WorldWideScience

Sample records for displaying differential vulnerability

  1. Differential display-mediated identification of three drought

    Indian Academy of Sciences (India)

    L.) O. Kuntze], a woody and perennial plant of commercial importance. Using differential display of mRNA, three drought-modulated expressed sequence tags (ESTs) were identified. Northern and BLAST analysis revealed that clone dr1 ...

  2. Predicting risk in space: Genetic markers for differential vulnerability to sleep restriction

    Science.gov (United States)

    Goel, Namni; Dinges, David F.

    2012-08-01

    Several laboratories have found large, highly reliable individual differences in the magnitude of cognitive performance, fatigue and sleepiness, and sleep homeostatic vulnerability to acute total sleep deprivation and to chronic sleep restriction in healthy adults. Such individual differences in neurobehavioral performance are also observed in space flight as a result of sleep loss. The reasons for these stable phenotypic differential vulnerabilities are unknown: such differences are not yet accounted for by demographic factors, IQ or sleep need, and moreover, psychometric scales do not predict those individuals cognitively vulnerable to sleep loss. The stable, trait-like (phenotypic) inter-individual differences observed in response to sleep loss—with intraclass correlation coefficients accounting for 58-92% of the variance in neurobehavioral measures—point to an underlying genetic component. To this end, we utilized multi-day highly controlled laboratory studies to investigate the role of various common candidate gene variants—each independently—in relation to cumulative neurobehavioral and sleep homeostatic responses to sleep restriction. These data suggest that common genetic variations (polymorphisms) involved in sleep-wake, circadian, and cognitive regulation may serve as markers for prediction of inter-individual differences in sleep homeostatic and neurobehavioral vulnerability to sleep restriction in healthy adults. Identification of genetic predictors of differential vulnerability to sleep restriction—as determined from candidate gene studies—will help identify astronauts most in need of fatigue countermeasures in space flight and inform medical standards for obtaining adequate sleep in space. This review summarizes individual differences in neurobehavioral vulnerability to sleep deprivation and ongoing genetic efforts to identify markers of such differences.

  3. Interactive exploration of the vulnerability of the human infrastructure: an approach using simultaneous display of similar locations

    Science.gov (United States)

    Ceré, Raphaël; Kaiser, Christian

    2015-04-01

    Currently, three quarters of the Swiss population is living in urban areas. The total population is still increasing, and urbanized space is increasing event faster. Consequently, the intensity of use has decreased but the exposure of the urban space to natural events has grown along with the cost related to the impact of hazards. In line with this fact, during the 20th century there has been a noticeable increase of natural disasters accompanied by the rapid increase of the world population, leading to higher costs. Additionally to the fact that more people are exposed to natural hazards, the value of goods globally has increased more than proportionally. Consequently, the vulnerability of urban space is, more than ever before, a major issue for socio-economic development. Here, vulnerability is defined as the potential human loss or loss of infrastructure caused by a hazardous event. It encompasses factors of urban infrastructure, population and the environment, which increase the susceptibility of a location to the impact of hazards. This paper describes a novel method for improving the interactive use of exploratory data analysis in the context of minimizing vulnerability and disaster risk by prevention or mitigation. This method is used to assess the similarity between different locations with respect to several characteristics relevant to vulnerability at different scales, allowing for automatic display of multiple locations similar to the one under investigation by an expert. Visualizing vulnerability simultaneously for several locations allows for analyzing and comparing of metric characteristics between multiple places and at different scales. The interactivity aspect is also useful for understanding vulnerability patterns and it facilitates disaster risk management and decisions on global preventive measures in urban spaces. Metrics for vulnerability assessment can be extracted from extensive geospatial datasets such as high-resolution digital elevation

  4. Comparison of independent screens on differentially vulnerable motor neurons reveals alpha-synuclein as a common modifier in motor neuron diseases.

    Science.gov (United States)

    Kline, Rachel A; Kaifer, Kevin A; Osman, Erkan Y; Carella, Francesco; Tiberi, Ariana; Ross, Jolill; Pennetta, Giuseppa; Lorson, Christian L; Murray, Lyndsay M

    2017-03-01

    The term "motor neuron disease" encompasses a spectrum of disorders in which motor neurons are the primary pathological target. However, in both patients and animal models of these diseases, not all motor neurons are equally vulnerable, in that while some motor neurons are lost very early in disease, others remain comparatively intact, even at late stages. This creates a valuable system to investigate the factors that regulate motor neuron vulnerability. In this study, we aim to use this experimental paradigm to identify potential transcriptional modifiers. We have compared the transcriptome of motor neurons from healthy wild-type mice, which are differentially vulnerable in the childhood motor neuron disease Spinal Muscular Atrophy (SMA), and have identified 910 transcriptional changes. We have compared this data set with published microarray data sets on other differentially vulnerable motor neurons. These neurons were differentially vulnerable in the adult onset motor neuron disease Amyotrophic Lateral Sclerosis (ALS), but the screen was performed on the equivalent population of neurons from neurologically normal human, rat and mouse. This cross species comparison has generated a refined list of differentially expressed genes, including CELF5, Col5a2, PGEMN1, SNCA, Stmn1 and HOXa5, alongside a further enrichment for synaptic and axonal transcripts. As an in vivo validation, we demonstrate that the manipulation of a significant number of these transcripts can modify the neurodegenerative phenotype observed in a Drosophila line carrying an ALS causing mutation. Finally, we demonstrate that vector-mediated expression of alpha-synuclein (SNCA), a transcript decreased in selectively vulnerable motor neurons in all four screens, can extend life span, increase weight and decrease neuromuscular junction pathology in a mouse model of SMA. In summary, we have combined multiple data sets to identify transcripts, which are strong candidates for being phenotypic modifiers

  5. [Characteristics of temporal-spatial differentiation in landscape pattern vulnerability in Nansihu Lake wetland, China.

    Science.gov (United States)

    Liang, Jia Xin; Li, Xin Ju

    2018-02-01

    With remote sensing images from 1985, 2000 Lantsat 5 TM and 2015 Lantsat 8 OLI as data sources, we tried to select the suitable research scale and examine the temporal-spatial diffe-rentiation with such scale in the Nansihu Lake wetland by using landscape pattern vulnerability index constructed by sensitivity index and adaptability index, and combined with space statistics such as semivariogram and spatial autocorrelation. The results showed that 1 km × 1 km equidistant grid was the suitable research scale, which could eliminate the influence of spatial heterogeneity induced by random factors. From 1985 to 2015, the landscape pattern vulnerability in the Nansihu Lake wetland deteriorated gradually. The high-risk area of landscape pattern vulnerability dramatically expanded with time. The spatial heterogeneity of landscape pattern vulnerability increased, and the influence of non-structural factors on landscape pattern vulnerability strengthened. Spatial variability affected by spatial autocorrelation slightly weakened. Landscape pattern vulnerability had strong general spatial positive correlation, with the significant form of spatial agglomeration. The positive spatial autocorrelation continued to increase and the phenomenon of spatial concentration was more and more obvious over time. The local autocorrelation mainly based on high-high accumulation zone and low-low accumulation zone had stronger spatial autocorrelation among neighboring space units. The high-high accumulation areas showed the strongest level of significance, and the significant level of low-low accumulation zone increased with time. Natural factors, such as temperature and precipitation, affected water-level and landscape distribution, and thus changed the landscape patterns vulnerability of Nansihu Lake wetland. The dominant driver for the deterioration of landscape patterns vulnerability was human activities, including social economy activity and policy system.

  6. Social rank-associated stress vulnerability predisposes individuals to cocaine attraction.

    Science.gov (United States)

    Yanovich, Chen; Kirby, Michael L; Michaelevski, Izhak; Yadid, Gal; Pinhasov, Albert

    2018-01-29

    Studies of personality have suggested that dissimilarities in ability to cope with stressful situations results in differing tendency to develop addictive behaviors. The present study used selectively bred stress-resilient, socially-dominant (Dom) and stress-vulnerable, socially-submissive (Sub) mice to investigate the interaction between environmental stress and inbred predisposition to develop addictive behavior to cocaine. In a Conditioned Place Preference (CPP) paradigm using cocaine, Sub mice displayed an aversion to drug, whereas Dom mice displayed drug attraction. Following a 4-week regimen of Chronic Mild Stress (CMS), Sub mice in CPP displayed a marked increase (>400%) in cocaine attraction, whereas Dom mice did not differ in attraction from their non-stressed state. Examination of hippocampal gene expression revealed in Sub mice, exposure to external stimuli, stress or cocaine, increased CRH expression (>100%), which was evoked in Dom mice only by cocaine exposure. Further, stress-induced decreases in DRD1 (>60%) and DRD2 (>50%) expression in Sub mice differed markedly from a complete lack of change in Dom mice. From our findings, we propose that social stratification dictates vulnerability to stress-induced attraction that may lead to addiction via differential regulation of hippocampal response to dopaminergic input, which in turn may influence differing tendency to develop addictive behaviors.

  7. Expression of cardiac neural crest and heart genes isolated by modified differential display.

    Science.gov (United States)

    Martinsen, Brad J; Groebner, Nathan J; Frasier, Allison J; Lohr, Jamie L

    2003-08-01

    The invasion of the cardiac neural crest (CNC) into the outflow tract (OFT) and subsequent outflow tract septation are critical events during vertebrate heart development. We have performed four modified differential display screens in the chick embryo to identify genes that may be involved in CNC, OFT, secondary heart field, and heart development. The screens included differential display of RNA isolated from three different axial segments containing premigratory cranial neural crest cells; of RNA from distal outflow tract, proximal outflow tract, and atrioventricular tissue of embryonic chick hearts; and of RNA isolated from left and right cranial tissues, including the early heart fields. These screens have resulted in the identification of the five cDNA clones presented here, which are expressed in the cardiac neural crest, outflow tract and developing heart in patterns that are unique in heart development.

  8. Childhood adversity and adult depression among the incarcerated: differential exposure and vulnerability by race/ethnicity and gender.

    Science.gov (United States)

    Roxburgh, Susan; MacArthur, Kelly Rhea

    2014-08-01

    The relationship between childhood adversity and adult depression is well-established but less is known about the association between childhood adversity and adult depression among the incarcerated. In this paper, we examine differential exposure and vulnerability to childhood adversity by race/ethnicity and gender on adult depression among the incarcerated in the United States. We address three research questions: does exposure to childhood adverse experiences vary by race/ethnicity and gender? Is there an association between these childhood adverse events and depression and does the strength of the association vary by the specific adverse experiences? And does vulnerability to childhood adversity vary by gender and race/ethnicity? Using the 2004 Survey of Inmates in State and Federal Correctional Facilities (SI-SFCF), we measure four key childhood adverse events - parental/caretaker substance abuse, physical assault, having been placed in foster care, and sexual assault. We use ordinary least squares regression and a series of interaction effect analyses to examine differential exposure and vulnerability to the four childhood adverse experiences by race/ethnicity and gender. Incarcerated women are more likely to report parental substance abuse, but all inmates/prisoners are similarly vulnerable to this experience. For the other three adverse experiences measured, we find that there are important racial/ethnic and gender differences in both exposure and vulnerability. African American men and women are more vulnerable to the effects of physical and sexual victimization than White and Hispanic men and women. Women are much more likely to be exposed to sexual victimization, but men who report this experience are significantly more depressed. Hispanic women and White men and women are more likely to report foster care, but all inmates/prisoners who report foster care experiences are significantly more depressed than other inmates/prisoners, with the exception of

  9. Differentially displayed expressed sequence tags in Melipona scutellaris (Hymenoptera, Apidae, Meliponini) development.

    Science.gov (United States)

    Santana, Flávia A; Nunes, Francis M F; Vieira, Carlos U; Machado, Maria Alice M S; Kerr, Warwick E; Silva, Wilson A; Bonetti, Ana Maria

    2006-03-01

    We have compared gene expression, using the Differential Display Reverse Transcriptase-Polymerase Chain Reaction (DDRT-PCR) technique, by means of mRNA profile in Melipona scutellaris during ontogenetic postembryonic development, in adult worker, and in both Natural and Juvenile Hormone III-induced adult queen. Six, out of the nine ESTs described here, presented differentially expressed in the phases L1 or L2, or even in both of them, suggesting that key mechanisms to the development of Melipona scutellaris are regulated in these stages. The combination HT11G-AP05 revealed in L1 and L2 a product which matches to thioredoxin reductase protein domain in the Clostridium sporogenes, an important protein during cellular oxidoreduction processes. This study represents the first molecular evidence of differential gene expression profiles toward a description of the genetic developmental traits in the genus Melipona.

  10. Differentially displayed expressed sequence tags in Melipona scutellaris (Hymenoptera, Apidae, Meliponini development

    Directory of Open Access Journals (Sweden)

    Santana Flávia A.

    2006-01-01

    Full Text Available We have compared gene expression, using the Differential Display Reverse Transcriptase - Polymerase Chain Reaction (DDRT-PCR technique, by means of mRNA profile in Melipona scutellaris during ontogenetic postembryonic development, in adult worker, and in both Natural and Juvenile Hormone III-induced adult queen. Six, out of the nine ESTs described here, presented differentially expressed in the phases L1 or L2, or even in both of them, suggesting that key mechanisms to the development of Melipona scutellaris are regulated in these stages. The combination HT11G-AP05 revealed in L1 and L2 a product which matches to thioredoxin reductase protein domain in the Clostridium sporogenes, an important protein during cellular oxidoreduction processes. This study represents the first molecular evidence of differential gene expression profiles toward a description of the genetic developmental traits in the genus Melipona.

  11. Fluorescent differential display analysis of Lactobacillus sakei strains under stress conditions.

    Science.gov (United States)

    Bonomo, Maria Grazia; Sico, Maria Anna; Grieco, Simona; Salzano, Giovanni

    2010-07-01

    Lactobacillus (Lb.) sakei is widely used as starter in the production process of Italian fermented sausages and its growth and survival are affected by various factors such as temperature, pH and salt concentration. We studied the behaviour of Lb. sakei strains under various growth conditions relative to acid, osmotic and heat stress treatments by a novel fluorescent differential display (FDD) technique. This study obtained the development and the optimization of a technique that allows the identification of genome expression changes, associated with differential microbial behaviour under different stress conditions with a better stress response definition and a better discrimination of starter cultures. DNA sequence information from the FDD products provided an important tool to assess and observe the response to a variety of environmental stimuli and the adaptation to bacterial stress. Our work provided an innovative FDD method, with a high level of reproducibility and quality for studying and probing the knowledge of the relation between differential genome expression and different stresses tolerance. Copyright (c) 2010 Elsevier B.V. All rights reserved.

  12. Categorisation of typical vulnerability patterns in global drylands

    NARCIS (Netherlands)

    Sietz, D.; Lûdeke, M.K.B.; Walther, C.

