructure, and programs; the significantly degraded physical condition of the facilities and infrastructure; the large number of known environmental vulnerabilities; the scope of legacy contamination issues [not currently addressed in the Environmental Management (EM) Program]; the lack of facility process and environmental pathway analysis performed by the accountable line management or facility owner; and

  6. Determining Vulnerability Importance in Environmental Impact Assessment

    International Nuclear Information System (INIS)

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: ► The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. ► The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. ► A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. ► Results in Colombia highlight the usefulness and objectivity of this method.

  7. Assessing European wild fire vulnerability

    Science.gov (United States)

    Oehler, F.; Oliveira, S.; Barredo, J. I.; Camia, A.; Ayanz, J. San Miguel; Pettenella, D.; Mavsar, R.

    2012-04-01

    Wild fire vulnerability is a measure of potential socio-economic damage caused by a fire in a specific area. As such it is an important component of long-term fire risk management, helping policy-makers take informed decisions about adequate expenditures for fire prevention and suppression, and to target those regions at highest risk. This paper presents a first approach to assess wild fire vulnerability at the European level. A conservative approach was chosen that assesses the cost of restoring the previous land cover after a potential fire. Based on the CORINE Land Cover, a restoration cost was established for each land cover class at country level, and an average restoration time was assigned according to the recovery capacity of the land cover. The damage caused by fire was then assessed by discounting the cost of restoring the previous land cover over the restoration period. Three different vulnerability scenarios were considered assuming low, medium and high fire severity causing different levels of damage. Over Europe, the potential damage of wild land fires ranges from 10 - 13, 732 Euro*ha-1*yr-1 for low fire severity, 32 - 45,772 Euro*ha-1*yr-1 for medium fire severity and 54 - 77,812 Euro*ha-1*yr-1 for high fire severity. The least vulnerable are natural grasslands, moors and heathland and sclerophyllous vegetation, while the highest cost occurs for restoring broad-leaved forest. Preliminary validation comparing these estimates with official damage assessments for past fires shows reasonable results. The restoration cost approach allows for a straightforward, data extensive assessment of fire vulnerability at European level. A disadvantage is the inherent simplification of the evaluation procedure with the underestimation of non-markets goods and services. Thus, a second approach has been developed, valuing individual wild land goods and services and assessing their annual flow which is lost for a certain period of time in case of a fire event. However

  8. On the significance of contaminant plume-scale and dose-response models in defining hydrogeological characterization needs

    Science.gov (United States)

    de Barros, F.; Rubin, Y.; Maxwell, R.; Bai, H.

    2007-12-01

    Defining rational and effective hydrogeological data acquisition strategies is of crucial importance since financial resources available for such efforts are always limited. Usually such strategies are developed with the goal of reducing uncertainty, but less often they are developed in the context of the impacts of uncertainty. This paper presents an approach for determining site characterization needs based on human health risk factors. The main challenge is in striking a balance between improved definition of hydrogeological, behavioral and physiological parameters. Striking this balance can provide clear guidance on setting priorities for data acquisition and for better estimating adverse health effects in humans. This paper addresses this challenge through theoretical developments and numerical testing. We will report on a wide range of factors that affect the site characterization needs including contaminant plume's dimensions, travel distances and other length scales that characterize the transport problem, as well as health risk models. We introduce a new graphical tool that allows one to investigate the relative impact of hydrogeological and physiological parameters in risk. Results show that the impact of uncertainty reduction in the risk-related parameters decreases with increasing distances from the contaminant source. Also, results indicate that human health risk becomes less sensitive to hydrogeological measurements when dealing with ergodic plumes. This indicates that under ergodic conditions, uncertainty reduction in human health risk may benefit from better understanding of the physiological component as opposed to a detailed hydrogeological characterization

  9. Vulnerability, Health Agency and Capability to Health.

    Science.gov (United States)

    Straehle, Christine

    2016-01-01

    One of the defining features of the capability approach (CA) to health, as developed in Venkatapuram's book Health Justice, is its aim to enable individual health agency. Furthermore, the CA to health hopes to provide a strong guideline for assessing the health-enabling content of social and political conditions. In this article, I employ the recent literature on the liberal concept of vulnerability to assess the CA. I distinguish two kinds of vulnerability. Considering circumstantial vulnerability, I argue that liberal accounts of vulnerability concerned with individual autonomy, align with the CA to health. Individuals should, as far as possible, be able to make health-enabling decisions about their lives, and their capability to do so should certainly not be hindered by public policy. The CA to health and a vulnerability-based analysis then work alongside to define moral responsibilities and designate those who hold them. Both approaches demand social policy to address circumstances that hinder individuals from taking health-enabling decisions. A background condition of vulnerability, on the other hand, even though it hampers the capability for health, does not warrant the strong moral claim proposed by the CA to health to define health as a meta-capability that should guide social policy. Nothing in our designing social policy could change the challenge to health agency when we deal with background conditions of vulnerability.

  10. Evaluation of a Home-Based Environmental and Educational Intervention to Improve Health in Vulnerable Households: Southeastern Pennsylvania Lead and Healthy Homes Program.

    Science.gov (United States)

    Mankikar, Deepa; Campbell, Carla; Greenberg, Rachael

    2016-01-01

    This evaluation examined whether participation in a home-based environmental educational intervention would reduce exposure to health and safety hazards and asthma-related medical visits. The home intervention program focused on vulnerable, low-income households, where children had asthma, were at risk for lead poisoning, or faced multiple unsafe housing conditions. Home visitors conducted two home visits, two months apart, consisting of an environmental home assessment, Healthy Homes education, and distribution of Healthy Homes supplies. Measured outcomes included changes in participant knowledge and awareness of environmental home-based hazards, rate of children's asthma-related medical use, and the presence of asthma triggers and safety hazards. Analysis of 2013-2014 baseline and post-intervention program data for a cohort of 150 families revealed a significantly lower three-month rate (p program completion. In addition, there were significantly reduced reports of the presence of home-based hazards, including basement or roof leaks (p = 0.011), plumbing leaks (p = 0.019), and use of an oven to heat the home (p < 0.001). Participants' pre- and post- test scores showed significant improvement (p < 0.05) in knowledge and awareness of home hazards. Comprehensive home interventions may effectively reduce environmental home hazards and improve the health of asthmatic children in the short term.

  11. Hydrogeology of the unsaturated zone, Yucca Mountain, Nevada

    Energy Technology Data Exchange (ETDEWEB)

    Montazer, P.; Wilson, W.E.

    1985-12-31

    The unsaturated volcanic tuff beneath Yucca Mountain, Nevada, is being evaluated by the US Department of Energy as a host rock for a potential mined geologic repository for high-level radioactive waste. Assessment of site suitability needs an efficient and focused investigative program. A conceptual hydrogeologic model that simulates the flow of fluids through the unsaturated zone at Yucca Mountain was developed to guide the program and to provide a basis for preliminary assessment of site suitability. The study was made as part of the Nevada Nuclear Waste Storage Investigations Project of the US Department of Energy. Thickness of the unsaturated zone is about 1640 to 2460 feet (500 to 750 meters). Based on physical properties, the rocks in the unsaturated zone are grouped for the purpose of this paper into five informal hydrogeologic units. From top to bottom these units are: Tiva Canyon welded unit, Paintbrush nonwelded unit. Topopah Spring welded unit, Calico Hills nonwelded unit, and Crater Flat unit. Welded units have a mean fracture density of 8 to 40 fractures per unit cubic meter, mean matrix porosities of 12 to 23%, matrix hydraulic conductivities with geometric means ranging from 6.5 x 10{sup -6} to 9.8 x 10{sup -6} foot per day (2 x 10{sup -6} to 3 x 10{sup -6} meter per day), and bulk hydraulic conductivities of 0.33 to 33 feet per day (0.1 to 10 meters per day). The nonwelded units have a mean fracture density of 1 to 3 fractures per unit cubic meter, mean matrix porosities of 31 to 46%, and saturated hydraulic conductivities with geometric means ranging from 2.6 x 10{sup -5} to 2.9 x 10{sup -2} foot per day (8 x 10{sup -6} to 9 x 10{sup -3} meter per day). 15 refs., 4 figs., 1 tab.

  12. Models of Social Vulnerability to Disasters*

    OpenAIRE

    Alexander, David

    2012-01-01

    This paper discusses the bases of theory in the evaluation of social vulnerability to disasters. Vulnerability is shown to be the vital component of risk and the principal element of disaster impacts. Perception is a key process in decision making in disasters. It is affected by culture and symbolism, which are analysed in the context of disaster risk. A model of cultural metamorphosis is used to explain changes and discrepancies in attitudes to disaster and recovery processes. The response t...

  13. Hydrogeophysics and remote sensing for the design of hydrogeological conceptual models in hard rocks - Sardón catchment (Spain)

    Science.gov (United States)

    Francés, Alain P.; Lubczynski, Maciek W.; Roy, Jean; Santos, Fernando A. M.; Mahmoudzadeh Ardekani, Mohammad R.

    2014-11-01

    Hard rock aquifers are highly heterogeneous and hydrogeologically complex. To contribute to the design of hydrogeological conceptual models of hard rock aquifers, we propose a multi-techniques methodology based on a downward approach that combines remote sensing (RS), non-invasive hydrogeophysics and hydrogeological field data acquisition. The proposed methodology is particularly suitable for data scarce areas. It was applied in the pilot research area of Sardón catchment (80 km2) located west of Salamanca (Spain). The area was selected because of hard-rock hydrogeology, semi-arid climate and scarcity of groundwater resources. The proposed methodology consisted of three main steps. First, we detected the main hydrogeological features at the catchment scale by processing: (i) a high resolution digital terrain model to map lineaments and to outline fault zones; and (ii) high-resolution, multispectral satellite QuickBird and WorldView-2 images to map the outcropping granite. Second, we characterized at the local scale the hydrogeological features identified at step one with: i) ground penetrating radar (GPR) to assess groundwater table depth complementing the available monitoring network data; ii) 2D electric resistivity tomography (ERT) and frequency domain electromagnetic (FDEM) to retrieve the hydrostratigraphy along selected survey transects; iii) magnetic resonance soundings (MRS) to retrieve the hydrostratigraphy and aquifer parameters at the selected survey sites. In the third step, we drilled 5 boreholes (25 to 48 m deep) and performed slug tests to verify the hydrogeophysical interpretation and to calibrate the MRS parameters. Finally, we compiled and integrated all acquired data to define the geometry and parameters of the Sardón aquifer at the catchment scale. In line with a general conceptual model of hard rock aquifers, we identified two main hydrostratigraphic layers: a saprolite layer and a fissured layer. Both layers were intersected and drained by

  14. Earthquake Vulnerability Assessment for Hospital Buildings Using a Gis-Based Group Multi Criteria Decision Making Approach: a Case Study of Tehran, Iran

    Science.gov (United States)

    Delavar, M. R.; Moradi, M.; Moshiri, B.

    2015-12-01

    Nowadays, urban areas are threatened by a number of natural hazards such as flood, landslide and earthquake. They can cause huge damages to buildings and human beings which necessitates disaster mitigation and preparation. One of the most important steps in disaster management is to understand all impacts and effects of disaster on urban facilities. Given that hospitals take care of vulnerable people reaction of hospital buildings against earthquake is vital. In this research, the vulnerability of hospital buildings against earthquake is analysed. The vulnerability of buildings is related to a number of criteria including age of building, number of floors, the quality of materials and intensity of the earthquake. Therefore, the problem of seismic vulnerability assessment is a multi-criteria assessment problem and multi criteria decision making methods can be used to address the problem. In this paper a group multi criteria decision making model is applied because using only one expert's judgments can cause biased vulnerability maps. Sugeno integral which is able to take into account the interaction among criteria is employed to assess the vulnerability degree of buildings. Fuzzy capacities which are similar to layer weights in weighted linear averaging operator are calculated using particle swarm optimization. Then, calculated fuzzy capacities are included into the model to compute a vulnerability degree for each hospital.

  15. EARTHQUAKE VULNERABILITY ASSESSMENT FOR HOSPITAL BUILDINGS USING A GIS-BASED GROUP MULTI CRITERIA DECISION MAKING APPROACH: A CASE STUDY OF TEHRAN, IRAN

    Directory of Open Access Journals (Sweden)

    M. R. Delavar

    2015-12-01

    Full Text Available Nowadays, urban areas are threatened by a number of natural hazards such as flood, landslide and earthquake. They can cause huge damages to buildings and human beings which necessitates disaster mitigation and preparation. One of the most important steps in disaster management is to understand all impacts and effects of disaster on urban facilities. Given that hospitals take care of vulnerable people reaction of hospital buildings against earthquake is vital. In this research, the vulnerability of hospital buildings against earthquake is analysed. The vulnerability of buildings is related to a number of criteria including age of building, number of floors, the quality of materials and intensity of the earthquake. Therefore, the problem of seismic vulnerability assessment is a multi-criteria assessment problem and multi criteria decision making methods can be used to address the problem. In this paper a group multi criteria decision making model is applied because using only one expert’s judgments can cause biased vulnerability maps. Sugeno integral which is able to take into account the interaction among criteria is employed to assess the vulnerability degree of buildings. Fuzzy capacities which are similar to layer weights in weighted linear averaging operator are calculated using particle swarm optimization. Then, calculated fuzzy capacities are included into the model to compute a vulnerability degree for each hospital.

  16. Home-Based Economic Activities and Caribbean Urban Livelihoods : Vulnerability, Ambition and Impact in Paramaribo and Port of Spain

    NARCIS (Netherlands)

    Verrest, Hebe

    2007-01-01

    Poor urban households in the economic 'south' deploy various livelihood activities. One of these is a Home-Based Economic Activity (HBEA), e.g. sales of home-made snacks or car maintenance. This study examines the prevalence, organisation and relevance of HBEAs in four neighbourhoods in the Caribbea

  17. Energy vulnerability relationships

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  18. Calibration of the hydrogeological model of the Baltic Artesian Basin

    Science.gov (United States)

    Virbulis, J.; Klints, I.; Timuhins, A.; Sennikovs, J.; Bethers, U.

    2012-04-01

    . The parameters of the calibration are the horizontal and vertical hydraulic conductivities of the hydrogeological layers, which are assumed uniform throughout the whole individual layer. The initial values of conductivities are taken from the available field pumping test measurements or based on the lithology of individual hydrogeological layers. The allowed variation range (multiplicative coefficient applied to respective initial parameter value) of conductivities for all layers and of infiltration rate is from 0.01 to 100 times. The minimization of objective function converges in several hundreds of iterations and the mean squared difference in one layer is 7 m. The ratio between the horizontal and vertical conductivity is kept fixed in each optimization run and the effect of different ratios on objective function is shown. The influence of initial values of hydraulic conductivities on the objective function is analyzed. The calibration results are validated using different data sets for calibration and validation. Acknowledgement The present work has been funded by the European Social Fund project "Establishment of interdisciplinary scientist group and modelling system for groundwater research" (Project Nr. 2009/0212/1DP/1.1.1.2.0/09/APIA/VIAA/060)

  19. Simulations of hydrogeological impacts of the ONKALO. Update 2013

    Energy Technology Data Exchange (ETDEWEB)

    Krumenacker, F. M. [The Relief Lab. (Finland); Loefman, J. [VTT Technical Research Centre of Finland Ltd, Espoo (Finland)

    2014-09-15

    On assignment by its owners, Fortum and TVO, Posiva will take care of the disposal of spent fuel from the nuclear power plants at Loviisa and Olkiluoto, Finland. The site for the repository (Olkiluoto) has been chosen on the basis of a site investigation programme, which currently is focused on the construction of an underground rock characterisation and research facility (the ONKALO). The open tunnels and shafts of the ONKALO, and the subsequent repository, are likely to influence the site's groundwater system for hundreds of years. The objectives of the so-called prediction/outcome (P/O) studies conducted in several modelling rounds of Olkiluoto Site Descriptions since 2004 have been twofold. One of them was to assess the hydrogeological disturbances caused by the excavation of the ONKALO, together with the accuracy of the predictions of the previous modelling round ('Outcome'). The other objective was to provide new predictions for the inflow, hydraulic heads and salinity of the groundwater at the monitoring points during the whole period of the construction ('Prediction'). The latest update of the P/O study was conducted as a part of Site Description 2011 (SD2011) in spring 2011 and it was based on all the relevant hydrogeological monitoring data gathered from field investigations by the end of 2010. This report constitutes a full documentation of the latest hydrogeological P/O study, which was originally summarized in SD2011. In addition, the latest study is updated so that the time span for the monitoring data is extended up to the end of 2012. The latest predictions for the total inflow rates were not significantly different from the observations (approximately 33-42 L/min at the deepest access tunnel chainage of 4580 metres measured between June 2011 and November 2012) and from the previous estimations (approximately 35 L/min). However, the distribution of this rate amongst the relevant hydrogeological structures was somewhat

  20. Plutonium Vulnerability Management Plan

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  1. Plutonium Vulnerability Management Plan

    International Nuclear Information System (INIS)

    This Plutonium Vulnerability Management Plan describes the Department of Energy's response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department's Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B

  2. From vulnerability to resilience : multiple routes to social and self-acceptance as buffers of norm-based rejection sensitivity

    OpenAIRE

    Yip, Wai-kin; 葉煒堅

    2014-01-01

    People with high norm-based rejection sensitivity have heightened anticipatory anxiety and expectation of rejection if they do not follow norms. Under threats of rejection (e.g., when personal preferences collide with group norms), they are more intended to conform to group norms to avoid social rejection (Poon et al., 2010). Thus, they are more susceptible to peer pressure for risk-taking behaviors and have less autonomy to make decision. Research also indicates that they derive their self-w...

  3. Dynamic Assessment on Ecosystem Vulnerability in Dashanbao Wetland

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    [Objective] The aim was to assess the ecosystem vulnerability of Dashanbao wetland.[Method] The evaluation index system of ecosystem vulnerability of Dashanbao wetland was constructed by using analytic hierarchy process(AHP),and the ecosystem vulnerability of Dashanbao wetland from 2002 to 2008 was assessed based on vulnerable degree of ecosystem.[Result] The vulnerable degree of ecosystem of Dashanbao wetland from 2002 to 2008 was 0.560 0,0.513 7,0.516 4,0.465 4,0.476 0,0.449 2 and 0.400 6 respectively,tha...

  4. Volcanic aquifers of Hawai‘i—Hydrogeology, water budgets, and conceptual models

    Science.gov (United States)

    Izuka, Scot K.; Engott, John A.; Bassiouni, Maoya; Johnson, Adam G.; Miller, Lisa D.; Rotzoll, Kolja; Mair, Alan

    2016-06-13

    Hawai‘i’s aquifers have limited capacity to store fresh groundwater because each island is small and surrounded by saltwater. Saltwater also underlies much of the fresh groundwater. Fresh groundwater resources are, therefore, particularly vulnerable to human activity, short-term climate cycles, and long-term climate change. Availability of fresh groundwater for human use is constrained by the degree to which the impacts of withdrawal—such as lowering of the water table, saltwater intrusion, and reduction in the natural discharge to springs, streams, wetlands, and submarine seeps—are deemed acceptable. This report describes the hydrogeologic framework, groundwater budgets (inflows and outflows), conceptual models of groundwater occurrence and movement, and the factors limiting groundwater availability for the largest and most populated of the Hawaiian Islands—Kaua‘i, O‘ahu, Maui, and Hawai‘i Island.

  5. 参考安全补丁比对的软件安全漏洞挖掘方法%Software security vulnerability exploitation method based on a security patch

    Institute of Scientific and Technical Information of China (English)

    文伟平; 张普含; 徐有福; 尹亮

    2011-01-01

    Windows操作系统作为目前全球使用最广泛的桌面操作系统,一旦其漏洞被利用将造成严重后果,所以对Windows操作系统的漏洞发掘意义重大。当前对软件安全漏洞的发现更多的是依靠安全研究人员的经验和运气,缺乏系统且有效的方法指导。为了找到一种能够快速发现Windows一类漏洞的方法,本文从安全补丁的修补方法入手,分析了漏洞补丁后可能引入新的安全隐患的4种模式,提出了一种参考安全补丁比对的软件安全漏洞挖掘方法,并对方法进行了形式化描述。利用此方法较好的解决了半自动化挖掘Windows系统漏洞问题。最后以Windows操作系统未知漏洞案例验证了该方法的有效性。%Windows is the world's most widely used desktop operating system,so security vulnerabilities in windows have an enormous impact on system security and exploiting vulnerabilities in the Windows operating system has great significance.At present,the discovery of software security vulnerabilities depends mainly on the experience and luck of security researchers since they lack systematic and effective methods to find vulnerabilities.To more quickly find a class of vulnerabilities,this paper focuses on patch vulnerability with four types of security threat modes introduced patches.Then this paper describes a software security vulnerability exploitation method based on patch comparison.This method can be used to solve the semi-automatically find Windows vulnerabilities with patches.This method found unknown Windows operating system vulnerabilities to verify its effectiveness.

  6. Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system in Florida and parts of Georgia, Alabama, and South Carolina

    Science.gov (United States)

    Williams, Lester J.; Dixon, Joann F.

    2015-01-01

    Digital surfaces and thicknesses of selected hydrogeologic units of the Floridan aquifer system were developed to define an updated hydrogeologic framework as part of the U.S. Geological Survey Groundwater Resources Program. The dataset contains structural surfaces depicting the top and base of the aquifer system, its major and minor hydrogeologic units and zones, geophysical marker horizons, and the altitude of the 10,000-milligram-per-liter total dissolved solids boundary that defines the approximate fresh and saline parts of the aquifer system. The thicknesses of selected major and minor units or zones were determined by interpolating points of known thickness or from raster surface subtraction of the structural surfaces. Additional data contained include clipping polygons; regional polygon features that represent geologic or hydrogeologic aspects of the aquifers and the minor units or zones; data points used in the interpolation; and polygon and line features that represent faults, boundaries, and other features in the aquifer system.

  7. VULNERABILITY ANALYSIS ON APPSOCKET-BASED NETWORK PRINT JOB%基于 AppSocket 的网络打印作业脆弱性分析

    Institute of Scientific and Technical Information of China (English)

    杨宏宇; 王梓

    2015-01-01

    网络打印机近年来得到广泛应用,但网络打印作业在安全性方面有很大局限性。从网络传输协议和网络打印控制两个方面分析基于 AppSocket 协议的网络打印作业的脆弱性,提出中间人攻击和远程控制攻击两种针对网络打印作业的攻击模式。实验结果表明,基于 AppSocket 协议的网络打印作业受到两种模式的攻击时存在安全隐患,可能造成信息泄露、非法广播、密码丢失等后果。最后,针对提出的攻击模式给出了具有可操作性的防范措施,作为网络打印作业在安全性方面的补充。%Network printers are widely used in recent years,but the security of network print jobs is very limited.In this paper we analyse the vulnerabilities of AppSocket protocol-based network print jobs from two aspects of network transmission protocol and network printing control,and present two attack patterns,the man-in-the-middle attack and the remote control attack,against the network print jobs. Experimental results show that there are the security vulnerabilities when the AppSocket protocol-based network print jobs are attacked by these two patterns,and this may lead to the consequences of leakage of information,illegal broadcast,loss of password,etc.At last,we give the operable precautions against the presented attack patterns as the security supplement for network print jobs.

  8. Design and testing of a process-based groundwater vulnerability assessment (P-GWAVA) system for predicting concentrations of agrichemicals in groundwater across the United States

    Science.gov (United States)

    Barbash, Jack E; Voss, Frank D.

    2016-03-29

    Efforts to assess the likelihood of groundwater contamination from surface-derived compounds have spanned more than three decades. Relatively few of these assessments, however, have involved the use of process-based simulations of contaminant transport and fate in the subsurface, or compared the predictions from such models with measured data—especially over regional to national scales. To address this need, a process-based groundwater vulnerability assessment (P-GWAVA) system was constructed to use transport-and-fate simulations to predict the concentration of any surface-derived compound at a specified depth in the vadose zone anywhere in the conterminous United States. The system was then used to simulate the concentrations of selected agrichemicals in the vadose zone beneath agricultural areas in multiple locations across the conterminous United States. The simulated concentrations were compared with measured concentrations of the compounds detected in shallow groundwater (that is, groundwater drawn from within a depth of 6.3 ± 0.5 meters [mean ± 95 percent confidence interval] below the water table) in more than 1,400 locations across the United States. The results from these comparisons were used to select the simulation approaches that led to the closest agreement between the simulated and the measured concentrations.The P-GWAVA system uses computer simulations that account for a broader range of the hydrologic, physical, biological and chemical phenomena known to control the transport and fate of solutes in the subsurface than has been accounted for by any other vulnerability assessment over regional to national scales. Such phenomena include preferential transport and the influences of temperature, soil properties, and depth on the partitioning, transport, and transformation of pesticides in the subsurface. Published methods and detailed soil property data are used to estimate a wide range of model input parameters for each site, including surface

  9. A bottom-up, vulnerability-based framework for identifying the adaptive capacity of water resources systems in a changing climate

    Science.gov (United States)

    Culley, Sam; Noble, Stephanie; Timbs, Michael; Yates, Adam; Giuliani, Matteo; Castelletti, Andrea; Maier, Holger; Westra, Seth

    2015-04-01

    Water resource system infrastructure and operating policies are commonly designed on the assumption that the statistics of future rainfall, temperature and other hydrometeorological variables are equal to those of the historical record. There is now substantial evidence demonstrating that this assumption is no longer valid, and that climate change will significantly impact water resources systems worldwide. Under different climatic inputs, the performance of these systems may degrade to a point where they become unable to meet the primary objectives for which they were built. In such a changing context, using existing infrastructure more efficiently - rather than planning additional infrastructure - becomes key to restore the system's performance at acceptable levels and minimize financial investments and associated risk. The traditional top-down approach for assessing climate change impacts relies on the use of a cascade of models from the global to the local scale. However, it is often difficult to utilize this top-down approach in a decision-making procedure, as there is disparity amongst various climate projections, arising from incomplete scientific understanding of the complicated processes and feedbacks within the climate system, and model limitations in reproducing those relationships. In contrast with this top-down approach, this study contributes a framework to identify the adaptive capacity of water resource systems under changing climatic conditions adopting a bottom-up, vulnerability-based approach. The performance of the current system management is first assessed for a comprehensive range of climatic conditions, which are independent of climate model forecasts. The adaptive capacity of the system is then estimated by re-evaluating the performance of a set of adaptive operating policies, which are optimized for each climatic condition under which the system is simulated. The proposed framework reverses the perspective by identifying water system

  10. Hydrogeologic factors to be addressed in disposal guidelines

    International Nuclear Information System (INIS)

    This report identifies the physical hydrogeologic factors that should be addressed for performance assessment of a radioactive waste disposal facility in plutonic rock. The hydrogeologic factors include theoretical methods, groundwater flow factors and solute transport parameters. Theoretical methods, including different deterministic and stochastic approaches for evaluating physical hydrogeolgic conditions, are evaluated with respect to data requirements, applications and limitations. Preferred methods for measurement and determination of the identified groundwater flow factors and solute transport parameters are discussed. A recommended set of procedures for reliable hydrogeologic characterization of a plutonic rock mass at both regional and site scales is also presented

  11. A compilation of subsurface hydrogeologic data

    International Nuclear Information System (INIS)

    This volume contains the storage coefficient, porosity, compressibility and fracture data for the research sites discussed in Volume 1 which have been studied in sufficient detail to allow for analysis. These sites are the following: Stripa Mine, Sweden; Finnsjon, Kamlunge, Fjallveden, Gidea, Svartboberget, Sweden; Olkiluoto, Loviisa, Lavia, Finland; Climax Granite Nevada Test Site; OCRD Room, Colorado School of Mines; Savannah River Plant, Aiken, South Carolina; Oracle, Arizona; Basalt Waste Isolation Project (BWIP), Hanford, Washington; Underground Research Laboratory, AECL, Canada; Atikokan Research Area, AECL; Chalk River Research Area, AECL; Whiteshell Research Area, AECL. Other sources of information have been included where sufficient site specific geologic and hydrogeologic information is provided. The fracture data for the first three of the sites listed above are contained in this volume. The fracture data for the remaining research research sites are discussed in Volume 4

  12. Borehole Completion and Conceptual Hydrogeologic Model for the IFRC Well Field, 300 Area, Hanford Site

    International Nuclear Information System (INIS)

    A tight cluster of 35 new wells was installed over a former waste site, the South Process Pond (316-1 waste site), in the Hanford Site 300 Area in summer 2008. This report documents the details of the drilling, sampling, and well construction for the new array and presents a summary of the site hydrogeology based on the results of drilling and preliminary geophysical logging.

  13. Marine hydrogeology: recent accomplishments and future opportunities

    Science.gov (United States)

    Fisher, A. T.