    2011-01-01

    Drylands display specific vulnerability-creating mechanisms which threaten ecosystems and human well-being. The upscaling of successful interventions to reduce vulnerability arises as an important, but challenging aim, since drylands are not homogenous. To support this aim, we present the first

  13. Involvement of the histamine H4 receptor in clozapine-induced hematopoietic toxicity: Vulnerability under granulocytic differentiation of HL-60 cells

    International Nuclear Information System (INIS)

    Goto, Aya; Mouri, Akihiro; Nagai, Tomoko; Yoshimi, Akira; Ukigai, Mako; Tsubai, Tomomi; Hida, Hirotake; Ozaki, Norio; Noda, Yukihiro

    2016-01-01

    Clozapine is an effective antipsychotic for treatment-resistant schizophrenia, but can cause fatal hematopoietic toxicity as agranulocytosis. To elucidate the mechanism of hematopoietic toxicity induced by clozapine, we developed an in vitro assay system using HL-60 cells, and investigated the effect on hematopoiesis. HL-60 cells were differentiated by all-trans retinoic acid (ATRA) into three states according to the following hematopoietic process: undifferentiated HL-60 cells, those undergoing granulocytic ATRA-differentiation, and ATRA-differentiated granulocytic cells. Hematopoietic toxicity was evaluated by analyzing cell survival, cell proliferation, granulocytic differentiation, apoptosis, and necrosis. In undifferentiated HL-60 cells and ATRA-differentiated granulocytic cells, both clozapine (50 and 100 μM) and doxorubicin (0.2 µM) decreased the cell survival rate, but olanzapine (1–100 µM) did not. Under granulocytic differentiation for 5 days, clozapine, even at a concentration of 25 μM, decreased survival without affecting granulocytic differentiation, increased caspase activity, and caused apoptosis rather than necrosis. Histamine H 4 receptor mRNA was expressed in HL-60 cells, whereas the expression decreased under granulocytic ATRA-differentiation little by little. Both thioperamide, a histamine H 4 receptor antagonist, and DEVD-FMK, a caspase-3 inhibitor, exerted protection against clozapine-induced survival rate reduction, but not of live cell counts. 4-Methylhistamine, a histamine H 4 receptor agonist, decreased the survival rate and live cell counts, as did clozapine. HL-60 cells under granulocytic differentiation are vulnerable under in vitro assay conditions to hematopoietic toxicity induced by clozapine. Histamine H 4 receptor is involved in the development of clozapine-induced hematopoietic toxicity through apoptosis, and may be a potential target for preventing its occurrence through granulocytic differentiation. - Highlights: • HL-60

  14. CALBINDIN CONTENT AND DIFFERENTIAL VULNERABILITY OF MIDBRAIN EFFERENT DOPAMINERGIC NEURONS IN MACAQUES

    Directory of Open Access Journals (Sweden)

    Iria G Dopeso-Reyes

    2014-12-01

    Full Text Available Calbindin (CB is a calcium binding protein reported to protect dopaminergic neurons from degeneration. Although a direct link between CB content and differential vulnerability of dopaminergic neurons has long been accepted, factors other than CB have also been suggested, particularly those related to the dopamine transporter. Indeed, several studies have reported that CB levels are not causally related to the differential vulnerability of dopaminergic neurons against neurotoxins. Here we have used dual stains for tyrosine hydroxylase (TH and CB in 3 control and 3 MPTP-treated monkeys to visualize dopaminergic neurons in the ventral tegmental area (VTA and in the dorsal and ventral tiers of the substantia nigra pars compacta (SNcd and SNcv co-expressing TH and CB. In control animals, the highest percentages of co-localization were found in VTA (58.2%, followed by neurons located in the SNcd (34.7%. As expected, SNcv neurons lacked CB expression. In MPTP-treated animals, the percentage of CB-ir/TH-ir neurons in the VTA was similar to control monkeys (62.1%, whereas most of the few surviving neurons in the SNcd were CB-ir/TH-ir (88.6%. Next, we have elucidated the presence of CB within identified nigrostriatal and nigroextrastriatal midbrain dopaminergic projection neurons. For this purpose, two control monkeys received one injection of Fluoro-Gold into the caudate nucleus and one injection of cholera toxin (CTB into the postcommissural putamen, whereas two more monkeys were injected with CTB into the internal division of the globus pallidus. As expected, all the nigrocaudate- and nigroputamen-projecting neurons were TH-ir, although surprisingly, all of these nigrostriatal-projecting neurons were negative for CB. Furthermore, all the nigropallidal-projecting neurons co-expressed both TH and CB. In summary, although CB-ir dopaminergic neurons seem to be less prone to MPTP-induced degeneration, our data clearly demonstrated that these neurons are not

  15. Involvement of the histamine H{sub 4} receptor in clozapine-induced hematopoietic toxicity: Vulnerability under granulocytic differentiation of HL-60 cells

    Energy Technology Data Exchange (ETDEWEB)

    Goto, Aya; Mouri, Akihiro; Nagai, Tomoko; Yoshimi, Akira; Ukigai, Mako; Tsubai, Tomomi; Hida, Hirotake [Division of Clinical Sciences and Neuropsychopharmacology, Faculty and Graduate School of Pharmacy, Meijo University, 150 Yagotoyama, Tempaku-ku, Nagoya 468-8503 (Japan); Ozaki, Norio [Department of Psychiatry, Graduate School of Medicine, Nagoya University, 65 Tsurumai-cho, Showa-ku, Nagoya 466-8550 (Japan); Noda, Yukihiro, E-mail: ynoda@meijo-u.ac.jp [Division of Clinical Sciences and Neuropsychopharmacology, Faculty and Graduate School of Pharmacy, Meijo University, 150 Yagotoyama, Tempaku-ku, Nagoya 468-8503 (Japan)

    2016-09-01

    Clozapine is an effective antipsychotic for treatment-resistant schizophrenia, but can cause fatal hematopoietic toxicity as agranulocytosis. To elucidate the mechanism of hematopoietic toxicity induced by clozapine, we developed an in vitro assay system using HL-60 cells, and investigated the effect on hematopoiesis. HL-60 cells were differentiated by all-trans retinoic acid (ATRA) into three states according to the following hematopoietic process: undifferentiated HL-60 cells, those undergoing granulocytic ATRA-differentiation, and ATRA-differentiated granulocytic cells. Hematopoietic toxicity was evaluated by analyzing cell survival, cell proliferation, granulocytic differentiation, apoptosis, and necrosis. In undifferentiated HL-60 cells and ATRA-differentiated granulocytic cells, both clozapine (50 and 100 μM) and doxorubicin (0.2 µM) decreased the cell survival rate, but olanzapine (1–100 µM) did not. Under granulocytic differentiation for 5 days, clozapine, even at a concentration of 25 μM, decreased survival without affecting granulocytic differentiation, increased caspase activity, and caused apoptosis rather than necrosis. Histamine H{sub 4} receptor mRNA was expressed in HL-60 cells, whereas the expression decreased under granulocytic ATRA-differentiation little by little. Both thioperamide, a histamine H{sub 4} receptor antagonist, and DEVD-FMK, a caspase-3 inhibitor, exerted protection against clozapine-induced survival rate reduction, but not of live cell counts. 4-Methylhistamine, a histamine H{sub 4} receptor agonist, decreased the survival rate and live cell counts, as did clozapine. HL-60 cells under granulocytic differentiation are vulnerable under in vitro assay conditions to hematopoietic toxicity induced by clozapine. Histamine H{sub 4} receptor is involved in the development of clozapine-induced hematopoietic toxicity through apoptosis, and may be a potential target for preventing its occurrence through granulocytic differentiation

  16. Aren't we all vulnerable: why do vulnerability analysis?

    Energy Technology Data Exchange (ETDEWEB)

    Moench, Marcus

    2011-11-15

    The idea of 'vulnerability' is widely-used shorthand for the disproportionate impacts that climate change will have on high-risk groups and fragile ecosystems. Decision makers increasingly want to target adaptation funding to those people and environments most affected by climate change. They must also be able to monitor the effectiveness of their investments. Vulnerability analysis is sometimes presented as the solution to these wants and needs — but existing approaches are often of little use: at best, they reiterate what we already know; at worst, they are used to justify entrenched agendas. To be truly useful as a basis for dialogue, action and accountability, the meaning of 'vulnerability' must be clarified and the methods for analysing it greatly strengthened. This means establishing standard, replicable approaches that differentiate between the roles and exposure of stakeholders, systems and institutions.

  17. Vulnerable Hunter

    OpenAIRE

    Md.Asha Begum; Y.VishnuPriya; V.ManoranjanBabu; ,O.Srinivasu

    2016-01-01

    This project "VULNERABLE HUNTER" application main aim is to detect risk in our mobile applications. This application contains modules like Fetch Application, Generate Score, Uninstall and Display Graph. Through this application it detects risk so that this application is very useful to smart phone users Now-a-days so many people are using smart phones and people are crazy about new apps. But by installing all the applications into our mobile may reduce its performance. Some apps c...

  18. Vulnerability to cavitation, hydraulic efficiency, growth and survival in an insular pine (Pinus canariensis).

    Science.gov (United States)

    López, Rosana; López de Heredia, Unai; Collada, Carmen; Cano, Francisco Javier; Emerson, Brent C; Cochard, Hervé; Gil, Luis

    2013-06-01

    It is widely accepted that hydraulic failure due to xylem embolism is a key factor contributing to drought-induced mortality in trees. In the present study, an attempt is made to disentangle phenotypic plasticity from genetic variation in hydraulic traits across the entire distribution area of a tree species to detect adaptation to local environments. A series of traits related to hydraulics (vulnerability to cavitation and hydraulic conductivity in branches), growth performance and leaf mass per area were assessed in eight Pinus canariensis populations growing in two common gardens under contrasting environments. In addition, the neutral genetic variability (FST) and the genetic differentiation of phenotypic variation (QST) were compared in order to identify the evolutionary forces acting on these traits. The variability for hydraulic traits was largely due to phenotypic plasticity. Nevertheless, the vulnerability to cavitation displayed a significant genetic variability (approx. 5 % of the explained variation), and a significant genetic × environment interaction (between 5 and 19 % of the explained variation). The strong correlation between vulnerability to cavitation and survival in the xeric common garden (r = -0·81; P < 0·05) suggests a role for the former in the adaptation to xeric environments. Populations from drier sites and higher temperature seasonality were less vulnerable to cavitation than those growing at mesic sites. No trade-off between xylem safety and efficiency was detected. QST of parameters of the vulnerability curve (0·365 for P50 and the slope of the vulnerability curve and 0·452 for P88) differed substantially from FST (0·091), indicating divergent selection. In contrast, genetic drift alone was found to be sufficient to explain patterns of differentiation for xylem efficiency and growth. The ability of P. canariensis to inhabit a wide range of ecosystems seemed to be associated with high phenotypic plasticity and some degree of local

  19. Isolation of stress responsive Psb A gene from rice (Oryza sativa l.) using differential display.

    Science.gov (United States)

    Tyagi, Aruna; Chandra, Arti

    2006-08-01

    Differential display (DD) experiments were performed on drought-tolerant rice (Oryza sativa L.) genotype N22 to identify both upregulated and downregulated partial cDNAs with respect to moisture stress. DNA polymorphism was detected between drought-stressed and control leaf tissues on the DD gels. A partial cDNA showing differential expression, with respect to moisture stress was isolated from the gel. Northern blotting analysis was performed using this cDNA as a probe and it was observed that mRNA corresponding to this transcript was accumulated to high level in rice leaves under water deficit stress. At the DNA sequence level, the partial cDNA showed homology with psb A gene encoding for Dl protein.

  20. Prospective risk factors for adolescent PTSD: sources of differential exposure and differential vulnerability.

    Science.gov (United States)

    Milan, Stephanie; Zona, Kate; Acker, Jenna; Turcios-Cotto, Viana

    2013-02-01

    There are two types of risk factors for developing PTSD: factors that increase the likelihood of experiencing a potentially traumatizing event and factors that increase the likelihood of developing symptoms following such events. Using prospective data over a two-year period from a large, diverse sample of urban adolescents (n = 1242, Mean age = 13.5), the current study differentiates these two sources of risk for developing PTSD in response to violence exposure. Five domains of potential risk and protective factors were examined: community context (e.g., neighborhood poverty), family risk (e.g., family conflict), behavioral maladjustment (e.g., internalizing symptoms), cognitive vulnerabilities (e.g., low IQ), and interpersonal problems (e.g., low social support). Time 1 interpersonal violence history, externalizing behaviors, and association with deviant peers were the best predictors of subsequent violence, but did not further increase the likelihood of PTSD in response to violence. Race/ethnicity, thought disorder symptoms, and social problems were distinctly predictive of the development of PTSD following violence exposure. Among youth exposed to violence, Time 1 risk factors did not predict specific event features associated with elevated PTSD rates (e.g., parent as perpetrator), nor did interactions between Time 1 factors and event features add significantly to the prediction of PTSD diagnosis. Findings highlight areas for refinement in adolescent PTSD symptom measures and conceptualization, and provide direction for more targeted prevention and intervention efforts.

  1. Social vulnerability assessment of flood risk using GIS-based multicriteria decision analysis. A case study of Vila Nova de Gaia (Portugal

    Directory of Open Access Journals (Sweden)

    Paulo Fernandez

    2016-07-01

    Full Text Available Over the last decade, flood disasters have affected millions of people and caused massive economic losses. Social vulnerability assessment uses a combination of several factors to represent a population's differential access to resources and its ability to cope with and respond to hazards. In this paper, social vulnerability assessment to flood risk was applied to the third most populous Portuguese municipality. The study was developed at the neighbourhood level, allowing for social vulnerability analysis at inter civil parish, intra civil parish, and municipality scales. A geographic information system-based multicriteria decision analysis (GIS-MCDA was applied to social vulnerability and allows for an increased understanding and improved monitoring of social vulnerability over space, identifying ‘hot spots’ that require adaptation policies. Mafamude, Oliveira do Douro, Vila Nova de Gaia, and Avintes civil parishes display the greatest vulnerability to flooding. According to the most pessimistic scenario 57%–68% of the area of these civil parishes is classed at a high or very high level of social vulnerability. The GIS-MCDA helps to assess what and who is at risk, and where targeted impact-reduction strategies should be implemented. The results demonstrate the importance of an urban-scale approach instead of a river basin scale to urban flood risk management plans.

  2. Analysis on expression of gene for flower shape in Dendrobium sonia mutants using differential display technique

    International Nuclear Information System (INIS)

    Affrida Abu Hassan; Ahmad Syazni Kamarudin; Nurul Nadia Aminuddin; Mohd Nazir Basiran

    2004-01-01

    In vitro mutagenesis on Dendrobium Sonia in MINT has produced mutants with wide range of flower form and colour variations. Among the mutants are plants with different flower size and shape. These changes could be caused by alterations to the expression level of the genes responsible for the characteristics. In this studies, Differential Display technique was used to identify and analyse altered gene expression at the mRNA level. Total RNA of the control and mutants were reversed transcribed using three anchored oligo-d T primers. Subsequently, these cDNAs were Pcr amplified in combination with 16 arbitrary primers. The amplified products were electrophoresed side by side on agarose gel. Differentially expressed bands are isolated for further analysis. (Author)

  3. The Relationship between Grandiose and Vulnerable (Hypersensitive Narcissism

    Directory of Open Access Journals (Sweden)

    Emanuel Jauk

    2017-09-01

    Full Text Available Narcissistic grandiosity is characterized by overt expressions of feelings of superiority and entitlement, while narcissistic vulnerability reflects hypersensitivity and introversive self-absorbedness. Clinical evidence suggests that grandiosity is accompanied by vulnerable aspects, pointing to a common foundation. Subclinical personality research, however, views grandiose and vulnerable narcissism as independent traits. Grandiose narcissism displays substantial correlation with extraversion, while vulnerable narcissism correlates highly with introversion. We investigated if (1 controlling for intro-/extraversion might reveal a “common core” of grandiose and vulnerable narcissism, and if (2 the correlation between both aspects might be higher at higher levels of narcissism. Latent variable structural equation modeling and segmented regression analysis confirmed these hypotheses in a large non-clinical sample (N = 1,006. Interindividual differences in intro-/extraversion mask the common core of grandiose and vulnerable narcissism. The association between both aspects increases at high levels (upper 10% of grandiose narcissism, which suggests a possible transition to clinically relevant (pathological narcissism.

  4. The Relationship between Grandiose and Vulnerable (Hypersensitive) Narcissism

    Science.gov (United States)

    Jauk, Emanuel; Weigle, Elena; Lehmann, Konrad; Benedek, Mathias; Neubauer, Aljoscha C.

    2017-01-01

    Narcissistic grandiosity is characterized by overt expressions of feelings of superiority and entitlement, while narcissistic vulnerability reflects hypersensitivity and introversive self-absorbedness. Clinical evidence suggests that grandiosity is accompanied by vulnerable aspects, pointing to a common foundation. Subclinical personality research, however, views grandiose and vulnerable narcissism as independent traits. Grandiose narcissism displays substantial correlation with extraversion, while vulnerable narcissism correlates highly with introversion. We investigated if (1) controlling for intro-/extraversion might reveal a “common core” of grandiose and vulnerable narcissism, and if (2) the correlation between both aspects might be higher at higher levels of narcissism. Latent variable structural equation modeling and segmented regression analysis confirmed these hypotheses in a large non-clinical sample (N = 1,006). Interindividual differences in intro-/extraversion mask the common core of grandiose and vulnerable narcissism. The association between both aspects increases at high levels (upper 10%) of grandiose narcissism, which suggests a possible transition to clinically relevant (pathological) narcissism. PMID:28955288

  5. Expanded cardiac rehabilitation in socially vulnerable patients with myocardial infarction

    DEFF Research Database (Denmark)

    Hald, Kathrine; Nielsen, Kirsten Melgaard; Nielsen, Claus Vinther

    2018-01-01

    ). The patients were defined as socially vulnerable or non-socially vulnerable according to their educational level and their social network. A complete follow-up was achieved. INTERVENTION: A socially differentiated CR intervention. The intervention consisted of standard CR and additionally a longer phase II......OBJECTIVE: Cardiac rehabilitation (CR) has been shown to reduce cardiovascular risk. A research project performed at a university hospital in Denmark offered an expanded CR intervention to socially vulnerable patients. One-year follow-up showed significant improvements concerning medicine...... compliance, lipid profile, blood pressure and body mass index when compared with socially vulnerable patients receiving standard CR. The aim of the study was to perform a long-term follow-up on the socially differentiated CR intervention and examine the impact of the intervention on all-cause mortality...

  6. Development and Optimization of a Fluorescent Differential Display PCR System for Analyzing the Stress Response in Lactobacillus sakei Strains

    Directory of Open Access Journals (Sweden)

    Giovanni Salzano

    2009-11-01

    Full Text Available Lactobacillus sakei is widely used as starter in the production process of Italian fermented sausages and its growth and survival are affected by various factors. We studied the differential expression of genome in response to different stresses by the fluorescent differential display (FDD technique. This study resulted in the development and optimization of an innovative technique, with a high level of reproducibility and quality, which allows the identification of gene expression changes associated with different microbial behaviours under different growth conditions.

  7. Primer design for a prokaryotic differential display RT-PCR.

    Science.gov (United States)

    Fislage, R; Berceanu, M; Humboldt, Y; Wendt, M; Oberender, H

    1997-05-01

    We have developed a primer set for a prokaryotic differential display of mRNA in the Enterobacteriaceae group. Each combination of ten 10mer and ten 11mer primers generates up to 85 bands from total Escherichia coli RNA, thus covering expressed sequences of a complete bacterial genome. Due to the lack of polyadenylation in prokaryotic RNA the type T11VN anchored oligonucleotides for the reverse transcriptase reaction had to be replaced with respect to the original method described by Liang and Pardee [ Science , 257, 967-971 (1992)]. Therefore, the sequences of both the 10mer and the new 11mer oligonucleotides were determined by a statistical evaluation of species-specific coding regions extracted from the EMBL database. The 11mer primers used for reverse transcription were selected for localization in the 3'-region of the bacterial RNA. The 10mer primers preferentially bind to the 5'-end of the RNA. None of the primers show homology to rRNA or other abundant small RNA species. Randomly sampled cDNA bands were checked for their bacterial origin either by re-amplification, cloning and sequencing or by re-amplification and direct sequencing with 10mer and 11mer primers after asymmetric PCR.

  8. Identification of Powdery Mildew Responsive Genes in Hevea brasiliensis through mRNA Differential Display

    Science.gov (United States)

    Li, Xiang; Bi, Zhenghong; Di, Rong; Liang, Peng; He, Qiguang; Liu, Wenbo; Miao, Weiguo; Zheng, Fucong

    2016-01-01

    Powdery mildew is an important disease of rubber trees caused by Oidium heveae B. A. Steinmann. As far as we know, none of the resistance genes related to powdery mildew have been isolated from the rubber tree. There is little information available at the molecular level regarding how a rubber tree develops defense mechanisms against this pathogen. We have studied rubber tree mRNA transcripts from the resistant RRIC52 cultivar by differential display analysis. Leaves inoculated with the spores of O. heveae were collected from 0 to 120 hpi in order to identify pathogen-regulated genes at different infection stages. We identified 78 rubber tree genes that were differentially expressed during the plant–pathogen interaction. BLAST analysis for these 78 ESTs classified them into seven functional groups: cell wall and membrane pathways, transcription factor and regulatory proteins, transporters, signal transduction, phytoalexin biosynthesis, other metabolism functions, and unknown functions. The gene expression for eight of these genes was validated by qRT-PCR in both RRIC52 and the partially susceptible Reyan 7-33-97 cultivars, revealing the similar or differential changes of gene expressions between these two cultivars. This study has improved our overall understanding of the molecular mechanisms of rubber tree resistance to powdery mildew. PMID:26840302

  9. Vulnerability of families with children with intestinal stomas

    Directory of Open Access Journals (Sweden)

    Clara Ferraz Lazarini Zacarin

    2014-06-01

    Full Text Available Intestinal stomas cause transformations in the body and create specific and continuous needs for care that imply in hospitalization and surgeries. In this context, we applied the concept of family vulnerability in order to identify the vulnerability of the family living with a child who has intestinal stoma. It is a qualitative study which interviewed the mothers of children with this chronic condition. We used narrative analysis based on the concept of family vulnerability. The results display that the family has gone through previous noteworthy experiences associated with the child’s condition. The family cares for the child on their own and seeks ways to control the situation and regain autonomy, hoping for stoma reversal. Based on the concept of vulnerability, we observed that these families can be considered vulnerable, for they experience threats to their autonomy, but are moved by the hope of reversal and intestinal tract reconstruction. doi: 10.5216/ree.v16i2.26639.

  10. Watching sexy displays improves hatching success and offspring growth through maternal allocation.

    Science.gov (United States)

    Loyau, Adeline; Lacroix, Frédéric

    2010-11-22

    Male attractiveness can have tremendous effects on the fitness of his offspring via good genes, but also via enhanced maternal allocation of resources. Yet the proximate mechanisms influencing differential maternal allocation in relation to male sexiness are poorly known. Here, we studied the importance of visual stimulation for maternal allocation in the Houbara bustard, a vulnerable bird species bred in captivity to support wild populations. Artificial insemination allowed controlling for potential confounding factors, such as a male's territory quality, social interactions or sperm quality/quantity, probably linked to mate attractiveness. We show that artificially inseminated females stimulated by highly displaying males increased their hatching success, owing to increased fertilization success. The females also increased the allocation of maternal androgens in their eggs, leading to an increase of circulating testosterone and growth rate in chicks. Hence, visual stimulation of the females can promote differential maternal allocation and favour offspring fitness. Our results further suggest that using artificial insemination for species conservation without appropriate stimulation of the breeding females probably has negative impacts on their breeding performance and therefore on population viability.

  11. Sex-driven vulnerability in stress and drug abuse.

    Science.gov (United States)

    Berry, Alessandra; Raggi, Carla; Borgi, Marta; Cirulli, Francesca

    2016-01-01

    A growing body of literature shows that a link exists between substance abuse and stress and that the crosstalk of sex hormones with the neuroendocrine system might differently prime vulnerability to drug addiction in male and female subjects. Thus, understanding the neurobiological mechanisms of addiction and the identification of sex-driven determinants in vulnerability to drug abuse may help to better devise and/or implement strategic (pharmacological, behavioural, social) interventions to prevent or face the issue of addiction. Differences between sexes can be found at all stages of life (in both the animal model and human studies) and may account for genetic, epigenetic and environmental/hormonal factors that in turn affect the functionality of the whole organism leading also to a sex-driven differential vulnerability or resilience to non-communicable pathologies. These include the onset and precipitation of stress-related psychiatric disorders as well as "substance-related and addictive disorders" (as defined in the DSM-V). This paper reviews the scientific literature highlighting significant differences in male and female subjects in stress and neuroendocrine function and the implications for sex-dependent differential vulnerability to drug addiction.

  12. Insulin signaling displayed a differential tissue-specific response to low-dose dihydrotestosterone in female mice.

    Science.gov (United States)

    Andrisse, Stanley; Billings, Katelyn; Xue, Ping; Wu, Sheng

    2018-04-01

    Hyperandrogenemia and hyperinsulinemia are believed to play prominent roles in polycystic ovarian syndrome (PCOS). We explored the effects of low-dose dihydrotestosterone (DHT), a model of PCOS, on insulin signaling in metabolic and reproductive tissues in a female mouse model. Insulin resistance in the energy storage tissues is associated with type 2 diabetes. Insulin signaling in the ovaries and pituitary either directly or indirectly stimulates androgen production. Energy storage and reproductive tissues were isolated and molecular assays were performed. Livers and white adipose tissue (WAT) from DHT mice displayed lower mRNA and protein expression of insulin signaling intermediates. However, ovaries and pituitaries of DHT mice exhibited higher expression levels of insulin signaling genes/proteins. Insulin-stimulated p-AKT levels were blunted in the livers and WAT of the DHT mice but increased or remained the same in the ovaries and pituitaries compared with controls. Glucose uptake decreased in liver and WAT but was unchanged in pituitary and ovary of DHT mice. Plasma membrane GLUTs were decreased in liver and WAT but increased in ovary and pituitary of DHT mice. Skeletal muscle insulin-signaling genes were not lowered in DHT mice compared with control. DHT mice did not display skeletal muscle insulin resistance. Insulin-stimulated glucose transport increased in skeletal muscles of DHT mice compared with controls. DHT mice were hyperinsulinemic. However, the differential mRNA and protein expression pattern was independent of hyperinsulinemia in cultured hepatocytes and pituitary cells. These findings demonstrate a differential effect of DHT on the insulin-signaling pathway in energy storage vs. reproductive tissues independent of hyperinsulinemia.

  13. Differential strain vulnerability to binge eating behaviors in rats.

    Science.gov (United States)

    Hildebrandt, Britny A; Klump, Kelly L; Racine, Sarah E; Sisk, Cheryl L

    2014-03-29

    Binge eating is a significantly heritable phenotype, but efforts to detect specific risk genes have fallen short. Identification of animal strain differences in risk for binge eating could highlight genetic differences across individuals of the same species that can be exploited in future animal and molecular genetic research. The current study aimed to explore strain differences in risk for binge eating in Sprague-Dawley versus Wistar female rats using the Binge Eating Resistant/Binge Eating Prone model. A sample of male Sprague-Dawley rats, a known low-risk group for binge eating, was included as a comparison group. A total of 83 rats (23 Wistar females, 30 Sprague-Dawley females, 30 Sprague-Dawley males) completed a protocol of intermittently administered, palatable food. Binge eating prone (BEP) and binge eating resistant (BER) rats were identified using a tertile approach. Sprague-Dawley female rats consumed the highest amount of palatable food and were more likely to be classified as BEP compared to Wistar female and Sprague-Dawley male rats. Wistar female rats were not significantly different from Sprague-Dawley male rats in their palatable food intake and tendency to be classified as BER rather than BEP. Sprague-Dawley female rats appear to be a particularly vulnerable genotype for binge eating. Comparisons between this group and others could help identify specific genetic/biological factors that differentiate it from lower risk groups. The reward system, linked to binge eating in humans, is a possible candidate to explore. Strain differences in the reward system could help increase understanding of individual differences in risk for binge eating in humans. Copyright © 2014 Elsevier Inc. All rights reserved.

  14. Differential display technique of RNA from tumorigenic and non-tumorigenic variants of hamster cells transformed with avian sarcoma virus

    International Nuclear Information System (INIS)

    Leksa, V.; Altaner, C.

    1997-01-01

    Differential display technique was applied to study expression of RNA in tumorigenic and non-tumorigenic cell variants of avian sarcoma virus transformed hamster cells. Methodical conditions were worked out, which allowed identifying a cDNA fragment of an unknown gene expressed in non-tumorigenic cell variant only. Its role in tumor suppression remains to be determined. (author)

  15. Antibody complementarity-determining regions (CDRs can display differential antimicrobial, antiviral and antitumor activities.

    Directory of Open Access Journals (Sweden)

    Luciano Polonelli

    Full Text Available BACKGROUND: Complementarity-determining regions (CDRs are immunoglobulin (Ig hypervariable domains that determine specific antibody (Ab binding. We have shown that synthetic CDR-related peptides and many decapeptides spanning the variable region of a recombinant yeast killer toxin-like antiidiotypic Ab are candidacidal in vitro. An alanine-substituted decapeptide from the variable region of this Ab displayed increased cytotoxicity in vitro and/or therapeutic effects in vivo against various bacteria, fungi, protozoa and viruses. The possibility that isolated CDRs, represented by short synthetic peptides, may display antimicrobial, antiviral and antitumor activities irrespective of Ab specificity for a given antigen is addressed here. METHODOLOGY/PRINCIPAL FINDINGS: CDR-based synthetic peptides of murine and human monoclonal Abs directed to: a a protein epitope of Candida albicans cell wall stress mannoprotein; b a synthetic peptide containing well-characterized B-cell and T-cell epitopes; c a carbohydrate blood group A substance, showed differential inhibitory activities in vitro, ex vivo and/or in vivo against C. albicans, HIV-1 and B16F10-Nex2 melanoma cells, conceivably involving different mechanisms of action. Antitumor activities involved peptide-induced caspase-dependent apoptosis. Engineered peptides, obtained by alanine substitution of Ig CDR sequences, and used as surrogates of natural point mutations, showed further differential increased/unaltered/decreased antimicrobial, antiviral and/or antitumor activities. The inhibitory effects observed were largely independent of the specificity of the native Ab and involved chiefly germline encoded CDR1 and CDR2 of light and heavy chains. CONCLUSIONS/SIGNIFICANCE: The high frequency of bioactive peptides based on CDRs suggests that Ig molecules are sources of an unlimited number of sequences potentially active against infectious agents and tumor cells. The easy production and low cost of small

  16. The SAVI Vulnerability Analysis Software Package

    International Nuclear Information System (INIS)

    Mc Aniff, R.J.; Paulus, W.K.; Key, B.; Simpkins, B.

    1987-01-01

    SAVI (Systematic Analysis of Vulnerability to Intrusion) is a new PC-based software package for modeling Physical Protection Systems (PPS). SAVI utilizes a path analysis approach based on the Adversary Sequence Diagram (ASD) methodology. A highly interactive interface allows the user to accurately model complex facilities, maintain a library of these models on disk, and calculate the most vulnerable paths through any facility. Recommendations are provided to help the user choose facility upgrades which should reduce identified path vulnerabilities. Pop-up windows throughout SAVI are used for the input and display of information. A menu at the top of the screen presents all options to the user. These options are further explained on a message line directly below the menu. A diagram on the screen graphically represents the current protection system model. All input is checked for errors, and data are presented in a logical and clear manner. Print utilities provide the user with hard copies of all information and calculated results

  17. Climate Change Vulnerability Analysis of Baluran National Park

    Directory of Open Access Journals (Sweden)

    Beny Harjadi

    2016-12-01

    Full Text Available Every ecosystem has a different level of susceptibility to environmental disturbances it receives, both from natural factors or anthropogenic disturbance. National Park (NP Baluran is one national park that has a representation of a complete ecosystem that includes upland forest ecosystems, lowland forests, coastal forests, mangroves, savanna and evergreen forest. The objective of this study is to get a formula calculation of vulnerability analysis of constant and dynamic factors. Baluran NP vulnerability assessment to climate change done by looking at the dynamic and fixed factors. Vulnerability remains a vulnerability factor to the condition of the original (control, whereas vulnerability is the vulnerability of the dynamic change factors which affected the condition from the outside. Constant Vulnerability (CV in  Baluran NP dominated resistant conditions (61%, meaning that the geomorphology and other fixed factors (slope and slope direction/aspect, then the condition in Baluran NP sufficiently resilient to climate change. Dynamic Vulnerability (DV is the vulnerability of an area or areas that change because of pressure from external factors. DV is influenced by climatic factors (WI = Wetness Index, soil (SBI = Soil Brightness Index, and vegetation (GI = Greenness Index. DV in  Baluran NP from 1999 to 2010 shifted from the original category of being (84.76% and shifted to the susceptible (59.88%.  The role of remote sensing for the analysis of raster digital system, while the geographic information system to display the results of cartographic maps.

  18. Oligo-dT anchored cDNA-SCoT: a novel differential display method for analyzing differential gene expression in response to several stress treatments in mango (Mangifera indica L.).

    Science.gov (United States)

    Luo, Cong; He, Xin-Hua; Hu, Ying; Yu, Hai-xia; Ou, Shi-Jin; Fang, Zhong-Bin

    2014-09-15

    Differential display is a powerful technique for analyzing differences in gene expression. Oligo-dT cDNAstart codon targeted marker (cDNA-SCoT) technique is a novel, simple, cheap, rapid, and efficient method for differential gene expression research. In the present study, the oligo-dT anchored cDNA-SCoT technique was exploited to identify differentially expressed genes during several stress treatments in mango. A total of 37 primers combined with oligo-dT anchor primers 3side amplified approximately 150 fragments of 150 bp to 1500 bp in length. Up to 100 fragments were differentially expressed among the stress treatments and control samples, among which 92 were obtained and sequenced. Out of the 92 transcript derived fragments (TDFs), 70% were highly homologous to known genes, and 30% encoded unclassified proteins with unknown functions. The expression pattern of nine genes with known functions involved in several abiotic stresses in other species was confirmed by quantitative reverse transcription polymerase chain reaction (qRT-PCR) under cold (4 °C), salinity (NaCl), polyethylene glycol (PEG, MW 6000), and heavy metal treatments in leaves and stems at different time points (0, 24, 48, and 72 h). The expression patterns of the genes (TDF4, TDF7, TDF23, TDF45, TDF49, TDF50, TDF57, TDF91 and TDF92) that had direct or indirect relationships with cold, salinity, drought and heavy metal stress response were analyzed through qRT-PCR. The possible roles of these genes are discussed. This study suggests that the oligo-dT anchored cDNA-SCoT differential display method is a useful tool to serve as an initial step for characterizing transcriptional changes induced by abiotic stresses and provide gene information for further study and application in genetic improvement and breeding in mango. Copyright © 2014 Elsevier B.V. All rights reserved.