    2005-03-01

    Marine hydrogeology is a broad-ranging scientific discipline involving the exploration of fluid-rock interactions below the seafloor. Studies have been conducted at seafloor spreading centers, mid-plate locations, and in plate- and continental-margin environments. Although many seafloor locations are remote, there are aspects of marine systems that make them uniquely suited for hydrologic analysis. Newly developed tools and techniques, and the establishment of several multidisciplinary programs for oceanographic exploration, have helped to push marine hydrogeology forward over the last several decades. Most marine hydrogeologic work has focused on measurement or estimation of hydrogeologic properties within the shallow subsurface, but additional work has emphasized measurements of local and global fluxes, fluid source and sink terms, and quantitative links between hydrogeologic, chemical, tectonic, biological, and geophysical processes. In addition to summarizing selected results from a small number of case studies, this paper includes a description of several new experiments and programs that will provide outstanding opportunities to address fundamental hydrogeologic questions within the seafloor during the next 20-30 years. L'hydrogéologie marine est une large discipline scientifique impliquant l' exploration des interactions entre les fluides et les roches sous les fonds marins. Des études ont été menées dans les différents environnements sous-marins (zone abyssale, plaque océanique, marges continentales). Bien que de nombreux fonds marins soient connus, il existe des aspects des systèmes marins qui les rendent inadaptés à l'analyse hydrologique. De nouveaux outils et techniques, et la mise en oeuvre de nombreux programmes multidisciplinaires d'exploration océanographique, ont aidé à pousser en avant l'hydrogéologie marine ces dix dernières années. La plus part des études hydrogéologiques se sont concentrées jusqu'à présent sur la mesure ou

  14. A GIS based urban flood risk analysis model for vulnerability assessment of critical structures during flood emergencies

    Science.gov (United States)

    Albano, R.; Sole, A.; Adamowski, J.; Mancusi, L.

    2014-04-01

    Risk analysis has become a priority for authorities and stakeholders in many European countries, with the aim of reducing flooding risk by considering the priority and benefits of possible interventions. Within this context, a flood risk analysis model was developed in this study that is based on GIS, and integrated with a model that assesses the degree of accessibility and operability of strategic emergency response structures in an urban area. The proposed model is unique in that it provides a quantitative estimation of flood risk on the basis of the operability of the strategic emergency structures in an urban area, their accessibility, and connection within the urban system of a city (i.e., connection between aid centres and buildings at risk) in the emergency phase. The results of a case study in the Puglia Region in Southern Italy are described to illustrate the practical applications of this newly proposed approach. The main advantage of the proposed approach is that it allows for the defining of a hierarchy between different infrastructures in the urban area through the identification of particular components whose operation and efficiency are critical for emergency management. This information can be used by decision makers to prioritize risk reduction interventions in flood emergencies in urban areas.

  15. Seismic vulnerability assessment of a steel-girder highway bridge equipped with different SMA wire-based smart elastomeric isolators

    Science.gov (United States)

    Hedayati Dezfuli, Farshad; Shahria Alam, M.

    2016-07-01

    Shape memory alloy wire-based rubber bearings (SMA-RBs) possess enhanced energy dissipation capacity and self-centering property compared to conventional RBs. The performance of different types of SMA-RBs with different wire configurations has been studied in detail. However, their reliability in isolating structures has not been thoroughly investigated. The objective of this study is to analytically explore the effect of SMA-RBs on the seismic fragility of a highway bridge. Steel-reinforced elastomeric isolators are equipped with SMA wires and used to isolate the bridge. Results revealed that SMA wires with a superelastic behavior and re-centering capability can increase the reliability of the bearing and the bridge structure. It was observed that at the collapse level of damage, the bridge isolated by SMA-HDRB has the lowest fragility. Findings also showed that equipping NRB with SMA wires decreases the possibility of damage in the bridge while, replacing HDRB with SMA-HDRB; or LRB with SMA-LRB increases the failure probability of the system at slight, moderate, and extensive limit states.

  16. Mapping ground water vulnerability to pesticide leaching with a process-based metamodel of EuroPEARL.

    Science.gov (United States)

    Tiktak, A; Boesten, J J T I; van der Linden, A M A; Vanclooster, M

    2006-01-01

    To support EU policy, indicators of pesticide leaching at the European level are required. For this reason, a metamodel of the spatially distributed European pesticide leaching model EuroPEARL was developed. EuroPEARL considers transient flow and solute transport and assumes Freundlich adsorption, first-order degradation and passive plant uptake of pesticides. Physical parameters are depth dependent while (bio)-chemical parameters are depth, temperature, and moisture dependent. The metamodel is based on an analytical expression that describes the mass fraction of pesticide leached. The metamodel ignores vertical parameter variations and assumes steady flow. The calibration dataset was generated with EuroPEARL and consisted of approximately 60,000 simulations done for 56 pesticides with different half-lives and partitioning coefficients. The target variable was the 80th percentile of the annual average leaching concentration at 1-m depth from a time series of 20 yr. The metamodel explains over 90% of the variation of the original model with only four independent spatial attributes. These parameters are available in European soil and climate databases, so that the calibrated metamodel could be applied to generate maps of the predicted leaching concentration in the European Union. Maps generated with the metamodel showed a good similarity with the maps obtained with EuroPEARL, which was confirmed by means of quantitative performance indicators. PMID:16825441

  17. Hydrogeologic Areas of the Southwest Principal Aquifer (SWPA) study

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — This raster dataset represents the boundaries of the hydrogeologic areas of the Southwest Principal Aquifer (SWPA) study of the National Water Quality Assessment...

  18. Natural and Artificial (fluorescent) Tracers to Characterise Hydrogeological Functioning and to Protect Karst Aquifers

    Science.gov (United States)

    Andreo, B.

    2013-12-01

    tracers of infiltration (global system response) and artificial tracers (single response) in karst waters has revealed the usefulness and complementarily of both techniques for characterising the hydrogeological functioning of karst aquifers and, even more important, for validating contamination vulnerability mapping in these medium. In recent decades, several methods have been developed for such vulnerability mapping, but little progress has been made in validating their results. This validation is essential for the adequate protection of water resources in karst media, as has been shown in recent research.

  19. Digital surfaces and thicknesses of selected hydrogeologic units within the Ozark Plateaus aquifer system, northwestern Arkansas

    Science.gov (United States)

    Czarnecki, John B.; Bolyard, Susan E.; Hart, Rheannon M.; Clark, Jimmy M.

    2014-01-01

    Digital surfaces and thicknesses of nine hydrogeologic units of the Ozark Plateaus aquifer system from land surface to the top of the Gunter Sandstone in northwestern Arkansas were created using geophysical logs, drillers’ logs, geologist-interpreted formation tops, and previously published maps. The 6,040 square mile study area in the Ozark Plateaus Province includes Benton, Washington, Carroll, Madison, Boone, Newton, Marion, and Searcy Counties. The top of each hydrogeologic unit delineated on geophysical logs was based partly on previously published reports and maps and also from drillers’ logs. These logs were then used as a basis to contour digital surfaces showing the top and thickness of the Fayetteville Shale, the Boone Formation, the Chattanooga Shale, the Everton Formation, the Powell Dolomite, the Cotter Dolomite, the Roubidoux Formation, the Gasconade Dolomite, and the Gunter Sandstone.

  20. California GAMA Program: A Contamination Vulnerability Assessment for the Bakersfield Area

    Energy Technology Data Exchange (ETDEWEB)

    Moran, J E; Hudson, G B; Eaton, G F; Leif, R

    2004-11-01

    In response to concerns expressed by the California Legislature and the citizenry of the State of California, the State Water Resources Control Board (SWRCB), implemented a program to assess groundwater quality, and provide a predictive capability for identifying areas that are vulnerable to contamination. The program was initiated in response to concern over public supply well closures due to contamination by chemicals such as MTBE from gasoline, and solvents from industrial operations. As a result of this increased awareness regarding groundwater quality, the Supplemental Report of the 1999 Budget Act mandated the SWRCB to develop a comprehensive ambient groundwater-monitoring plan, and led to the initiation of the Groundwater Ambient Monitoring and Assessment (GAMA) Program. The primary objective of the GAMA Program is to assess the water quality and to predict the relative susceptibility to contamination of groundwater resources throughout the state of California. Under the GAMA program, scientists from Lawrence Livermore National Laboratory (LLNL) collaborate with the SWRCB, the U.S. Geological Survey (USGS), the California Department of Health Services (DHS), and the California Department of Water Resources (DWR) to implement this groundwater assessment program. In 2003, LLNL carried out this vulnerability study in the groundwater basin that underlies Bakersfield, in the southern San Joaquin Valley. The goal of the study is to provide a probabilistic assessment of the relative vulnerability of groundwater used for the public water supply to contamination from surface sources. This assessment of relative contamination vulnerability is made based on the results of two types of analyses that are not routinely carried out at public water supply wells: ultra low-level measurement of volatile organic compounds (VOCs), and groundwater age dating (using the tritium-helium-3 method). In addition, stable oxygen isotope measurements help determine the recharge water

  1. A Contamination Vulnerability Assessment for the Santa Clara and San Mateo County Groundwater Basins

    Energy Technology Data Exchange (ETDEWEB)

    Moran, J E; Hudson, G B; Eaton, G F; Leif, R

    2004-01-06

    In response to concerns expressed by the California Legislature and the citizenry of the State of California, the State Water Resources Control Board (SWRCB), implemented a program to assess groundwater quality, and provide a predictive capability for identifying areas that are vulnerable to contamination. The program was initiated in response to concern over public supply well closures due to contamination by chemicals such as MtBE from gasoline, and solvents from industrial operations. As a result of this increased awareness regarding groundwater quality, the Supplemental Report of the 1999 Budget Act mandated the SWRCB to develop a comprehensive ambient groundwater-monitoring plan, and led to the initiation of the Ambient Groundwater Monitoring and Assessment (GAMA) Program. The primary objective of the GAMA Program is to assess the water quality and to predict the relative susceptibility to contamination of groundwater resources throughout the state of California. Under the GAMA program, scientists from Lawrence Livermore National Laboratory (LLNL) collaborate with the SWRCB, the U.S. Geological Survey, the California Department of Health Services (DHS), and the California Department of Water Resources (DWR) to implement this groundwater assessment program. In 2001 and 2002, LLNL carried out this vulnerability study in the groundwater basins of Santa Clara County and San Mateo County, located to the south of the city of San Francisco. The goal of the study is to provide a probabilistic assessment of the relative vulnerability of groundwater used for the public water supply to contamination from surface sources. This assessment of relative contamination vulnerability is made based on the results of two types of analyses that are not routinely carried out at public water supply wells: ultra low-level measurement of volatile organic compounds (VOCs), and groundwater age dating (using the tritium-helium-3 method). In addition, stable oxygen isotope measurements

  2. Beyond 'vulnerable groups': contexts and dynamics of vulnerability

    NARCIS (Netherlands)

    C. Zarowsky; S. Haddad; V.K. Nguyen

    2013-01-01

    This paper reviews approaches to vulnerability in public health, introducing a series of 10 papers addressing vulnerability in health in Africa. We understand vulnerability as simultaneously a condition and a process. Social inequalities are manifest in and exacerbate three key dimensions of vulnera

  3. Rockfall vulnerability assessment for reinforced concrete buildings

    Directory of Open Access Journals (Sweden)

    O. Mavrouli

    2010-10-01

    Full Text Available The vulnerability of buildings to the impact of rockfalls is a topic that has recently attracted increasing attention in the scientific literature. The quantification of the vulnerability, when based on empirical or heuristic approaches requires data recorded from historical rockfalls, which are not always available. This is the reason why appropriate alternatives are required. The use of analytical and numerical models can be one of them. In this paper, a methodology is proposed for the analytical evaluation of the vulnerability of reinforced concrete buildings. The vulnerability is included in the risk equation by incorporating the uncertainty of the impact location of the rock block and the subsequent damage level. The output is a weighted vulnerability that ranges from 0 to 1 and expresses the potential damage that a rock block causes to a building in function of its velocity and size. The vulnerability is calculated by the sum of the products of the probability of block impact on each element of the building and its associated damage state, the latter expressed in relative recovery cost terms. The probability of exceeding a specific damage state such as non-structural, local, partial, extensive or total collapse is also important for the quantification of risk and to this purpose, several sets of fragility curves for various rock diameters and increasing velocities have been prepared. An example is shown for the case of a simple reinforced concrete building and impact energies from 0 to 4075 kJ.

  4. Hydrogeology in North America: past and future

    Science.gov (United States)

    Narasimhan, T. N.

    2005-03-01

    This paper is a retrospective on the evolution of hydrogeology in North America over the past two centuries, and a brief speculation of its future. The history of hydrogeology is marked by developments in many different fields such as groundwater hydrology, soil mechanics, soil science, economic geology, petroleum engineering, structural geology, geochemistry, geophysics, marine geology, and more recently, ecology. The field has been enriched by the contributions of distinguished researchers from all these fields. At present, hydrogeology is in transition from a state of discovering new resources and exploiting them efficiently for maximum benefit, to one of judicious management of finite, interconnected resources that are vital for the sustenance of humans and other living things. The future of hydrogeology is likely to be dictated by the subtle balance with which the hydrological, erosional, and nutritional cycles function, and the decision of a technological society to either adapt to the constraints imposed by the balance, or to continue to exploit hydrogeological systems for maximum benefit. Although there is now a trend towards ecological and environmental awareness, human attitudes could change should large parts of the populated world be subjected to the stresses of droughts that last for many decades. Cet article est une rétrospective de l'évolution de l'hydrogéologie en Amérique du Nord sur les deux derniers siècles, et une brève évaluation de son futur. L'histoire de l'hydrogéologie est marquée par le développement de plusieurs techniques de terrain telles, l'hydrologie des eaux souterraines, la mécanique des sols, les sciences du sol, la géologie économique, l' ingénierie pétrolière, la géologie structurale, la géochimie, la géophysique, la géologie marine et plus récemment l'écologie. La science a été enrichie par la contribution de plusieurs chercheurs distingués, provenant de toutes ces branches. A présent, l

  5. INCORPORATING A-PRIORI INFORMATION INTO AEM INVERSION FOR GEOLOGICAL AND HYDROGEOLOGICAL MAPPING OF THE SPIRITWOOD VALLEY AQUIFER, MANITOBA, CANADA

    OpenAIRE

    Sapia, V.; Istituto Nazionale di Geofisica e Vulcanologia, Sezione Roma2, Roma, Italia; Oldenborger, G. A.; Geological Survey of Canada; Viezzoli, A.; Aarhus Geophysics Aps

    2012-01-01

    Buried valleys are important hydrogeological structures in Canada and other glaciated terrains, providing sources of groundwater for drinking, agriculture and industrial applications. Hydrgeological exploration methods such as pumping tests, boreholes coring or ground-based geophysical methods (seismic and electrical resistivity tomography) provide limited spatial information and are inadequate to efficiently predict the sustainability of these aquifers at the regional scale. A...

  6. Hydrogeology along the southern boundary of the Hanford Site between the Yakima and Columbia Rivers, Washington

    International Nuclear Information System (INIS)

    US Department of Energy (DOE) operations at the Hanford Site, located in southeastern Washington, have generated large volumes of hazardous and radioactive wastes since 1944. Some of the hazardous wastes were discharged to the ground in the 1100 and 3000 Areas, near the city of Richland. The specific waste types and quantities are unknown; however, they probably include battery acid, antifreeze, hydraulic fluids, waste oils, solvents, degreasers, paints, and paint thinners. Between the Yakima and Columbia rivers in support of future hazardous waste site investigations and ground-water and land-use management. The specific objectives were to collect and review existing hydrogeologic data for the study area and establish a water-level monitoring network; describe the regional and study area hydrogeology; develop a hydrogeologic conceptual model of the unconfined ground-water flow system beneath the study area, based on available data; describe the flow characteristics of the unconfined aquifer based on the spatial and temporal distribution of hydraulic head within the aquifer; use the results of this study to delineate additional data needs in support of future Remedial Investigation/Feasibility Studies (RI/FS), Fate and Transport modeling, Baseline Risk Assessments (BRA), and ground-water and land-use management

  7. Urban land use and ground water vulnerability in Washington, DC: Environmental equity by city ward

    Energy Technology Data Exchange (ETDEWEB)

    Schneider, J.; O' Conner, J.V.; Wade, C.; Chang, F.M. (Univ. of the District of Columbia, Washington, DC (United States))

    1992-01-01

    The DC WRRC initiated a USGS-funded study on impacts of urban land use on the city's ground water. Its main objective is the development of pollution potential maps using available physical and land use data for the District of Columbia. A second goal is the design of a ground water protection strategy applicable to a heterogeneous urban setting. The multitude of data required for this project were compiled using a Geographic Information System (GIS). GIS maps show the four hydrogeologic settings, traditional land use categories, specific urban pollution sources, and management units. A coding matrix was developed to create a rating hierarchy of the pollution potential of various land use/pollution source combinations. Subsequent superposition with the ground water vulnerability map allowed the city-wide spatial assessment of land use impacts on ground water quality. Preliminary results can be displayed by voting ward and used to educate residents on environmental conditions. Field trips and technical notes coupled with exposure to new laws and historic maps can heighten public and political awareness of the ground water resource. A city-wide GIS based on voting wards can enhance understanding of the dynamic urban hydrologic cycle and thus aid in establishing environmental equity.

  8. Fuzzy vulnerability matrix

    International Nuclear Information System (INIS)

    The so-called vulnerability matrix is used in the evaluation part of the probabilistic safety assessment for a nuclear power plant, during the containment event trees calculations. This matrix is established from what is knows as Numerical Categories for Engineering Judgement. This matrix is usually established with numerical values obtained with traditional arithmetic using the set theory. The representation of this matrix with fuzzy numbers is much more adequate, due to the fact that the Numerical Categories for Engineering Judgement are better represented with linguistic variables, such as 'highly probable', 'probable', 'impossible', etc. In the present paper a methodology to obtain a Fuzzy Vulnerability Matrix is presented, starting from the recommendations on the Numerical Categories for Engineering Judgement. (author)

  9. The space of vulnerability

    Directory of Open Access Journals (Sweden)

    Claudio Sgarbi

    2015-11-01

    Full Text Available Archi-tecture has lost the reference to its prop “Archi” to develop mostly its “Tecture”: a deceitful form of nihilism, which has given full credit to a hurricane of instruments for which we know no purpose. Any distinction between city and architecture is purely contingent. Contingency is relevant but only in so far as it makes one lose any sense of scale. Many of our cities do not work because our style of life eradicates the sense of hospitality. The city becomes the place where we un-learn how to live together. Hospitality is vulnerability – the construction of vulnerability is the true beauty, the only deterrent against stupidity. Learn to live with the others, to approximate the alterity and its unpredictability. The basic tools of conviviality are the common goods of inter-disciplinarity. Learn to cultivate and educate yourself to phenomenal incompleteness.

  10. Tsunami Risk and Vulnerability

    OpenAIRE

    Khomarudin, Muhammad Rokhis

    2010-01-01

    The research focuses on providing reliable spatial information in support of tsunami risk and vulnerability assessment within the framework of the German-Indonesian Tsunami Early Warning System (GITEWS) project. It contributes to three major components of the project: (1) the provision of spatial information on surface roughness as an important parameter for tsunami inundation modeling and hazard assessment; (2) the modeling of population distribution, which is an essential factor in tsunami ...

  11. Mapping Vulnerability to Climate Change

    OpenAIRE

    Heltberg, Rasmus; Bonch-Osmolovskiy, Misha

    2011-01-01

    This paper develops a methodology for regional disaggregated estimation and mapping of the areas that are ex-ante the most vulnerable to the impacts of climate change and variability and applies it to Tajikistan, a mountainous country highly vulnerable to the impacts of climate change. The authors construct the vulnerability index as a function of exposure to climate variability and natura...

  12. Windows Server 2012 vulnerabilities and security

    Directory of Open Access Journals (Sweden)

    Gabriel R. López

    2015-09-01

    Full Text Available This investigation analyses the history of the vulnerabilities of the base system Windows Server 2012 highlighting the most critic vulnerabilities given every 4 months since its creation until the current date of the research. It was organized by the type of vulnerabilities based on the classification of the NIST. Next, given the official vulnerabilities of the system, the authors show how a critical vulnerability is treated by Microsoft in order to countermeasure the security flaw. Then, the authors present the recommended security approaches for Windows Server 2012, which focus on the baseline software given by Microsoft, update, patch and change management, hardening practices and the application of Active Directory Rights Management Services (AD RMS. AD RMS is considered as an important feature since it is able to protect the system even though it is compromised using access lists at a document level. Finally, the investigation of the state of the art related to the security of Windows Server 2012 shows an analysis of solutions given by third parties vendors, which offer security products to secure the base system objective of this study. The recommended solution given by the authors present the security vendor Symantec with its successful features and also characteristics that the authors considered that may have to be improved in future versions of the security solution.

  13. 通用Web漏洞库%Common Web Vulnerability Database

    Institute of Scientific and Technical Information of China (English)

    张昊星; 孙应飞

    2013-01-01

    Based on the research of Web vulnerability database and the situation of vulnerability database construction at home and aboard, the paper designed and implemented a vulnerability database focused on Web vulnerabilities. In consideration of both the features of Web vulnerability and the differences with traditional vulnerability, the paper designed the Web vulnerability database description model, enriched the ways of Web vulnerability collection, redefined the Web vulnerability scoring attributes and added the Web vulnerability reproduce function. The Web vulnerability database guarantees the comprehensive collection of Web vulnerability information and the standard release of Web vulnerability information, helps analyze the Web vulnerability information and data better, and provides a powerful technical support to Web security.%本文研究了国内外Web漏洞库及建设的现状,设计并实现了一个专注于Web漏洞发布的Web漏洞数据库。文中兼顾了Web漏洞的固有特点及其与传统漏洞的属性差别,设计了Web漏洞库描述模型,丰富了Web漏洞的收集方法,定义了Web漏洞的漏洞评价属性标准,并在Web漏洞库中添加了Web漏洞重现模块。我们所设计的Web漏洞库确保了全面的Web漏洞信息收集和Web漏洞信息发布的标准化,可更好地对Web漏洞信息和数据进行分析研究,也为Web安全提供了有力的技术支撑。

  14. Research-based Reflections on How the Educational, Economic and Social Circumstances Faced by Some Children and Young People Can Lead to Significant Disadvantage and Vulnerability

    Directory of Open Access Journals (Sweden)

    Tucker Stanley

    2016-07-01

    Full Text Available The paper provides detailed reflections on the educational, economic and social circumstances that impact on the lives of many disadvantaged and vulnerable children and young people. Drawing largely on primary research data collected in Romania, Germany and the United Kingdom, three illustrative case studies are presented for consideration focusing on: life in residential care and youth offending institutions; experiences of educational vulnerability; and human trafficking. The methodological approach adopted across the research projects explored, was shaped by the demands and expectations of the United Nations Convention on the Rights of the Child (UNCRC. All of the reported data reflects the views of children and young people who were interviewed as part of three research projects. It is argued that the difficult and challenging circumstances that many children and young people find themselves in, place them at significant disadvantage and increased vulnerability in terms of their social and educational development and life chances.

  15. Site investigation SFR. Hydrogeological modelling of SFR. Model version 0.2

    Energy Technology Data Exchange (ETDEWEB)

    Oehman, Johan (Golder Associates AB (Sweden)); Follin, Sven (SF GeoLogic (Sweden))

    2010-01-15

    The Swedish Nuclear Fuel and Waste Management Company (SKB) has conducted site investigations for a planned extension of the existing final repository for short-lived radioactive waste (SFR). A hydrogeological model is developed in three model versions, which will be used for safety assessment and design analyses. This report presents a data analysis of the currently available hydrogeological data from the ongoing Site Investigation SFR (KFR27, KFR101, KFR102A, KFR102B, KFR103, KFR104, and KFR105). The purpose of this work is to develop a preliminary hydrogeological Discrete Fracture Network model (hydro-DFN) parameterisation that can be applied in regional-scale modelling. During this work, the Geologic model had not yet been updated for the new data set. Therefore, all analyses were made to the rock mass outside Possible Deformation Zones, according to Single Hole Interpretation. Owing to this circumstance, it was decided not to perform a complete hydro-DFN calibration at this stage. Instead focus was re-directed to preparatory test cases and conceptual questions with the aim to provide a sound strategy for developing the hydrogeological model SFR v. 1.0. The presented preliminary hydro-DFN consists of five fracture sets and three depth domains. A statistical/geometrical approach (connectivity analysis /Follin et al. 2005/) was performed to estimate the size (i.e. fracture radius) distribution of fractures that are interpreted as Open in geologic mapping of core data. Transmissivity relations were established based on an assumption of a correlation between the size and evaluated specific capacity of geologic features coupled to inflows measured by the Posiva Flow Log device (PFL-f data). The preliminary hydro-DFN was applied in flow simulations in order to test its performance and to explore the role of PFL-f data. Several insights were gained and a few model technical issues were raised. These are summarised in Table 5-1

  16. Summary of discrete fracture network modelling as applied to hydrogeology of the Forsmark and Laxemar sites

    Energy Technology Data Exchange (ETDEWEB)

    Hartley, Lee; Roberts, David

    2013-04-15

    The Swedish Nuclear Fuel and Waste Management Company (SKB) is responsible for the development of a deep geological repository for spent nuclear fuel. The permitting of such a repository is informed by assessment studies to estimate the risks of the disposal method. One of the potential risks involves the transport of radionuclides in groundwater from defective canisters in the repository to the accessible environment. The Swedish programme for geological disposal of spent nuclear fuel has involved undertaking detailed surface-based site characterisation studies at two different sites, Forsmark and Laxemar-Simpevarp. A key component of the hydrogeological modelling of these two sites has been the development of Discrete Fracture Network (DFN) concepts of groundwater flow through the fractures in the crystalline rocks present. A discrete fracture network model represents some of the characteristics of fractures explicitly, such as their, orientation, intensity, size, spatial distribution, shape and transmissivity. This report summarises how the discrete fracture network methodology has been applied to model groundwater flow and transport at Forsmark and Laxemar. The account has involved summarising reports previously published by SKB between 2001 and 2011. The report describes the conceptual framework and assumptions used in interpreting site data, and in particular how data has been used to calibrate the various parameters that define the discrete fracture network representation of bedrock hydrogeology against borehole geologic and hydraulic data. Steps taken to confirm whether the developed discrete fracture network models provide a description of regional-scale groundwater flow and solute transport consistent with wider hydraulic tests hydrochemical data from Forsmark and Laxemar are discussed. It illustrates the use of derived hydrogeological DFN models in the simulations of the temperate period hydrogeology that provided input to radionuclide transport

  17. The use of historical data for the characterisation of multiple damaging hydrogeological events

    Directory of Open Access Journals (Sweden)

    O. Petrucci

    2003-01-01

    Full Text Available Landslides, floods and secondary floods (hereinafter called phenomena triggered by rainfall and causing extensive damage are reviewed in this paper. Damaging Hydrogeological Events (DHEs are defined as the occurrence of one or more simultaneous aforementioned phenomena. A method for the characterisation of DHEs based upon historic data is proposed. The method is aimed at assessing DHE-related hazard in terms of recurrence, severity, damage, and extent of the affected area. Using GIS, the DHEs historical and climatic data collection, the geomorphological and hydrogeological characterisation of the hit areas, the characterisation of induced damage, the evaluation of triggering rainfall return period and critical duration of each DHE were carried out. The approach was applied to a test site in Southern Italy (Calabria for validation purposes. A database was set up including data from 24 events which have occurred during an 80-year period. The spatial distribution of phenomena was analysed together with the return period of cumulative rainfall. The trend of the occurred phenomena was also compared with the climatic trend. Four main types of Damaging Hydrogeological Events were identified in the study area.

  18. Benchmark analysis for quantifying urban vulnerability to terrorist incidents.

    Science.gov (United States)

    Piegorsch, Walter W; Cutter, Susan L; Hardisty, Frank

    2007-12-01

    We describe a quantitative methodology to characterize the vulnerability of U.S. urban centers to terrorist attack, using a place-based vulnerability index and a database of terrorist incidents and related human casualties. Via generalized linear statistical models, we study the relationships between vulnerability and terrorist events, and find that our place-based vulnerability metric significantly describes both terrorist incidence and occurrence of human casualties from terrorist events in these urban centers. We also introduce benchmark analytic technologies from applications in toxicological risk assessment to this social risk/vulnerability paradigm, and use these to distinguish levels of high and low urban vulnerability to terrorism. It is seen that the benchmark approach translates quite flexibly from its biological roots to this social scientific archetype.

  19. Hydrogeological Issues Concerning the Thar Lignite Prospect

    Directory of Open Access Journals (Sweden)

    R. N. Singh

    2012-12-01

    Full Text Available The paper is concerned with the hydrogeological appraisal of the proposed mining operations in theThar lignite field in Sindh, Pakistan. The Thar coalfield covers an area of approximately 9000km2 andcontains three lignite seams lying at depth of 130m to 250 m. In the Thar lignite field, the presence ofthree main aquifers induces pore pressure in the rock mass surrounding the lignite seams and makes highwall slopes potentially unsafe. It is, therefore, necessary to dewater the rock mass before commencingmining excavations. The paper describes the proposed mine dewatering scheme to facilitatedepressurising of the rock mass surrounding the mining excavations. Inflow prediction of groundwater tothe surface mining excavation was carried out using a SEEP/W finite element software package. Thesimulation results show that the ground water inflow from the Top aquifer is 114m3/d, from theIntermediate confined aquifer is 141m3/d and from the Bottom confined aquifer is 1.28 x 105 m3 /d. Theseresults were compared with the analytical solutions which indicated that the relative error of estimation ofinflow quantities varies from 3.4 % to 6.4%.

  20. 2101-M Pond hydrogeologic characterization report

    Energy Technology Data Exchange (ETDEWEB)

    Chamness, M.A.; Luttrell, S.P.; Bates, D.J.; Martin, W.J.

    1990-09-01

    This report documents information collected by the Pacific Northwest Laboratory {sup (a)} at the request of Westinghouse Hanford Company. Presented in this report is the interpretation of the hydrogeologic environment at the 2101-M Pond, located in the 200-East Area of the Hanford Site. This information and its accompanying interpretation were derived from sampling and testing activities associated with the installation of four ground-water monitoring wells, in addition to data gathered from several previously existing wells. The new monitoring wells were installed as part of a groundwater monitoring program initiated in 1988. The four new monitoring wells were installed around the 2101-M Pond between May 23 and August 27, 1988. Geologic sampling, aquifer testing, and initial ground-water sampling were performed during the installation of these wells. Laboratory analyses of the sediment samples for particle size, calcium carbonate content, and selected natural and contaminant constituents were performed. A full year of quarterly ground-water sampling and the first statistical analysis of background and downgradient data have also been performed. 112 refs., 49 figs., 18 tabs.

  1. Photogrammetry in Experiments for Hydrogeological Risk Assessment

    Science.gov (United States)

    Barazzetti, L.; Scaioni, M.; Feng, T.; Qiao, G.; Lu, P.; Tong, X.; Li, R.

    2013-01-01

    The construction of scaled-down simulation platforms is largely used to support investigations for the assessment of hydrological risk. Achieved outcomes can be integrated and assimilated to numerical analyses for the study of unstable slope collapse, debris transport, and hydrological modeling in general. During design of such simulation platforms, a relevant role has to be given to the spatial sensor network (SSN) to deploy, which is in charge of collecting geo-referenced, quantitative information during experiments. Photogrammetry (including 3D imaging sensors) can play an important role in SSN owing to its capability of collecting 2D images and 3D point clouds data covering wide surfaces without any contact. Different kinds of metric measurements can be then extracted from datasets. The aim of this paper is to give an overview and some examples on the potential of photogrammetry in hydrogeological experiments. After a general introduction on a few preliminary issues (sensors, calibration, ground reference, usage of imaging or ranging sensors), potential applications are classified into 2D and 3D categories. Examples are focused on a scaled-down landslide simulation platform developed at Tongji University (Shanghai, P. R. China).

  2. PHOTOGRAMMETRY IN EXPERIMENTS FOR HYDROGEOLOGICAL RISK ASSESSMENT

    Directory of Open Access Journals (Sweden)

    L. Barazzetti

    2014-01-01

    Full Text Available The construction of scaled-down simulation platforms is largely used to support investigations for the assessment of hydrological risk. Achieved outcomes can be integrated and assimilated to numerical analyses for the study of unstable slope collapse, debris transport, and hydrological modeling in general. During design of such simulation platforms, a relevant role has to be given to the spatial sensor network (SSN to deploy, which is in charge of collecting geo-referenced, quantitative information during experiments. Photogrammetry (including 3D imaging sensors can play an important role in SSN owing to its capability of collecting 2D images and 3D point clouds data covering wide surfaces without any contact. Different kinds of metric measurements can be then extracted from datasets. The aim of this paper is to give an overview and some examples on the potential of photogrammetry in hydrogeological experiments. After a general introduction on a few preliminary issues (sensors, calibration, ground reference, usage of imaging or ranging sensors, potential applications are classified into 2D and 3D categories. Examples are focused on a scaled-down landslide simulation platform developed at Tongji University (Shanghai, P. R. China.

  3. Hydrogeology of Montserrat review and new insights

    Directory of Open Access Journals (Sweden)

    Brioch Hemmings

    2015-03-01

    New hydrological insights for the region: A new groundwater recharge model predicts whole island recharge of 266 mm/year, between 10% and 20% of annual rainfall. Core scale permeability tests reveal ranges from 10−14 to 10−12 m2 for volcaniclastic rocks with coarse matrix, to a minimum of 10−18 m2 for andesitic lavas and volcaniclastics with fine or altered matrix. Analysis of historical pumping tests on aquifers in reworked, channel and alluvial sediment indicate permeabilities ∼10−10 m2. Springs at elevations between 200 and 400 m above mean sea level on Centre Hills currently discharge over 45 L/s. High discharge require a reasonably laterally continuous low permeability body. Contrasting conceptual models are presented to illustrate two potential hydrogeological scenarios. New field observations also reveal systematic spatial variations in spring water temperature and specific electrical conductivity indicating that meteoric waters supplying the springs are mixed with a deeper groundwater source at some sites.

  4. Deriving vulnerability curves using Italian earthquake damage data

    OpenAIRE

    Colombi, M.; EUCENTRE, European Centre for Training and Research in Earthquake Engineering, Via Ferrata 1, Pavia, Italy; Borzi, B.; EUCENTRE, European Centre for Training and Research in Earthquake Engineering, Via Ferrata 1, Pavia, Italy; Crowley, H.; EUCENTRE, European Centre for Training and Research in Earthquake Engineering, Via Ferrata 1, Pavia, Italy; Onida, M.; EUCENTRE, European Centre for Training and Research in Earthquake Engineering, Via Ferrata 1, Pavia, Italy; Meroni, F.; Istituto Nazionale di Geofisica e Vulcanologia, Sezione Milano-Pavia, Milano, Italia; Pinho, R.; Dipartimento di Meccanica Strutturale, Università degli Studi di Pavia, Via Ferrata 1, Pavia, Italy

    2008-01-01

    The concerted effort to collect earthquake damage data in Italy over the past 30 years has led to the development of an extensive database from which vulnerability predictions for the Italian building stock can be derived. A methodology to derive empirical vulnerability curves with the aforementioned data is presented herein and the resulting curves have been directly compared with mechanics-based vulnerability curves. However, it has been found that a valid comparison between the empirical a...

  5. Vulnerability of families with children with intestinal stomas

    OpenAIRE

    Clara Ferraz Lazarini Zacarin; Willyane de Andrade Alvarenga; Renata Olzon Dionísio de Souza; Daianne Cibele de Souza Borges; Giselle Dupas

    2014-01-01

    Intestinal stomas cause transformations in the body and create specific and continuous needs for care that imply in hospitalization and surgeries. In this context, we applied the concept of family vulnerability in order to identify the vulnerability of the family living with a child who has intestinal stoma. It is a qualitative study which interviewed the mothers of children with this chronic condition. We used narrative analysis based on the concept of family vulnerability. The results displ...

  6. Exploration and Practice of Using Typical Software Vulnerabilities Based on Windows%基于 Windows 的软件安全典型漏洞利用策略探索与实践

    Institute of Scientific and Technical Information of China (English)

    关通; 任馥荔; 伟平; 张浩

    2014-01-01

    With the rapid development of the global information technology, computer software has become the important engine of the world economy, science and technology, military and social development. The core of information security is attached to the security mechanism of the operating system and software vulnerabilities. Software vulnerability itself can not constitute attack, software vulnerability exploiting make the attack possible. This article is based on the Windows operating system, mainly analyzes the principles of some typical software vulnerabilities as well as the common ways to exploit software vulnerabilities, comparing them. in different environment.The article also simply analyzes the protective effect to software security and the hinder to software vulnerability exploiting of Windows security mechanisms. The article emphatically does some explorations and practices on exploiting several typical software vulnerabilities, analyzing the fragility of Windows security mechanisms by using the current popular methods of bypassing security mechanisms.%随着全球信息化的迅猛发展,计算机软件已成为世界经济、科技、军事和社会发展的重要引擎。信息安全的核心在于其所依附的操作系统的安全机制以及软件本身存在的漏洞。软件漏洞本身无法构成攻击,软件漏洞利用使得把漏洞转化为攻击变为可能。文章立足于 Windows 操作系统,主要分析了一些常用软件的典型漏洞原理以及常见的利用方法,比较了不同利用方法在不同环境下的性能优劣,并简单分析了 Windows 的安全机制对软件的防护作用以及对软件漏洞利用的阻碍作用。文章着重对几种典型漏洞进行了软件漏洞利用的探索和实践,并使用当前流行的对安全机制的绕过方法分析了 Windows 几种安全机制的脆弱性。

  7. Perspectives on contextual vulnerability in discourses of climate conflict

    Science.gov (United States)

    Okpara, U. T.; Stringer, L. C.; Dougill, A. J.

    2016-02-01

    The science of climate security and conflict is replete with controversies. Yet the increasing vulnerability of politically fragile countries to the security consequences of climate change is widely acknowledged. Although climate conflict reflects a continuum of conditional forces that coalesce around the notion of vulnerability, how different portrayals of vulnerability influence the discursive formation of climate conflict relations remains an exceptional but under-researched issue. This paper combines a systematic discourse analysis with a vulnerability interpretation diagnostic tool to explore (i) how discourses of climate conflict are constructed and represented, (ii) how vulnerability is communicated across discourse lines, and (iii) the strength of contextual vulnerability against a deterministic narrative of scarcity-induced conflict, such as that pertaining to land. Systematically characterising climate conflict discourses based on the central issues constructed, assumptions about mechanistic relationships, implicit normative judgements and vulnerability portrayals, provides a useful way of understanding where discourses differ. While discourses show a wide range of opinions "for" and "against" climate conflict relations, engagement with vulnerability has been less pronounced - except for the dominant context centrism discourse concerned about human security (particularly in Africa). In exploring this discourse, we observe an increasing sense of contextual vulnerability that is oriented towards a concern for complexity rather than predictability. The article concludes by illustrating that a turn towards contextual vulnerability thinking will help advance a constructivist theory-informed climate conflict scholarship that recognises historicity, specificity, and variability as crucial elements of contextual totalities of any area affected by climate conflict.

  8. CSRF Vulnerabilities and Defensive Techniques

    Directory of Open Access Journals (Sweden)

    Rupali D. Kombade

    2012-02-01

    Full Text Available Web applications are now part of day to day life due to their user friendly environment as well as advancement of technology to provide internet facilities, but these web applications brought lot of threats with them and these threats are continuously growing, one of the these threat is Cross Site Request Forgery(CSRF. CSRF attack is immerged as serious threat to web applications which based on the vulnerabilities present in the normal request response pattern of HTTP protocol. It is difficult to detect and hence it is present in most of the existing web applications. CSRF attack occurs when a malicious web site causes a user’s web browser to perform an unwanted action on a trusted site. It is listed in OWASP’s top ten Web Application attacks list. In this survey paper we will study CSRF attack, CSRF vulnerabilities and its defensive measures. We have compared various defense mechanisms to analyse the best defense mechanism. This study will help us to build strong and robust CSRF protection mechanism.

  9. Geologic Setting and Hydrogeologic Units of the Columbia Plateau Regional Aquifer System, Washington, Oregon, and Idaho

    Science.gov (United States)

    Kahle, Sue C.; Olsen, Theresa D.; Morgan, David S.

    2009-01-01

    The Columbia Plateau Regional Aquifer System (CPRAS) covers approximately 44,000 square miles of northeastern Oregon, southeastern Washington, and western Idaho. The area supports a $6 billion per year agricultural industry, leading the Nation in production of apples and nine other commodities (State of Washington Office of Financial Management, 2007; U.S. Department of Agriculture, 2007). Groundwater availability in the aquifers of the area is a critical water-resource management issue because the water demand for agriculture, economic development, and ecological needs is high. The primary aquifers of the CPRAS are basalts of the Columbia River Basalt Group (CRBG) and overlying basin-fill sediments. Water-resources issues that have implications for future groundwater availability in the region include (1) widespread water-level declines associated with development of groundwater resources for irrigation and other uses, (2) reduction in base flow to rivers and associated effects on temperature and water quality, and (3) current and anticipated effects of global climate change on recharge, base flow, and ultimately, groundwater availability. As part of a National Groundwater Resources Program, the U.S. Geological Survey began a study of the CPRAS in 2007 with the broad goals of (1) characterizing the hydrologic status of the system, (2) identifying trends in groundwater storage and use, and (3) quantifying groundwater availability. The study approach includes documenting changes in the status of the system, quantifying the hydrologic budget for the system, updating the regional hydrogeologic framework, and developing a groundwater-flow simulation model for the system. The simulation model will be used to evaluate and test the conceptual model of the system and later to evaluate groundwater availability under alternative development and climate scenarios. The objectives of this study were to update the hydrogeologic framework for the CPRAS using the available

  10. Assessing human vulnerability: Daytime residential distribution as a vulnerability indicator

    Science.gov (United States)

    Gokesch, Karin; Promper, Catrin; Papathoma-Köhle, Maria; Glade, Thomas

    2014-05-01

    Natural hazard risk management is based on detailed information on potential impacts of natural hazards. Especially concerning fast onset hazards such as flash floods, earthquakes but also debris flows and landslides, knowing potential hotspots of impact to both, assets and human lives is essential. This information is important for emergency management and decision making in the response phase of the disaster management cycle. Emergency managers are in need of information regarding not only the number of humans being potentially affected but also the respective vulnerability of the group affected based on characteristics such as age, income, health condition, mobility, etc. regarding a certain hazard. The analysis presented focuses on the distribution of the population, assuming a certain pattern of people in a certain radius of action. The method applied is based on a regular pattern of movement of different groups of people and a pattern of presence in certain units, e.g. schools, businesses or residential buildings. The distribution is calculated on a minimum of available data including the average household size, as well as information on building types. The study area is located in the Southwest of Lower Austria, Austria. The city of Waidhofen/Ybbs can be regarded as a regional center providing basic infrastructure, shops and schools. The high concentration of buildings combining shops and residential units leads to a high damage potential throughout the whole study area. The presented results indicate the population distribution within the study area on an average working day. It is clear that explicitly high numbers of people are located in specific buildings (e.g. schools and hospitals) which also include highly vulnerable groups especially to fast onset hazards. The results provide emergency services with the information that they need in order to intervene directly where large numbers of victims or people that need to be evacuated are located. In this

  11. Hydrogeology of the 200 Areas low-level burial grounds

    International Nuclear Information System (INIS)

    This report presents information derived from the installation of 35 ground-water monitoring wells around six low-level radioactive/hazardous waste burial grounds located in the 200 Areas of the Hanford Site in southeastern Washington State. This information was collected between May 20, 1987 and August 1, 1988. The contents of this report have been divided into two volumes. This volume contains the main text. Volume 2 contains the appendixes, including data and supporting information that verify content and results found in the main text. This report documents information collected by the Pacific Northwest Laboratory at the request of Westinghouse Hanford Company. Presented in this report are the preliminary interpretations of the hydrogeologic environment of six low-level burial grounds, which comprise four waste management areas (WMAs) located in the 200 Areas of the Hanford Site. This information and its accompanying interpretations were derived from sampling and testing activities associated with the construction of 35 ground-water monitoring wells as well as a multitude of previously existing boreholes. The new monitoring wells were installed as part of a ground-water monitoring program initiated in 1986. This ground-water monitoring program is based on requirements for interim status facilities in compliance with the Resource Conservation and Recovery Act (1976)

  12. Beyond 'vulnerable groups': contexts and dynamics of vulnerability.

    Science.gov (United States)

    Zarowsky, Christina; Haddad, Slim; Nguyen, Vinh-Kim

    2013-03-01

    This paper reviews approaches to vulnerability in public health, introducing a series of 10 papers addressing vulnerability in health in Africa. We understand vulnerability as simultaneously a condition and a process. Social inequalities are manifest in and exacerbate three key dimensions of vulnerability: the initial level of wellbeing, the degree of exposure to risk, and the capacity to manage risk effectively. We stress the dynamic interactions linking material and social deprivation, poverty, powerlessness and ill health: risks or shocks and their health impacts are intimately interconnected and reinforce each other in a cycle which in the absence of effective interventions, increases vulnerability. An inductive process which does not begin with an a priori definition or measurement of 'vulnerability' and which does not assume the existence of fixed 'vulnerable groups' allowed us both to re-affirm core aspects of existing conceptual frameworks, and to engage in new ways with literature specifically addressing vulnerability and resilience at the population level as well as with literature - for example in ecology, and on the concept of frailty in research on aging - with which researchers on health and poverty in Africa may not be familiar. We invite conceptual and empirical work on vulnerability in complex systems frameworks. These perspectives emphasize contexts and nonlinear causality thus supporting analyses of vulnerability and resilience as both markers and emergent properties of dynamic interactions. We accept a working definition of vulnerability, and recognize that some definable groups of people are more likely than others to suffer harm from exposure to health risks. But we suggest that the real work - at both intellectual and policy/political levels - lies in understanding and responding to the dynamics, meanings and power relations underlying actual instances and processes of vulnerability and harm.

  13. Beyond 'vulnerable groups': contexts and dynamics of vulnerability.

    Science.gov (United States)

    Zarowsky, Christina; Haddad, Slim; Nguyen, Vinh-Kim

    2013-03-01

    This paper reviews approaches to vulnerability in public health, introducing a series of 10 papers addressing vulnerability in health in Africa. We understand vulnerability as simultaneously a condition and a process. Social inequalities are manifest in and exacerbate three key dimensions of vulnerability: the initial level of wellbeing, the degree of exposure to risk, and the capacity to manage risk effectively. We stress the dynamic interactions linking material and social deprivation, poverty, powerlessness and ill health: risks or shocks and their health impacts are intimately interconnected and reinforce each other in a cycle which in the absence of effective interventions, increases vulnerability. An inductive process which does not begin with an a priori definition or measurement of 'vulnerability' and which does not assume the existence of fixed 'vulnerable groups' allowed us both to re-affirm core aspects of existing conceptual frameworks, and to engage in new ways with literature specifically addressing vulnerability and resilience at the population level as well as with literature - for example in ecology, and on the concept of frailty in research on aging - with which researchers on health and poverty in Africa may not be familiar. We invite conceptual and empirical work on vulnerability in complex systems frameworks. These perspectives emphasize contexts and nonlinear causality thus supporting analyses of vulnerability and resilience as both markers and emergent properties of dynamic interactions. We accept a working definition of vulnerability, and recognize that some definable groups of people are more likely than others to suffer harm from exposure to health risks. But we suggest that the real work - at both intellectual and policy/political levels - lies in understanding and responding to the dynamics, meanings and power relations underlying actual instances and processes of vulnerability and harm. PMID:23549696

  14. Hydrogeologic subdivision of the Wolfcamp series and Pennsylvanian system of eastern Texas Panhandle, north-central Texas, and southwestern Oklahoma

    International Nuclear Information System (INIS)

    The Pennsylvanian-Wolfcamp section in the Palo Duro Basin includes brine aquifers that are considered to be the most important ground-water flow paths in the deep-basin system. This report is the fifth in a series providing summary documentation of studies that subdivide the section into hydrogeologic units based on their judged relative capacities for transmitting water. This report extends the hydrogeologic study area to the eastern Texas Panhandle, north-central Texas, and southwestern Oklahoma. It includes 37 counties in Texas and Oklahoma. Underground patterns of rock distribution are delineated from a hydrologic perspective and at a level of detail appropriate for numerical modeling of regional ground-water flow. Hydrogeologic units are defined and characterized so that appropriate porosity and permeability values can be assigned to each unit during construction of the numerical models (not part of this study), and so that modelers can combine units where necessary. In this study, hydrogeologic units have been defined as mappable, physically continuous rock bodies that function in bulk as water-transmitting or water-retarding units relative to adjacent rocks. Interpretations are made primarily from geophysical logs. Hydrologic characteristics are assessed on the basis of properties typically associated with certain lithologies (e.g., sandstones are more pervious than shales) and on the basis of gross variations in effective porosity (particularly in carbonate sequences). 44 refs., 32 figs., 1 tab

  15. Hydrogeologic Framework Model for the Saturated Zone Site Scale flow and Transport Model

    International Nuclear Information System (INIS)

    The purpose of this report is to document the 19-unit, hydrogeologic framework model (19-layer version, output of this report) (HFM-19) with regard to input data, modeling methods, assumptions, uncertainties, limitations, and validation of the model results in accordance with AP-SIII.10Q, Models. The HFM-19 is developed as a conceptual model of the geometric extent of the hydrogeologic units at Yucca Mountain and is intended specifically for use in the development of the ''Saturated Zone Site-Scale Flow Model'' (BSC 2004 [DIRS 170037]). Primary inputs to this model report include the GFM 3.1 (DTN: MO9901MWDGFM31.000 [DIRS 103769]), borehole lithologic logs, geologic maps, geologic cross sections, water level data, topographic information, and geophysical data as discussed in Section 4.1. Figure 1-1 shows the information flow among all of the saturated zone (SZ) reports and the relationship of this conceptual model in that flow. The HFM-19 is a three-dimensional (3-D) representation of the hydrogeologic units surrounding the location of the Yucca Mountain geologic repository for spent nuclear fuel and high-level radioactive waste. The HFM-19 represents the hydrogeologic setting for the Yucca Mountain area that covers about 1,350 km2 and includes a saturated thickness of about 2.75 km. The boundaries of the conceptual model were primarily chosen to be coincident with grid cells in the Death Valley regional groundwater flow model (DTN: GS960808312144.003 [DIRS 105121]) such that the base of the site-scale SZ flow model is consistent with the base of the regional model (2,750 meters below a smoothed version of the potentiometric surface), encompasses the exploratory boreholes, and provides a framework over the area of interest for groundwater flow and radionuclide transport modeling. In depth, the model domain extends from land surface to the base of the regional groundwater flow model (D'Agnese et al. 1997 [DIRS 100131], p 2). For the site-scale SZ flow model, the HFM

  16. Hydrogeologic Framework Model for the Saturated Zone Site Scale flow and Transport Model

    Energy Technology Data Exchange (ETDEWEB)

    T. Miller

    2004-11-15

    The purpose of this report is to document the 19-unit, hydrogeologic framework model (19-layer version, output of this report) (HFM-19) with regard to input data, modeling methods, assumptions, uncertainties, limitations, and validation of the model results in accordance with AP-SIII.10Q, Models. The HFM-19 is developed as a conceptual model of the geometric extent of the hydrogeologic units at Yucca Mountain and is intended specifically for use in the development of the ''Saturated Zone Site-Scale Flow Model'' (BSC 2004 [DIRS 170037]). Primary inputs to this model report include the GFM 3.1 (DTN: MO9901MWDGFM31.000 [DIRS 103769]), borehole lithologic logs, geologic maps, geologic cross sections, water level data, topographic information, and geophysical data as discussed in Section 4.1. Figure 1-1 shows the information flow among all of the saturated zone (SZ) reports and the relationship of this conceptual model in that flow. The HFM-19 is a three-dimensional (3-D) representation of the hydrogeologic units surrounding the location of the Yucca Mountain geologic repository for spent nuclear fuel and high-level radioactive waste. The HFM-19 represents the hydrogeologic setting for the Yucca Mountain area that covers about 1,350 km2 and includes a saturated thickness of about 2.75 km. The boundaries of the conceptual model were primarily chosen to be coincident with grid cells in the Death Valley regional groundwater flow model (DTN: GS960808312144.003 [DIRS 105121]) such that the base of the site-scale SZ flow model is consistent with the base of the regional model (2,750 meters below a smoothed version of the potentiometric surface), encompasses the exploratory boreholes, and provides a framework over the area of interest for groundwater flow and radionuclide transport modeling. In depth, the model domain extends from land surface to the base of the regional groundwater flow model (D'Agnese et al. 1997 [DIRS 100131], p 2). For the site

  17. Morphological and Stress Vulnerability Indices for Human Coronary Plaques and Their Correlations with Cap Thickness and Lipid Percent: An IVUS-Based Fluid-Structure Interaction Multi-patient Study.

    Directory of Open Access Journals (Sweden)

    Liang Wang

    2015-12-01

    Full Text Available Plaque vulnerability, defined as the likelihood that a plaque would rupture, is difficult to quantify due to lack of in vivo plaque rupture data. Morphological and stress-based plaque vulnerability indices were introduced as alternatives to obtain quantitative vulnerability assessment. Correlations between these indices and key plaque features were investigated. In vivo intravascular ultrasound (IVUS data were acquired from 14 patients and IVUS-based 3D fluid-structure interaction (FSI coronary plaque models with cyclic bending were constructed to obtain plaque wall stress/strain and flow shear stress for analysis. For the 617 slices from the 14 patients, lipid percentage, min cap thickness, critical plaque wall stress (CPWS, strain (CPWSn and flow shear stress (CFSS were recorded, and cap index, lipid index and morphological index were assigned to each slice using methods consistent with American Heart Association (AHA plaque classification schemes. A stress index was introduced based on CPWS. Linear Mixed-Effects (LME models were used to analyze the correlations between the mechanical and morphological indices and key morphological factors associated with plaque rupture. Our results indicated that for all 617 slices, CPWS correlated with min cap thickness, cap index, morphological index with r = -0.6414, 0.7852, and 0.7411 respectively (p<0.0001. The correlation between CPWS and lipid percentage, lipid index were weaker (r = 0.2445, r = 0.2338, p<0.0001. Stress index correlated with cap index, lipid index, morphological index positively with r = 0.8185, 0.3067, and 0.7715, respectively, all with p<0.0001. For all 617 slices, the stress index has 66.77% agreement with morphological index. Morphological and stress indices may serve as quantitative plaque vulnerability assessment supported by their strong correlations with morphological features associated with plaque rupture. Differences between the two indices may lead to better plaque

  18. Research on Vulnerability Assessment of Human-land System of Anshan City Based on Set Pair Analysis%基于集对分析的鞍山市人地系统脆弱性评估

    Institute of Scientific and Technical Information of China (English)

    韩瑞玲; 佟连军; 佟伟铭; 于建辉

    2012-01-01

    脆弱性评估是当前脆弱性研究的一项重要内容,其已成为分析人地系统相互作用的过程与机理的有效工具之一。应用集对分析方法和熵权法,根据鞍山市经济发展的资源依赖特征、社会就业的不稳定特征、资源型城市生态环境破坏相对严重的特征,评估了1990-2009年鞍山市经济系统、社会就业系统、生态环境系统3个系统各自的敏感性、应对能力和脆弱性,进而对鞍山市人地关系的脆弱性程度进行了评估。文章发现,鞍山市人地系统作用关系属于低敏感型、高应对能力型,其相对于其他东北地区资源型城市具有较好的可持续发展基础,未来发展应注重降低经济系统的敏感性,并积极提高其应对能力。%Vulnerability assessment framework in sustainability science has properties of multi-scale,multi-element,multi-flow and multi-cycle,so vulnerability assessment is a new research paradigm in the realms of global environmental change and sustainable development,and provides an effective tool for the study of interaction mechanisms and processes of coupled human-land system.Based on the dependence of economic development on resources,and the instability in employment,and the ecology being relatively disrupted,the vulnerability assessment indexes of Anshan city are established.By using the set pair analysis and the entropy method,the essay analyzed the sensitivity,response capacity and vulnerability level of the economic system,as well as the employment system and the ecosystem.Then the vulnerability of human-land system of Anshan city are tested and the evolution of vulnerability characteristics during 1990 to 2009 has been revealed.The relationship of human-land system of Anshan city belongs to the lower sensitivity and higher response capacity type.In comparison with other resource-based cities in Northeast China,the human-land stability of Anshan city is stronger,and the vulnerability is relatively

  19. Climate challenges, vulnerabilities, and food security.

    Science.gov (United States)

    Nelson, Margaret C; Ingram, Scott E; Dugmore, Andrew J; Streeter, Richard; Peeples, Matthew A; McGovern, Thomas H; Hegmon, Michelle; Arneborg, Jette; Kintigh, Keith W; Brewington, Seth; Spielmann, Katherine A; Simpson, Ian A; Strawhacker, Colleen; Comeau, Laura E L; Torvinen, Andrea; Madsen, Christian K; Hambrecht, George; Smiarowski, Konrad

    2016-01-12

    This paper identifies rare climate challenges in the long-term history of seven areas, three in the subpolar North Atlantic Islands and four in the arid-to-semiarid deserts of the US Southwest. For each case, the vulnerability to food shortage before the climate challenge is quantified based on eight variables encompassing both environmental and social domains. These data are used to evaluate the relationship between the "weight" of vulnerability before a climate challenge and the nature of social change and food security following a challenge. The outcome of this work is directly applicable to debates about disaster management policy.