  19. Differential use of danger and safety signals in an animal model of anxiety vulnerability: The behavioral economics of avoidance.

    Science.gov (United States)

    Spiegler, Kevin M; Fortress, Ashley M; Pang, Kevin C H

    2018-03-02

    Differential processing of danger and safety signals may underlie symptoms of anxiety disorders and posttraumatic stress disorder. One symptom common to these disorders is pathological avoidance. The present study examined whether danger and safety signals influence avoidance differently in anxiety-vulnerable Wistar-Kyoto (WKY) rats and Sprague Dawley (SD) rats. SD and WKY rats were tested in a novel progressive ratio avoidance task with and without danger or safety signals. Two components of reinforcement, hedonic value and motivation, were determined by fitting an exponentiated demand equation to the data. Hedonic value of avoidance did not differ between SD and WKY rats, but WKY rats had greater motivation to avoid than SD rats. Removal of the safety signal reduced motivation to avoid in SD, but not WKY, rats. Removal of the danger signal did not alter avoidance in either strain. When danger and safety signals were presented simultaneously, WKY rats responded to the danger signals, whereas SD rats responded to the safety signal. The results provide evidence that 1) safety signals enhance motivation to avoid in SD rats, 2) both danger and safety signals influence motivation in WKY rats, and 3) danger signals take precedence over safety signals when presented simultaneously in WKY rats. Thus, anxiety vulnerability is associated with preferential use of danger signals to motivate avoidance. The differential use of danger and safety signals has important implications for the etiology and treatment of pathological avoidance in anxiety disorders and posttraumatic stress disorder. Copyright © 2017. Published by Elsevier Inc.

  20. Situating Hazard Vulnerability: People's Negotiations with Wildfire Environments in the U.S. Southwest

    Science.gov (United States)

    Collins, Timothy W.; Bolin, Bob

    2009-09-01

    This article is based on a multimethod study designed to clarify influences on wildfire hazard vulnerability in Arizona’s White Mountains, USA. Findings reveal that multiple factors operating across scales generate socially unequal wildfire risks. At the household scale, conflicting environmental values, reliance on fire insurance and firefighting institutions, a lack of place dependency, and social vulnerability (e.g., a lack of financial, physical, and/or legal capacity to reduce risks) were found to be important influences on wildfire risk. At the regional-scale, the shift from a resource extraction to environmental amenity-based economy has transformed ecological communities, produced unequal social distributions of risks and resources, and shaped people’s social and environmental interactions in everyday life. While working-class locals are more socially vulnerable than amenity migrants to wildfire hazards, they have also been more active in attempting to reduce risks in the aftermath of the disastrous 2002 Rodeo-Chediski fire. Social tensions between locals and amenity migrants temporarily dissolved immediately following the disaster, only to be exacerbated by the heightened perception of risk and the differential commitment to hazard mitigation displayed by these groups over a 2-year study period. Findings suggest that to enhance wildfire safety, environmental managers should acknowledge the environmental benefits associated with hazardous landscapes, the incentives created by risk management programs, and the specific constraints to action for relevant social groups in changing human-environmental context.

  1. Climate Vulnerability and Human Migration in Global Perspective

    Science.gov (United States)

    Grecequet, Martina; DeWaard, Jack; Hellmann, Jessica J.; Abel, Guy J.

    2018-01-01

    The relationship between climate change and human migration is not homogenous and depends critically on the differential vulnerability of population and places. If places and populations are not vulnerable, or susceptible, to climate change, then the climate–migration relationship may not materialize. The key to understanding and, from a policy perspective, planning for whether and how climate change will impact future migration patterns is therefore knowledge of the link between climate vulnerability and migration. However, beyond specific case studies, little is known about this association in global perspective. We therefore provide a descriptive, country-level portrait of this relationship. We show that the negative association between climate vulnerability and international migration holds only for countries least vulnerable to climate change, which suggests the potential for trapped populations in more vulnerable countries. However, when analyzed separately by life supporting sector (food, water, health, ecosystem services, human habitat, and infrastructure) and vulnerability dimension (exposure, sensitivity, and adaptive capacity), we detect evidence of a relationship among more, but not the most, vulnerable countries. The bilateral (i.e., country-to-country) migration show that, on average, people move from countries of higher vulnerability to lower vulnerability, reducing global risk by 15%. This finding is consistent with the idea that migration is a climate adaptation strategy. Still, ~6% of bilateral migration is maladaptive with respect to climate change, with some movement toward countries with greater climate change vulnerability. PMID:29707262

  2. Climate Vulnerability and Human Migration in Global Perspective.

    Science.gov (United States)

    Grecequet, Martina; DeWaard, Jack; Hellmann, Jessica J; Abel, Guy J

    2017-05-01

    The relationship between climate change and human migration is not homogenous and depends critically on the differential vulnerability of population and places. If places and populations are not vulnerable, or susceptible, to climate change, then the climate-migration relationship may not materialize. The key to understanding and, from a policy perspective, planning for whether and how climate change will impact future migration patterns is therefore knowledge of the link between climate vulnerability and migration. However, beyond specific case studies, little is known about this association in global perspective. We therefore provide a descriptive, country-level portrait of this relationship. We show that the negative association between climate vulnerability and international migration holds only for countries least vulnerable to climate change, which suggests the potential for trapped populations in more vulnerable countries. However, when analyzed separately by life supporting sector (food, water, health, ecosystem services, human habitat, and infrastructure) and vulnerability dimension (exposure, sensitivity, and adaptive capacity), we detect evidence of a relationship among more, but not the most, vulnerable countries. The bilateral (i.e., country-to-country) migration show that, on average, people move from countries of higher vulnerability to lower vulnerability, reducing global risk by 15%. This finding is consistent with the idea that migration is a climate adaptation strategy. Still, ~6% of bilateral migration is maladaptive with respect to climate change, with some movement toward countries with greater climate change vulnerability.

  3. The "weakest link" as an indicator of cognitive vulnerability differentially predicts symptom dimensions of anxiety in adolescents in China.

    Science.gov (United States)

    Wang, Junyi; Wang, Danyang; Cui, Lixia; McWhinnie, Chad M; Wang, Li; Xiao, Jing

    2017-08-01

    This multiwave longitudinal study examined the cognitive vulnerability-stress component of hopelessness theory to differentially predict symptom dimensions of anxiety using a "weakest link" approach in a sample of adolescents from Hunan Province, China. Baseline and 6-month follow-up data were obtained from 553 middle-school students. During an initial assessment, participants completed measures of assessing their weakest links, anxious symptoms, and the occurrence of stress. Participants subsequently completed measures assessing stress, and anxious symptoms one a month for six months. Higher weakest link scores were associated with greater increases in the harm avoidance and separation anxiety/panic dimensions, but not the physical or social anxiety dimension, of anxious symptoms following stress in Chinese adolescents. These results support the applicability of the "weakest link" approach, derived from hopelessness theory, in Chinese adolescents. Weakest link scores as cognitive vulnerability factors may play a role in the development of anxious symptoms, especially in the cognitive dimensions (e.g., harm avoidance and separation anxiety/panic). Our findings also have potential value in explaining the effectiveness of cognitive relevant therapy in treating the cognitive dimensions of anxious symptoms. Copyright © 2017 Elsevier Ltd. All rights reserved.

  4. Narcissistic grandiosity and narcissistic vulnerability in psychotherapy.

    Science.gov (United States)

    Pincus, Aaron L; Cain, Nicole M; Wright, Aidan G C

    2014-10-01

    This article briefly summarizes the empirical and clinical literature underlying a contemporary clinical model of pathological narcissism. Unlike the DSM Narcissistic Personality Disorder (NPD), this clinical model identifies and differentiates between two phenotypic themes of dysfunction-narcissistic grandiosity and narcissistic vulnerability-that can be expressed both overtly and covertly in patients' ways of thinking, feeling, behaving, and participating in treatment. Clinical recognition that narcissistic patients can and often do present for psychotherapy in vulnerable states of depression, anxiety, shame, and even suicidality increases the likelihood of accurate diagnosis and effective treatment planning. This article provides case examples derived from psychotherapies with narcissistic patients to demonstrate how narcissistic grandiosity and narcissistic vulnerability concurrently present in patients who seek treatment. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  5. Vulnerable Genders, Vulnerable Loves

    DEFF Research Database (Denmark)

    Schleicher, Marianne

    2015-01-01

    This chapter analyses religious reflections on vulnerable genders and vulnerable loves from the Hebrew Bible to early Rabbinic literature. It is based on theories by inter alia Donna Haraway on complex identities, Turner and Maryanski on love as a prerequisite for survival, Michel Foucault...... on gathering knowledge and its often unpremeditated effect of recognition and inclusion, and Judith Butler on cultural intelligibility and subversion from within. With these theories as a departing point for the analysis, the chapter links the vulnerability of complex identities with the vulnerability...... of cultures which leads to the overall understanding that culture can accommodate complex identities associated with individual and cultural vulnerability as long as the overall survival of the culture is not threatened. This understanding questions the feasibility of the ethical position of thinkers...

  6. Mapping vulnerability to multiple stressors: climate change and globalization in India

    Energy Technology Data Exchange (ETDEWEB)

    O' Brien, Karen; Aandahl, Guro; Tompkins, Heather [CICERO, Oslo (NO)] (and others)

    2004-12-01

    There is growing recognition in the human dimensions research community that climate change impact studies must take into account the effects of other ongoing global changes. Yet there has been no systematic methodology to study climate change vulnerability in the context of multiple stressors. Using the example of Indian agriculture, this paper presents a methodology for investigating regional vulnerability to climate change in combination with other global stressors. This method, which relies on both vulnerability mapping and local- level case studies, may be used to assess differential vulnerability for any particular sector within a nation or region, and it can serve as a basis for targeting policy interventions. (Author)

  7. Indirect evidence for genetic differentiation in vulnerability to embolism in Pinus halepensis

    Directory of Open Access Journals (Sweden)

    Rakefet eDavid-Schwartz

    2016-06-01

    Full Text Available Climate change is increasing mean temperatures and in the eastern Mediterranean is expected to decrease annual precipitation. The resulting increase in aridity may be too rapid for adaptation of tree species unless their gene pool already possesses variation in drought resistance. Vulnerability to embolism, estimated by the pressure inducing 50% loss of xylem hydraulic conductivity (P50, is strongly associated with drought stress resistance in trees. Yet, previous studies on various tree species reported low intraspecific genetic variation for this trait, and therefore limited adaptive capacities to increasing aridity. Here we quantified differences in hydraulic efficiency (xylem hydraulic conductance and safety (resistance to embolism in four contrasting provenances of Pinus halepensis (Aleppo pine in a provenance trial, which is indirect evidence for genetic differences. Results obtained with three techniques (bench dehydration, centrifugation and X-ray micro-CT evidenced significant differentiation with similar ranking between provenances. Inter-provenance variation in P50 correlated with pit anatomical properties (torus overlap and pit aperture size. These results suggest that adaptation of P. halepensis to xeric habitats has been accompanied by modifications of bordered pit function driven by variation in pit aperture. This study thus provides evidence that appropriate exploitation of provenance differences will allow continued forestry with P. halepensis in future climates of the Eastern Mediterranean.

  8. Cell-type Dependent Alzheimer's Disease Phenotypes: Probing the Biology of Selective Neuronal Vulnerability

    Directory of Open Access Journals (Sweden)

    Christina R. Muratore

    2017-12-01

    Full Text Available Summary: Alzheimer's disease (AD induces memory and cognitive impairment in the absence of motor and sensory deficits during its early and middle course. A major unresolved question is the basis for this selective neuronal vulnerability. Aβ, which plays a central role in AD pathogenesis, is generated throughout the brain, yet some regions outside of the limbic and cerebral cortices are relatively spared from Aβ plaque deposition and synapse loss. Here, we examine neurons derived from iPSCs of patients harboring an amyloid precursor protein mutation to quantify AD-relevant phenotypes following directed differentiation to rostral fates of the brain (vulnerable and caudal fates (relatively spared in AD. We find that both the generation of Aβ and the responsiveness of TAU to Aβ are affected by neuronal cell type, with rostral neurons being more sensitive than caudal neurons. Thus, cell-autonomous factors may in part dictate the pattern of selective regional vulnerability in human neurons in AD. : In this article, Muratore et al. examine differential vulnerability of neuronal subtypes in AD by directing iPSC lines from control and familial AD subjects to different regional neuronal fates. APP processing and TAU proteostasis are differentially affected between regional fates, such that neuronal cell type dictates generation of and responsiveness to Aβ. Keywords: Alzheimer's disease, disease modeling, iPSCs, neural stem cells, Abeta, Tau, selective vulnerability, amyloid, familial AD, differential susceptibility

  9. Parental perceptions of child vulnerability, overprotection, and parental psychological characteristics.

    Science.gov (United States)

    Thomasgard, M

    1998-01-01

    While a parental perception of child vulnerability to illness/injury is often used interchangeably with parental overprotection, research suggests that these constructs are independent. Distinct parental psychological characteristics were hypothesized for each construct. The parents of 871 children, ages 22-72 months, completed a four-part protocol (clinical background data, Child Vulnerability Scale, Parent Protection Scale, and Brief Symptom Inventory). A distinct parent symptom profile was found for perceived child vulnerability (somatization, obsessive-compulsiveness, and anxiety). Overprotection was associated with phobic anxiety, psychoticism, and paranoid ideation. These findings provide further support for the differentiation of these constructs.

  10. Social Vulnerability and Ebola Virus Disease in Rural Liberia.

    Directory of Open Access Journals (Sweden)

    John A Stanturf

    Full Text Available The Ebola virus disease (EVD epidemic that has stricken thousands of people in the three West African countries of Liberia, Sierra Leone, and Guinea highlights the lack of adaptive capacity in post-conflict countries. The scarcity of health services in particular renders these populations vulnerable to multiple interacting stressors including food insecurity, climate change, and the cascading effects of disease epidemics such as EVD. However, the spatial distribution of vulnerable rural populations and the individual stressors contributing to their vulnerability are unknown. We developed a Social Vulnerability Classification using census indicators and mapped it at the district scale for Liberia. According to the Classification, we estimate that districts having the highest social vulnerability lie in the north and west of Liberia in Lofa, Bong, Grand Cape Mount, and Bomi Counties. Three of these counties together with the capital Monrovia and surrounding Montserrado and Margibi counties experienced the highest levels of EVD infections in Liberia. Vulnerability has multiple dimensions and a classification developed from multiple variables provides a more holistic view of vulnerability than single indicators such as food insecurity or scarcity of health care facilities. Few rural Liberians are food secure and many cannot reach a medical clinic in <80 minutes. Our results illustrate how census and household survey data, when displayed spatially at a sub-county level, may help highlight the location of the most vulnerable households and populations. Our results can be used to identify vulnerability hotspots where development strategies and allocation of resources to address the underlying causes of vulnerability in Liberia may be warranted. We demonstrate how social vulnerability index approaches can be applied in the context of disease outbreaks, and our methods are relevant elsewhere.

  11. New potential markers of in vitro tomato morphogenesis identified by mRNA differential display.

    Science.gov (United States)

    Torelli, A; Soragni, E; Bolchi, A; Petrucco, S; Ottonello, S; Branca, C

    1996-12-01

    The identification of plant genes involved in early phases of in vitro morphogenesis can not only contribute to our understanding of the processes underlying growth regulator-controlled determination, but also provide novel markers for evaluating the outcome of in vitro regeneration experiments. To search for such genes and to monitor changes in gene expression accompanying in vitro regeneration, we have adapted the mRNA differential display technique to the comparative analysis of a model system of tomato cotyledons that can be driven selectively toward either shoot or callus formation by means of previously determined growth regulator supplementations. Hormone-independent transcriptional modulation (mainly down-regulation) has been found to be the most common event, indicating that a non-specific reprogramming of gene expression quantitatively predominates during the early phases of in vitro culture. However, cDNA fragments representative of genes that are either down-regulated or induced in a programme-specific manner could also be identified, and two of them (G35, G36) were further characterized. One of these cDNA fragments, G35, corresponds to an mRNA that is down-regulated much earlier in callus- (day 2) than in shoot-determined explants (day 6). The other, G36, identifies an mRNA that is transiently expressed in shoot-determined explants only, well before any macroscopic signs of differentiation become apparent, and thus exhibits typical features of a morphogenetic marker.