  20. Climate challenges, vulnerabilities, and food security

    Science.gov (United States)

    Nelson, Margaret C.; Ingram, Scott E.; Dugmore, Andrew J.; Streeter, Richard; Peeples, Matthew A.; McGovern, Thomas H.; Hegmon, Michelle; Arneborg, Jette; Brewington, Seth; Spielmann, Katherine A.; Simpson, Ian A.; Strawhacker, Colleen; Comeau, Laura E. L.; Torvinen, Andrea; Madsen, Christian K.; Hambrecht, George; Smiarowski, Konrad

    2016-01-01

    This paper identifies rare climate challenges in the long-term history of seven areas, three in the subpolar North Atlantic Islands and four in the arid-to-semiarid deserts of the US Southwest. For each case, the vulnerability to food shortage before the climate challenge is quantified based on eight variables encompassing both environmental and social domains. These data are used to evaluate the relationship between the “weight” of vulnerability before a climate challenge and the nature of social change and food security following a challenge. The outcome of this work is directly applicable to debates about disaster management policy. PMID:26712017

  1. Design and Implementation of Web Service Vulnerability Testing System Based on SOAP Messages Mutation%基于消息变异的Web服务脆弱性测试系统的设计与实现

    Institute of Scientific and Technical Information of China (English)

    陈加梅; 陈锦富; 詹永照; 王环环; 李青

    2013-01-01

    The automatic tool of testing Web service vulnerability brings great effect on Web service-based software engineering,and they can effeetively ensure the security and reliability of Web service-based software.According to Web service which is used widely,a prototype system WSVTS(Web Service Vulnerability Testing System) was designed and implemented.Two mutation approaches of testing Web service vulnerability based on the input domain of SOAP message,namely the worst-input mutation approach and fuzz data-input mutation approach,were implemented.Based on the two approaches,two test cases generation algorithms which are Test Cases generation based on Farthest Neighbor (TCFN) and Fuzz Data-input Mutation Algorithm (FDMA) were also implemented.Then,the test cases generated by the algorithms were executed in the SOAP requesting message.The vulnerability of the Web services can be detected by the response message of the client.%研制自动化的Web服务脆弱性测试工具对基于Web服务的软件工程有重大影响,并能提高软件的安全性和可靠性,是当前软件行业一个有意义的研究课题.针对广泛使用的Web服务,设计和实现了一个测试Web服务脆弱性的原型系统WSVTS (Web Service Vulnerability Testing System).根据SOAP消息参数的个数和类型,实现了两种基于SOAP消息变异的Web服务脆弱性测试方法,分别是最坏差异输入变异方法(The Worst-input MutationApproach)和杂乱数据变异方法(Fuzz Data-input Mutation Approach).测试系统融合这两种测试方法,实现了两种测试用例生成算法,分别是最远邻测试用例生成算法TCFN(Test Cases generation based on Farthest Neighbor)和杂乱数据输入变异算法FDMA(Fuzz Data-input Mutation Algorithm),然后,将算法产生的测试用例作用于SOAP请求消息,从客户端观察应答消息,来分析Web服务的脆弱性.

  2. Perceived Vulnerability to Disease Predicts Environmental Attitudes

    Science.gov (United States)

    Prokop, Pavol; Kubiatko, Milan

    2014-01-01

    Investigating predictors of environmental attitudes may bring valuable benefits in terms of improving public awareness about biodiversity degradation and increased pro-environmental behaviour. Here we used an evolutionary approach to study environmental attitudes based on disease-threat model. We hypothesized that people vulnerable to diseases may…

  3. Vulnerability of Frame Structures Based on Energy Flow Network%基于能量流动网络的杆系结构易损性

    Institute of Scientific and Technical Information of China (English)

    崔洋; 张雷明

    2012-01-01

    Based on the network of energy flow in frame structures, three matrixes of energy change are constructed due to reduction of member stiffness: matrix of change of energy flow, matrix of change of stored energy and matrix of change of structural energy. By calculating the matrix of change of structural energy, the effects both on the structure when a member is damaged and on the member itself when other portion of the structure is damaged, are considered. Then the index of member importance is determined. By analogy to the chain law in calculus, the index of vulnerability of a structure is defined on the importance indexes of a series of the most important members. As demonstration, a continuous beam, a parallel structure, a frame and a three-hinged frame are analyzed. The results which show that the presented method is reasonable and can be used in other fields in structural engineering such as health monitoring.%本文从杆系结构的能量流动网络入手,通过折减杆件刚度模拟结构构件受到的损伤,建立了描述结构能量流动网络变化的两个矩阵——结构的流动能量变化矩阵、留驻能量变化矩阵,并由此构造出衡量二者综合变化的结构能量综合变化矩阵.该矩阵同时考虑了杆件受到损伤后对结构其他部分的影响以及结构的其他部分受到损伤后此杆件自身受到的影响,通过对其进行范数计算确定杆件的重要性排序.类比链式法则,由确定的最重要杆件序列的重要性系数确定结构的易损性指标.算例中对连续梁、并联结构、一榀框架和三铰刚架进行了分析,结果表明,本文计算方法的合理性以及应用于结构健康监测等领域的可行性.

  4. Regional tsunami vulnerability analysis through ASTER imagery

    Science.gov (United States)

    Dall'Osso, Filippo; Cavalletti, Alessandra; Immordino, Francesco; Gonella, Marco

    2010-05-01

    Analysis of vulnerability to natural hazards is a key issue of prevention measures within ICZM. Knowledge of susceptibility to damage and how this is distributed along the coast allows to optimize possible prevention and mitigation actions. The present study focuses on tsunami vulnerability of a large extension of coastline: the entire westerly Thailand's coast. The work is a follow up of the CRATER project (Coastal Risk Analysis for Tsunamis and Environmental Remediation) carried out on the aftermath of the 26th December 2004 Tsunami event. Vulnerability is analyzed considering an inundation scenario given by a tsunami of seismic origin, causing a maximum run-up of 25m.. An innovative methodology have been here developed and applied, based on the combined use of ASTER (Advanced Spaceborn Thermal Emission and Reflection Radiometer) satellite imagery, SRTM v-3 (Shuttle Radar Topography Mission - version #3) DEMs and GIS. Vulnerability level has been calculated combining information on coastal geomorphology, land use, topography and distance from the shoreline. Land use has been extrapolated from ASTER images through a multi-spectral analysis (a pixel-based and supervised classification process) of ASTER bands 1 to 9, plus one band for the NDVI index (Normalized Difference Vegetation Index). Coastal geomorphology has been obtained through a photo-interpretation process. Results have been organized in a set of vectorial vulnerability maps with horizontal resolution of 90m. The proposed methodology has the great advantage of being repeatable for any case of vulnerability analysis at small-medium scale (i.e. at Regional/National level) with a moderate investment in term of costs and human resources.

  5. Open Source Vulnerability Database Project

    Directory of Open Access Journals (Sweden)

    Jake Kouns

    2008-06-01

    Full Text Available This article introduces the Open Source Vulnerability Database (OSVDB project which manages a global collection of computer security vulnerabilities, available for free use by the information security community. This collection contains information on known security weaknesses in operating systems, software products, protocols, hardware devices, and other infrastructure elements of information technology. The OSVDB project is intended to be the centralized global open source vulnerability collection on the Internet.

  6. Vulnerability Measurement of Chinese Marine Economic System Based on Set Pair Analysis%基于集对分析的中国海洋经济系统脆弱性研究

    Institute of Scientific and Technical Information of China (English)

    李博; 杨智; 苏飞; 孙才志; 许妍; 郭建科; 王泽宇

    2016-01-01

    从海洋经济脆弱性内涵出发,构建敏感性和应对性指标,运用主、客观相结合的组合赋权法确定指标权重,并结合集对分析法,分析1996~2012年中国海洋经济系统脆弱性的演变趋势及影响因素。结果表明:①中国海洋经济系统对不利扰动的敏感性呈下降趋势,对内、外冲击的应对能力表现出增强趋势,脆弱性不断下降;②运用回归分析法分析海洋经济系统敏感性、应对能力与脆弱性之间的关系,得出应对性的强弱对脆弱性的影响居于主导地位;③提出相应的降低海洋经济脆弱性的对策,包括充分合理利用海洋资源,改变经济增长方式;加强陆海统筹,优化产业结构;推进科学技术创新和人才培养;加强海洋环境保护和污染治理等。%Vulnerability assessment is an important method to reveal the economic development "bottleneck"factors, and has great significance to analyze the major restricted factors to achieve economic development. Based on a detailed description about the vulnerability of marine economic system (MESV), the article estab-lishes a vulnerability assessment model of marine economic system in China from the aspects of sensitivity and response capacity. Then it combines the methods of set pair analysis and vulnerability assessment, and us-es combination weight method to evaluate the indicators and to calculate their weights, then analyzes the evolu-tion trends and major influencing factors of vulnerability in marine economic system from 1996 to 2012. At last, it puts forward corresponding development countermeasures. The results indicate that the vulnerability in marine economic system of China during the past 17 years, shows a declining trend, and the sensitivity to ad-verse disturbance takes on a declining trend and response capacity sometimes presents a wandering period, sometimes in a growth phase for internal and external shocks. The MESV has two

  7. 基于代理模式的 SQL 注入漏洞检测技术研究%Research on SQL Injection Vulnerabilities Detection Technology Based on Proxy Mode

    Institute of Scientific and Technical Information of China (English)

    韦存堂; 赵晶玲; 崔宝江

    2014-01-01

    SQL injection vulnerability is one of the most common vulnerabilities in the Web site; also it's one of the most destructive loopholes during business operations. SQL injection vulnerability detection mode can be divided into manual and automated analysis. Although there are many automated tools that can help us quickly detect SQL injection vulnerability, but the capacity of the tools is very limited. For now, the biggest problem is how to ensure the comprehensive of the test data. Restricted to the crawler technology, the probability of false positives and false negatives of the automated tools is relatively large. Although the manual analysis way can ensure the accuracy of the vulnerability detection, but the testing process consumes a lot of time and low efficiency. In such cases, based on a proxy mode, this paper presents a SQL injection vulnerability detection way which can take full advantages of the existing vulnerability detection tools and achieve high efficiency and accuracy of SQL injection vulnerability detection. On the other hand, we also used this method to detect and analyze the XSS vulnerability in Web applications and have achieved very good results.%SQL 注入(SQL injection)漏洞是网站中普遍存在的漏洞之一,同时也是影响企业运营且最具破坏性的漏洞之一。SQL 注入漏洞的检测模式可分为手工分析和自动化工具扫描分析两种方式。虽然有很多自动化工具可以帮助我们快速检测 SQL 注入漏洞,但工具检测能力十分有限,就目前而言,扫描工具的最大瓶颈在于如何确保爬虫所得待测数据的全面性。由于爬虫技术的限制,大部分扫描工具的误报和漏报概率都比较大。人工分析虽然可以保证漏洞检测的准确度,但检测过程需要消耗大量时间且效率比较低下。针对此种情况,文章提出一种基于代理模式的 SQL 注入漏洞检测方法,该方法在兼顾准确率和效率的基础之上

  8. Social vulnerability assessment: a growing practice in Europe?

    Science.gov (United States)

    Tapsell, S.; McC arthy, S.

    2012-04-01

    This paper builds upon work on social vulnerability from the CapHaz-Net consortium, an ongoing research project funded by the European Commission in its 7th Framework Programme. The project focuses on the social dimensions of natural hazards, as well as on regional practices of risk prevention and management, and aims at improving the resilience of European societies to natural hazards, paying particular attention to social capacity building. The topic of social vulnerability is one of seven themes being addressed in the project. There are various rationales for examining the relevance of social vulnerability to natural hazards. Vulnerability assessment has now been accepted as a requirement for the effective development of emergency management capability, and assessment of social vulnerability has been recognised as being integral to understanding the risk to natural hazards. The aim of our research was to examine social vulnerability, how it might be understood in the context of natural hazards in Europe, and how social vulnerability can be addressed to increase social capacity. The work comprised a review of research on social vulnerability to different natural hazards within Europe and included concepts and definitions of social vulnerability (and related concepts), the purpose of vulnerability assessment and who decides who is vulnerable, different approaches to assessing or measuring social vulnerability (such as the use of 'classical' quantitative vulnerability indicators and qualitative community-based approaches, along with the advantages and disadvantages of both), conceptual frameworks for assessing social vulnerability and three case studies of social vulnerability studies within Europe: flash floods in the Italian Alps, fluvial flooding in Germany and heat waves in Spain. The review reveals variable application of social vulnerability analysis across Europe and there are indications why this might be the case. Reasons could range from the scale of

  9. Buffer Overflow Vulnerability Location Technology Based on Code Instrumentation%基于代码插装的缓冲区溢出漏洞定位技术

    Institute of Scientific and Technical Information of China (English)

    史胜利

    2012-01-01

    In order to find buffer overflow vulnerability point accurately and rapidly, this paper proposes a method that can find buffer overflow vulnerabilities in binary file through code instrumentation. It uses plentiful functions PIN providing to make program analysis tool and saves information needed during program execution. When detecting memory access violation exception, it distinguishes what class of memory corruption and obtains memory corruption point and seeks illegal memory writing instruction to locate vulnerability. Example analysis shows that the method does not need source program, and has higher efficiency, it can locate popular buffer overflow vulnerabilities successfully.%为准确快速地找到缓冲区溢出漏洞点,提出一种通过代码插装对二进制文件中的缓冲区溢出漏洞自动定位的方法.使用PIN提供的函数编写程序分析工具,在程序执行过程中记录所需的信息.当检测到内存访问错误异常时,判别破坏内存的情况,获取内存破坏点,查找到非法写内存的指令定位漏洞.实例分析表明,该方法不需要源程序且效率较高,能成功地定位常见的缓冲区溢出漏洞.

  10. Assessment of Intrinsic Vulnerability to Contamination for the Alluvial Aquifer in El-Fayoum Depression Using the Drastic Method

    International Nuclear Information System (INIS)

    Intrinsic vulnerability assessment to delineate areas that are more susceptible to contamination from anthropogenic sources has become an important element for sensible resource management and land use planning. The vulnerability for the alluvial aquifer in El-Fayoum depression was assessed by applying the Drastic model as well as utilizing sensitivity analyses to evaluate the reliability of this model. This method uses seven parameters including climatic, geological, and hydrogeological conditions controlling the seepage of pollutant substances to groundwater. Vulnerability maps were produced by applying the Generic and Agricultural models according to the Drastic charter. The resulting agricultural Drastic vulnerability map indicates that 23.3%, 22.7% and 12.4% of El-Fayoum depression is under low, low-moderate and moderately high vulnerability of groundwater contamination, respectively, while 41.6% of the area of study can be designated as an area of moderate vulnerability of groundwater contamination. Resulting maps revealed that the potential for polluting groundwater with agricultural chemicals is greater than with Generic Drastic index pollutants. Depth to water table parameter inflicted the largest impact on the intrinsic vulnerability of the alluvial aquifer in El-Fayoum depression. Both the map removal and single-parameter sensitivity analyses indicated that the vulnerability index is the least sensitive to the removal of the recharge and hydraulic conductivity parameters but is highly sensitive to the removal of depth to water parameter.

  11. Common Control System Vulnerability

    Energy Technology Data Exchange (ETDEWEB)

    Trent Nelson

    2005-12-01

    The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an

  12. A Branch Comprehensive Vulnerability Assessment Method Based on Improved DEAHP Model%基于改进DEAHP模型的支路综合脆弱性评估方法

    Institute of Scientific and Technical Information of China (English)

    王羽佳; 李华强; 刘沛清; 王兰

    2016-01-01

    Identification of branch vulnerability is of great significance for safe operation of power system and prevention of catastrophic failures. Most of existing branch vulnerability assessment methods fail to present a full view and weight-based comprehensive indices are too subjective. To solve these problems, this paper starts analysis from perspective of cause analysis and consequence evaluation of vulnerability, and presents evaluation indices reflecting anti-interference ability and influence of branches. Then branch comprehensive vulnerability index, considering both subjective preference and objective data, is generated with improved data envelopment analysis model with analytic hierarchy process restraint cone. Multi-layer and multi-angle branch vulnerability assessment index system is built. On this basis, a new branch comprehensive vulnerability assessment method is proposed. Simulation results show that this method is comprehensive and effective.%电力系统脆弱支路辨识,对系统安全运行、防止灾难性事故发生具有重要意义。针对现有脆弱支路评估方法存在的评估角度单一,综合指标权重选取过于主观的问题,文中综合脆弱性的原因分析与后果评估2个角度,建立反映支路抗干扰能力和影响力的指标集;基于改进的带层次分析法约束锥的数据包络分析模型进行多指标综合,得到了既考虑主观偏好又考虑客观数据的支路综合脆弱性评估指标,构建了多层次多角度的支路脆弱性评估指标体系,并基于此提出了一种新的支路综合脆弱性评估方法。仿真结果证明了该方法的全面性与有效性。

  13. Environmental Vulnerability Index for the Island of Tobago, West Indies

    OpenAIRE

    Marissa N. Gowrie

    2003-01-01

    This study investigated the environmental vulnerability index (EVI) for the island of Tobago. Based on the EVI study developed by the South Pacific Applied Geosciences Commission (SOPAC), the vulnerability index was determined for anthropogenic, meteorological, biological, and geological events and for general country characteristics. Written requests for information were made through appropriate government ministries, state agencies, private companies, and other environmental organizations, ...

  14. A Formal Classification of Internet Banking Attacks and Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Laerte Peotta

    2011-02-01

    Full Text Available A formal classification of attacks and vulnerabilities that affect current internet banking systems is presented along with two attacks which demonstrate the insecurity of such systems. Based ona thoroughanalysis of current security models, we propose a guidelines for designing secure internet banking systems which are not affected by the presented attacks and vulnerabilities.

  15. Hydrogeology of Cibola County, New Mexico

    Science.gov (United States)

    Baldwin, J.A.; Rankin, D.R.

    1995-01-01

    The hydrogeology of Cibola County, New Mexico, was evaluated to determine the occurrence, availability, and quality of ground-water resources. Rocks of Precambrian through Quaternary age are present in Cibola County. Most rocks are sedimentary in origin except for Precambrian igneous and metamorphic rocks exposed in the Zuni Uplift and Tertiary and Quaternary basalts in northern and central parts of the county. The most productive aquifers in the county include (youngest to oldest) Quaternary deposits, sandstones in the Mesaverde Group, the Dakota-Zuni-Bluff aquifer, the Westwater Canyon aquifer, the Todilto- Entrada aquifer, sandstone beds in the Chinle Formation, and the San Andres-Glorieta aquifer. Unconsolidated sand, silt, and gravel form a mantle ranging from a few inches to 150 to 200 feet over much of the bedrock in Cibola County. Well yields range from 5 to 1,110 gallons per minute. Dissolved-solids concentrations of ground water range from 200 to more than 5,200 milligrams per liter. Calcium, magnesium, bicarbonate, and sulfate are the predominant ions in ground water in alluvial material. The Mesaverde Group mainly occurs in three areas of the county. Well yields range from less than 1 to 12 gallons per minute. The predominant ions in water from wells in the Mesaverde Group are calcium, sodium, and bicarbonate. The transition from calcium-predominant to sodium-predominant water in the southwestern part of the county likely is a result of ion exchange. Wells completed in the Dakota-Zuni-Bluff aquifer yield from 1 to 30 gallons per minute. Dissolved-solids concentrations range from 220 to 2,000 milligrams per liter in water from 34 wells in the western part of the county. Predominant ions in the ground water include calcium, sodium, sulfate, and bicarbonate. Calcium predominates in areas where the aquifer is exposed at the surface or is overlain with alluvium. Sandstones in the Chinle Formation yield from 10 to 300 gallons per minute to wells in the Grants

  16. Natural and Artificial (fluorescent) Tracers to Characterise Hydrogeological Functioning and to Protect Karst Aquifers

    Science.gov (United States)

    Andreo, B.; Mudarra, M.; Marin, A. I.; Barberá, J. A.

    2012-12-01

    The hydrogeological functioning and response of karst aquifers can be determined by the joint use of natural hydrogeochemical tracers, especially total organic carbon (TOC) and intrinsic fluorescence of water, together with artificial (fluorescent) tracers, under the same hydrodynamic conditions. Sharp and rapid variations in discharge, temperature, electrical conductivity and water chemistry, particularly of natural tracers of infiltration (TOC, intrinsic fluorescence and NO3-) recorded in karst spring water, confirm the existence of well developed karst conduits in the sector of the aquifer being drained, with rapid flows and very short water transit times from the surface to the springs (Mudarra et al., 2011). This is in agreement with the evidence obtained from breakthrough curves of fluorescent dye tracers (uranine, eosine, etc.). However, time lags between maximum concentrations of natural (especially TOC and intrinsic fluorescence) and artificial tracers show that the global system response is faster than that produced from a recharge concentrated at a point on the surface, even in karst sinkholes. Response and transit times of water through the karst can be calculated using both natural and artificial tracers, but flow velocities can really only be quantified using artificial tracers. Analysis of the responses obtained by natural tracers of infiltration (global system response) and artificial tracers (single response) in karst waters has revealed the usefulness and complementarity of both techniques for characterising the hydrogeological functioning of karst aquifers and, even more important, for validating contamination vulnerability mapping in these medium (Zwahlen, 2004; Andreo et al., 2006). In recent decades, several methods have been developed for such vulnerability mapping, but little progress has been made in validating their results. This validation is essential for the adequate protection of water resources in karst media, as has been shown in

  17. Hydrogeology of the Azores volcanic archipelago (Portugal)

    Science.gov (United States)

    Cruz, J.; Coutinho, R.; Antunes, P.; Freire, P.

    2009-04-01

    the volcanic edifices slopes. The basal aquifer system is in the coastal area, presenting generally a very low hydraulic gradient. Hydrogeological surveys that have been made in the Azores archipelago points out to more than 1000 springs and wells spread all over the archipelago (950 springs and 83 drilled wells). Spring distribution is heterogeneous, with densities varying between 0.01 springs/km2 at Pico island and 0.72 springs/km2 estimated at Santa Maria. Specific capacity ranges from 1.4x10-2 to 266.7 L/sm, with a median value of 32.3 L/sm. Transmissivity also present a large range, with values ranging between 1.65x10-5 and 4.03x10-1 m2/s, and a median of 3.66x10-2 m2/s. The heterogeneous distribution shown by these values expresses the influence of the hydrogeological characteristics of volcanic terrain, resulting from syngenetic characteristics and secondary processes, like weathering. The highest values are observed in wells drilled in recent basaltic lava flows, which generally are thin and fractured, with frequent clincker levels interbedded, and the lowest data was estimated in the older volcanic formations of Santa Maria island. Groundwater on perched-water bodies, excluding the numerous mineral waters that are spread in several islands of the archipelago, present usually a low mineralization, shown by the electrical conductivity values (36-725 S/cm; median=158.0 S/cm). The average temperature is equal to 15°C. Waters have an average temperature of 15°C and are mainly slightly acid to slightly alkaline, with a pH range from 4.7 to 8.6, but showing a median value of 7.2. The main water types are Na-Cl to Na-HCO3 waters, with numerous samples lying in the intermediate compositional fields that characterize Na-Cl-HCO3 and Na-HCO3-Cl waters. The groundwater composition in the basal aquifer system is usually from the Na-Cl type and presents a higher mineralization, resulting in a median value for electrical conductivity equal to 1044 S/cm, expressing the

  18. What maintains the waters flowing in our rivers? - Rethinking hydrogeology to improve public policy

    Science.gov (United States)

    Vasconcelos, Vitor Vieira

    2016-01-01

    This article discusses how new contributions from hydrogeological science in the 20th and 21st centuries have allowed for a better understanding of the processes that affect the maintenance of river flows. Moreover, the way in which this knowledge has been conveyed beyond academia and has been gradually incorporated into public policy for natural resource management is also discussed. This article explains the development of several approaches used to understand the relationships among the management of aquifers, vegetation and river flows, including water balance, aquifer recharge, the piston effect, seasonal effects, and safe and sustainable yields. Additionally, the current challenges regarding the modeling of hydrological processes that integrate groundwater and surface waters are discussed. Examples of studies applied in Brazil that demonstrate these processes and stimulate thought regarding water management strategies are presented. In light of the case studies, it is possible to propose different strategies, each adapted for specific hydrogeological context to maximize aquifer recharge or base flow maintenance. Based on these strategies, the role of infiltration ponds and other artificial recharge techniques is re-evaluated in the context of the mitigation of environmental impacts on the maintenance of river flows. Proposals for the improvement of public policies regarding the payment of related environmental services to stimulate investment in aquifer recharge and the maintenance of base flow, for which the goal is to attain win-win-win situations for the environment, farmers and water users, while preventing land speculation, are discussed. Lastly, a conceptual model for the dissemination of hydrogeological knowledge in public policies is provided, and its challenges and possibilities are discussed.

  19. Mapping Regional Drought Vulnerability: a Case Study

    Science.gov (United States)

    Karamouz, M.; Zeynolabedin, A.; Olyaei, M. A.

    2015-12-01

    are ranked in 5 intervals and for each parameter vulnerability maps are prepared in GIS environment. Selection of theses parameters are based on factors such as regional features and availability of data. Considering the fact that the aforementioned parameters have different level of importance in vulnerability maps, different weights are assigned to the parameters considering how critical each parameter is in the overall drought analysis. Expert's opinion is selected in assigning weights. A multi-criteria decision making (MCDM) framework is used to check the consistency of the provided information. Then the weighted maps are overlaid to find the overall vulnerability map. The map shows very low, low, medium, intense and very intense regional vulnerabilities. According to the results, the west part of East Azarbaijan province is the most vulnerable region to drought which is expected due to the vicinity of this part to Urumia Lake that has been lost most of its water during the last decades. The least vulnerable part seems to be the Eastern part of the province with longer lasting resources. Taking into consideration that Caspian Sea is near this part with high precipitation record, the outcome of this study is in line with the general expectations. The result of this study can be used for preparedness planning and for allocating resources for facing droughts in this region.

  20. Radon in ground water - Hydrogeologic impact and indoor air contamination

    International Nuclear Information System (INIS)

    This book focuses on: geologic and hydrogeologic controls that influence radon occurrence; monitoring radon, radium and other radioactivity from geologic sources; mining impacts on occurrence of radon, radium, and other radioactivity in ground water; sampling and analysis; radon and radium in water supply wells; predictive models for occurrence of radon and other radioactivity; and remedial action

  1. Supply Chain Vulnerability in the automotive industry

    OpenAIRE

    Xanthopoulos, Panagiotis; Pejicic, Jerko

    2015-01-01

    Purpose: The purpose of this research study is the empirical analysis of theelements affecting supply chain vulnerability with a focus on theautomotive industry. Methodology: This research is based on a deductive approach. In order to fulfilthe purpose of the study, the authors stated three hypotheseswhich were tested with help of quantitative data. Moreover, thesurvey strategy was used while using questioning in order to gatherinformation from subjects. With the help of a web-based questionn...

  2. An Integrated Approach for Urban Earthquake Vulnerability Analyses

    Science.gov (United States)

    Düzgün, H. S.; Yücemen, M. S.; Kalaycioglu, H. S.