  12. General vulnerability to stuttering: The experience of stuttering and conditions bringing about invulnerability.

    Science.gov (United States)

    Briley, P M; Kalinowski, J S

    2016-08-01

    General vulnerability to stuttering is the broad awareness of stuttering and the ever-present, experiential sense of a person who stutters (PWS). It is defined by stuttering in all its forms and the awareness of its presence, both in moments of stuttering and moments of perceivably fluent speech. Under the heading of general vulnerability to stuttering is specific vulnerability to stuttering, which includes the actual events of stuttering (i.e., overt symptoms, covert symptoms, subperceptual stuttering, and anticipation of stuttering). The differentiation between the two is that specific vulnerability requires a specific moment of stuttering where general vulnerability does not. Copyright © 2016 Elsevier Ltd. All rights reserved.

  13. Disaster Governance and Vulnerability: The Case of Chile

    Directory of Open Access Journals (Sweden)

    Vicente Sandoval

    2016-12-01

    Full Text Available This exploratory work seeks to shed light on disaster governance by looking into potential linkages between the production of vulnerability and disaster governance in Chile. Our point of investigation is the case of post-disaster Chaitén and the Chilean model of Disaster Risk Management. The work begins by situating disaster governance and the production of vulnerability in a broader context of existing governance system that includes a multiplicity of actors and socio-economic, socio-ecological, and political processes. Coming from a multi-scalar perspective, we use the disaster Pressure and Release (PAR model to enable a differentiated analysis of the multiplicity of actors, rules, and processes related to DRM that participate in the production of disaster vulnerability in the current Chaitén. With this we address the questions as to ‘why’ the Chilean model of DRM is prominently centralised and ‘what’ are the effects on the production of disaster vulnerability for the case of post-disaster Chaitén.

  14. Identification of human candidate genes for male infertility by digital differential display.

    Science.gov (United States)

    Olesen, C; Hansen, C; Bendsen, E; Byskov, A G; Schwinger, E; Lopez-Pajares, I; Jensen, P K; Kristoffersson, U; Schubert, R; Van Assche, E; Wahlstroem, J; Lespinasse, J; Tommerup, N

    2001-01-01

    Evidence for the importance of genetic factors in male fertility is accumulating. In the literature and the Mendelian Cytogenetics Network database, 265 cases of infertile males with balanced reciprocal translocations have been described. The candidacy for infertility of 14 testis-expressed transcripts (TETs) were examined by comparing their chromosomal mapping position to the position of balanced reciprocal translocation breakpoints found in the 265 infertile males. The 14 TETs were selected by using digital differential display (electronic subtraction) to search for apparently testis-specific transcripts in the TIGR database. The testis specificity of the 14 TETs was further examined by reverse transcription-polymerase chain reaction (RT-PCR) on adult and fetal tissues showing that four TETs (TET1 to TET4) were testis-expressed only, six TETs (TET5 to TET10) appeared to be differentially expressed and the remaining four TETs (TET11 to TET14) were ubiquitously expressed. Interestingly, the two tesis expressed-only transcripts, TET1 and TET2, mapped to chromosomal regions where seven and six translocation breakpoints have been reported in infertile males respectively. Furthermore, one ubiquitously, but predominantly testis-expressed, transcript, TET11, mapped to 1p32-33, where 13 translocation breakpoints have been found in infertile males. Interestingly, the mouse mutation, skeletal fusions with sterility, sks, maps to the syntenic region in the mouse genome. Another transcript, TET7, was the human homologue of rat Tpx-1, which functions in the specific interaction of spermatogenic cells with Sertoli cells. TPX-1 maps to 6p21 where three cases of chromosomal breakpoints in infertile males have been reported. Finally, TET8 was a novel transcript which in the fetal stage is testis-specific, but in the adult is expressed in multiple tissues, including testis. We named this novel transcript fetal and adult testis-expressed transcript (FATE).

  15. Is a clean river fun for all? Recognizing social vulnerability in watershed planning.

    Science.gov (United States)

    Cutts, Bethany B; Greenlee, Andrew J; Prochaska, Natalie K; Chantrill, Carolina V; Contractor, Annie B; Wilhoit, Juliana M; Abts, Nancy; Hornik, Kaitlyn

    2018-01-01

    Watershed planning can lead to policy innovation and action toward environmental protection. However, groups often suffer from low engagement with communities that experience disparate impacts from flooding and water pollution. This can limit the capacity of watershed efforts to dismantle pernicious forms of social inequality. As a result, the benefits of environmental changes often flow to more empowered residents, short-changing the power of watershed-based planning as a tool to transform ecological, economic, and social relationships. The objectives of this paper are to assess whether the worldview of watershed planning actors are sufficiently attuned to local patterns of social vulnerability and whether locally significant patterns of social vulnerability can be adequately differentiated using conventional data sources. Drawing from 35 in-depth interviews with watershed planners and community stakeholders in the Milwaukee River Basin (WI, USA), we identify five unique definitions of social vulnerability. Watershed planners in our sample articulate a narrower range of social vulnerability definitions than other participants. All five definitions emphasize spatial and demographic characteristics consistent with existing ways of measuring social vulnerability. However, existing measures do not adequately differentiate among the spatio-temporal dynamics used to distinguish definitions. In response, we develop two new social vulnerability measures. The combination of interviews and demographic analyses in this study provides an assessment technique that can help watershed planners (a) understand the limits of their own conceptualization of social vulnerability and (b) acknowledge the importance of place-based vulnerabilities that may otherwise be obscured. We conclude by discussing how our methods can be a useful tool for identifying opportunities to disrupt social vulnerability in a watershed by evaluating how issue frames, outreach messages, and engagement tactics

  16. Is a clean river fun for all? Recognizing social vulnerability in watershed planning

    Science.gov (United States)

    Greenlee, Andrew J.; Prochaska, Natalie K.; Chantrill, Carolina V.; Contractor, Annie B.; Wilhoit, Juliana M.; Abts, Nancy; Hornik, Kaitlyn

    2018-01-01

    Watershed planning can lead to policy innovation and action toward environmental protection. However, groups often suffer from low engagement with communities that experience disparate impacts from flooding and water pollution. This can limit the capacity of watershed efforts to dismantle pernicious forms of social inequality. As a result, the benefits of environmental changes often flow to more empowered residents, short-changing the power of watershed-based planning as a tool to transform ecological, economic, and social relationships. The objectives of this paper are to assess whether the worldview of watershed planning actors are sufficiently attuned to local patterns of social vulnerability and whether locally significant patterns of social vulnerability can be adequately differentiated using conventional data sources. Drawing from 35 in-depth interviews with watershed planners and community stakeholders in the Milwaukee River Basin (WI, USA), we identify five unique definitions of social vulnerability. Watershed planners in our sample articulate a narrower range of social vulnerability definitions than other participants. All five definitions emphasize spatial and demographic characteristics consistent with existing ways of measuring social vulnerability. However, existing measures do not adequately differentiate among the spatio-temporal dynamics used to distinguish definitions. In response, we develop two new social vulnerability measures. The combination of interviews and demographic analyses in this study provides an assessment technique that can help watershed planners (a) understand the limits of their own conceptualization of social vulnerability and (b) acknowledge the importance of place-based vulnerabilities that may otherwise be obscured. We conclude by discussing how our methods can be a useful tool for identifying opportunities to disrupt social vulnerability in a watershed by evaluating how issue frames, outreach messages, and engagement tactics

  17. Children's Control/Display Stereotypes.

    Science.gov (United States)

    Hoffmann, Errol R; Chan, Alan H S; Tai, Judy P C

    2018-06-01

    Objective The aim of this study was to determine control/display stereotypes for children of a range of ages and development of these stereotypes with age. Background Little is known about control/display stereotypes for children of different ages and the way in which these stereotypes develop with age. This study is part of a program to determine the need to design differentially for these age groups. Method We tested four groups of children with various tasks (age groups 5 to 7, 8 to 10, 11 to 13, 14 to 16), with about 30 in each group. Examples of common tasks were opening a bottle, turning on taps, and allocating numbers to keypads. More complex tasks involved rotating a control to move a display in a requested direction. Results Tasks with which different age groups were familiar showed no effect of age group. Different control/display arrangements generally showed an increase in stereotype strength with age, with dependence on the form of the control/display arrangement. Two-dimensional arrangements, with the control on the same plane as the display, had higher stereotype strength than three-dimensional arrangements for all age groups, suggesting an effect of familiarity with controls and displays with increasing age. Conclusion Children's control/display stereotypes do not differ greatly from those of adults, and hence, design for children older than 5 years of age, for control/display stereotypes, can be the same as that for adult populations. Application When designing devices for children, the relationship between controls and displays can be as for adult populations, for which there are considerable experimental data.

  18. Does the oxytocin receptor polymorphism (rs2254298 confer 'vulnerability' for psychopathology or 'differential susceptibility'? insights from evolution

    Directory of Open Access Journals (Sweden)

    Brüne Martin

    2012-04-01

    Full Text Available Abstract The diathesis-stress model of psychiatric conditions has recently been challenged by the view that it might be more accurate to speak of 'differential susceptibility' or 'plasticity' genes, rather than one-sidedly focusing on individual vulnerability. That is, the same allelic variation that predisposes to a psychiatric disorder if associated with (developmentally early environmental adversity may lead to a better-than-average functional outcome in the same domain under thriving (or favourable environmental conditions. Studies of polymorphic variations of the serotonin transporter gene, the monoamino-oxidase-inhibitor A coding gene or the dopamine D4 receptor gene indicate that the early environment plays a crucial role in the development of favourable versus unfavourable outcomes. Current evidence is limited, however, to establishing a link between genetic variation and behavioural phenotypes. In contrast, little is known about how plasticity may be expressed at the neuroanatomical level as a 'hard-wired' correlate of observable behaviour. The present review article seeks to further strengthen the argument in favour of the differential susceptibility theory by incorporating findings from behavioural and neuroanatomical studies in relation to genetic variation of the oxytocin receptor gene. It is suggested that polymorphic variation at the oxytocin receptor gene (rs2254298 is associated with sociability, amygdala volume and differential risk for psychiatric conditions including autism, depression and anxiety disorder, depending on the quality of early environmental experiences. Seeing genetic variation at the core of developmental plasticity can explain, in contrast to the diathesis-stress perspective, why evolution by natural selection has maintained such 'risk' alleles in the gene pool of a population. Please see related manuscript: http://www.biomedcentral.com/1741-7015/10/37

  19. Development of a heat vulnerability index for New York State.

    Science.gov (United States)

    Nayak, S G; Shrestha, S; Kinney, P L; Ross, Z; Sheridan, S C; Pantea, C I; Hsu, W H; Muscatiello, N; Hwang, S A

    2017-12-01

    The frequency and intensity of extreme heat events are increasing in New York State (NYS) and have been linked with increased heat-related morbidity and mortality. But these effects are not uniform across the state and can vary across large regions due to regional sociodemographic and environmental factors which impact an individual's response or adaptive capacity to heat and in turn contribute to vulnerability among certain populations. We developed a heat vulnerability index (HVI) to identify heat-vulnerable populations and regions in NYS. Census tract level environmental and sociodemographic heat-vulnerability variables were used to develop the HVI to identify heat-vulnerable populations and areas. Variables were identified from a comprehensive literature review and climate-health research in NYS. We obtained data from 2010 US Census Bureau and 2011 National Land Cover Database. We used principal component analysis to reduce correlated variables to fewer uncorrelated components, and then calculated the cumulative HVI for each census tract by summing up the scores across the components. The HVI was then mapped across NYS (excluding New York City) to display spatial vulnerability. The prevalence rates of heat stress were compared across HVI score categories. Thirteen variables were reduced to four meaningful components representing 1) social/language vulnerability; 2) socioeconomic vulnerability; 3) environmental/urban vulnerability; and 4) elderly/ social isolation. Vulnerability to heat varied spatially in NYS with the HVI showing that metropolitan areas were most vulnerable, with language barriers and socioeconomic disadvantage contributing to the most vulnerability. Reliability of the HVI was supported by preliminary results where higher rates of heat stress were collocated in the regions with the highest HVI. The NYS HVI showed spatial variability in heat vulnerability across the state. Mapping the HVI allows quick identification of regions in NYS that could

  20. Effect of β on Seismic Vulnerability Curve for RC Bridge Based on Double Damage Criterion

    International Nuclear Information System (INIS)

    Feng Qinghai; Yuan Wancheng

    2010-01-01

    In the analysis of seismic vulnerability curve based on double damage criterion, the randomness of structural parameter and randomness of seismic should be considered. Firstly, the distribution characteristics of structure capability and seismic demand are obtained based on IDA and PUSHOVER, secondly, the vulnerability of the bridge is gained based on ANN and MC and a vulnerability curve according to this bridge and seismic is drawn. Finally, the analysis for a continuous bridge is displayed as an example, and parametric analysis for the effect of β is done, which reflects the bridge vulnerability overall from the point of total probability, and in order to reduce the discreteness, large value of β are suggested.

  1. Vulnerability

    Science.gov (United States)

    Taback, I.

    1979-01-01

    The discussion of vulnerability begins with a description of some of the electrical characteristics of fibers before definiting how vulnerability calculations are done. The vulnerability results secured to date are presented. The discussion touches on post exposure vulnerability. After a description of some shock hazard work now underway, the discussion leads into a description of the planned effort and some preliminary conclusions are presented.

  2. Identification of genes involved in the drought adaptation and recovery in Portulaca oleracea by differential display.

    Science.gov (United States)

    D'Andrea, Rodrigo Matías; Triassi, Agustina; Casas, María Isabel; Andreo, Carlos Santiago; Lara, María Valeria

    2015-05-01

    Portulaca oleracea is one of the richest plant sources of ω-3 and ω-6 fatty acids and other compounds potentially valuable for nutrition. It is broadly established in arid, semiarid and well-watered fields, thus making it a promising candidate for research on abiotic stress resistance mechanisms. It is capable of withstanding severe drought and then of recovering upon rehydration. Here, the adaptation to drought and the posterior recovery was evaluated at transcriptomic level by differential display validated by qRT-PCR. Of the 2279 transcript-derived fragments amplified, 202 presented differential expression. Ninety of them were successfully isolated and sequenced. Selected genes were tested against different abiotic stresses in P. oleracea and the behavior of their orthologous genes in Arabidopsis thaliana was also explored to seek for conserved response mechanisms. In drought adapted and in recovered plants changes in expression of many protein metabolism-, lipid metabolism- and stress-related genes were observed. Many genes with unknown function were detected, which also respond to other abiotic stresses. Some of them are also involved in the seed desiccation/imbibition process and thus would be of great interest for further research. The potential use of candidate genes to engineer drought tolerance improvement and recovery is discussed. Copyright © 2015 Elsevier Masson SAS. All rights reserved.

  3. Gendered depression: Vulnerability or exposure to work and family stressors?

    Science.gov (United States)

    Marchand, Alain; Bilodeau, Jaunathan; Demers, Andrée; Beauregard, Nancy; Durand, Pierre; Haines, Victor Y

    2016-10-01

    Research has shown that employed women are more prone to depression than men, but the pathways linking gender to depression remain poorly understood. The aim of this study was to examine how work and family conditions operated as potentially gendered antecedents of depression. It evaluated more specifically how differences in depressive symptoms in women and men could be explained by their differential vulnerability and exposure to work and family conditions, as well as by the mediating role of work-to-family conflict (WFC) and family-to-work conflict (FWC). Data were collected in 2009-2012 from a sample of 1935 employees (48.9% women) nested in 63 workplaces in the province of Quebec (Canada). Data were analyzed with multilevel path analysis models to test for the differential exposure hypothesis, and stratified by gender to test for the differential vulnerability hypothesis. Results supported both hypothesizes, but only WFC played a mediating role between work-family stressors and depression. Regarding the vulnerability hypothesis, WFC was more strongly associated with women depressive symptoms, and the magnitude of the association between family income and WFC was stronger for women. Overall, the differential exposure hypothesis seemed to reach a greater empirical support. After accounting for work and family stressors as well as WFC, differences in depressive symptoms in women and men were no longer significantly, as WFC, working hours, irregular work schedule and skill utilization acted as mediators. WFC associated with higher depressive symptoms and skill utilization with lower depressive symptoms. WFC related to higher working hours and irregular work schedule. Compared to men, women reported higher WFC, but lower working hours, less irregular work schedule and lower skill utilization at work. Women's higher rate of depression is intrinsically linked to their different social experiences as shaped by a gendered social structure and gendered organizations

  4. Low self-esteem as a vulnerability differentially predicts symptom dimensions of depression in university students in China: A 6-month longitudinal study.

    Science.gov (United States)

    Zheng, Xinyue; Wang, Danyang; Yu, Ping; Yao, Shuqiao; Xiao, Jing

    2014-12-01

    This 6-month longitudinal study examined how self-esteem as a vulnerability differentially predicts symptom dimensions of depression in a sample of university students from Hunan Province, China. Baseline and 6-month follow-up data were obtained from 659 university students. During an initial assessment, participants completed measures assessing their low self-esteem, depressive symptoms, and the occurrence of daily hassle. Participants subsequently completed measures assessing daily hassle and depressive symptoms once per month for 6 months. Higher low self-esteem scores were associated with greater increases in the somatic complaints and positive affect dimensions, but not the depressed affect and interpersonal problem dimensions of depressive symptoms following daily hassle in Chinese university students. The results of the current study suggest that low self-esteem plays a significant role in the etiology and course of depressive symptoms that develop in response to exposure to daily hassles. Consistent with the vulnerability-stress model of depression, the results suggest that low self-esteem serves as a risk factor and daily hassles serve as a precipitating factor. © 2014 The Institute of Psychology, Chinese Academy of Sciences and Wiley Publishing Asia Pty Ltd.

  5. A Comprehensive Assessment and Spatial Analysis of Vulnerability of China’s Provincial Economies

    Directory of Open Access Journals (Sweden)

    Chongqiang Ren

    2018-04-01

    Full Text Available Vulnerability theory is a fundamental scientific knowledge system in sustainable development, and vulnerability assessment is important in vulnerability studies. Economic vulnerability affects economic growth sustainability. Comprehensive assessment of economic vulnerability in the process of economic growth under the theoretical framework of vulnerability will provide a new perspective for vulnerability studies. Based on a vulnerability scoping diagram assessment model, this study selected 22 economic sensitivity indexes and 25 economic adaptability indexes from the economic, social, and nature–resource–environmental subsystems to comprehensively assess and spatially analyse the vulnerability of China’s provincial economies since the year 2000, while applying the entropy method, multilevel extension assessment, spatial measurement method, and geographic information system technology. The results showed the following: (1 There are great differences in the vulnerability of China’s provincial economies. Western China’s vulnerability is higher and the fluctuation range of economic vulnerability is larger. The vulnerability increased significantly based on spatial differential features; (2 Regional differences in economic vulnerability, mainly caused by differences within a region, increased gradually. Eastern and Western China showed the spatial pattern characteristics of prominent and reinforcing regional imbalance, while Central and Northeast China showed declining regional imbalance. The spatial structure evolution of economic vulnerability is characterized by a volatility curve, and regional separation and divergence are strengthened; (3 Growth of China’s provincial economies and economic vulnerability are related negatively. In Eastern, Central, and Northeast China, vulnerability of the provincial economies has a negative spillover effect on neighbouring provinces’ economic growth, while in Western China it has a slight positive

  6. Trait anxiety and attenuated negative affect differentiation: a vulnerability factor to consider?

    Science.gov (United States)

    Matt, Lindsey M; Fresco, David M; Coifman, Karin G

    2016-11-01

    Describing emotional experiences using distinct terms, or affect differentiation, has been associated with emotion regulation and adaptive behavior under stress. There is little data, however, examining the association between differentiation and dispositional factors underlying psychopathology. The current study examines the association between differentiation and trait anxiety (TA) given prior evidence of cognitive biases in TA relevant to higher order processing of emotional experiences. We examined cross-sectionally, via lab-based repeated assessment, the association between differentiation of negative and positive experiences and TA. Two hundred twenty-two adults completed an emotion reactivity task including repeated assessments of affect. We hypothesized that individuals higher in trait anxiety (HTA) would have greater difficulty differentiating their experiences. HTA individuals exhibited lower levels of negative affect (NA) differentiation even when controlling for depression. Although negative emotion intensity was consistently associated with lower differentiation, this did not account for the influence of HTA on differentiation. These data suggest that HTA individuals have greater difficulty differentiating negative emotions, regardless of negative emotion intensity and depression. As HTA is common to many emotional disorders; this evidence suggests that poor differentiation may also be an important transdiagnostic consideration in models of risk and of affective disease.

  7. Considering Time-Dependency of Social Vulnerability in Crisis Modeling and Management

    Science.gov (United States)

    Aubrecht, C.; Steinnocher, K.; Freire, S.; Loibl, W.; Peters-Anders, J.; Ungar, J.

    2012-04-01

    Crisis and disaster management is much more than the immediate first-response actions following an incident. In many projects the main focus has been on the phase starting at the point when an unwanted event happens and lasting until the activities return to normal routines (i.e., ad hoc reaction rather than proactive mitigation). There has been less emphasis on the other phases of the disaster management cycle such as prevention, preparedness, recovery and reconstruction, even though those phases have a strong influence on the general status of a society and its citizens. Especially the potential of a crisis to escalate into a large-scale disaster is heavily dependent on the overall level of preparedness as well as on the planning of mitigation and response actions and their timely execution. There is a need for improved decision-making support that enables modeling of different crisis scenarios and their impacts according to chosen prevention and response actions. Vulnerability describing the status of a society with respect to an imposed hazard or potential impact is considered a strongly multidisciplinary concept. A central objective of vulnerability assessment is to provide indications where and how people - and more specifically, what kind of people - might be affected by a certain impact. Results should provide decision- and policy-makers with supporting information to target response and mitigation actions adequately. For assessment of the social dimension of vulnerability, population exposure mapping is usually considered the starting point. Integration of social structure and varying aspects of resilience further differentiate situation-specific vulnerability patterns on a local scale. In a disaster risk management context, assessment of human vulnerability has generally been lagging behind hazard analysis efforts. Accurately estimating population exposure is a key component of catastrophe loss modeling, one element of effective integrated risk analysis

  8. Differential Vulnerability to Hurricanes in Cuba, Haiti, and the Dominican Republic: The Contribution of Education

    Directory of Open Access Journals (Sweden)

    Adelheid Pichler

    2013-09-01

    Full Text Available The possible impacts of the level of formal education on different aspects of disaster management, prevention, alarm, emergency, or postdisaster activities, were studied in a comparative perspective for three countries with a comparable exposure to hurricane hazards but different capacities for preventing harm. The study focused on the role of formal education in reducing vulnerability operating through a long-term learning process and put particular emphasis on the education of women. The comparative statistical analysis of the three countries was complemented through qualitative studies in Cuba and the Dominican Republic collected in 2010-2011. We also analyzed to what degree targeted efforts to reduce vulnerability were interconnected with other policy domains, including education and science, health, national defense, regional development, and cultural factors. We found that better education in the population had clear short-term effects on reducing vulnerability through awareness about crucial information, faster and more efficient responses to alerts, and better postdisaster recuperation. However, there were also important longer term effects of educational efforts to reduce social vulnerability through the empowerment of women, its effect on the quality of institutions and social networks for mutual assistance creating a general culture of safety and preparedness. Not surprisingly, on all three accounts Cuba clearly did the best; whereas Haiti was worst, and the Dominican Republic took an intermediate position.

  9. Race differences in depression vulnerability following Hurricane Katrina.

    Science.gov (United States)

    Ali, Jeanelle S; Farrell, Amy S; Alexander, Adam C; Forde, David R; Stockton, Michelle; Ward, Kenneth D

    2017-05-01

    This study investigated whether racial disparities in depression were present after Hurricane Katrina. Data were gathered from 932 New Orleans residents who were present when Hurricane Katrina struck, and who returned to New Orleans the following year. Multiple logistic regression models evaluated racial differences in screening positive for depression (a score ≥16 on the Center for Epidemiologic Studies Depression Scale), and explored whether differential vulnerability (prehurricane physical and mental health functioning and education level), differential exposure to hurricane-related stressors, and loss of social support moderated and/or reduced the association of race with depression. A univariate logistic regression analysis showed the odds for screening positive for depression were 86% higher for African Americans than for Caucasians (odds ratio [OR] = 1.86 [1.28-2.71], p = .0012). However, after controlling simultaneously for sociodemographic characteristics, preexisting vulnerabilities, social support, and trauma-specific factors, race was no longer a significant correlate for screening positive for depression (OR = 1.54 [0.95-2.48], p = .0771). The racial disparity in postdisaster depression seems to be confounded by sociodemographic characteristics, preexisting vulnerabilities, social support, and trauma-specific factors. Nonetheless, even after adjusting for these factors, there was a nonsignificant trend effect for race, which could suggest race played an important role in depression outcomes following Hurricane Katrina. Future studies should examine these associations prospectively, using stronger assessments for depression, and incorporate measures for discrimination and segregation, to further understand possible racial disparities in depression after Hurricane Katrina. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  10. Assessing flash flood vulnerability using a multi-vulnerability approach

    Directory of Open Access Journals (Sweden)

    Karagiorgos Konstantinos

    2016-01-01

    Full Text Available In the framework of flood risk assessment, while the understanding of hazard and exposure has significantly improved over the last years, knowledge on vulnerability remains one of the challenges. Current approaches in vulnerability research are characterised by a division between social scientists and natural scientists. In order to close this gap, we present an approach that combines information on physical and social vulnerability in order to merge information on the susceptibility of elements at risk and society. With respect to physical vulnerability, the study is based on local-scale vulnerability models using nonlinear regression approaches. Modified Weibull distributions were fit to the data in order to represent the relationship between process magnitude and degree of loss. With respect to social vulnerability we conducted a door-to-door survey which resulted in particular insights on flood risk awareness and resilience strategies of exposed communities. In general, both physical and social vulnerability were low in comparison with other European studies, which may result from (a specific building regulations in the four Mediterranean test sites as well as general design principles leading to low structural susceptibility of elements at risk, and (b relatively low social vulnerability of citizens exposed. As a result it is shown that a combination of different perspectives of vulnerability will lead to a better understanding of exposure and capacities in flood risk management.

  11. Safety parameter display systems' effect on operator performance

    International Nuclear Information System (INIS)

    Cerven, F.; Ford, R.E.; Blackman, H.S.

    1983-01-01

    Computer generated displays are a powerful and flexible tool for presenting data to the operators of nuclear power plants. Such displays are currently being developed in industry for use as safety parameter displays and for use in advanced control rooms. There exists a need for methods to objectively evaluate the effect of these displays, positive or negative, on the performance of control room personnel. Results of developing one such method, noninteractive simulation, and the two experiments that were performed to determine if it can be used as a method for evaluating computer displays are presented. This method is more objective and powerful than pencil and paper methods because it measures human performance rather than opinion or perference, has excellent control of the experimental variables, and has a higher fidelity to the control room environment. The results of these experiments indicates that the present methodology does not differentiate among the display types tested at a statistically significant level. In other words, all display types tested worked equally well in providing operators needed information

  12. Environmental Health Related Socio-Spatial Inequalities: Identifying “Hotspots” of Environmental Burdens and Social Vulnerability

    Science.gov (United States)

    Shrestha, Rehana; Flacke, Johannes; Martinez, Javier; van Maarseveen, Martin

    2016-01-01

    Differential exposure to multiple environmental burdens and benefits and their distribution across a population with varying vulnerability can contribute heavily to health inequalities. Particularly relevant are areas with high cumulative burdens and high social vulnerability termed as “hotspots”. This paper develops an index-based approach to assess these multiple burdens and benefits in combination with vulnerability factors at detailed intra-urban level. The method is applied to the city of Dortmund, Germany. Using non-spatial and spatial methods we assessed inequalities and identified “hotspot” areas in the city. We found modest inequalities burdening higher vulnerable groups in Dortmund (CI = −0.020 at p vulnerability, is essential to inform environmental justice debates and to mobilize local stakeholders. Locating “hotspot” areas at this detailed spatial level can serve as a basis to develop interventions that target vulnerable groups to ensure a health conducive equal environment. PMID:27409625

  13. Socially differentiated cardiac rehabilitation

    DEFF Research Database (Denmark)

    Meillier, Lucette Kirsten; Nielsen, Kirsten Melgaard; Larsen, Finn Breinholt

    2012-01-01

    in recruitment and participation among low educated and socially vulnerable patients must be addressed to lower inequality in post-MI health. Our aim was to improve referral, attendance, and adherence rates among socially vulnerable patients by systematic screening and by offering a socially differentiated...... to a standard rehabilitation programme (SRP). If patients were identified as socially vulnerable, they were offered an extended version of the rehabilitation programme (ERP). Excluded patients were offered home visits by a cardiac nurse. Concordance principles were used in the individualised programme elements......%. Patients were equally distributed to the SRP and the ERP. No inequality was found in attendance and adherence among referred patients. Conclusions: It seems possible to overcome unequal referral, attendance, and adherence in cardiac rehabilitation by organisation of systematic screening and social...

  14. Territorial Vulnerability Assessment Supporting Risk Managing Coastal Areas Due to Tsunami Impact

    Directory of Open Access Journals (Sweden)

    José Leandro Barros

    2015-09-01

    Full Text Available Portugal’s coastline extends 1187 km. It is characterized by social, economic and physical conditions that differentiate it from the rest of the territory, including population density, location of infrastructure and support of tourism activities. Therefore, it has a significant exposure if a tsunami occurs. Six coastal study sites with varying characteristics were selected for evaluation in this paper, including two core beach-use areas, two residential areas and two industrial areas. These sites are located in the municipalities of Figueira da Foz, Setúbal and Vila do Bispo. The analysis began with the calculation of the potential tsunami inundation area for each site using the 1755 Lisbon tsunami. Next, a methodology distinguished by its multidimensional character was applied to assess local vulnerability to tsunamis. This methodology assesses vulnerabilities associated with morphological, structural, social and tax factors. These four vulnerability components were combined to obtain a Composite Vulnerability Index (CVI, which enabled us to identify the most vulnerable areas and to determine the distinguishing characteristics of each area.

  15. Identification of nickel response genes in abnormal early developments of sea urchin by differential display polymerase chain reaction.

    Science.gov (United States)

    Ryu, Tae Kwon; Lee, Gunsup; Rhee, Yong; Park, Heung-Sik; Chang, Man; Lee, Sukchan; Lee, Jaean; Lee, Taek-Kyun

    2012-10-01

    Bioassays and biomarkers have been previously developed to assess the effects of heavy metal contaminants on the early life stages of the sea urchin. In this study, malformation in the early developmental processes was observed in sea urchin (Strongylocentrotus intermedius) larvae exposed to 10 ppm Ni for over 30 h. The most critical stage at which the triggering of nickel effects takes place is thought to be the blastula stage, which occurs after fertilization in larval development. To investigate the molecular-level responses of sea urchin exposed to heavy metal stress and to explore the differentially expressed genes that are induced or repressed by nickel, differential display polymerase chain reaction (DD-PCR) was used with sea urchin mRNAs. The malformation-related genes expressed in the early life stages of the sea urchin were cloned from larvae exposed to 10 ppm of nickel for 15 h, and accessed via DD-PCR. Sequence analysis results revealed that each of the genes evidenced high homology with EGF2, PCSK9, serine/threonine protein kinase, apolipophorin precursor protein, and MGC80921 protein/transcript variant 2. This result may prove useful in the development of novel biomarkers for the assessment of heavy metal stresses on sea urchin embryos. Copyright © 2012 Elsevier Inc. All rights reserved.