    2009-04-01

    -economical, structural, coastal, ground condition, organizational vulnerabilities, as well as accessibility to critical services within the framework. The proposed framework has the following eight components: Seismic hazard analysis, soil response analysis, tsunami inundation analysis, structural vulnerability analysis, socio-economic vulnerability analysis, accessibility to critical services, GIS-based integrated vulnerability assessment, and visualization of vulnerabilities in 3D virtual city model The integrated model for various vulnerabilities obtained for the urban area is developed in GIS environment by using individual vulnerability assessments for considered elements at risk and serve for establishing the backbone of the spatial decision support system. The stages followed in the model are: Determination of a common mapping unit for each aspect of urban earthquake vulnerability, formation of a geo-database for the vulnerabilities, evaluation of urban vulnerability based on multi attribute utility theory with various weighting algorithms, mapping of the evaluated integrated earthquake risk in geographic information systems (GIS) in the neighborhood scale. The framework is also applicable to larger geographical mapping scales, for example, the building scale. When illustrating the results in building scale, 3-D visualizations with remote sensing data is used so that decision-makers can easily interpret the outputs. The proposed vulnerability assessment framework is flexible and can easily be applied to urban environments at various geographical scales with different mapping units. The obtained total vulnerability maps for the urban area provide a baseline for the development of risk reduction strategies for the decision makers. Moreover, as several aspects of elements at risk for an urban area is considered through vulnerability analyses, effect on changes in vulnerability conditions on the total can easily be determined. The developed approach also enables decision makers to

  3. Mapping the groundwater vulnerability for pollution at the pan African scale.

    Science.gov (United States)

    Ouedraogo, Issoufou; Defourny, Pierre; Vanclooster, Marnik

    2016-02-15

    We estimated vulnerability and pollution risk of groundwater at the pan-African scale. We therefore compiled the most recent continental scale information on soil, land use, geology, hydrogeology and climate in a Geographical Information System (GIS) at a resolution of 15 km × 15 km and at the scale of 1:60,000,000. The groundwater vulnerability map was constructed by means of the DRASTIC method. The map reveals that groundwater is highly vulnerable in Central and West Africa, where the watertable is very low. In addition, very low vulnerability is found in the large sedimentary basins of the African deserts where groundwater is situated in very deep aquifers. The groundwater pollution risk map is obtained by overlaying the DRASTIC vulnerability map with land use. The northern, central and western part of the African continent is dominated by high pollution risk classes and this is very strongly related to shallow groundwater systems and the development of agricultural activities. Subsequently, we performed a sensitivity analysis to evaluate the relative importance of each parameter on groundwater vulnerability and pollution risk. The sensitivity analysis indicated that the removal of the impact of vadose zone, the depth of the groundwater, the hydraulic conductivity and the net recharge causes a large variation in the mapped vulnerability and pollution risk. The mapping model was validated using nitrate concentration data of groundwater as a proxy of pollution risk. Pan-African concentration data were inferred from a meta-analysis of literature data. Results shows a good match between nitrate concentration and the groundwater pollution risk classes. The pan African assessment of groundwater vulnerability and pollution risk is expected to be of particular value for water policy and for designing groundwater resources management programs. We expect, however, that this assessment can be strongly improved when better pan African monitoring data related to groundwater

  4. Mapping the groundwater vulnerability for pollution at the pan African scale.

    Science.gov (United States)

    Ouedraogo, Issoufou; Defourny, Pierre; Vanclooster, Marnik

    2016-02-15

    We estimated vulnerability and pollution risk of groundwater at the pan-African scale. We therefore compiled the most recent continental scale information on soil, land use, geology, hydrogeology and climate in a Geographical Information System (GIS) at a resolution of 15 km × 15 km and at the scale of 1:60,000,000. The groundwater vulnerability map was constructed by means of the DRASTIC method. The map reveals that groundwater is highly vulnerable in Central and West Africa, where the watertable is very low. In addition, very low vulnerability is found in the large sedimentary basins of the African deserts where groundwater is situated in very deep aquifers. The groundwater pollution risk map is obtained by overlaying the DRASTIC vulnerability map with land use. The northern, central and western part of the African continent is dominated by high pollution risk classes and this is very strongly related to shallow groundwater systems and the development of agricultural activities. Subsequently, we performed a sensitivity analysis to evaluate the relative importance of each parameter on groundwater vulnerability and pollution risk. The sensitivity analysis indicated that the removal of the impact of vadose zone, the depth of the groundwater, the hydraulic conductivity and the net recharge causes a large variation in the mapped vulnerability and pollution risk. The mapping model was validated using nitrate concentration data of groundwater as a proxy of pollution risk. Pan-African concentration data were inferred from a meta-analysis of literature data. Results shows a good match between nitrate concentration and the groundwater pollution risk classes. The pan African assessment of groundwater vulnerability and pollution risk is expected to be of particular value for water policy and for designing groundwater resources management programs. We expect, however, that this assessment can be strongly improved when better pan African monitoring data related to groundwater

  5. Methodological fundamentals for hydrogeological interpretation of geophysical data in regional studies

    Energy Technology Data Exchange (ETDEWEB)

    Mel' kanovitskiy, I.M.

    1984-01-01

    Hydrogeological interpretation requires studies on the relationships between geophysical, hydrogeological and other characteristics of the environment. As a result a successful study is made of the geometry of the hydrogeological structures and the main profile parameters are revealed. A close relationship was established between the geophysical and hydrogeological characteristics. Prolonged geological development of the Earth's crust determined the general laws and at the same time the specificity of forming these relationships within definite hydrogeological objects. It is expedient to use regional geophysical data to isolate different types of physical-geological models on three levels of generalization of the natural situation: underground hydrosphere as a whole; main types of hydrogeological structures (basins) located in the upper part of the hydrosphere; aquiferous, water-resistant and other levels that form the hydrologically stratified profile of these structures. These physical-geological models are described and the possibilities of geophysical methods with regional hydrogeological studies are demonstrated.

  6. Geophysical characterization of Hydrogeological processes at the catchment scale

    Science.gov (United States)

    Flores Orozco, Adrian; Gallistl, Jakob; Schlögel, Ingrid; Chwatal, Werner; Oismüller, Markus; Blöschl, Günter

    2016-04-01

    The characterization of hydrogeological properties in the subsurface with high resolution across space and time scales is critical to improve our understanding of water flow and transport processes. However, to date, hydrogeological investigations are mainly performed through well-tests or the analysis of samples, thus, limiting the spatial resolution of the investigation. To properly capture heterogeneities in the subsurface controlling surface-groundwater interactions, modern hydrogeological studies require the development of innovative investigation techniques that permit to gain continuous information about subsurface state with high spatial and temporal resolution at different scales: from the pore-space all the way to the catchment. To achieve this, we propose the conduction of geophysical surveys, in particular field-scale Spectral Induced Polarization (SIP) imaging measurements. SIP images provide information about the complex electrical conductivity (CEC), which is controlled by important hydrogeological parameters, such as porosity, water content and the chemical properties of the pore-water. Here, we present imaging results collected at the catchment scale (approximately 66 ha), which permitted to gain detailed information about the spatial variability of hydrogeological parameters at different scales. The heterogeneities observed in the geophysical images revealed consistency with independent information collected at the study area. In addition to this, and taking into account that different geophysical methods yield information about different properties and at diverse scales, interpretation of the SIP images was improved by incorporation of complementary measurements, such as: ElectroMagnetic Induction (EMI), Ground Penetrating Radar (GPR), Multichannel Analysis of Surface-Waves (MASW) and Seismic Refraction-Reflection (SRR).

  7. 基于Windows的结构化异常处理漏洞利用技术%Vulnerability Exploitation Technology of Structured Exception Handling Based on Windows

    Institute of Scientific and Technical Information of China (English)

    吴伟民; 郭朝伟; 黄志伟; 苏庆; 陈秋伟

    2012-01-01

    论述基于Windows的结构化异常处理(SEH)及相关保护机制,从攻击者的角度总结SEH漏洞利用技术.利用堆地址或保护模块之外的地址覆盖SEH句柄指针,绕过SafeSEH机制,伪造SEH链,绕过SEHOP机制,并分析使程序执行流程定位到Shellcode的方法.实例验证了SEH漏洞利用技术的有效性.%This paper discusses the Structured Exception Handling(SEH) and related protection mechanism, from the perspective of attackers, summarizes the technology of SEH vulnerability exploitation. It uses heap addresses or addresses outside of protection modules to overwrite the pointer of SEH handles to bypass SafeSEH, and fakes SEH chain to bypass SEHOP. It analyzes some major methods of making program execution flow locate the Shellcode. Example verifies the effectiveness of the SHE vulnerability exploitation technology.

  8. Mapping global vulnerability index in mining sectors: A case study Moulares-Redayef aquifer system, southwestern Tunisia

    Science.gov (United States)

    Khelif, Nadia; Jmal, Ikram; Bouri, Salem

    2016-09-01

    Contrary to the DRASTIC model grouping together the saturated and unsaturated zones to compute a global intrinsic vulnerability index, the global vulnerability index method incorporates both hydrogeological and hydrochemical data for a comprehensive index mapping for the saturated zones. This concept depends on the behavior and the uses of the groundwater. The main aim of this study is to propose a scientific basis for sustainable land use planning and groundwater management of the Moulares-Reayef aquifer, located in Southwestern Tunisia. The overexploitation of this aquifer causes the threat of groundwater quality by various sources of pollution. The global vulnerability index was applied in the Moulares-Reayef aquifer. The results show that the most favorable zones to pollutant percolation are situated along the wadis (Tabaddit, Zallaz, Berka, …) which are drained by continuous discharges. The global vulnerability values were correlated with nitrates values for validation. It revealed a significant correlation showing that high values of nitrates occurred in highly vulnerable zones with a value of 0.69 for the Pearson coefficient. The global vulnerability evaluation shows that the aquifer is characterized by high vertical vulnerability and high susceptibility.

  9. [Assessment of eco-environmental vulnerability of Hainan Island, China].

    Science.gov (United States)

    Huang, Bao-rong; Ouyang, Zhi-yun; Zhang, Hui-zhi; Zhang, Li-hua; Zheng, Hua

    2009-03-01

    Based on the assessment method of environmental vulnerability constructed by SOPAC and UNEP, this paper constructed an indicator system from three sub-themes including hazard, resistance, and damage to assess the eco-environmental vulnerability of Hainan Island. The results showed that Hainan Island was suffering a middling level eco-environmental hazard, and the main hazards came from some intensive human activities such as intensive agriculture, mass tourism, mining, and a mass of solid wastes thrown by islanders and tourists. Some geographical characters such as larger land area, larger altitude range, integrated geographical form, and abundant habitat types endowed Hainan Island higher resistance to environmental hazards. However, disturbed by historical accumulative artificial and natural hazards, the Island ecosystem had showed serious ecological damage, such as soil degradation and biodiversity loss. Comprehensively considered hazard, resistance, damage, and degradation, the comprehensive environmental vulnerability of the Island was at a middling level. Some indicators showed lower vulnerability, but some showed higher vulnerability.

  10. Targeting the vulnerable in emergency situations: who is vulnerable?

    OpenAIRE

    Davis, A

    1996-01-01

    BACKGROUND: Emergencies such as wars and natural disasters increase the vulnerability of affected populations and expose these populations to risks such as disease, violence, and hunger. Emergency public health interventions aim to mitigate these effects by providing basic minimum requirements, reducing vulnerability, and reducing exposure to risk. Targeted services are generally aimed at children under 5. Mortality rates among young children are higher than the crude mortality rate (CMR) amo...

  11. Safeguard Vulnerability Analysis Program (SVAP)

    International Nuclear Information System (INIS)

    This report gives an overview of the Safeguard Vulnerability Analysis Program (SVAP) developed at Lawrence Livermore National Laboratory. SVAP was designed as an automated method of analyzing the safeguard systems at nuclear facilities for vulnerabilities relating to the theft or diversion of nuclear materials. SVAP addresses one class of safeguard threat: theft or diversion of nuclear materials by nonviolent insiders, acting individually or in collusion. SVAP is a user-oriented tool which uses an interactive input medium for preprocessing the large amounts of safeguards data. Its output includes concise summary data as well as detailed vulnerability information

  12. Flow and transport in unsaturated fractured rock: Effects of multiscale heterogeneity of hydrogeologic properties

    Energy Technology Data Exchange (ETDEWEB)

    Zhou, Quanlin; Liu, Hui-Hai; Bodvarsson, Gudmundur S.; Oldenburg, Curtis M.

    2002-07-09

    The heterogeneity of hydrogeologic properties at different scales may have different effects on flow and transport processes in a subsurface system. A model for the unsaturated zone of Yucca Mountain, Nevada, is developed to represent complex heterogeneity at two different scales: (1) layer scale corresponding to geologic layering and (2) local scale. The layer-scale hydrogeologic properties are obtained using inverse modeling, based on the available measurements collected from the Yucca Mountain site. Calibration results show a significant lateral and vertical variability in matrix and fracture properties. Hydrogeologic property distributions in a two-dimensional, vertical cross section of the site are generated by combining the average layer-scale matrix and fracture properties with local-scale perturbations generated using a stochastic simulation method. The unsaturated water flow and conservative (nonsorbing) tracer transport through the cross section are simulated for different sets of matrix and fracture property fields. Comparison of simulation results indicates that the local-scale heterogeneity of matrix and fracture properties has a considerable effect on unsaturated flow processes, leading to fast flow paths in fractures and the matrix. These paths shorten the travel time of a conservative tracer from the source (repository) horizon in the unsaturated zone to the water table for small fractions of total released tracer mass. As a result, the local-scale heterogeneity also has a noticeable effect on global tracer transport processes, characterized by an average breakthrough curve at the water table, especially at the early arrival time of tracer mass. However, the effect is not significant at the later time after 20 percent tracer mass reaches the water table. The simulation results also verify that matrix diffusion plays an important role in overall solute transport processes in the unsaturated zone at Yucca Mountain.

  13. Vulnerability to Poverty in select Central Asian Countries

    Directory of Open Access Journals (Sweden)

    Raghbendra Jha

    2009-06-01

    Full Text Available In the extant literature either income or consumption expenditures as measured over short periods of time have been regarded as a proxy for the material well-being of households. However, economists have long recognized that a household's sense of well-being depends not just on its average income or expenditures, but also on the risks it faces and its ability to deal with these risks. Hence vulnerability is a more satisfactory measure of welfare. In this study we used the concept of vulnerability as expected poverty to assess the household vulnerability to poverty in four Central Asian countries: Azerbaijan, Kazakhstan, Kyrgyzstan, and Tajikistan. Except for Tajikistan, headcount poverty and vulnerability rates are significantly different. We also find that vulnerability differs significantly across households by location and selected household characteristics. In this paper we use a simple empirical measurement that allows estimating the headcount vulnerability to poverty using cross-section data. This measurement is based on the strong assumption that households have the same conditional distribution of consumption in a stationary environment. While this approach cannot capture all dimensions of vulnerability, it at least begins to raise the policy issue that vulnerability should be considered alongside poverty.

  14. A quantitative vulnerability function for fluvial sediment transport

    Science.gov (United States)

    Totschnig, Reinhold; Sedlacek, Walter; Fuchs, Sven

    2010-05-01

    In quantitative risk assessment, risk is expressed as a function of hazard, elements at risk exposed, and the vulnerability. From a natural sciences perspective, vulnerability is defined as the expected degree of loss for an element at risk as a consequence of a certain event. The resulting value is dependent on the impacting process intensity and the susceptibility of the elements at risk, and ranges from 0 (no damage) to 1 (complete destruction). With respect to torrent processes, i.e. fluvial sediment transport, the concept of vulnerability - though widely acknowledged - did not result in any sound quantitative relationship between process intensities and vulnerability values so far, even if considerable loss occurred during recent years. To close this gap and establish this relationship, data from three well-documented torrent events in the Austrian Alps was used to derive a quantitative vulnerability function applicable to residential buildings located on torrent fans. The method applied followed a spatial approach, and was based on process intensities, the spatial characteristics of elements at risk, and average reconstruction values on a local scale. The results suggest a modified Weibull function to fit best to the observed damage pattern if vulnerability is quantified in absolute values, and a modified Frechet function if vulnerability is quantified relatively in relation to the individual building height. The vulnerability relationship obtained is applicable to a mixed type of construction used in European mountain regions, composed from brick masonry and concrete, a typical design in post-1950s building craft in alpine countries.

  15. Use of a ground-water flow model with particle tracking to evaluate ground-water vulnerability, Clark County, Washington

    Science.gov (United States)

    Snyder, D.T.; Wilkinson, J.M.; Orzol, L.L.

    1996-01-01

    A ground-water flow model was used in conjunction with particle tracking to evaluate ground-water vulnerability in Clark County, Washington. Using the particle-tracking program, particles were placed in every cell of the flow model (about 60,000 particles) and tracked backwards in time and space upgradient along flow paths to their recharge points. A new computer program was developed that interfaces the results from a particle-tracking program with a geographic information system (GIS). The GIS was used to display and analyze the particle-tracking results. Ground-water vulnerability was evaluated by selecting parts of the ground-water flow system and combining the results with ancillary information stored in the GIS to determine recharge areas, characteristics of recharge areas, downgradient impact of land use at recharge areas, and age of ground water. Maps of the recharge areas for each hydrogeologic unit illustrate the presence of local, intermediate, or regional ground-water flow systems and emphasize the three-dimensional nature of the ground-water flow system in Clark County. Maps of the recharge points for each hydrogeologic unit were overlaid with maps depicting aquifer sensitivity as determined by DRASTIC (a measure of the pollution potential of ground water, based on the intrinsic characteristics of the near-surface unsaturated and saturated zones) and recharge from on-site waste-disposal systems. A large number of recharge areas were identified, particularly in southern Clark County, that have a high aquifer sensitivity, coincide with areas of recharge from on-site waste-disposal systems, or both. Using the GIS, the characteristics of the recharge areas were related to the downgradient parts of the ground-water system that will eventually receive flow that has recharged through these areas. The aquifer sensitivity, as indicated by DRASTIC, of the recharge areas for downgradient parts of the flow system was mapped for each hydrogeologic unit. A number of

  16. Pathways to HIV risk and vulnerability among lesbian, gay, bisexual, and transgendered methamphetamine users: a multi-cohort gender-based analysis

    Directory of Open Access Journals (Sweden)

    Patterson Thomas L

    2011-01-01

    Full Text Available Abstract Background Methamphetamine (MA use continues to be a major public health concern in many urban settings. We sought to assess potential relationships between MA use and individual, social, and structural HIV vulnerabilities among sexual minority (lesbian, gay, bisexual or transgendered drug users. Methods Beginning in 2005 and ending in 2008, 2109 drug users were enroled into one of three cohort studies in Vancouver, Canada. We analysed longitudinal data from all self-identified sexual minority participants (n = 248. Logistic regression using generalized estimating equations (GEE was used to examine the independent correlates of MA use over time. All analyses were stratified by biological sex at birth. Results At baseline, 104 (7.5% males and 144 (20.4% females reported sexual minority status, among whom 64 (62.1% and 58 (40.3% reported MA use in the past six months, respectively. Compared to heterosexual participants, sexual minority males (odds ratio [OR] = 3.74, p p = 0.003 were more likely to report recent MA use. In multivariate analysis, MA use among sexual minority males was associated with younger age (adjusted odds ratio [AOR] = 0.93 per year older, p = 0.011, Aboriginal ancestry (AOR = 2.59, p = 0.019, injection drug use (AOR = 3.98, p p = 0.008, unprotected intercourse (AOR = 1.62, p = 0.048, and increased depressive symptoms (AOR = 1.67, p = 0.044. Among females, MA use was associated with injection drug use (AOR = 2.49, p = 0.002, Downtown South residency (i.e., an area known for drug use (AOR = 1.60, p = 0.047, and unprotected intercourse with sex trade clients (AOR = 2.62, p = 0.027. Conclusions Methamphetamine use was more prevalent among sexual minority males and females and was associated with different sets of HIV risks and vulnerabilities. Our findings suggest that interventions addressing MA-related harms may need to be informed by more nuanced understandings of the intersection between drug use patterns, social and

  17. Poverty and Vulnerability - An Interdisciplinary Approach

    OpenAIRE

    Makoka, Donald; Kaplan, Marcus

    2005-01-01

    This paper describes the concepts of poverty and vulnerability as well as the interconnections and differences between them using an interdisciplinary approach. While poverty is a static concept, vulnerability has a forward-looking dimension. We, therefore, review the methodologies that different disciplines use to measure poverty and vulnerability. In particular, the differences between vulnerability to natural disasters, vulnerability to climate change, as well as vulnerability to poverty a...

  18. North-West Iowa Groundwater Vulnerability Regions

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — The regions on this map represent areas with similar hydro-geologic characteristics thought to represent similar potentials for contamination of groundwater and/or...

  19. North-East Iowa Groundwater Vulnerability Regions

    Data.gov (United States)

    Iowa State University GIS Support and Research Facility — The regions on this map represent areas with similar hydro-geologic characteristics thought to represent similar potentials for contamination of groundwater and/or...

  20. Power system vulnerability assessment based on transient energy hybrid method%基于暂态能量函数混合法的电力系统脆弱性分析

    Institute of Scientific and Technical Information of China (English)

    李迁; 李华强; 黄昭蒙; 李艳卿

    2013-01-01

    电力系统在遭受大干扰后失稳的后果非常严重,甚至是灾难性的,从暂态稳定方面分析系统的脆弱性具有重大的研究价值。采用暂态能量函数,结合暂态稳定分析中数值仿真法和直接法两种基本方法,同时考虑预想事故概率,从暂态稳定安全角度快速、定量评估电力系统的脆弱性。基于事故概率与暂态能量裕度构建相关脆弱度指标,并根据临界机群状态以修正暂态动能,改进不同事故下系统脆弱性的评估精度,同时确定系统的薄弱环节。通过对IEEE 5机14节点系统的仿真,验证了该方法的合理性与有效性。%losing stabilityThe consequences of power system by being subjected to large disturbance are very serious and even disastrous, so analyzing vulnerability of power system from the viewpoint of transient stability is extraordinarily valuable. This paper evaluates the vulnerability of power system from the viewpoint of transient stability safety quickly and quantitatively based on the transient energy function, combining the time simulation method and the direct method which are the two main methods of transient stability analysis, and at the same time considering the occurrence probability of contingency. It constructs correlative vulnerability index based on the probability of contingencies and transient energy margin, and revises transient kinetic energy based on the condition of critical cluster for improving the evaluation precision of vulnerability of power system under different contingencies and confirming the weak links of power system. Simulations of this method in IEEE 14-bus system demonstrate its rationality and effectiveness.

  1. Combined Estimation of Hydrogeologic Conceptual Model and Parameter Uncertainty

    Energy Technology Data Exchange (ETDEWEB)

    Meyer, Philip D.; Ye, Ming; Neuman, Shlomo P.; Cantrell, Kirk J.

    2004-03-01

    The objective of the research described in this report is the development and application of a methodology for comprehensively assessing the hydrogeologic uncertainties involved in dose assessment, including uncertainties associated with conceptual models, parameters, and scenarios. This report describes and applies a statistical method to quantitatively estimate the combined uncertainty in model predictions arising from conceptual model and parameter uncertainties. The method relies on model averaging to combine the predictions of a set of alternative models. Implementation is driven by the available data. When there is minimal site-specific data the method can be carried out with prior parameter estimates based on generic data and subjective prior model probabilities. For sites with observations of system behavior (and optionally data characterizing model parameters), the method uses model calibration to update the prior parameter estimates and model probabilities based on the correspondence between model predictions and site observations. The set of model alternatives can contain both simplified and complex models, with the requirement that all models be based on the same set of data. The method was applied to the geostatistical modeling of air permeability at a fractured rock site. Seven alternative variogram models of log air permeability were considered to represent data from single-hole pneumatic injection tests in six boreholes at the site. Unbiased maximum likelihood estimates of variogram and drift parameters were obtained for each model. Standard information criteria provided an ambiguous ranking of the models, which would not justify selecting one of them and discarding all others as is commonly done in practice. Instead, some of the models were eliminated based on their negligibly small updated probabilities and the rest were used to project the measured log permeabilities by kriging onto a rock volume containing the six boreholes. These four

  2. Region 9 - Social Vulnerability Index

    Data.gov (United States)

    U.S. Environmental Protection Agency — The Social Vulnerability Index is derived from the 2000 US Census data. The fields included are percent minority, median household income, age (under 18 and over...

  3. CDC's Social Vulnerability Index (SVI)

    Data.gov (United States)

    U.S. Department of Health & Human Services — Social vulnerability refers to the resilience of communities when confronted by external stresses on human health, stresses such as natural or human-caused...

  4. A community-based participatory research study of HIV and HPV vulnerabilities and prevention in two Pacific Islander communities: ethical challenges and solutions.

    Science.gov (United States)

    DiStefano, Anthony; Peters, Ruth; Tanjasiri, Sora Park; Quitugua, Lourdes; Dimaculangan, Jeany; Hui, Brian; Barrera-Ng, Angelica; Vunileva, 'Isileli; Tui'one, Vanessa; Takahashi, Lois

    2013-02-01

    We describe ethical issues that emerged during a one-year CBPR study of HIV and human papillomavirus (HPV) vulnerabilities and prevention in two Pacific Islander (PI) communities, and the collaborative solutions to these challenges reached by academic and community partners. In our project case study analysis, we found that ethical tensions were linked mainly to issues of mutual trust and credibility in PI communities; cultural taboos associated with the nexus of religiosity and traditional PI culture; fears of privacy breaches in small, interconnected PI communities; and competing priorities of scientific rigor versus direct community services. Mutual capacity building and linking CBPR practice to PI social protocols are required for effective solutions and progress toward social justice outcomes.

  5. Vulnerability Assessments in Ethical Hacking

    OpenAIRE

    Ashiqur Rahman ,; Md. SarwarAlam Rasel; Asaduzzaman Noman; Shakh Md. Alimuzjaman Alim

    2016-01-01

    Ethical hackers use the same methods and techniques to test and bypass a system's defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found, they document them and provide actionable advice on how to fix them so the organization can improve its overall security. The purpose of ethical hacking is to evaluate the security of a network or system's infrastructure. It entails finding and attempting to exploit any vulnerabilities to de...

  6. Promoting physical activity in socially vulnerable groups

    OpenAIRE

    Herens, M.C.

    2016-01-01

    Background:  In the Netherlands, inequalities in physical activity behaviour go hand in hand with socioeconomic inequalities in health. To promote physical activity effectively and equitably, participatory community-based physical activity interventions seem promising and are supported by the Dutch government’s policy. Although many strategies have been developed to increase physical activity levels in general and in socially vulnerable groups in particular, most evaluations show o...

  7. Vulnerability Assessment Method of Natural Gas System in Seism Based on Capacity Curve%基于能力曲线的燃气系统地震脆弱性评估方法

    Institute of Scientific and Technical Information of China (English)

    颜峻

    2013-01-01

    为了定量评估燃气系统在地震中的脆弱性水平,基于能力——需求谱方法建立了燃气系统地震脆弱性评估方法.评估方法从地震潜在危险性分析、结构抗震能力、需求谱与脆弱性曲线建立以及破坏状态预测等四方面着手研究.基于上述模型与方法,研究了地震动作用下燃气系统最大承载能力、破坏等级及概率.最后以某天然气压缩站主体建筑为例,建立了反映场地地震潜在危险性的地震反应谱,构建了用于确定性能点的抗震能力——需求谱,并基于FEMA 273绘制了不同破坏等级的脆弱性曲线,定量分析了该压缩站遭受破坏等级和概率.%In order to assess the vulnerability level of natural gas supply system in seism quantitatively, assessment method of vulnerability level is investigated based on capacity-demand spectrum. Study works are done from 4 aspects including potential earthquake hazard analysis, capacity-demand spectrum of the natural gas supply system, vulnerability curves and forecast method for the destruction state. On this basis, maximum carrying capacity and probabilities of specific damage levels in the role of ground motion parameters are studied. Finally, take for example the main structure of a natural gas compressor station, seismic response spectrum is established to analyze the potential earthquake risk, capacity-demand spectrum is constructed to determine the seismic performance point, vulnerability curves of the corresponding destruction states for this type of natural gas compressor stations is drew based on the FEMA 273, the level and the possibilities of destruction level is calculated quantitatively.

  8. Reproductive Health and Reproductive Vulnerability

    Directory of Open Access Journals (Sweden)

    Bojan Žikić

    2016-03-01

    Full Text Available Reproductive health represents, almost to an equal extent, a socio-cultural and a medical fact. What influences it, both positively and negatively, stems from the ways in which we culturally cognize and act with regard to reproductive behavior. These thoughts and actions are conditioned by a culturally contextualized conceptualization of human physiology which is, in turn, based on the conceptualization of sexuality, and especially, the normativization of gender roles. Therefore, reproductive health is, above all, female health, when viewed as a socio-cultural category, meaning that reproductive vulnerability mostly refers to those factors that negatively influence female reproductive health. These factors are social – they negatively influence reproductive health through the institutional and legally normative aspects, they are economic – they decrease the number of those who, in a certain socio-cultural context, have timely access to quality medical care, and they are cultural – they reinforce modes of thinking and behavior which do not take into consideration the right of every human being to his or her own sexual and reproductive life, but rather insist on conforming individual sexuality and reproductive desires and capacities to the dominant cultural norm.