  16. Vulnerability

    NARCIS (Netherlands)

    Issa, Sahar; van der Molen, Irna; Stel, Nora

    2015-01-01

    This chapter reviews the literature on vulnerability. Together with Chapter 3, that offers a literature review specifically focused on resilience, it lays the conceptual foundations for the empirical chapters in this edited volume. Vulnerability symbolizes the susceptibility of a certain system to

  17. Current status of vulnerable plaque detection.

    LENUS (Irish Health Repository)

    Sharif, Faisal

    2012-02-01

    Critical coronary stenoses have been shown to contribute to only a minority of acute coronary syndromes (ACS) and sudden cardiac death. Autopsy studies have identified a subgroup of high-risk patients with disrupted vulnerable plaque and modest stenosis. Consequently, a clinical need exists to develop methods to identify these plaques prospectively before disruption and clinical expression of disease. Recent advances in invasive and noninvasive imaging techniques have shown the potential to identify these high-risk plaques. The anatomical characteristics of the vulnerable plaque such as thin cap fibroatheroma and lipid pool can be identified with angioscopy, high frequency intravascular ultrasound, intravascular MRI, and optical coherence tomography. Efforts have also been made to recognize active inflammation in high-risk plaques using intravascular thermography. Plaque chemical composition by measuring electromagnetic radiation using spectroscopy is also an emerging technology to detect vulnerable plaques. Noninvasive imaging with MRI, CT, and PET also holds the potential to differentiate between low and high-risk plaques. However, at present none of these imaging modalities are able to detect vulnerable plaque neither has been shown to definitively predict outcome. Nevertheless in contrast, there has been a parallel development in the physiological assessment of advanced atherosclerotic coronary artery disease. Thus recent trials using fractional flow reserve in patients with modest non flow-limiting stenoses have shown that deferral of PCI with optimal medical therapy in these patients is superior to coronary intervention. Further trials are needed to provide more information regarding the natural history of high-risk but non flow-limiting plaque to establish patient-specific targeted therapy and to refine plaque stabilizing strategies in the future.

  18. Applicability of vulnerability maps

    International Nuclear Information System (INIS)

    Andersen, L.J.; Gosk, E.

    1989-01-01

    A number of aspects to vulnerability maps are discussed: the vulnerability concept, mapping purposes, possible users, and applicability of vulnerability maps. Problems associated with general-type vulnerability mapping, including large-scale maps, universal pollutant, and universal pollution scenario are also discussed. An alternative approach to vulnerability assessment - specific vulnerability mapping for limited areas, specific pollutant, and predefined pollution scenario - is suggested. A simplification of the vulnerability concept is proposed in order to make vulnerability mapping more objective and by this means more comparable. An extension of the vulnerability concept to the rest of the hydrogeological cycle (lakes, rivers, and the sea) is proposed. Some recommendations regarding future activities are given

  19. Combining demographic and genetic factors to assess population vulnerability in stream species

    Science.gov (United States)

    Erin L, Landguth; Muhlfeld, Clint C.; Jones, Leslie W.; Waples, Robin S.; Whited, Diane; Lowe, Winsor H.; Lucotch, John; Neville, Helen; Luikart, Gordon

    2014-01-01

    Accelerating climate change and other cumulative stressors create an urgent need to understand the influence of environmental variation and landscape features on the connectivity and vulnerability of freshwater species. Here, we introduce a novel modeling framework for aquatic systems that integrates spatially explicit, individual-based, demographic and genetic (demogenetic) assessments with environmental variables. To show its potential utility, we simulated a hypothetical network of 19 migratory riverine populations (e.g., salmonids) using a riverscape connectivity and demogenetic model (CDFISH). We assessed how stream resistance to movement (a function of water temperature, fluvial distance, and physical barriers) might influence demogenetic connectivity, and hence, population vulnerability. We present demographic metrics (abundance, immigration, and change in abundance) and genetic metrics (diversity, differentiation, and change in differentiation), and combine them into a single vulnerability index for identifying populations at risk of extirpation. We considered four realistic scenarios that illustrate the relative sensitivity of these metrics for early detection of reduced connectivity: (1) maximum resistance due to high water temperatures throughout the network, (2) minimum resistance due to low water temperatures throughout the network, (3) increased resistance at a tributary junction caused by a partial barrier, and (4) complete isolation of a tributary, leaving resident individuals only. We then applied this demogenetic framework using empirical data for a bull trout (Salvelinus confluentus) metapopulation in the upper Flathead River system, Canada and USA, to assess how current and predicted future stream warming may influence population vulnerability. Results suggest that warmer water temperatures and associated barriers to movement (e.g., low flows, dewatering) are predicted to fragment suitable habitat for migratory salmonids, resulting in the loss

  20. Questioning Complacency: Climate Change Impacts, Vulnerability, and Adaptation in Norway

    International Nuclear Information System (INIS)

    O'Brien, Karen; Eriksen, Siri; Sygna, Linda; Naess, Lars Otto

    2006-01-01

    Most European assessments of climate change impacts have been carried out on sectors and ecosystems, providing a narrow understanding of what climate change really means for society. Furthermore, the main focus has been on technological adaptations, with less attention paid to the process of climate change adaptation. In this article, we present and analyze findings from recent studies on climate change impacts, vulnerability, and adaptation in Norway, with the aim of identifying the wider social impacts of climate change. Three main lessons can be drawn. First, the potential thresholds and indirect effects may be more important than the direct, sectoral effects. Second, highly sensitive sectors, regions, and communities combine with differential social vulnerability to create both winners and losers. Third, high national levels of adaptive capacity mask the barriers and constraints to adaptation, particularly among those who are most vulnerable to climate change. Based on these results, we question complacency in Norway and other European countries regarding climate change impacts and adaptation. We argue that greater attention needs to be placed on the social context of climate change impacts and on the processes shaping vulnerability and adaptation

  1. Martyrdom redefined: self-destructive killers and vulnerable narcissism.

    Science.gov (United States)

    Bobadilla, Leonardo

    2014-08-01

    Lankford shows that suicide terrorists have much in common with maladjusted persons who die by suicide. However, what differentiates suicidal killers from those who "only" commit suicide? A key element may be vulnerable narcissism. Narcissism has been simultaneously linked to interpersonal aggression, achievement, and depression. These traits may explain the paradoxical picture of a person who may appear "normal" in some aspects, and yet hate himself and others so intensely as to seek mutual destruction.

  2. Apoptosis in differentiating C2C12 muscle cells selectively targets Bcl-2-deficient myotubes

    Science.gov (United States)

    Schoneich, Christian; Dremina, Elena; Galeva, Nadezhda; Sharov, Victor

    2014-01-01

    Muscle cell apoptosis accompanies normal muscle development and regeneration, as well as degenerative diseases and aging. C2C12 murine myoblast cells represent a common model to study muscle differentiation. Though it was already shown that myogenic differentiation of C2C12 cells is accompanied by enhanced apoptosis in a fraction of cells, either the cell population sensitive to apoptosis or regulatory mechanisms for the apoptotic response are unclear so far. In the current study we characterize apoptotic phenotypes of different types of C2C12 cells at all stages of differentiation, and report here that myotubes of differentiated C2C12 cells with low levels of anti-apoptotic Bcl-2 expression are particularly vulnerable to apoptosis even though they are displaying low levels of pro-apoptotic proteins Bax, Bak and Bad. In contrast, reserve cells exhibit higher levels of Bcl-2 and high resistance to apoptosis. The transfection of proliferating myoblasts with Bcl-2 prior to differentiation did not protect against spontaneous apoptosis accompanying differentiation of C2C12 cell but led to Bcl-2 overexpression in myotubes and to significant protection from apoptotic cell loss caused by exposure to hydrogen peroxide. Overall, our data advocate for a Bcl-2-dependent mechanism of apoptosis in differentiated muscle cells. However, downstream processes for spontaneous and hydrogen peroxide induced apoptosis are not completely similar. Apoptosis in differentiating myoblasts and myotubes is regulated not through interaction of Bcl-2 with pro-apoptotic Bcl-2 family proteins such as Bax, Bak, and Bad. PMID:24129924

  3. Children's differential susceptibility to parenting: An experimental test of "for better and for worse".

    Science.gov (United States)

    Slagt, Meike; Dubas, Judith Semon; van Aken, Marcel A G; Ellis, Bruce J; Deković, Maja

    2017-02-01

    Differential susceptibility theory proposes that a subset of individuals exist who display enhanced susceptibility to both negative (risk-promoting) and positive (development-enhancing) environments. This experiment represents the first attempt to directly test this assumption by exposing children in the experimental group to both negative and positive feedback using puppet role-plays. It thereby serves as an empirical test as well as a methodological primer for testing differential susceptibility. Dutch children (N=190, 45.3% girls) between the ages of 4 and 6years participated. We examined whether negative and positive feedback would differentially affect changes in positive and negative affect, in prosocial and antisocial intentions and behavior, depending on children's negative emotionality. Results show that on hearing negative feedback, children in the experimental group increased in negative affect and decreased in positive affect more strongly than children in the control group. On hearing positive feedback, children in the experimental group tended to increase in positive affect and decrease in prosocial behavior. However, changes in response to negative or positive feedback did not depend on children's negative emotionality. Moreover, using reliable change scores, we found support for a subset of "vulnerable" children but not for a subset of "susceptible" children. The findings offer suggestions to guide future differential susceptibility experiments. Copyright © 2016 Elsevier Inc. All rights reserved.

  4. CD271+ osteosarcoma cells display stem-like properties.

    Directory of Open Access Journals (Sweden)

    Jiguang Tian

    Full Text Available Cancer stem cell (CSC theory has been proposed and verified in many cancers. The existence of osteosarcoma CSCs has been confirmed for many years and multiple surface markers have been employed to identify them. In this study, we identified CD271(+ subpopulation of osteosarcoma displaying stem-like properties. CD271, known as the neural crest nerve growth factor receptor, is the marker of bone marrow mesenchymal stem cells (MSCs and human melanoma-initiating cells. We discovered that CD271 was expressed differentially in diverse types of human osteosarcoma and stabilized cell lines. CD271(+ osteosarcoma cells displayed most of the properties of CSC, such as self-renewal, differentiation, drug resistance and tumorigenicity in vivo. Nanog, Oct3/4, STAT3, DNA-PKcs, Bcl-2 and ABCG2 were more expressed in CD271(+ cells compared with CD271- cells. Our study supported the osteosarcoma CSC hypothesis and, to a certain extent, revealed one of the possible mechanisms involved in maintaining CSCs properties.

  5. VULNERABILITY OF COMPANIES

    Directory of Open Access Journals (Sweden)

    ARMEAN ANDREEA

    2013-06-01

    Full Text Available In present, the study of vulnerability of companies is increasing in every field due to the unstable economic environment influences. The object of this research is to define and identify vulnerabilities of companies and the establishment of evaluation methods at their level. This article emphasizes the importance and usefulness of one of the best known model in this way, from our point of view, namely Băileşteanu, Negrila Pattern. This pattern covers both external factors and internal ones, that increase vulnerabilities of companies, and fit the companies in which the state of vulnerability are (vitality, viability, vulnerability, high vulnerability, difficulty and high difficulty, with a matrix. The result of the research is that any company belonging to any field, can be analyzed using this model, and assigned to one of the conditions defined within.

  6. The consumer’s choice among television displays: A multinomial logit approach

    Directory of Open Access Journals (Sweden)

    Carlos Giovanni González Espitia

    2013-07-01

    Full Text Available The consumer’s choice over a bundle of products depends on observable and unobservable characteristics of goods and consumers. This choice is made in order to maximize utility subject to a budget constraint. At the same time, firms make product differentiation decisions to maximize profit. Quality is a form of differentiation. An example of this occurs in the TV market, where several displays are developed. Our objective is to determine the probability for a consumer of choosing a type of display from among five kinds: standard tube, LCD, plasma, projection and LED. Using a multinomial logit approach, we find that electronic appliances like DVDs and audio systems, as well as socioeconomic status, increase the probability of choosing a high-tech television display. Our empirical approximation contributes to further understanding rational consumer behavior through the theory of utility maximization and highlights the importance of studying market structure and analyzing changes in welfare and efficiency.

  7. Intravascular photoacoustic imaging: a new tool for vulnerable plaque identification.

    Science.gov (United States)

    Jansen, Krista; van Soest, Gijs; van der Steen, Antonius F W

    2014-06-01

    The vulnerable atherosclerotic plaque is believed to be at the root of the majority of acute coronary events. Even though the exact origins of plaque vulnerability remain elusive, the thin-cap fibroatheroma, characterized by a lipid-rich necrotic core covered by a thin fibrous cap, is considered to be the most prominent type of vulnerable plaque. No clinically available imaging technique can characterize atherosclerotic lesions to the extent needed to determine plaque vulnerability prognostically. Intravascular photoacoustic imaging (IVPA) has the potential to take a significant step in that direction by imaging both plaque structure and composition. IVPA is a natural extension of intravascular ultrasound that adds tissue type specificity to the images. IVPA utilizes the optical contrast provided by the differences in the absorption spectra of plaque components to image composition. Its capability to image lipids in human coronary atherosclerosis has been shown extensively ex vivo and has recently been translated to an in vivo animal model. Other disease markers that have been successfully targeted are calcium and inflammatory markers, such as macrophages and matrix metalloproteinase; the latter two through application of exogenous contrast agents. By simultaneously displaying plaque morphology and composition, IVPA can provide a powerful prognostic marker for disease progression, and as such has the potential to transform the current practice in percutaneous coronary intervention. Copyright © 2014 World Federation for Ultrasound in Medicine & Biology. Published by Elsevier Inc. All rights reserved.

  8. Human fibroblasts display a differential focal adhesion phenotype relative to chimpanzee.

    Science.gov (United States)

    Advani, Alexander S; Chen, Annie Y; Babbitt, Courtney C

    2016-01-01

    There are a number of documented differences between humans and our closest relatives in responses to wound healing and in disease susceptibilities, suggesting a differential cellular response to certain environmental factors. In this study, we sought to look at a specific cell type, fibroblasts, to examine differences in cellular adhesion between humans and chimpanzees in visualized cells and in gene expression. We have found significant differences in the number of focal adhesions between primary human and chimpanzee fibroblasts. Additionally, we see that adhesion related gene ontology categories are some of the most differentially expressed between human and chimpanzee in normal fibroblast cells. These results suggest that human and chimpanzee fibroblasts may have somewhat different adhesive properties, which could play a role in differential disease phenotypes and responses to external factors. © The Author(s) 2016. Published by Oxford University Press on behalf of the Foundation for Evolution, Medicine, and Public Health.

  9. Social vulnerability to heat in Greater Atlanta, USA: spatial pattern of heat, NDVI, socioeconomics and household composition

    Science.gov (United States)

    Sim, Sunhui

    2017-10-01

    The purpose of the article is evaluating spatial patterns of social vulnerability to heat in Greater Atlanta in 2015. The social vulnerability to heat is an index of socioeconomic status, household composition, land surface temperature and normalized differential vegetation index (NDVI). Land surface temperature and NDVI were derived from the red, NIR and thermal infrared (TIR) of a Landsat OLI/TIRS images collected on September 14, 2015. The research focus is on the variation of heat vulnerability in Greater Atlanta. The study found that heat vulnerability is highly clustered spatially, resulting in "hot spots" and "cool spots". The results show significant health disparities. The hotspots of social vulnerability to heat occurred in neighborhoods with lower socioeconomic status as measured by low education, low income and more poverty, greater proportion of elderly people and young children. The findings of this study are important for identifying clusters of heat vulnerability and the relationships with social factors. These significant results provide a basis for heat intervention services.

  10. Specific metabolomics adaptations define a differential regional vulnerability in the adult human cerebral cortex

    Directory of Open Access Journals (Sweden)

    Rosanna Cabré

    2016-12-01

    Full Text Available Brain neurons offer diverse responses to stresses and detrimental factors during development and aging, and as a result of both neurodegenerative and neuropsychiatric disorders. This multiplicity of responses can be ascribed to the great diversity among neuronal populations. Here we have determined the metabolomic profile of three healthy adult human brain regions—entorhinal cortex, hippocampus, and frontal cortex—using mass spectrometry-based technologies. Our results show the existence of a lessened energy demand, mitochondrial stress, and lower one-carbon metabolism (particularly restricted to the methionine cycle specifically in frontal cortex. These findings, along with the better antioxidant capacity and lower mTOR signaling also seen in frontal cortex, suggest that this brain region is especially resistant to stress compared to the entorhinal cortex and hippocampus, which are more vulnerable regions. Globally, our results show the presence of specific metabolomics adaptations in three mature, healthy human brain regions, confirming the existence of cross-regional differences in cell vulnerability in the human cerebral cortex.

  11. Differential display of abundantly expressed genes of Trichoderma harzianum during colonization of tomato-germinating seeds and roots.