  9. Attending to social vulnerability when rationing pandemic resources.

    Science.gov (United States)

    Vawter, Dorothy E; Garrett, J Eline; Gervais, Karen G; Prehn, Angela Witt; DeBruin, Debra A

    2011-01-01

    Pandemic plans are increasingly attending to groups experiencing health disparities and other social vulnerabilities. Although some pandemic guidance is silent on the issue, guidance that attends to socially vulnerable groups ranges widely, some procedural (often calling for public engagement), and some substantive. Public engagement objectives vary from merely educational to seeking reflective input into the ethical commitments that should guide pandemic planning and response. Some plans that concern rationing during a severe pandemic recommend ways to protect socially vulnerable groups without prioritizing access to scarce resources based on social vulnerability per se. The Minnesota Pandemic Ethics Project (MPEP), a public engagement project on rationing scarce health resources during a severe influenza pandemic, agrees and recommends an integrated set of ways to attend to the needs of socially vulnerable people and avoid exacerbation of health disparities during a severe influenza pandemic. Among other things, MPEP recommends: 1. Engaging socially vulnerable populations to clarify unique needs and effective strategies; 2. Engaging socially vulnerable populations to elicit ethical values and perspectives on rationing; 3. Rejecting rationing based on race, socioeconomic class, citizenship, quality of life, length of life-extension and first-come, first-served; 4. Prioritizing those in the general population for access to resources based on combinations of risk (of death or severe complications from influenza, exposure to influenza, transmitting influenza to vulnerable groups) and the likelihood of responding well to the resource in question. 5. Protecting critical infrastructures on which vulnerable populations and the general public rely; 6. Identifying and removing access barriers during pandemic planning and response; and 7. Collecting and promptly analyzing data during the pandemic to identify groups at disproportionate risk of influenza-related mortality and

  10. Site investigation - equipment for geological, geophysical, hydrogeological and hydrochemical characterization

    International Nuclear Information System (INIS)

    The investigations are performed within a site investigation program. In total about 60,000 m of cored 56 mm boreholes have been drilled and investigated at eight study sites. A summarized description of the main investigation methods is included. Instruments for geophysical investigations contains equipment for ground measurements as well as for borehole logging. The Geophysical investigations including the borehole radar measurements, are indirect methods for the geological and hydrogeological characterization of the rock formation. Great effort has been laid on the development of hydrogeological instruments for hydraulic tests and groundwater head measurements. In order to obtain hydrochemical investigations with high quality, a complete system for sampling and analysis of ground water has been developed. (orig./PW)

  11. Land Use and Hydrogeological Characteristics Influence Groundwater Invertebrate Communities.

    Science.gov (United States)

    Tione, María Laura; Bedano, José Camilo; Blarasin, Mónica

    2016-08-01

    We examine the influence of land use and hydrogeological characteristics on the abundance, composition and structure of groundwater invertebrate communities in a loessic aquifer from Argentina. Seven wells, selected according to surrounding land use and hydrogeological characteristics, were sampled twice. Groundwater was characterized as sodium bicarbonate, bicarbonate sulfate or sulfate type. NO3(-) was detected in all samples. Land use in the area surrounding the well, unsaturated zone thickness and geochemical characteristics of groundwater influenced the abundance, composition and community structure of groundwater invertebrates. Copepoda, Oligochaeta, Cladocera, Ostracoda and Amphipoda were highly influenced by land use, particularly by point pollution sources that produced higher abundance and changes in taxonomic composition. The lowest invertebrate abundance was observed at the wells situated in areas with the thickest unsaturated zone. Groundwater salinity and geochemical type influenced the presence of certain species, particularly Stygonitocrella sp. PMID:27456146

  12. Main results of hydrogeological studies on the Karazhyra coal deposit

    International Nuclear Information System (INIS)

    Karazhyra coal deposit is situated on the former Semipalatinsk test site territory, and in the structural relation it presents the Jurassic edge of a mountain with extension 13 km and width 3.5-5.0 km, and it is related with sub-artesian basin accumulated with the Lower Jurassic carboniferous sediments. Here in 1994 the hydrogeological examination were began and its are going on at present. At the first stage of works a general hydrogeologic deposit conditions have being studied. At the second stage the underground water monitoring were organized. The objects of study were quantity and quality of pumped waters, underground waters levels variations on the deposit area, and its chemical content

  13. Geological realism in hydrogeological and geophysical inverse modeling: A review

    Science.gov (United States)

    Linde, Niklas; Renard, Philippe; Mukerji, Tapan; Caers, Jef

    2015-12-01

    Scientific curiosity, exploration of georesources and environmental concerns are pushing the geoscientific research community toward subsurface investigations of ever-increasing complexity. This review explores various approaches to formulate and solve inverse problems in ways that effectively integrate geological concepts with geophysical and hydrogeological data. Modern geostatistical simulation algorithms can produce multiple subsurface realizations that are in agreement with conceptual geological models and statistical rock physics can be used to map these realizations into physical properties that are sensed by the geophysical or hydrogeological data. The inverse problem consists of finding one or an ensemble of such subsurface realizations that are in agreement with the data. The most general inversion frameworks are presently often computationally intractable when applied to large-scale problems and it is necessary to better understand the implications of simplifying (1) the conceptual geological model (e.g., using model compression); (2) the physical forward problem (e.g., using proxy models); and (3) the algorithm used to solve the inverse problem (e.g., Markov chain Monte Carlo or local optimization methods) to reach practical and robust solutions given today's computer resources and knowledge. We also highlight the need to not only use geophysical and hydrogeological data for parameter estimation purposes, but also to use them to falsify or corroborate alternative geological scenarios.

  14. Defining Hydrogeological Boundaries for Mountain Front Recharge (MFR) Predictions in Multi-Catchment Mountainous Systems

    Science.gov (United States)

    Neilson-Welch, L. A.; Allen, D. M.

    2010-12-01

    Cross-catchment groundwater flow in mountainous watersheds results from the development of local, intermediate, and regional groundwater flow pathways in multi-catchment systems. As such, hydrogeological analysis (e.g. water balance calculations and numerical modelling) to assess contributions of groundwater to mountain front recharge (MFR) must consider the choice of boundaries based on hydrological divides. Numerical 3-dimensional hydrogeological modelling was completed using FeFlow (DHI-WASY), for conceptual regional-scale multi-catchment systems; extending from a watershed boundary to a mountain front. The modelled systems were designed to represent major ridge and valley configurations observed in mountainous watersheds including: nested, adjacent, disconnected, non-parallel, and parallel catchments. Both homogeneous and heterogeneous hydraulic conductivity scenarios were simulated; with the heterogeneous scenario including a shallow zone of higher hydraulic conductivity bedrock overlying less permeable bedrock. The influence of cross-catchment flow in the development of groundwater flow pathways contributing to MFR was examined. The results provide a basis for identifying topographic scenarios where contributions to MFR may originate outside hydrological divides. This understanding will contribute to improving MFR predictions using both the numerical modelling approach and the water balance approach.

  15. Hydrogeological Characteristics of a Karst Mountainous Catchment in the Northwest of Vietnam

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper presents a preliminary assessment of the hydrogeological characteristics of a karst mountainous catchment, the Suoi Muoi River catchment, in the northwest of Vietnam. The catchment is located at 600 -700 m a.s.1. and covers an area of 284 km. Exposed limestone occupies 32% of the total catchment area. Various types of assessments have been carded out, including geological and hydrogeological field surveys, cave surveys, dye-tracer tests, meteorological and surface water monitoring. Geological studies and cave surveys have identified the most important active cave/conduit systems within the catchment. Although these data are essential, they are insufficient to make a comprehensive appraisal of the hydrologic nature of the catchment under interest. An attempt was made to calculate a global water balance of the catchment, based on short-term (15 months) meteorological and streamfiow records. The results show that, despite the existence of a number of substantial cavern conduit systems, the groundwater system of the catchment is governed by the fracture/fissure matrix. The cavern conduit systems only collect groundwater from the adjacent fracture matrix and/or connect topographically isolated surface watercourses. The groundwater storage of the cavern conduit systems appears to be regionally insignificant in comparison with the governed fracture matrix groundwater system.``

  16. Modelling of the site scale hydrogeological situation at Beberg using NAMMU

    International Nuclear Information System (INIS)

    The purpose of the present study is to perform modelling of the site scale hydrogeological situation at Beberg using the finite element code NAMMU and compare the results with those from HYDRASTAR reported in SR 97. NAMMU was used in the large scale regional hydrogeological modelling at Beberg. The hypothetical repository layout at Beberg is based on geological data from the Finnsjoen site. Four model variants were created in this study. Two variants were compared with the deterministic freshwater case in the HYDRASTAR modelling. The other two variants were created to study the effect of a regionally distributed permeability anisotropy and variable density groundwater on the groundwater flow pattern. These processes are not considered in HYDRASTAR. The NAMMU results, including the pathline patterns, agree with those from the HYDRASTAR modelling. The effect of anisotropy and saline groundwater is found significant for the pathlines. The difference in canister flux between the NAMMU and the HYDRASTAR models is small, while the difference in travel time is more significant. The discrepancies between the results from the NAMMU and the HYDRASTAR simulations can be ascribed to the different numerical discretisation, i.e. different representation of the permeability, and the different pathline algorithms used in the two models

  17. Special Analysis of Vulnerability Based on Network Models%基于网络模型的脆弱性的特例分析

    Institute of Scientific and Technical Information of China (English)

    张婧婧; 达新民

    2009-01-01

    Using the model which depicted airplane kidnappers attacks in the US as the source of data, this paper idealizes it and obtains another two structures with the same scale, such as uniformly distributed structure and hierarchical structure. Under the existing attacking strategies, experiments have done to analyse the vulnerability of three given structures. At last, it gets the descendent rate of efficiency by attacking the networks. So the aim for quantifying the discrepancy of different structures is realized.%以美国劫机事件绘制的网络模型作为数据源,将其理想化为相同规模的均匀结构和层次结构,利用现有的攻击策略,针对三种不同分布的模型进行脆弱性分析实验,并根据实验得到网络被攻击前、后效率的下降比例,以此定量衡量不同网络模型的脆弱性差异.

  18. A Methodology For Flood Vulnerability Analysis In Complex Flood Scenarios

    Science.gov (United States)

    Figueiredo, R.; Martina, M. L. V.; Dottori, F.

    2015-12-01

    Nowadays, flood risk management is gaining importance in order to mitigate and prevent flood disasters, and consequently the analysis of flood vulnerability is becoming a key research topic. In this paper, we propose a methodology for large-scale analysis of flood vulnerability. The methodology is based on a GIS-based index, which considers local topography, terrain roughness and basic information about the flood scenario to reproduce the diffusive behaviour of floodplain flow. The methodology synthetizes the spatial distribution of index values into maps and curves, used to represent the vulnerability in the area of interest. Its application allows for considering different levels of complexity of flood scenarios, from localized flood defence failures to complex hazard scenarios involving river reaches. The components of the methodology are applied and tested in two floodplain areas in Northern Italy recently affected by floods. The results show that the methodology can provide an original and valuable insight of flood vulnerability variables and processes.

  19. Quantitative Vulnerability Assessment of Cyber Security for Distribution Automation Systems

    Directory of Open Access Journals (Sweden)

    Xiaming Ye

    2015-06-01

    Full Text Available The distribution automation system (DAS is vulnerable to cyber-attacks due to the widespread use of terminal devices and standard communication protocols. On account of the cost of defense, it is impossible to ensure the security of every device in the DAS. Given this background, a novel quantitative vulnerability assessment model of cyber security for DAS is developed in this paper. In the assessment model, the potential physical consequences of cyber-attacks are analyzed from two levels: terminal device level and control center server level. Then, the attack process is modeled based on game theory and the relationships among different vulnerabilities are analyzed by introducing a vulnerability adjacency matrix. Finally, the application process of the proposed methodology is illustrated through a case study based on bus 2 of the Roy Billinton Test System (RBTS. The results demonstrate the reasonability and effectiveness of the proposed methodology.

  20. Hydrogeologic subdivision of the Wolfcamp series and Pennsylvanian system of the Swisher Study Area, Texas: Revision 1: Topical report

    International Nuclear Information System (INIS)

    The Pennsylvanian-Wolfcamp section in the Palo Duro Basin includes brine aquifers that are considered to be the most important ground- water flow paths in the deep-basin system. This report provides summary documentation of studies that subdivide the section into hydrogeologic units based on their judged relative capacities for transmitting water. This particular study area comprises eight counties in Texas, including Swisher County. Underground patterns of rock distribution are delineated from a hydrologic perspective and at a level of detail appropriate for numerical modeling of regional ground-water flow. Hydrogeologic units are defined and characterized so that appropriate porosity and permeability values can be assigned to each during construction of the numerical models and so that modelers can combine units where necessary. Hydrogeologic units have been defined as mappable, physically continuous rock bodies that function in bulk as water-transmitting or water-retarding units relative to adjacent rocks. Interpretations are made primarily from geophysical logs. Hydrologic characteristics are assessed on the basis of properties typically associated with certain lithologies (e.g., sandstones are more pervious than shales) and on the basis of gross variations in effective porosity (particularly in carbonate sequences). 15 refs., 52 figs., 1 tab

  1. Hydrogeologic framework of LaSalle County, Illinois

    Science.gov (United States)

    Kay, Robert T.; Bailey, Clinton R.

    2016-10-28

    Water-supply needs in LaSalle County in northern Illinois are met by surface water and groundwater. Water-supply needs are expected to increase to serve future residential and mining uses. Available information on water use, geology, surface-water and groundwater hydrology, and water quality provides a hydrogeologic framework for LaSalle County that can be used to help plan the future use of the water resources.The Illinois, Fox, and Vermilion Rivers are the primary surface-water bodies in LaSalle County. These and other surface-water bodies are used for wastewater disposal in the county. The Vermilion River is used as a drinking-water supply in the southern part of the county. Water from the Illinois and Fox Rivers also is used for the generation of electric power.Glacial drift aquifers capable of yielding sufficient water for public supply are expected to be present in the Illinois River Valley in the western part of the county, the Troy Bedrock Valley in the northwestern part of the county, and in the Ticona Bedrock Valley in the south-central part of the county. Glacial drift aquifers capable of yielding sufficient water for residential supply are present in most of the county, although well yield often needs to be improved by using large-diameter wells. Arsenic concentrations above health-based standards have been detected in some wells in this aquifer. These aquifers are a viable source for additional water supply in some areas, but would require further characterization prior to full development.Shallow bedrock deposits comprising the sandstone units of the Ancell Group, the Prairie du Chien Group, dolomite of the Galena and Platteville Groups, and Silurian-aged dolomite are utilized for water supply where these units are at or near the bedrock surface or where overlain by Pennsylvanian-aged deposits. The availability of water from the shallow bedrock deposits depends primarily on the geologic unit analyzed. All these deposits can yield sufficient water for

  2. Investigation of the large scale regional hydrogeological situation at Beberg

    Energy Technology Data Exchange (ETDEWEB)

    Hartley, L. [AEA Technology, Harwell (United Kingdom); Boghammar, A.; Grundfelt, B. [Kemakta Konsult AB, Stockholm (Sweden)

    1998-12-01

    The present study forms part of the large-scale groundwater flow studies within the SR 97 project. The site of interest is Beberg which is based on data from the Finnsjoen site. To understand the groundwater flow and salinity at present it is necessary to consider the history of the Finnsjoen site over the last few thousand years. A numerical approach is developed to model a situation of transient variable density flow on a regional scale. The model is considered a reasonable representation of the real situation at the site, since it is consistent with the current conceptual understanding of the site and predictions of salinity are in broad agreement with field observations. The effects of post-glacial uplift on the hydrogeological conditions are considered. It is assumed that about 9,000-4,000 years BP the rock was completely infiltrated by saline groundwaters during the periods when the Yoldia and Litorina Seas covered the Finnsjoen area. The model represents the interval from the end of this period up to the present day. During which time the recharge of fresh water in the form of rainfall flushed or displaced saline water from the near-surface. Many variants on the basis conceptual model are considered both to calibrate the model against field data and to quantify the sensitivities of groundwater pathways. The present study shows that: Salinity and transient processes are very important in determining groundwater pathways in the deep rock. Salinity drives flow downwards increasing the length of pathways and groundwater travel times. A high contrast in hydraulic conductivity between major structures and the rock mass results in the fracture zones being the dominant flow paths, in particular Zone 1 and Imundbo. There are two distinct flow paths. In the east of the hypothetical repository the path is short along Zone 1, for the west the path is longer through the rock mass. Fracture zones are flushed of salt on a time-scale of 10-100 years. For the rock mass it

  3. Assessment of groundwater vulnerability by combining drastic and susceptibility index: Application to Annaba superficial aquifer (Algeria)

    Science.gov (United States)

    Sedrati, Nassima; Djabri, Larbi; Chaffai, Hicham; Bougherira, Nabil

    2016-07-01

    Groundwater pollution due to anthropogenic activities is one of the major environmental problems in urban and industrial areas. The aim of this work is to propose a new integrated methodology to assess actual and forecasted groundwater vulnerability by combining Drastic and susceptibility index. The contamination susceptibility index (SI) at a given location was calculated by taking the product of the vulnerability DRASTIC index (VI) and the quality index (QI): SI=VI x QI. The superficial aquifer of Annaba plain was the study case proposed for the application of this methodology. The study revealed that the area with Very High vulnerability would increase 73 % in this superficial layer. This result can be explained by the susceptibility index map shows both hydrogeological and hydrochemical data related to the contamination problem including areas that should be taken into consideration during water management planning. The index map indicates that the most susceptible groundwater is occupies the majority of the study area. The validity of the DRASTIC and the susceptibility index methods, verified by comparing the distribution of some pollutants (Daouad, 2013) in the groundwater and the different vulnerability classes, shows a high contamination that affect the water quality in study areas.

  4. Let Them Eat Risk? Wealth, Rights, and Disaster Vulnerability

    OpenAIRE

    James Boyce

    2000-01-01

    Disaster-vulnerability reduction is an impure public good: when provided to one it is provided to others, but not equally provided to all. This means that in addition to the question of how much disaster-vulnerability reduction to provide, policy makers face the question of to whom it should be provided. This essay distinguishes between two broad classes of approaches to the latter question, one based on wealth, the other on rights.

  5. Hydrogeological studies in high mountains karst environment: the example of Picos de Europa (Spain)

    Science.gov (United States)

    Meléndez, Mónica; Ballesteros, Daniel; Jiménez-Sanchez, Montserrat; García-Sansegundo, Joaquín

    2015-04-01

    Karst aquifers are very vulnerable to contamination due their high infiltration coefficient, elevated hydraulic conductivity, high speed of circulation, and very low self-purification capacities. The functioning of that type of aquifer is quite complicated by the high heterogeneity and anisotropy of the karst and the presence of three different types of porosity. It is necessary to understand the functioning of a karst aquifer in order to protect and manage them properly. Therefore, it is necessary to develop working methods to establish the aquifer hydrodynamics, especially in high mountain areas with many methodological constrains (e. g. difficulty to access). The Picos de Europa karst aquifer, located in theNational Park of Picos de Europa (North Spain), presents a high environmental, geomorphological and hydrogeological value; it is included in the "Spanish geological contexts with global relevance" by the Law of Natural Heritage and Biodiversity of Spain, being considered as a Global Geosite by the Geological and Mining Institute of Spain. In addition, the karst massif is included in several figures of environmental protection, both at global and national levels. Hydrogeological and geomorphological research is developed together in this area under the GEOCAVE project (MAGRAMA-580/12 OAPN) and the "Investigación hidrogeológica en las masas de agua subterránea 012.014 Picos de Europa-Panes y 012.018 Alto Deva-Alto Cares. (IGME-73.3.00.41.00/2013)". The aim of this study is to characterize the hydrodynamics of the karst aquifer, considering the snow as an important component of the aquifer recharge. The proposed methodology includes the installation of an integrated pressure sensor and data logger for level and temperature measurement in two karst spring related to two groundwater bodies (GWB) with 86 and 14 km2 extension. The store of data to regular intervals with punctual values of discharge measures has provided, at least, an annual series of data in

  6. Transgender youth: invisible and vulnerable.

    Science.gov (United States)

    Grossman, Arnold H; D'Augelli, Anthony R

    2006-01-01

    This study used three focus groups to explore factors that affect the experiences of youth (ages 15 to 21) who identify as transgender. The focus groups were designed to probe transgender youths' experiences of vulnerability in the areas of health and mental health. This involved their exposure to risks, discrimination, marginalization, and their access to supportive resources. Three themes emerged from an analysis of the groups' conversations. The themes centered on gender identity and gender presentation, sexuality and sexual orientation, and vulnerability and health issues. Most youth reported feeling they were transgender at puberty, and they experienced negative reactions to their gender atypical behaviors, as well as confusion between their gender identity and sexual orientation. Youth noted four problems related to their vulnerability in health-related areas: the lack of safe environments, poor access to physical health services, inadequate resources to address their mental health concerns, and a lack of continuity of caregiving by their families and communities. PMID:16893828

  7. “Informative representation” for the vulnerability analysis of anthropic landscape. two different areas in comparison: the historical center of St. Elia Fiume Rapido (FR and the mining site of Coreno Ausonio.

    Directory of Open Access Journals (Sweden)

    Assunta Pelliccio

    2013-05-01

    Full Text Available The main riscks of the landscape are the overexploitation of the soil and a high physical vulnerability of our country determined by considerable seismic and volcanic activities, and by the peculiar geomorphological and hydrogeological pattern. This risk needs to be mitigated through a careful analysis of the criticity levels in the different geographical areas and by developing strategies based on requirements and operational guidance. In this paper two different procedures for vulnerability analysis are described, designed for completely different landscape areas. The first case concerns the historical center of Sant’Elia Fiumerapido, in the province of Frosinone, with the objective of analysing the town and its exposure to natural factors of degradation. The second case is the basin of Coreno Ausonio, in the province of Latina, deeply marked by intense mining activities. These two cases constitute examples where the "Informative Representation" allows an immediate reading of the involved components with the aim, in the first case to preserve the evidence of the past, in the second case to protect the environment from uncontrolled human activities.

  8. Description of climate, surface hydrology, and near-surface hydrogeology. Simpevarp 1.2

    Energy Technology Data Exchange (ETDEWEB)

    Werner, Kent [SWECO VIAK AB/Golder Associates AB, Stockholm (Sweden); Bosson, Emma; Berglund, Sten [Swedish Nuclear Fuel and Waste Management Co., Stockholm (Sweden)

    2005-04-01

    This report presents and evaluates the site investigations and primary data on meteorology, surface hydrology and near-surface hydrogeology that are available in the Simpevarp 1.2 'data freeze'. The main objective is to update the previous Simpevarp 1.1 description of the meteorological, surface hydrological and near-surface hydrogeological conditions in the Simpevarp area. Based on the Simpevarp 1.2 dataset, an updated conceptual and descriptive model of the surface and near-surface water flow conditions in the Simpevarp area is presented. In cases where site investigation data are not yet available, regional and/or generic data are used as input to the modelling. GIS- and process-based tools, used for initial quantitative flow modelling, are also presented. The objectives of this initial quantitative modelling are to illustrate, quantify and support the site descriptive model, and also to produce relevant input data to the ecological systems modelling within the SKB SurfaceNet framework.For the Simpevarp 1.2 model, the relevant site investigations include the establishment of one local meteorological station and surface-hydrological stations for discharge measurements, delineation and description of catchment areas, manual discharge measurements in water courses, slug tests in groundwater monitoring wells, and manual groundwater level measurements. In addition, other investigations have also contributed to the modelling, providing data on geometry (including topography), data from surface-based geological investigations and boreholes in Quaternary deposits, and data on the hydrogeological properties of the bedrock. The conceptual and descriptive modelling includes an identification and basic description of type areas, domains and interfaces between domains within the model area. The surface and near-surface flow system is described, including the assignment of hydrogeological properties to HSDs (Hydraulic Soil Domains) of Quaternary deposits based on a

  9. HIV gender-based vulnerabilities of women using drugs in long-term heterosexual relationships: baseline results from a randomized trial in Ukraine

    Directory of Open Access Journals (Sweden)

    Shulga, Liudmyla

    2012-07-01

    Full Text Available BACKGROUND: Sexual way of HIV transmission in Ukraine outweighs parenteral route since 2007. In response to situation change couple’s counseling for IDUs was introduced and is currently tested within randomized trial.METHODS: Baseline data were collected in June-September 2011: 548 IDU couples in 10 cities were surveyed and screened for HIV and Hepatitis C. Participants were recruited using respondent-driven sampling method. RESULTS: The average age of participants varied between 30 – 33 years old with women being 3 years younger. On many aspects drug using couples in long-term relationships share the same values as non-drug using couples. However, drug use resulted into specific HIV/STIs risks for the couple. Common reasons of being with the current partner included mutual understanding (98%; similar life styles (90%; understanding life with addiction (88%; and love (87%. At the same time, looking at the quality time partners spend together, it was found that mostly, they are connected by their drug use, fear of social exclusion and economical reasons. Although these factors are important for both men and women, they have a bigger impact on women and put them into more vulnerable position: 25% have children who in 59% of cases mostly live with mother and her partner; 40% live in a partner’s house; 30% are financially supported by partners; 77% women get drugs from partners and only 20% are first one to be injected. Trust also seems to be an issue. Thus, 83% of respondents believe that they know the HIV/STI status of their partner and 90% of those believe it to be negative, while 20% of those surveyed appeared to be HIV positive and about 30% Hepatitis C positive. CONCLUSIONS: Understanding characteristics of sexual partners is crucial for HIV prevention programme design and implementation.

  10. Chronic stress-induced hippocampal vulnerability: the glucocorticoid vulnerability hypothesis.

    Science.gov (United States)

    Conrad, Cheryl D

    2008-01-01

    The hippocampus, a limbic structure important in learning and memory, is particularly sensitive to chronic stress and to glucocorticoids. While glucocorticoids are essential for an effective stress response, their oversecretion was originally hypothesized to contribute to age-related hippocampal degeneration. However, conflicting findings were reported on whether prolonged exposure to elevated glucocorticoids endangered the hippocampus and whether the primate hippocampus even responded to glucocorticoids as the rodent hippocampus did. This review discusses the seemingly inconsistent findings about the effects of elevated and prolonged glucocorticoids on hippocampal health and proposes that a chronic stress history, which includes repeated elevation of glucocorticoids, may make the hippocampus vulnerable to potential injury. Studies are described to show that chronic stress or prolonged exposure to glucocorticoids can compromise the hippocampus by producing dendritic retraction, a reversible form of plasticity that includes dendritic restructuring without irreversible cell death. Conditions that produce dendritic retraction are hypothesized to make the hippocampus vulnerable to neurotoxic or metabolic challenges. Of particular interest is the finding that the hippocampus can recover from dendritic retraction without any noticeable cell loss. When conditions surrounding dendritic retraction are present, the potential for harm is increased because dendritic retraction may persist for weeks, months or even years, thereby broadening the window of time during which the hippocampus is vulnerable to harm, called the 'glucocorticoid vulnerability hypothesis'. The relevance of these findings is discussed with regard to conditions exhibiting parallels in hippocampal plasticity, including Cushing's disease, major depressive disorder (MDD), and post-traumatic stress disorder (PTSD).

  11. Managing a network vulnerability assessment

    CERN Document Server

    Peltier, Thomas R; Blackley, John A

    2003-01-01

    Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.

  12. Vulnerability in north- central Vietnam

    DEFF Research Database (Denmark)

    Casse, Thorkil; Milhøj, Anders; Nguyen, Thao Phuong

    2015-01-01

    a long term negative effect of floods. The research showed that a high impact of natural disasters is correlated with decreases in income over time. As the disaster relief offered by the authorities is marginal compared to economic losses, some households react by increasing off-farm incomes (including...... the impact of flooding in the provinces. The article ends by looking at the vulnerability-resilience debate concluding that the poorer households could enter a vulnerability loop, unless new strategies to cope with natural hazards are suggested....

  13. Forest climate change Vulnerability and Adaptation Assessment in Himalayas

    Science.gov (United States)

    Chitale, V. S.; Shrestha, H. L.; Agarwal, N. K.; Choudhurya, D.; Gilani, H.; Dhonju, H. K.; Murthy, M. S. R.

    2014-11-01

    Forests offer an important basis for creating and safeguarding more climate-resilient communities over Hindu Kush Himalayan region. The forest ecosystem vulnerability assessment to climate change and developing knowledge base to identify and support relevant adaptation strategies is realized as an urgent need. The multi scale adaptation strategies portray increasing complexity with the increasing levels in terms of data requirements, vulnerability understanding and decision making to choose a particular adaptation strategy. We present here how such complexities could be addressed and adaptation decisions could be either directly supported by open source remote sensing based forestry products or geospatial analysis and modelled products. The forest vulnerability assessment under climate change scenario coupled with increasing forest social dependence was studied using IPCC Landscape scale Vulnerability framework in Chitwan-Annapurna Landscape (CHAL) situated in Nepal. Around twenty layers of geospatial information on climate, forest biophysical and forest social dependence data was used to assess forest vulnerability and associated adaptation needs using self-learning decision tree based approaches. The increase in forest fires, evapotranspiration and reduction in productivity over changing climate scenario was observed. The adaptation measures on enhancing productivity, improving resilience, reducing or avoiding pressure with spatial specificity are identified to support suitable decision making. The study provides spatial analytical framework to evaluate multitude of parameters to understand vulnerabilities and assess scope for alternative adaptation strategies with spatial explicitness.

  14. Local spatial and temporal factors influencing population and societal vulnerability to natural disasters.

    Science.gov (United States)

    Zhou, Yang; Li, Ning; Wu, Wenxiang; Wu, Jidong; Shi, Peijun

    2014-04-01

    The identification of societal vulnerable counties and regions and the factors contributing to social vulnerability are crucial for effective disaster risk management. Significant advances have been made in the study of social vulnerability over the past two decades, but we still know little regarding China's societal vulnerability profiles, especially at the county level. This study investigates the county-level spatial and temporal patterns in social vulnerability in China from 1980 to 2010. Based on China's four most recent population censuses of 2,361 counties and their corresponding socioeconomic data, a social vulnerability index for each county was created using factor analysis. Exploratory spatial data analysis, including global and local autocorrelations, was applied to reveal the spatial patterns of county-level social vulnerability. The results demonstrate that the dynamic characteristics of China's county-level social vulnerability are notably distinct, and the dominant contributors to societal vulnerability for all of the years studied were rural character, development (urbanization), and economic status. The spatial clustering patterns of social vulnerability to natural disasters in China exhibited a gathering-scattering-gathering pattern over time. Further investigations indicate that many counties in the eastern coastal area of China are experiencing a detectable increase in social vulnerability, whereas the societal vulnerability of many counties in the western and northern areas of China has significantly decreased over the past three decades. These findings will provide policymakers with a sound scientific basis for disaster prevention and mitigation decisions.

  15. Cluster analysis-based vulnerability risk zoning of lightning disaster in Hainan Island%基于聚类分析的海南岛雷电灾害易损度风险区划

    Institute of Scientific and Technical Information of China (English)

    高燚; 蒙小亮; 劳小青

    2013-01-01

    From the national collected data of lightning disasters from 1998 to 2009, the observational thunderstorm data of 18 meteorological stations, and lightning locating networks data and economy and population data in statistical yearbook of Hainan Province, the indices representing hazard-formative factor, hazard pregnant environment and hazard-affected body of lightning was selected. Through R-Cluster analysis, the indices influencing vulnerability were screened and checked. Based on 5 indices, i. e. , thunderstorm days, lightning density above 50 kA, thunderstorm frequency, casualty frequency and regional vulnerability economic modulus as basic variables, similarity measures of samples were calculated. With Ward's method in Q-Cluster, the hierarchy cluster analysis was carried out and Q-iterative cluster was adopted to explain and testify the result of the cluster. Finally the zoning of lightning risk in Hainan Island was constructed. Results show that Haikou City is within the first category zone, whose vulnerability is extremely high, with comprehensive vulnerability as high as 3. 89; Wencang, Chenmai, Linggao, Dingan, Tuncang and Qionghai are in the second category zone, whose vulnerability is just next to the extremely high zones; Danzhou, Qiongzhong, Baisha, Tongshi, Baoting are in the third category zone with moderate risks; Changjiang, Dongfang, Ledong,Wannin, Lingshui and Sanya are in the fourth category zone with weak risks.%利用1998-2009年全国雷电灾害汇编资料、海南岛18个气象台站雷暴资料、海南闪电定位网观测资料和海南省统计年鉴的区域经济、人口数据,选取了表征海南岛雷电灾害致灾因子、孕灾环境和承灾体特征的指标变量.采用R型聚类分析方法对影响易损度的指标进行了筛选和检验.以雷暴日数、50 kA以上平均地闪密度、雷灾频数、人员伤亡频数和区域经济易损模数等5个指标为依据变量,用欧氏距离(Euclidean distance)计算了

  16. Surface altitudes of hydrogeologic units used in the hydrogeologic framework and transient ground-water flow model of the Death Valley regional ground-water flow system, Nevada and California

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — A digital three-dimensional (3D) hydrogeologic framework model (HFM) represents the geometry and extent of hydrogeologic units (HGUs) and major structures in the...

  17. Thicknesses of hydrogeologic units used in the hydrogeologic framework and transient ground-water flow model of the Death Valley regional ground-water flow system, Nevada and California

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — A digital three-dimensional hydrogeologic framework model (HFM) represents the geometry and extent of hydrogeologic units (HGUs) and major structures in the Death...

  18. Cognitive vulnerability and dental fear

    Directory of Open Access Journals (Sweden)

    Spencer A John

    2008-01-01

    Full Text Available Abstract Background The Cognitive Vulnerability Model proposes that perceptions of certain characteristics of a situation are critical determinants of fear. Although the model is applicable to all animal, natural environment and situational fears, it has not yet been applied specifically to dental fear. This study therefore aimed to examine the association between dental fear and perceptions of dental visits as uncontrollable, unpredictable and dangerous. Methods The study used a clustered, stratified national sample of Australians aged 15 years and over. All participants were asked in a telephone interview survey to indicate their level of dental fear. Participants who received an oral examination were subsequently provided with a self-complete questionnaire in which they rated their perceptions of uncontrollability, unpredictability and dangerousness associated with dental visiting. Results 3937 participants were recruited. Each of the three vulnerability-related perceptions was strongly associated with the prevalence of high dental fear. In a logistic regression analysis, uncontrollability and dangerousness perceptions were significantly associated with high dental fear after controlling for age and sex. However, unpredictability perceptions did not have a statistically significant independent association with dental fear after controlling for all other variables. Conclusion Results are mostly consistent with the Cognitive Vulnerability Model of the etiology of fear, with perceptions of uncontrollability, unpredictability and dangerousness each showing a strong bivariate relationship with high dental fear prevalence. However, more extensive measures of vulnerability perceptions would be valuable in future investigations.

  19. The Influence of Hydrogeological Conditions on the Enrichment of Coalbed Methane%水文地质条件对煤层气富集的影响

    Institute of Scientific and Technical Information of China (English)

    吴鲜; 廖冲; 叶玉娟; 窦莲

    2011-01-01

    水文地质条件作为煤层气保存及形成超压煤储层主要因素之一。它对煤层气赋存、运移和生产都会产生影响与控制作用,对煤层气的高产富集和开采也起到非常重要的作用,是煤层气富集成藏过程主控因素中的一个关键因素。结合沁水盆地、鄂尔多斯盆地等一些国内煤层气区块,研究水文地质对煤层气富集的影响。%The factors which influence the enrichment of coalbed methane (CBM) mainly involves air condition, CBM reservoir capacity, the physical properties of coal, the hydrogeological conditions and reserving process and so on. Hydrogeological condition, as one of the main factors influencing the preservation and formation of CBM overpressure coal mine, can affect and control the accumulation, migration and production of CBM and determine the enrichment and development of CBM. Hydrogeological condition is regarded as a key factor to research CBM reserving process. Based on Qinshui Basin, Ordos Basin and some other domestic CBM blocks, the paper mainly describes the influence of hydrogeological conditions.on the enrichment of coalbed methane.

  20. Maintaining dignity in vulnerability

    DEFF Research Database (Denmark)

    Høy, Bente

    2015-01-01

    Background. Older people, living in nursing homes, are exposed to diverse situations, which may be associated with loss of dignity. To help them maintain their dignity, it is important to explore, how dignity is preserved in such context. Views of dignity and factors influencing dignity have been...... studied from both the residents´ and the care pro-viders´ perspective. However, most of these studies pertain to experiences in the dying or the illness context. Knowledge is scarce about how older people experience their dig-nity within their everyday lives in nursing homes. Aim To illuminate the meaning...... of maintaining dignity from the perspective of older people living in nursing homes Method. This qualitative study is based on individual interviews. Twenty-eight nursing home residents were included from six nursing homes in Scandinavia. A phenomenolog-ical-hermeneutic approach, inspired by Ricoeur was used...

  1. Livelihood strategies under the constraints of climate change vulnerability in Quang Nam

    DEFF Research Database (Denmark)

    Casse, Thorkil

    2013-01-01

    This chapter examines how vulnerability can be measured in quantitative terms. Households whose livelihoods are based on economic activities like acacia production and shrimp farming suffered the most....

  2. Modelling farm vulnerability to flooding: A step toward vulnerability mitigation policies appraisal

    Science.gov (United States)

    Brémond, P.; Abrami, G.; Blanc, C.; Grelot, F.

    2009-04-01

    are needed to implement the model and to collect them, specifically using the focus group method; Based on the conceptual model, to program a mathematical model which will be used to simulate damage (direct and indirect) on farm due to flood. This last objective should enable us to appraise policy to mitigate vulnerability which is planned to be implemented on Rhône River at the individual and regional scale. Finally, we discuss the possibility to use the UML modelling to develop a multi-agent system approach which could be interesting to take into account ties between farmers (solidarity, loan of equipment) or systemic effects due to the damage incurred by economic partners (loss of market share). Keywords vulnerability, UML modelling, farming systems, flood, mitigation policy, economic valuation

  3. Population Evacuation: Assessing Biophysical Risk and Social Vulnerability to Floods

    Science.gov (United States)

    Sim, S.; Lee, D. H.

    2014-12-01

    A relatively new topic of environmental hazards research revolves around vulnerability to disasters. These studies focused separately on biophysical and social vulnerability perspectives. Only recently, community-based vulnerability studies have become common because of the recognition that combining social and biophysical components is important and practical (Cutter, et al., 2000; Cutter, et al., 2003; Turner, et al., 2003). Researchers have modeled vulnerability to analyze its spatial variation (Montz, Cross, and Cutter, 2006). This study aimed at developing a technical framework for community-based vulnerability to the specific hazards of floods. Developing a technical framework in this research used a "vulnerability of place" method (Hebb & Mortsch, 2007). The data reduction technique used was Principal Components Analysis (PCA) which allows for each variable to explain part of the vulnerability. The case study was on flooding in the Tennessee River Basin. The initial run with all 46 variables produced 13 components that explained 69.77% of the variance. Because of the relative homogeneity across the county (i.e., land use and soil types most vulnerable to flooding being located away from heavily populated areas) biophysical variables became less important in this region in creating overall risk scores. This is made all the more obvious by the number of social variables (17) compared to the number of biophysical variables (8) in the final components. The lowest risk block groups are located within the cities: central Florence, central, and central Madison. The highest risk block groups are in rural areas covered predominately with pasture and agricultural land or forests. They also lie near or within the 100 year floodplain.

  4. 基于地震动参数的RC框架结构易损性分析%Seismic Vulnerability Analysis of Reinforced Concrete Frame Structures Based on Ground Motion Parameters

    Institute of Scientific and Technical Information of China (English)

    徐超; 温增平

    2016-01-01

    以某典型的12层钢筋混凝土框架结构作为研究对象,研究基于非线性动力时程分析和地震动参数的RC框架结构易损性分析方法。首先采用静力 pushover分析判定结构薄弱层,并确定结构性能(capacity)参数;然后应用非线性动力时程分析估计结构地震反应,研究以峰值加速度和基本周期加速度反应谱作为地震动参数结构反应的不确定性,并进一步分析结构地震需求(demand)参数与地震动参数的关系;在此基础上,分别建立该结构基于峰值加速度和加速度反应谱的易损性曲线,通过考虑场地条件对地震动特性的影响,研究场地条件对结构易损性的影响,结果表明不同场地条件下的结构易损性曲线有一定差异。应用本文方法,根据新一代地震区划图或地震安全性评价确定的地震动参数,可以直接估计结构在未来地震中出现不同破坏的概率,这在结构的抗震性能评估和地震损失预测中有一定意义。%In this study,we performed the seismic vulnerability analysis of reinforced concrete (RC)frame buildings based on nonlinear dynamic time history analysis and ground motion pa-rameters.We used a typical 1 2-story RC frame structure as the research obj ect.First,we conducted static pushover analysis to identify a weak layer and to determine the capacity parameters of the building.Then,we performed nonlinear dynamic time history analysis to estimate the seismic re-sponse of the structure and to analyze the relation between the demand and ground motion param-eters.With respect to ground motion parameters,we studied the uncertainty of the structural re-sponse and then established peak ground acceleration and vulnerability curves based on the first-mode acceleration response spectrum.By considering the impacts of site conditions on ground mo-tion characteristics,we examined the impact of site conditions on vulnerability.The results show

  5. Information Management: Business Vulnerabilities

    International Nuclear Information System (INIS)

    Sophisticated cybercrimes and advanced persistent threats are occurring at an alarming rate. Aided by new attack techniques, increased financial support and the ease of exploiting social connections, attackers are having more success than ever before. Traditional security solutions are no longer sufficient to defend against these escalating threats. IBM® Security QRadar® uses big data capabilities to help keep pace with advanced threats and prevent attacks before they happen. It helps uncover hidden relationships within massive amounts of security data, using proven analytics to reduce billions of security events to a manageable set of prioritized incidents. Forward-leaning organizations are exploring custom analytics that use additional big data technologies on a variety of unstructured data sources including email, social media feeds, business transactions and full network packet payloads. To meet this demand, IBM is integrating industry-leading security intelligence capabilities with the world-class analytics capabilities of IBM InfoSphere® BigInsightsTM and related big data software and services. The combination offers a comprehensive solution — a security intelligence platform designed to detect and prioritize threats in real time, together with a mature Hadoop-based solution for custom data mining and analytics. (author)

  6. 基于流量熵的道路交通网络脆弱性优化%On Vulnerable Optimization of Traffic Road Network Based on Flow Entropy

    Institute of Scientific and Technical Information of China (English)

    曹娟; 张颖淳; 苏伯洪

    2014-01-01

    道路交通系统是社会物流实现的重要支撑,其中重要站点的故障可能造成交通系统的运营限于瘫痪,甚至产生重大的经济影响。针对道路交通网络中的相继故障问题,从动静结合的角度分析了道路交通网络的脆弱性。为了检测道路交通网络在相继故障下的脆弱性动态变化,首先建立了道路交通网络的级联反应动力学模型;然后提出该模型中脆弱性的优化设计方案,并利用算法进化得到网络的最优设计;最后利用复杂网络理论得到道路交通网络的网络结构图,通过该算例验证了提出的模型和优化方法的有效性和实际应用性。仿真实验表明该模型和方法能有效地降低交通网络的脆弱性。%Road traffic system is an important support for social logistics .The failure of a significant site may result in the paralysis of the w hole traffic system ,and even cause a significant economic damage .In this paper ,the dynamical vulnerability of the road traffic network has been explored according to the suc-cessive failures within the system .First ,a cascade reaction model of the road traffic network has been es-tablished for detecting dynamical changes of the network vulnerability facing successive failures .Then an optimal design of the model has been proposed based on evolutionary algorithm .Finally ,the complex net-work theory is applied to obtain the network structure of a road network .And this case study is given to verify the effectiveness and practical application of the proposed model and optimization algorithm .Simula-tion results show that the proposed method can effectively reduce the vulnerability of the road traffic net-work .

  7. Hydrogeologic Assessment of the Pixley National WildlifeRefuge

    Energy Technology Data Exchange (ETDEWEB)

    Quinn, Nigel W.T.

    2007-10-01

    A hydrogeological assessment of Pixley National Wildlife Refuge was conducted using published reports from the USGS and private engineering consultants that pertained to land in close proximity to the Refuge and from monitoring conducted by refuge staff in collaboration with Reclamation. The compiled data clearly show that there are a large number of agricultural wells throughout the Basin and that water levels are responsive to rates of pumping - in some cases declining more than 100 ft in a matter of a few years. Aquifer properties support a groundwater conjunctive use solution to the provision of additional water supply to the Refuge. The report provides justification for this approach.

  8. Hydrogeological modeling of prb for remediation of a contaminated site

    Science.gov (United States)

    Yang, Y. S.; McGeogh, K. L.; Kalin, R. M.

    2003-04-01

    In recent decades great effort has been spent on restoration of contaminated environment and considerable progress has been made in improving environmental quality. However, challenges still exist in some areas, such as remediation of contaminated land and groundwater. To provide sufficient remediation and protection for land and groundwater underneath, minimize environmental risk in infrastructure maintenance and urban re-development in terms of contamination remediation, it is necessary to incorporate understanding of the sub-surface conditions in the decision-making process. Characterization of regional and site-specific hydrogeological systems plays an important role in remediation of contaminated sites. Advanced modeling techniques can realize and improve characterization of complex hydrogeological systems. Numerical models can provide straightforward approaches for remediation designs. In this paper, a case study on hydrogeologic modeling of Permeable Reactive Barriers (PRB) for remediation of a contaminated site in the dockland area of Dublin, Ireland, is presented. The groundwater modeling maneuvers were carried out in three strands: regional characterization, zoom-in model in a smaller area; and detailed site-specific study. The regional hydrogeology and groundwater systems were characterized to form a regional conceptual model; a more detailed zoom-in 3-D model was further constructed in the quayside area to simulate the impact of adjacent remedial action and diurnally tidal fluctuation; finally, a site-specific model was built to study the detailed flow field and design the best remediation option. This site model was calibrated with field-monitored data under natural condition; hydraulic parameter, time varying river boundary and head-dependant boundary conditions were calibrated to achieve best fits between modeled and observed groundwater heads. The calibrated model then was used to carry out a remediation plan design using Permeable Reactive Barriers

  9. HYDROGEOLOGICAL INVESTIGATIONS OF SANDIKLI BASIN (AFYONKARAHISAR)-PRELIMINARY STUDIES

    OpenAIRE

    Seyman Aksever, Arş. Gör. Fatma; Davraz, Doç.Dr.Ayşen; Karagüzel, Prof.Dr.Remzi

    2011-01-01

    ABSTRACT The aims of this research are to determine hydrogeological and hydrogeochemical investigations of Sandıklı (Afyonkarahisar) basin and to plan of optimum groundwater management of the basin. The Sandıklı basin is situated in the west of the Aegean region and discharge to the Büyük Menderes Basin. The research area is occurred from Sandıklı Kuruçay basin and Küçük Sincanlı basin. It has 1556 km2 recharge area. The basin has a semi-closed basin property due to discharge to Kestel Ri...

  10. Traces of geologic and hydrogeologic cross sections used to develop the hydrogeologic framework model of the Death Valley regional ground-water flow system, Nevada and California

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — This digital dataset defines the traces of geologic and hydrogeologic cross sections that were used in the construction of a digital three-dimensional (3D)...

  11. Hydrogeology, Hydrogeology Districts for La Crosse County, Published in 2002, 1:4800 (1in=400ft) scale, LaCrosse County Zoning Planning & Land Information.

    Data.gov (United States)

    NSGIC GIS Inventory (aka Ramona) — This Hydrogeology dataset, published at 1:4800 (1in=400ft) scale, was produced all or in part from Published Reports/Deeds information as of 2002. It is described...

  12. Correlation of Spatio-Temporal Contaminant Distribution, Land Use, and Hydrogeological Factors in the Karst Aquifers of Northern Puerto Rico

    Science.gov (United States)

    Torres Torres, N. I.; Padilla, I. Y.

    2015-12-01

    Karst aquifers are characterized by caves, springs, and sinkholes, and typified by interconnected fissures, fractures and conduits. These characteristics make these aquifers highly productive, and vulnerable to contamination. Previous studies in the northern karst aquifers of Puerto Rico have shown significant distribution of contaminants, including volatile organic compounds, phthalates and other contaminants of emerging concern, beyond demarked sources of contamination. This study develops spatial-temporal distributions of phthalate contaminants in the karst system of northern Puerto Rico and assesses statistical correlations between hydrogeologic factors and groundwater contamination with phthalates. Geographic Information Systems (GIS) tools and technologies, and statistical models are applied to attain these objectives. Results show that there is an extensive contamination with phthalates that varies with time. Contamination is present in the confined and shallow aquifers. Di-(2-ethylhexyl) phthalate (DEHP) is the most detected contaminant (20.6% of the sites). Diethyl phthalate and and dibutyl phthalate are also detected in 6.7% and 8.24% of the sites, respectively. Phthalates detected as mixtures components are significantly detected in areas of high urban and industrial development. They are also detected in areas within 5 miles of superfund sites and landfills. The results indicate that phthalate contamination is highly related to land use. Statistical models show that the hydraulic conductivity of the aquifers, sinkholes density, and time are significantly related to the presence of phthalates in groundwater. The extensive spatio-temporal contamination suggests that contaminants can persist in the environment for long periods of time, and that land use and hydrogeological factors are important factors contributing to the presence of emerging contaminants in karst systems.

  13. MODFLOW-2000, the U.S. Geological Survey modular ground-water model -- Documentation of the Model-Layer Variable-Direction Horizontal Anisotropy (LVDA) capability of the Hydrogeologic-Unit Flow (HUF) package

    Science.gov (United States)

    Anderman, Evan R.; Kipp, K.L.; Hill, Mary C.; Valstar, Johan; Neupauer, R.M.

    2002-01-01

    This report documents the model-layer variable-direction horizontal anisotropy (LVDA) capability of the Hydrogeologic-Unit Flow (HUF) Package of MODFLOW-2000. The LVDA capability allows the principal directions of horizontal anisotropy to be different than the model-grid row and column directions, and for the directions to vary on a cell-by-cell basis within model layers. The HUF Package calculates effective hydraulic properties for model grid cells based on hydraulic properties of hydrogeologic units with thicknesses defined independently of the model layers. These hydraulic properties include, among other characteristics, hydraulic conductivity and a horizontal anisotropy ratio. Using the LVDA capability, horizontal anisotropy direction is defined for model grid cells within which one or more hydrogeologic units may occur. For each grid cell, the HUF Package calculates the effective horizontal hydraulic conductivity along the primary direction of anisotropy using the hydrogeologic-unit hydraulic conductivities, and calculates the effective horizontal hydraulic conductivity along the orthogonal anisotropy direction using the effective primary direction hydraulic conductivities and horizontal anisotropy ratios. The direction assigned to the model layer effective primary hydraulic conductivity is specified using a new data set defined by the LVDA capability, when active, to calculate coefficients needed to solve the ground-water flow equation. Use of the LVDA capability is illustrated in four simulation examples, which also serve to verify hydraulic heads, advective-travel paths, and sensitivities calculated using the LVDA capability. This version of the LVDA capability defines variable-direction horizontal anisotropy using model layers, not the hydrogeologic units defined by the HUF Package. This difference needs to be taken into account when designing model layers and hydrogeologic units to produce simulations that accurately represent a given field problem. This

  14. Potential of 3D City Models to assess flood vulnerability

    Science.gov (United States)

    Schröter, Kai; Bochow, Mathias; Schüttig, Martin; Nagel, Claus; Ross, Lutz; Kreibich, Heidi

    2016-04-01

    Vulnerability, as the product of exposure and susceptibility, is a key factor of the flood risk equation. Furthermore, the estimation of flood loss is very sensitive to the choice of the vulnerability model. Still, in contrast to elaborate hazard simulations, vulnerability is often considered in a simplified manner concerning the spatial resolution and geo-location of exposed objects as well as the susceptibility of these objects at risk. Usually, area specific potential flood loss is quantified on the level of aggregated land-use classes, and both hazard intensity and resistance characteristics of affected objects are represented in highly simplified terms. We investigate the potential of 3D City Models and spatial features derived from remote sensing data to improve the differentiation of vulnerability in flood risk assessment. 3D City Models are based on CityGML, an application scheme of the Geography Markup Language (GML), which represents the 3D geometry, 3D topology, semantics and appearance of objects on different levels of detail. As such, 3D City Models offer detailed spatial information which is useful to describe the exposure and to characterize the susceptibility of residential buildings at risk. This information is further consolidated with spatial features of the building stock derived from remote sensing data. Using this database a spatially detailed flood vulnerability model is developed by means of data-mining. Empirical flood damage data are used to derive and to validate flood susceptibility models for individual objects. We present first results from a prototype application in the city of Dresden, Germany. The vulnerability modeling based on 3D City Models and remote sensing data is compared i) to the generally accepted good engineering practice based on area specific loss potential and ii) to a highly detailed representation of flood vulnerability based on a building typology using urban structure types. Comparisons are drawn in terms of

  15. The geological, geochemical, topographical and hydrogeological characteristics of the Broubster natural analogue site, Caithness

    International Nuclear Information System (INIS)

    One of the four natural analogue sites chosen for investigation by the British Geological Survey is the uranium mineralisation at Broubster, Caithness, Scotland. Naturally occurring uranium has been leached from a thin mineralised limestone horizon and has been carried by groundwater flow into a peat bog about 100m away. This process has probably been going on for at least 5000 years. Standard surveying, hydrogeological and geochemical methods have been applied in the investigation and analysis of the area. Selected samples of the mineralisation, peat soils and associated groundwaters have been examined in detail. This report summarises the main findings accumulated since 1968 when the site was first discovered, and provides a useful information base for further modelling work. (author)

  16. The geological, geochemical, topographical and hydrogeological characteristics of the Broubster natural analogue site, Caithness

    International Nuclear Information System (INIS)

    One of the four analogue sites chosen for investigation by the British Geological Survey is the uranium mineralization at Broubster, Caithness, Scotland. Naturally occurring uranium has been leached from a thin mineralized limestone horizon and has been carried by groundwater flow into a peat bog about 100 m away. This process has probably been going on for at least 5 000 years. Standard surveying, hydrogeological and geochemical methods have been applied in the investigation and analysis of the area. Selected samples of the mineralization, peat soils and associated groundwaters have been examined in detail. This report summarizes the main findings accumulated since 1968 when the site was first discovered, and provides a useful information base for further modelling work. 27 refs.; 12 plates; 40 figs.; 17 tabs

  17. Vulnerability of mountain glaciers in China to climate change

    Institute of Scientific and Technical Information of China (English)

    YANG Jian-Ping; DING Yong-Jian; LIU Shi-Yin; TAN Chun-Ping

    2015-01-01

    Mountain glaciers in China are an important water source for both China and adjoining countries, and therefore their adaptation to glacier change is crucial in relation to maintaining populations. This study aims to improve our understanding of glacial vulnerability to climate change to establish adaptation strategies. A glacial numerical model is developed using spatial principle component analysis (SPCA) supported by remote sensing (RS) and geographical information system (GIS) technologies. The model contains nine factorsdslope, aspect, hillshade, elevation a.s.l., air temperature, precipitation, glacial area change percentage, glacial type and glacial area, describing topography, climate, and glacier characteristics. The vulnerability of glaciers to climate change is evaluated during the period of 1961e2007 on a regional scale, and in the 2030s and 2050s based on projections of air temperature and precipitation changes under the IPCC RCP6.0 scenario and of glacier change in the 21st century. Glacial vulnerability is graded into five levels:potential, light, medial, heavy, and very heavy, using natural breaks classification (NBC). The spatial distribution of glacial vulnerability and its temporal changes in the 21st century for the RCP6.0 scenario are analyzed, and the factors influencing vulnerability are discussed. Results show that mountain glaciers in China are very vulnerable to climate change, and 41.2% of glacial areas fall into the levels of heavy and very heavy vulnerability in the period 1961e2007. This is mainly explained by topographical exposure and the high sensitivity of glaciers to climate change. Trends of glacial vulnerability are projected to decline in the 2030s and 2050s, but a declining trend is still high in some regions. In addition to topographical factors, variation in precipitation in the 2030s and 2050s is found to be crucial.

  18. Water-Resources Data and Hydrogeologic Setting at the Raleigh Hydrogeologic Research Station, Wake County, North Carolina, 2005-2007

    Science.gov (United States)

    McSwain, Kristen Bukowski; Bolich, Richard E.; Chapman, Melinda J.; Huffman, Brad A.

    2009-01-01

    Water-resources data were collected to describe the hydrologic conditions at the Raleigh hydrogeologic research station, located in the Piedmont Physiographic Province of North Carolina. Data collected by the U.S. Geological Survey and the North Carolina Department of Environment and Natural Resources, Division of Water Quality, from May 2005 through September 2007 are presented in this report. Three well clusters and four piezometers were installed at the Raleigh hydrogeologic research station along an assumed flow path from recharge to discharge areas. Each well cluster includes four wells to monitor the regolith, transition zone, and shallow and deep bedrock. Borehole, surface, and waterborne geophysics were conducted to examine the lithology and physical properties of the bedrock and to determine the aerial extent of near vertical diabase dikes. Slug tests were conducted in the wells at each cluster to determine the hydraulic conductivity of the formation tapped by each well. Periodic water-level altitudes were measured in all wells and in four piezometers. Continuous hourly water levels were measured in wells for variable periods of time during the study, and a surface-water gage collected 15-minute stage data from April to June 2006. In October 2005 and April 2006, water-quality samples were collected from a tributary and in all wells at the Raleigh hydrogeologic research station. Continuous water-quality data were collected hourly in three wells from December 2005 through January 2007 and every 15 minutes in the tributary from May to June 2006. In August 2006, streambed temperatures and drive-point ground-water samples were collected across lines of section spanning the Neuse River.

  19. Geology and hydrogeology of northern Guam

    Energy Technology Data Exchange (ETDEWEB)

    Barner, W.L. [ICF Kaiser Engineers, Inc., Pittsburgh, PA (United States)

    1995-12-31

    Recent site characterization activities on the northern portion of the island of Guam have provided data challenging the perception of expected rapid flow within the karst ground water system. The main water bearing formations consist of Tertiary and Quaternary age coralline reef limestones of the Barrigada and Mariana formations. The Barrigada formation lies on top of the underlying Tertiary aged volcanics, and the younger Mariana formation overlies and onlaps the Barrigada formation as a vertical and transgressional facies, changing from a deep to a shallow water depositional sequence. Rain water rapidly infiltrates through the limestone recharging the fresh water aquifer. Conditions that affect the occurrence and extent of the fresh water aquifer are: tidal fluctuations, storm surges, stratigraphic settings, and karstification of the limestone. Evidence from boreholes drilled inland and near the coast suggest karstification has occurred between the phreatic and vadose zone at a depth of approximately 150 meters below ground surface, and within the transition zone between the fresh and salt water interface, near sea level. Although one might expect a rapid flow system in this karst aquifer, non-flashy responses on water levels in wells, and current results from a dye tracing study, suggest ground water movement is indicative of diffuse porous flow. However, flow velocity within the vadose zone has been found to be several times that occurring within the aquifer and it is very difficult to predict the direction of movement. Andersen Air Force Base, located on the northern portion of the island of Guam, has been operating since World War II after re-capturing the island from the Japanese in 1944. In the intervening years, sanitary and industrial wastes have been disposed in various trenches, borrow pits, quarries, and sinkholes. Potential ground water degradation may result if hazardous substances, in the form of leachate, are released from these disposal areas.

  20. Vulnerable groups in urban labour processes.

    OpenAIRE

    Standing G

    1987-01-01

    Explores the concept of workers' economic vulnerability, covering insecurity of income, employment and working conditions. Discusses vulnerability of workers by sector and by labour status and identifies susceptible groups (labour circulants, young workes and women).

  1. Geophysical modeling and geochemical analysis for hydrogeologic assessment of the Steamboat Hills area, Nevada

    Science.gov (United States)

    Skalbeck, John David

    2001-07-01

    Three studies constitute the hydrogeologic assessment of the Steamboat Hills area, Washoe County, Nevada. Geophysical modeling and geochemical analysis are used to assess the hydrogeologic connection between a fractured bedrock geothermal system used to produce electrical power and surrounding alluvial aquifer basins used for municipal drinking water supply. Understanding the hydrogeologic connection between these two water resources is important for long-term management of these resources. Coupled 2.75-D forward modeling of multiple gravity and aeromagnetic profiles constrained by geological and physical properties (density, magnetic susceptibility, remanent magnetic) data yields a detailed 3-D geologic model of the geothermal system and the alluvial basins. A new method is presented for modeling the geothermal reservoir based on altered physical properties of host rock that yields a reservoir volume estimate that is double the previously assumed volume. The configuration of the modeled geothermal reservoir suggests that a previously unrecognized thermal water up-flow zone may exist along the west flank of the Steamboat Hills. Model results delineate the elevation and thickness of geologic units that can be used in numerical modeling of groundwater flow, planning exploration drilling, and evaluating fully 3-D forward modeling software. The Steamboat Hills geothermal resource area offers an excellent opportunity to test an exploration strategy using magnetics. A zone of demagnetized rock within the geothermal resource area resulting from thermochemical alteration due to thermal water flow along faults and fractures is apparent as an aeromagnetic low anomaly. Anomalously low ground magnetic data delineate a fault that conducts thermal water from the geothermal system to an alluvial aquifer. Vertical magnetic susceptibility from core measurements yields an average value for altered granodiorite used in forward modeling. Permeable fractures and a major fault zone

  2. Quantification of Submarine Groundwater Discharge Using a Radon (222-Rn) Mass Balance and Hydrogeological Modelling

    Science.gov (United States)

    Petermann, Eric; Stollberg, Reiner; Scholten, Jan; Knöller, Kay; Schubert, Michael

    2016-04-01

    Apart from river and surface water runoff subsurface discharge of groundwater plays a key role in coastal water and matter budgets. Two major forms of submarine groundwater discharge (SGD) can be distinguished: (i) pure freshwater discharge from continental aquifers that are connected to the coastal sea driven by a positive hydraulic gradient (fresh SGD) and (ii) re-circulation of seawater that has penetrated permeable coastal sediments (re-circulated SGD), e.g. driven by tidal pumping. The localization of SGD zones and the quantification of SGD fluxes is of high interest for coastal water management due to potential threats related to SGD, namely (i) the detrimental impact of discharging nutrient- or contaminant-laden groundwater on coastal seawater quality, an aspect that is of relevance along coastlines which are impacted by agriculture, industry or intense urbanization, and (ii) the loss of freshwater to the ocean, an issue that is of major relevance in all coastal areas with (seasonally) limited freshwater availability. In this work, we discuss estimates for the total (fresh + re-circulated) SGD fluxes derived from a mass balance of the radioactive noble gas radon (222-Rn) with estimates of fresh SGD fluxes derived by hydrogeological modelling. The precision of the mass balance results depends on the adequate determination of the mass balance source and sink terms. These terms are calculated based on field observations of environmental tracers (salinity, δ18O, 222-Rn, 223-Ra, 224-Ra, 226-Ra) in seawater and porewater, as well as on meteorological data. The numerical hydrogeological model estimates groundwater flow based on groundwater monitoring data, river flow data, groundwater recharge estimates, tidal dynamics, and density effects along the freshwater/seawater interface. We compare these two independent methodological approaches of SGD flux estimation, discuss results regarding their relevance for the regional water balance and reason the implications of

  3. Prevalence and predictors of HIV-related stigma among institutional- and community-based caregivers of orphans and vulnerable children living in five less-wealthy countries

    Directory of Open Access Journals (Sweden)

    Messer Lynne C

    2010-08-01

    Full Text Available Abstract Background In the face of the HIV/AIDS epidemic that has contributed to the dramatic increase in orphans and abandoned children (OAC worldwide, caregiver attitudes about HIV, and HIV-related stigma, are two attributes that may affect caregiving. Little research has considered the relationship between caregiver attributes and caregiver-reported HIV-related stigma. In light of the paucity of this literature, this paper will describe HIV-related stigma among caregivers of OAC in five less wealthy nations. Methods Baseline data were collected between May 2006 through February 2008. The sample included 1,480 community-based and 192 institution-based caregivers. Characteristics of the community-based and institution-based caregivers are described using means and standard deviations for continuous variables or counts and percentages for categorical variables. We fit logistic regression models, both for the full sample and separately for community-based and institution-based caregivers, to explore predictors of acceptance of HIV. Results Approximately 80% of both community-based and institution-based caregivers were female; and 84% of institution-based caregivers, compared to 66% of community-based caregivers, said that they would be willing to care for a relative with HIV. Similar proportions were reported when caregivers were asked if they were willing to let their child play with an HIV-infected child. In a multivariable model predicting willingness to care for an HIV-infected relative, adjusted for site fixed effects, being an institution-based caregiver was associated with greater willingness (less stigma than community-based caregivers. Decreased willingness was reported by older respondents, while willingness increased with greater formal education. In the adjusted models predicting willingness to allow one's child to play with an HIV-infected child, female gender and older age was associated with less willingness. However, willingness

  4. Proceedings of the joint Russian-American hydrogeology seminar

    Energy Technology Data Exchange (ETDEWEB)

    Tsang, C.F. [ed.] [Lawrence Berkeley National Lab., CA (United States); Mironenko, V. [ed.] [Russian Academy of Sciences, St. Petersburg (Russian Federation). Inst. of Environmental Geology; Pozdniakov, S. [ed.] [Moscow State Univ. (Russian Federation)

    1997-12-31

    Hydrogeology research has been very active in both Russia and the US because of the concerns for migration of radioactive and chemical contaminants in soils and geologic formations, as well as for water problems related to mining and other industrial operations. Russian hydrogeologists have developed various analysis and field testing techniques, sometimes in parallel with US counterparts. These Proceedings come out of a Seminar held to bring together a small group (about 15) of active Russian researchers in geologic flow and transport associated with the disposal of radioactive and chemical wastes either on the soils or through deep injection wells, with a corresponding group (about 25) of American hydrogeologists. The meeting was intentionally kept small to enable informal, detailed and in-depth discussions on hydrogeological issues of common interest. Out of this interaction, the authors hope that, firstly, they will have learned from each other and secondly, that research collaborations will be established where there is the opportunity. This proceedings presents the summaries and viewgraphs from the presentations. What cannot be conveyed here is the warm and cooperative atmosphere of these interactions, both inside and outside the formal sessions, which may well lead to future collaborations.

  5. Hydrogeology and groundwater ecology: Does each inform the other?

    Science.gov (United States)

    Humphreys, W. F.

    2009-02-01

    The known, perceived and potential relationships between hydrogeology and groundwater ecology are explored, along with the spatial and temporal scale of these relations, the limit of knowledge and areas in need of research. Issues concerned with the subterranean part of the water cycle are considered from the perspective of the biology of those invertebrate animals that live, of necessity, in groundwater and the microbiological milieu essential for their survival. Groundwater ecosystems are placed in a hydrogeological context including the groundwater evolution along a flowpath, the significance of the biodiversity and of the ecosystem services potentially provided. This is considered against a background of three major components essential to the functioning of groundwater ecosystems, each of which can be affected by activities over which hydrogeologists often have control, and each, in turn, may have implications for groundwater management; these are, a place to live, oxygen and food (energy). New techniques and increasing awareness amongst hydrogeologists of the diversity and broad distribution of groundwater ecosystems offer new opportunities to develop cross disciplinary work between hydrogeologists and groundwater ecologists, already demonstrated to be a field for collaboration with broad benefits.

  6. Mapping pollution and coastal hydrogeology with helicopterborne transient electromagnetic measurements

    Science.gov (United States)

    Christensen, Niels B.; Halkjær, Max

    2014-03-01

    Coastal hydrology is becoming the focus of increasing interest for several reasons. Hydrogeological models need good boundary conditions at the coastline, and with the expected sea level rise due to climate changes, it becomes increasingly important to grasp the dynamics of coastal hydrology in order to predict the consequences of sea level rise for nature and society. We present a helicopterborne transient electromagnetic survey from a region at the North Sea coast in western Jutland, Denmark, carried out at a seriously polluted site with the dual purpose of assessing the extent of the pollution and mapping the coastal hydrogeology to provide data for remediation activities. Data are subjected to constrained inversion with one-dimensional multi-layer (smooth) models. The extent of the pollution plume estimated from a conductive anomaly in the survey results is mainly in accordance with results from other investigations, but also points to hitherto unknown directions of seepage. The interleaving of freshwater extending under the offshore shallow sea and saltwater infiltrating under the onshore freshwater aquifer can be clearly discerned and preferential flow channels are revealed.

  7. Proceedings of the joint Russian-American hydrogeology seminar

    International Nuclear Information System (INIS)

    Hydrogeology research has been very active in both Russia and the US because of the concerns for migration of radioactive and chemical contaminants in soils and geologic formations, as well as for water problems related to mining and other industrial operations. Russian hydrogeologists have developed various analysis and field testing techniques, sometimes in parallel with US counterparts. These Proceedings come out of a Seminar held to bring together a small group (about 15) of active Russian researchers in geologic flow and transport associated with the disposal of radioactive and chemical wastes either on the soils or through deep injection wells, with a corresponding group (about 25) of American hydrogeologists. The meeting was intentionally kept small to enable informal, detailed and in-depth discussions on hydrogeological issues of common interest. Out of this interaction, the authors hope that, firstly, they will have learned from each other and secondly, that research collaborations will be established where there is the opportunity. This proceedings presents the summaries and viewgraphs from the presentations. What cannot be conveyed here is the warm and cooperative atmosphere of these interactions, both inside and outside the formal sessions, which may well lead to future collaborations

  8. Climate vulnerability, communities' resilience and child labour

    OpenAIRE

    Boutin, Delphine

    2014-01-01

    This article clarifies and quantifies the causal impact of climate change vulnerability on child labour incidence and intensity. For this purpose, we create an index of vulnerability to climate change, composed of biophysical vulnerability and communities' resilience. Both, participation to economic activities and to household chores have been taken into account. We find that climate vulnerability negatively affects child labour incidence and intensity, while has no significant impact on hous...

  9. Vulnerability to Poverty: A Survey

    OpenAIRE

    Daisy Das; Ratul Mahanta

    2015-01-01

    There has been no consensus over the concept and measurement of vulnerability to poverty (VP). Many scholars bring in different perspectives to discuss various conceptual and measurement issues. This paper summarizes the available economic literature on the definitions and measurements of VP. Despite a lack of agreement, the concept of VP essentially captures the dynamic aspects of poverty, which are extremely important for formulating appropriate and effective poverty alleviation policies. T...

  10. Soil vulnerability for cesium transfer.

    Science.gov (United States)

    Vandenhove, Hildegarde; Sweeck, Lieve

    2011-07-01

    The recent events at the Fukushima Daiichi nuclear power plant in Japan have raised questions about the accumulation of radionuclides in soils and the possible impacts on agriculture surrounding nuclear power plants. This article summarizes the knowledge gained after the nuclear power plant accident in Chernobyl, Ukraine, on how soil parameters influence soil vulnerability for radiocesium bioavailability, discusses some potential agrochemical countermeasures, and presents some predictions of radiocesium crop concentrations for areas affected by the Fukushima accident. PMID:21608116

  11. Modelling of future hydrogeological conditions at SFR

    International Nuclear Information System (INIS)

    The purpose is to estimate the future groundwater movements at the SFR repository and to produce input to the quantitative safety assessment of the SFR. The future flow pattern of the groundwater is of interest, since components of the waste emplaced in a closed and abandoned repository will dissolve in the groundwater and be transported by the groundwater to the ground surface. The study is based on a system analysis approach. Three-dimensional models were devised of the studied domain. The models include the repository tunnels and the surrounding rock mass with fracture zones. The formal models used for simulation of the groundwater flow are three-dimensional mathematical descriptions of the studied hydraulic system. The studied domain is represented on four scales - regional, local, semi local and detailed - forming four models with different resolutions: regional, local, semi local and detailed models. The local and detailed models include a detailed description of the tunnel system at SFR and of surrounding rock mass and fracture zones. In addition, the detailed model includes description of the different structures that take place inside the deposition tunnels. At the area studied, the shoreline will retreat due to the shore level displacement; this process is included in the models. The studied period starts at 2000 AD and continues until a steady state like situation is reached for the surroundings of the SFR at ca 6000 AD. The models predict that as long as the sea covers the ground above the SFR, the regional groundwater flow as well as the flow in the deposition tunnels are small. However, due to the shore level displacement the shoreline (the sea) will retreat. Because of the retreating shoreline, the general direction of the groundwater flow at SFR will change, from vertical upward to a more horizontal flow; the size of the groundwater flow will be increased as well. The present layout of the SFR includes five deposition tunnels: SILO, BMA, BLA, BTF1

  12. 基于连锁故障序列分析的电网脆弱性评估%Vulnerability evaluation of power grid based on the analysis of cascading failure sequence

    Institute of Scientific and Technical Information of China (English)

    张海翔; 吕飞鹏

    2013-01-01

    电力系统的脆弱环节与连锁故障有着密切的联系,同时也是动态监测和控制的重要依据。为了有效地辨识出系统的脆弱环节,提出了基于不确定多属性决策理论的连锁故障搜索及电网脆弱性评估的新方法。首先,根据支路与支路保护之间的故障关系,建立了初始故障事件集,并计及各种引发连锁故障的因素形成实时条件下的决策矩阵,运用基于信息熵的多属性决策方法对初始故障事件进行排序,通过与设定的门槛值进行比较筛选出合适的初始故障事件;其次,基于改进的支路运行可靠性模型对后续故障进行搜索;最后,利用脆弱度函数对故障序列、节点及整个系统进行脆弱性评估。算例结果分析表明该方法具有良好的应用前景。%Critical segments in power system are closely related to cascading failure and provide important bases for dynamic monitoring and emergency control. In order to identify the critical segments, a novel method of vulnerability evaluation of power grid and cascading failure searching based on uncertain multiple attribute decision-making is proposed. Firstly, according to the relation between the branch and the protection relay on the branch, the initial fault event set is established and the decision matrix is formed in the real time by taking the various factors that trigger a chain of failures into account. By adopting the multi-attribute decision making based on information entropy, the initial fault events are sorted. By comparison with the threshold set, the proper initial fault event is screened;then the subsequent fault is searched based on the improved branch operational reliability model;finally, the fault sequence, node and the entire system are assessed by vulnerability function. The simulation results show the method has a good application prospect.

  13. Results of monitoring at Olkiluoto in 2012 - hydrology and hydrogeology

    Energy Technology Data Exchange (ETDEWEB)

    Vaittinen, T.; Ahokas, H.; Komulainen, J.; Nummela, J.; Pentti, E.; Tammisto, E.; Turku, J. [Poeyry Finland Oy, Espoo (Finland); Karvonen, T. [WaterHope, Helsinki (Finland); Aro, S.

    2013-10-15

    The impact of the construction of ONKALO is monitored by measuring and observing numerous different parameters related to hydrology, geochemistry, environment, rock mechanics and foreign materials. The Hydrological Monitoring Programme consists of the following parameters: groundwater level, hydraulic head, flow conditions in open drillholes, transverse flow, hydraulic conductivity, groundwater salinity (in situ EC), precipitation (including snow), sea-water level, surface flow (runoff), infiltration, ground frost, leakages in tunnels, and water balance in the tunnel system and in Korvensuo Reservoir. This Report focuses on hydrogeological parameters. Other parameters, like precipitation, ground frost etc. will be reported in the Monitoring Report of Environment. Updated monitoring program was introduced in the beginning of 2012. The updated program will be used for the period before repository operation. Only minor changes were implemented. Monitoring has been carried out according to plan. This Report presents the results for the year 2012. The access tunnel was excavated from chainage 4913 m to chainage 4987 m in 2012. In addition, demonstration tunnel 2 from chainage 65 m to 101 m and some technical facilities were excavated. Total inflow into ONKALO down to chainage 4580 m including shaft ONK-KU2 down to level -427m was 36 l/min at the end of 2012. The mapping of water leakages and moisture conditions on the tunnel walls and the ceiling has been continued. The general pattern of leakages has remained similar during the construction of ONKALO. Most significant differences are caused by seasonal effects like condensation of warm ventilation air on tunnel walls and ceiling. The changes observed in the groundwater level in shallow observation tubes in the overburden and in shallow drillholes in the bedrock are not necessarily caused by the construction of ONKALO. However, weak indications of a local decrease in groundwater level have been observed. Effects on the

  14. Results of monitoring at Olkiluoto in 2013. Hydrology and hydrogeology

    Energy Technology Data Exchange (ETDEWEB)

    Vaittinen, T.; Ahokas, H.; Komulainen, J.; Nummela, J.; Pentti, E.; Turku, J. [Poeyry Finland Oy, Vantaa (Finland); Karvonen, T. [WaterHope, Helsinki (Finland); Aro, S.

    2014-12-15

    The impact of the construction of ONKALO is monitored by measuring and observing numerous different parameters related to hydrology, geochemistry, environment, rock mechanics and foreign materials. The Hydrological Monitoring Programme consists of the following parameters: groundwater level, hydraulic head, flow conditions in open drillholes, transverse flow, hydraulic conductivity, groundwater salinity (in situ EC), precipitation (including snow), sea-water level, surface flow (runoff), infiltration, ground frost, leakages in tunnels, and water balance in the tunnel system and in Korvensuo Reservoir. This Report focuses on hydrogeological parameters. Other parameters, like precipitation, ground frost etc. will be reported in the Monitoring Report of Environment. Updated monitoring program was introduced in the beginning of 2012. The updated program will be used for the period before repository operation. Only minor changes were implemented. Monitoring has been carried out according to plan. This Report presents the results for the year 2013. Excavation of the access tunnel was completed in 2012. Demonstration tunnels 3 and 4 were excavated and central tunnel 1 was continued from chainage 4366-22 m to chainage 4366-60 m in 2013. Total inflow into ONKALO down to chainage 4580 m including shaft ONK-KU2 down to level -437 m was on average 35 l/min in 2013. The mapping of water leakages and moisture conditions on the tunnel walls and the ceiling has been continued. The general pattern of leakages has remained similar during the construction of ONKALO. Most significant differences are caused by seasonal effects like condensation of warm ventilation air on tunnel walls and ceiling. The changes observed in the groundwater level in observation tubes in the overburden and in shallow drillholes in the bedrock are not necessarily caused by the construction of ONKALO. However, weak indications of a local decrease in groundwater level have been observed. Effects on the head

  15. Results of monitoring at Olkiluoto in 2012 - hydrology and hydrogeology

    International Nuclear Information System (INIS)

    The impact of the construction of ONKALO is monitored by measuring and observing numerous different parameters related to hydrology, geochemistry, environment, rock mechanics and foreign materials. The Hydrological Monitoring Programme consists of the following parameters: groundwater level, hydraulic head, flow conditions in open drillholes, transverse flow, hydraulic conductivity, groundwater salinity (in situ EC), precipitation (including snow), sea-water level, surface flow (runoff), infiltration, ground frost, leakages in tunnels, and water balance in the tunnel system and in Korvensuo Reservoir. This Report focuses on hydrogeological parameters. Other parameters, like precipitation, ground frost etc. will be reported in the Monitoring Report of Environment. Updated monitoring program was introduced in the beginning of 2012. The updated program will be used for the period before repository operation. Only minor changes were implemented. Monitoring has been carried out according to plan. This Report presents the results for the year 2012. The access tunnel was excavated from chainage 4913 m to chainage 4987 m in 2012. In addition, demonstration tunnel 2 from chainage 65 m to 101 m and some technical facilities were excavated. Total inflow into ONKALO down to chainage 4580 m including shaft ONK-KU2 down to level -427m was 36 l/min at the end of 2012. The mapping of water leakages and moisture conditions on the tunnel walls and the ceiling has been continued. The general pattern of leakages has remained similar during the construction of ONKALO. Most significant differences are caused by seasonal effects like condensation of warm ventilation air on tunnel walls and ceiling. The changes observed in the groundwater level in shallow observation tubes in the overburden and in shallow drillholes in the bedrock are not necessarily caused by the construction of ONKALO. However, weak indications of a local decrease in groundwater level have been observed. Effects on the

  16. Results of monitoring at Olkiluoto in 2013. Hydrology and hydrogeology

    International Nuclear Information System (INIS)

    The impact of the construction of ONKALO is monitored by measuring and observing numerous different parameters related to hydrology, geochemistry, environment, rock mechanics and foreign materials. The Hydrological Monitoring Programme consists of the following parameters: groundwater level, hydraulic head, flow conditions in open drillholes, transverse flow, hydraulic conductivity, groundwater salinity (in situ EC), precipitation (including snow), sea-water level, surface flow (runoff), infiltration, ground frost, leakages in tunnels, and water balance in the tunnel system and in Korvensuo Reservoir. This Report focuses on hydrogeological parameters. Other parameters, like precipitation, ground frost etc. will be reported in the Monitoring Report of Environment. Updated monitoring program was introduced in the beginning of 2012. The updated program will be used for the period before repository operation. Only minor changes were implemented. Monitoring has been carried out according to plan. This Report presents the results for the year 2013. Excavation of the access tunnel was completed in 2012. Demonstration tunnels 3 and 4 were excavated and central tunnel 1 was continued from chainage 4366-22 m to chainage 4366-60 m in 2013. Total inflow into ONKALO down to chainage 4580 m including shaft ONK-KU2 down to level -437 m was on average 35 l/min in 2013. The mapping of water leakages and moisture conditions on the tunnel walls and the ceiling has been continued. The general pattern of leakages has remained similar during the construction of ONKALO. Most significant differences are caused by seasonal effects like condensation of warm ventilation air on tunnel walls and ceiling. The changes observed in the groundwater level in observation tubes in the overburden and in shallow drillholes in the bedrock are not necessarily caused by the construction of ONKALO. However, weak indications of a local decrease in groundwater level have been observed. Effects on the head

  17. Vulnerability Assessments in Ethical Hacking

    Directory of Open Access Journals (Sweden)

    Ashiqur Rahman ,

    2016-06-01

    Full Text Available Ethical hackers use the same methods and techniques to test and bypass a system's defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found, they document them and provide actionable advice on how to fix them so the organization can improve its overall security. The purpose of ethical hacking is to evaluate the security of a network or system's infrastructure. It entails finding and attempting to exploit any vulnerabilities to determine whether unauthorized access or other malicious activities are possible. Vulnerabilities tend to be found in poor or improper system configuration, known and unknown hardware or software flaws, and operational weaknesses in process or technical countermeasures. One of the first examples of ethical hacking occurred in the 1970s, when the United States government used groups of experts called "red teams" to hack its own computer systems. It has become a sizable sub-industry within the information security market and has expanded to also cover the physical and human elements of an organization's defenses. A successful test doesn't necessarily mean a network or system is 100% secure, but it should be able to withstand automated attacks and unskilled hackers.

  18. Combined geophysical and petrophysical characterization to support a hydrogeological model of a coastal environment

    Science.gov (United States)

    Burschil, Thomas; Wiederhold, Helga; Scheer, Wolfgang; Kirsch, Reinhard; Krawczyk, Charlotte M.

    2014-05-01

    Global warming affects the water cycle by changing precipitation/evaporation and raising sea level. Especially groundwater systems in sensitive environments, such as coastal areas or barrier islands, have to be evaluated with respect to the potential reduction of water quality, e.g. salinization by saltwater intrusion (Hinsby et al., 2012). To assess these hazards using groundwater modeling we need a strong base of hydraulic and hydrogeological information. The use of integrated geophysical methods, in combination with a petrophysical characterization, provides a reliable architecture for groundwater modeling. Within the EU-project CLIWAT, we investigated the hydrogeological situation of the North Sea island of Föhr in Schleswig-Holstein (Germany). The island was mainly formed during glaciations in Pleistocene Series, especially Saalian and Weichselian Stages. These deposits remain as a Geest core in the southern central part, and house a freshwater lens that is used for the local water supply. To investigate the architecture of the fresh water lens, we carried out several surveys with airborne electromagnetic (AEM), seismic reflection, and borehole methods. To enhance the AEM resistivity model we inverted the data with a-priori constraints from seismic reflections (Burschil et al., 2012a). This constrained inversion leads to, among other things, a separation of two aquifers by resistivity data. Additionally, from borehole logs, vertical seismic profiles (VSP), and nearby AEM inversion point models we are able to petrophysically characterize different lithological categories regarding resistivity and seismic velocity. Subsurface glacial structures, e.g. buried valleys and a push moraine complex, are mapped down to 150 m below sea level. Below this rather horizontal features indicate Tertiary layers. Geophysically determined petrophysical values were correlated with lithological categories to enhance the interpretation of geophysical data. In this way, we expose

  19. Factors affecting public-supply well vulnerability in two karst aquifers

    Science.gov (United States)

    Musgrove, MaryLynn; Katz, Brian G.; Fahlquist, Lynne S.; Crandall, Christy A.; Lindgren, Richard J.

    2014-01-01

    Karst aquifers occur in a range of climatic and geologic settings. Nonetheless, they are commonly characterized by their vulnerability to water-quality impairment. Two karst aquifers, the Edwards aquifer in south-central Texas and the Upper Floridan aquifer in western Florida, were investigated to assess factors that control the movement of contaminants to public-supply wells (PSWs). The geochemistry of samples from a selected PSW or wellfield in each aquifer was compared with that from nearby monitoring wells and regional PSWs. Geochemistry results were integrated with age tracers, flow modeling, and depth-dependent data to refine aquifer conceptual models and to identify factors that affect contaminant movement to PSWs. The oxic Edwards aquifer is vertically well mixed at the selected PSW/wellfield, although regionally the aquifer is geochemically variable downdip. The mostly anoxic Upper Floridan aquifer is affected by denitrification and also is geochemically variable with depth. In spite of considerable differences in geology and hydrogeology, the two aquifers are similarly vulnerable to anthropogenic contamination. Vulnerability in studied PSWs in both aquifers is strongly influenced by rapid karst flowpaths and the dominance of young (karst groundwater management.

  20. Assessment of groundwater vulnerability and sensitivity to pollution in Berrechid plain, using drastic model

    Directory of Open Access Journals (Sweden)

    M. Aboulouafa*1

    2016-06-01

    Full Text Available The Groundwater protection and management is vital for human evolution, socio-economic development and ecological diversity, because it is one of the most valuable natural resources. Agricultural and industrial activities, more and more intensive and significant population growth, have contributed to the degradation of Berrechid Groundwater quality. The present study aimed to assess the vulnerability of Berrechid aquifer using the DRASTIC models. The application of the methodology developed has needed the establishment of a Geographical Information System synthesizing a considerable mass of data (geological, hydrogeological, geophysical, etc., constitutes a real tool to aid in the decision for the managers of water resources in the region of Chaouia. The results show that three classes of vulnerability are observed in the study area: the higher drastic indices appear at the areas with low groundwater table depth and the areas which are not protected by the clays, and the areas less vulnerable are located in areas where the water is deeper and the clays recovery is important.