    Science.gov (United States)

    Mehrabi-Koushki, Mehdi; Rouhani, Hamid; Mahdikhani-Moghaddam, Esmat

    2012-11-01

    The identification of Trichoderma genes whose expression is altered during early stages of interaction with developing roots of germinated seeds is an important step toward understanding the rhizosphere competency of Trichoderma spp. The potential of 13 Trichoderma strains to colonize tomato root and promote plant growth has been evaluated. All used strains successfully propagated in spermosphere and continued their growth in rhizoplane simultaneously root enlargement while the strains T6 and T7 were the most abundant in the apical segment of roots. Root colonization in most strains associated with promoting the roots and shoots growth while they significantly increased up to 43 and 40 % roots and shoots dry weights, respectively. Differential display reverse transcriptase-PCR (DDRT-PCR) has been developed to detect differentially expressed genes in the previously selected strain, Trichoderma harzianum T7, during colonization stages of tomato-germinating seeds and roots. Amplified DDRT-PCR products were analyzed on gel agarose and 62 differential bands excised, purified, cloned, and sequenced. Obtained ESTs were submit-queried to NCBI database by BLASTx search and gene ontology hierarchy. Most of transcripts (29 EST) corresponds to known and hypothetical proteins such as secretion-related small GTPase, 40S ribosomal protein S3a, 3-hydroxybutyryl-CoA dehydrogenase, DNA repair protein rad50, lipid phosphate phosphatase-related protein type 3, nuclear essential protein, phospholipase A2, fatty acid desaturase, nuclear pore complex subunit Nup133, ubiquitin-activating enzyme, and 60S ribosomal protein L40. Also, 13 of these sequences showed no homology (E > 0.05) with public databases and considered as novel genes. Some of these ESTs corresponded to genes encodes enzymes potentially involved in nutritional support of microorganisms which have obvious importance in the establishment of Trichoderma in spermosphere and rhizosphere, via potentially functioning in

  12. Lung Cancer Signature Biomarkers: tissue specific semantic similarity based clustering of Digital Differential Display (DDD data

    Directory of Open Access Journals (Sweden)

    Srivastava Mousami

    2012-11-01

    Full Text Available Abstract Background The tissue-specific Unigene Sets derived from more than one million expressed sequence tags (ESTs in the NCBI, GenBank database offers a platform for identifying significantly and differentially expressed tissue-specific genes by in-silico methods. Digital differential display (DDD rapidly creates transcription profiles based on EST comparisons and numerically calculates, as a fraction of the pool of ESTs, the relative sequence abundance of known and novel genes. However, the process of identifying the most likely tissue for a specific disease in which to search for candidate genes from the pool of differentially expressed genes remains difficult. Therefore, we have used ‘Gene Ontology semantic similarity score’ to measure the GO similarity between gene products of lung tissue-specific candidate genes from control (normal and disease (cancer sets. This semantic similarity score matrix based on hierarchical clustering represents in the form of a dendrogram. The dendrogram cluster stability was assessed by multiple bootstrapping. Multiple bootstrapping also computes a p-value for each cluster and corrects the bias of the bootstrap probability. Results Subsequent hierarchical clustering by the multiple bootstrapping method (α = 0.95 identified seven clusters. The comparative, as well as subtractive, approach revealed a set of 38 biomarkers comprising four distinct lung cancer signature biomarker clusters (panel 1–4. Further gene enrichment analysis of the four panels revealed that each panel represents a set of lung cancer linked metastasis diagnostic biomarkers (panel 1, chemotherapy/drug resistance biomarkers (panel 2, hypoxia regulated biomarkers (panel 3 and lung extra cellular matrix biomarkers (panel 4. Conclusions Expression analysis reveals that hypoxia induced lung cancer related biomarkers (panel 3, HIF and its modulating proteins (TGM2, CSNK1A1, CTNNA1, NAMPT/Visfatin, TNFRSF1A, ETS1, SRC-1, FN1, APLP2, DMBT1

  13. Identifying typical patterns of vulnerability: A 5-step approach based on cluster analysis

    Science.gov (United States)

    Sietz, Diana; Lüdeke, Matthias; Kok, Marcel; Lucas, Paul; Carsten, Walther; Janssen, Peter

    2013-04-01

    Specific processes that shape the vulnerability of socio-ecological systems to climate, market and other stresses derive from diverse background conditions. Within the multitude of vulnerability-creating mechanisms, distinct processes recur in various regions inspiring research on typical patterns of vulnerability. The vulnerability patterns display typical combinations of the natural and socio-economic properties that shape a systems' vulnerability to particular stresses. Based on the identification of a limited number of vulnerability patterns, pattern analysis provides an efficient approach to improving our understanding of vulnerability and decision-making for vulnerability reduction. However, current pattern analyses often miss explicit descriptions of their methods and pay insufficient attention to the validity of their groupings. Therefore, the question arises as to how do we identify typical vulnerability patterns in order to enhance our understanding of a systems' vulnerability to stresses? A cluster-based pattern recognition applied at global and local levels is scrutinised with a focus on an applicable methodology and practicable insights. Taking the example of drylands, this presentation demonstrates the conditions necessary to identify typical vulnerability patterns. They are summarised in five methodological steps comprising the elicitation of relevant cause-effect hypotheses and the quantitative indication of mechanisms as well as an evaluation of robustness, a validation and a ranking of the identified patterns. Reflecting scale-dependent opportunities, a global study is able to support decision-making with insights into the up-scaling of interventions when available funds are limited. In contrast, local investigations encourage an outcome-based validation. This constitutes a crucial step in establishing the credibility of the patterns and hence their suitability for informing extension services and individual decisions. In this respect, working at

  14. Differentiated Anti-Predation Responses in a Superorganism.

    Directory of Open Access Journals (Sweden)

    Thomas A O'Shea-Wheller

    Full Text Available Insect societies are complex systems, displaying emergent properties much greater than the sum of their individual parts. As such, the concept of these societies as single 'superorganisms' is widely applied to describe their organisation and biology. Here, we test the applicability of this concept to the response of social insect colonies to predation during a vulnerable period of their life history. We used the model system of house-hunting behaviour in the ant Temnothorax albipennis. We show that removing individuals from directly within the nest causes an evacuation response, while removing ants at the periphery of scouting activity causes the colony to withdraw back into the nest. This suggests that colonies react differentially, but in a coordinated fashion, to these differing types of predation. Our findings lend support to the superorganism concept, as the whole society reacts much like a single organism would in response to attacks on different parts of its body. The implication of this is that a collective reaction to the location of worker loss within insect colonies is key to avoiding further harm, much in the same way that the nervous systems of individuals facilitate the avoidance of localised damage.

  15. GIS-Mapping and Statistical Analyses to Identify Climate-Vulnerable Communities and Populations Exposed to Superfund Sites

    Science.gov (United States)

    Climate change-related cumulative health risks are expected to be disproportionately greater for overburdened communities, due to differential proximity and exposures to chemical sources and flood zones. Communities and populations vulnerable to climate change-associated impacts ...

  16. An holistic view on aquifer vulnerability based on a distinction of different types of vulnerability

    Science.gov (United States)

    De Luca, Domenico Antonio; Lasagna, Manuela; Franchino, Elisa

    2016-04-01

    AN HOLISTIC VIEW ON AQUIFER VULNERABILITY BASED ON A DISTINCTION OF DIFFERENT TYPES OF VULNERABILITY D.A. De Luca1 , M. Lasagna1, E. Franchino1 1Department of Earth Sciences, University of Turin The concept of vulnerability is certainly useful in the field of groundwater protection. Nevertheless, within the scientific community, the definition of groundwater vulnerability is still debatable and not clear and conclusive. This is probably due to the fact that researchers often have very different experiences and education. A positive effect of it is a constant exchange of ideas, but there are also negative consequences and difficulties in deepening the issue. The different approaches are very important but they are usable only if the concept of vulnerability is standardized: thus, for the sake of clarity, a number of definitions should be laid down, based on the different types of vulnerability. These definitions can then provide the necessary holistic view for the aquifer vulnerability assessment. Nowadays vulnerability methods focus on the degree of vulnerability and the parameters needed for its evaluation, often neglecting to clarify what is the type of vulnerability the proposed methods are referred. The type of vulnerability, indeed, is both logically and hierarchically superior to the degree of vulnerability. More specifically the type of vulnerability represents the evaluation of the hydrogeological conditions considered in the vulnerability assessment and able to influence the way in which the contamination can take place. Currently the only distinction, based on of the type of vulnerability, is referred to intrinsic and specific vulnerability. Intrinsic vulnerability assesses the susceptibility of the receptor based on the natural properties of the land and subsurface; specific vulnerability also includes properties of the analyzed contaminant. This distinction is useful but not exhaustive. In addition to this, e.g., a distinction of vertical vulnerability

  17. Vulnerability curves vs. vulnerability indicators: application of an indicator-based methodology for debris-flow hazards

    Science.gov (United States)

    Papathoma-Köhle, Maria

    2016-08-01

    The assessment of the physical vulnerability of elements at risk as part of the risk analysis is an essential aspect for the development of strategies and structural measures for risk reduction. Understanding, analysing and, if possible, quantifying physical vulnerability is a prerequisite for designing strategies and adopting tools for its reduction. The most common methods for assessing physical vulnerability are vulnerability matrices, vulnerability curves and vulnerability indicators; however, in most of the cases, these methods are used in a conflicting way rather than in combination. The article focuses on two of these methods: vulnerability curves and vulnerability indicators. Vulnerability curves express physical vulnerability as a function of the intensity of the process and the degree of loss, considering, in individual cases only, some structural characteristics of the affected buildings. However, a considerable amount of studies argue that vulnerability assessment should focus on the identification of these variables that influence the vulnerability of an element at risk (vulnerability indicators). In this study, an indicator-based methodology (IBM) for mountain hazards including debris flow (Kappes et al., 2012) is applied to a case study for debris flows in South Tyrol, where in the past a vulnerability curve has been developed. The relatively "new" indicator-based method is being scrutinised and recommendations for its improvement are outlined. The comparison of the two methodological approaches and their results is challenging since both methodological approaches deal with vulnerability in a different way. However, it is still possible to highlight their weaknesses and strengths, show clearly that both methodologies are necessary for the assessment of physical vulnerability and provide a preliminary "holistic methodological framework" for physical vulnerability assessment showing how the two approaches may be used in combination in the future.

  18. Carbon pollution increases health inequities: lessons in resilience from the most vulnerable

    Directory of Open Access Journals (Sweden)

    Kristie L. Ebi

    Full Text Available ABSTRACT Climate change is a social justice as well as an environmental issue. The magnitude and pattern of changes in weather and climate variables are creating differential exposures, vulnerabilities, and health risks that increase stress on health systems while exacerbating existing and creating new health inequities. Examples from national and local health adaptation projects highlight that developing partnerships across sectors and levels are critical for building climate-resilient health systems and communities. Strengthening current and implementing new health interventions, such as using environmental information to develop early warning systems, can be effective in protecting the most vulnerable. However, not all projected risks of climate change can be avoided by climate policies and programs, so health system strengthening is also critical. Applying a health inequity lens can reduce current vulnerabilities while building resilience to longer-term climate change. Taking inequities into account is critical if societies are to effectively prepare for and manage the challenges ahead.

  19. Comparison and Evaluation of Global Scale Studies of Vulnerability and Risks to Climate Change

    Science.gov (United States)

    Muccione, Veruska; Allen, Simon K.; Huggel, Christian; Birkmann, Joern

    2015-04-01

    Understanding the present and future distribution of different climate change impacts and vulnerability to climate change is a central subject in the context of climate justice and international climate policy. Commonly, it is claimed that poor countries that contributed little to anthropogenic climate change are those most affected and most vulnerable to climate change. Such statements are backed by a number of global-scale vulnerability studies, which identified poor countries as most vulnerable. However, some studies have challenged this view, likewise highlighting the high vulnerability of richer countries. Overall, no consensus has been reached so far about which concept of vulnerability should be applied and what type of indicators should be considered. Furthermore, there is little agreement which specific countries are most vulnerable. This is a major concern in view of the need to inform international climate policy, all the more if such assessments should contribute to allocate climate adaptation funds as was invoked at some instances. We argue that next to the analysis of who is most vulnerable, it is also important to better understand and compare different vulnerability profiles assessed in present global studies. We perform a systematic literature review of global vulnerability assessments with the scope to highlight vulnerability distribution patterns. We then compare these distributions with global risk distributions in line with revised and adopted concepts by most recent IPCC reports. It emerges that improved differentiation of key drivers of risk and the understanding of different vulnerability profiles are important contributions, which can inform future adaptation policies at the regional and national level. This can change the perspective on, and basis for distributional issues in view of climate burden share, and therefore can have implications for UNFCCC financing instruments (e.g. Green Climate Fund). However, in order to better compare

  20. Preservice Teacher Application of Differentiated Instruction

    Science.gov (United States)

    Dee, Amy Lynn

    2011-01-01

    Successfully implementing the practice of inclusion by differentiating instruction depends on both the skills and attitudes of general education teachers. New general education teachers who are entering the field are particularly vulnerable to the demands and stress of the profession, and teacher education programs must prepare preservice teachers…

  1. Inflammation and vascular remodeling in the ventral hippocampus contributes to vulnerability to stress.

    Science.gov (United States)

    Pearson-Leary, J; Eacret, D; Chen, R; Takano, H; Nicholas, B; Bhatnagar, S

    2017-06-27

    During exposure to chronic stress, some individuals engage in active coping behaviors that promote resiliency to stress. Other individuals engage in passive coping that is associated with vulnerability to stress and with anxiety and depression. In an effort to identify novel molecular mechanisms that underlie vulnerability or resilience to stress, we used nonbiased analyses of microRNAs in the ventral hippocampus (vHPC) to identify those miRNAs differentially expressed in active (long-latency (LL)/resilient) or passive (short-latency (SL)/vulnerable) rats following chronic social defeat. In the vHPC of active coping rats, miR-455-3p level was increased, while miR-30e-3p level was increased in the vHPC of passive coping rats. Pathway analyses identified inflammatory and vascular remodeling pathways as enriched by genes targeted by these microRNAs. Utilizing several independent markers for blood vessels, inflammatory processes and neural activity in the vHPC, we found that SL/vulnerable rats exhibit increased neural activity, vascular remodeling and inflammatory processes that include both increased blood-brain barrier permeability and increased number of microglia in the vHPC relative to control and resilient rats. To test the relevance of these changes for the development of the vulnerable phenotype, we used pharmacological approaches to determine the contribution of inflammatory processes in mediating vulnerability and resiliency. Administration of the pro-inflammatory cytokine vascular endothelial growth factor-164 increased vulnerability to stress, while the non-steroidal anti-inflammatory drug meloxicam attenuated vulnerability. Collectively, these results show that vulnerability to stress is determined by a re-designed neurovascular unit characterized by increased neural activity, vascular remodeling and pro-inflammatory mechanisms in the vHPC. These results suggest that dampening inflammatory processes by administering anti-inflammatory agents reduces

  2. Potential of 3D City Models to assess flood vulnerability

    Science.gov (United States)

    Schröter, Kai; Bochow, Mathias; Schüttig, Martin; Nagel, Claus; Ross, Lutz; Kreibich, Heidi

    2016-04-01

    Vulnerability, as the product of exposure and susceptibility, is a key factor of the flood risk equation. Furthermore, the estimation of flood loss is very sensitive to the choice of the vulnerability model. Still, in contrast to elaborate hazard simulations, vulnerability is often considered in a simplified manner concerning the spatial resolution and geo-location of exposed objects as well as the susceptibility of these objects at risk. Usually, area specific potential flood loss is quantified on the level of aggregated land-use classes, and both hazard intensity and resistance characteristics of affected objects are represented in highly simplified terms. We investigate the potential of 3D City Models and spatial features derived from remote sensing data to improve the differentiation of vulnerability in flood risk assessment. 3D City Models are based on CityGML, an application scheme of the Geography Markup Language (GML), which represents the 3D geometry, 3D topology, semantics and appearance of objects on different levels of detail. As such, 3D City Models offer detailed spatial information which is useful to describe the exposure and to characterize the susceptibility of residential buildings at risk. This information is further consolidated with spatial features of the building stock derived from remote sensing data. Using this database a spatially detailed flood vulnerability model is developed by means of data-mining. Empirical flood damage data are used to derive and to validate flood susceptibility models for individual objects. We present first results from a prototype application in the city of Dresden, Germany. The vulnerability modeling based on 3D City Models and remote sensing data is compared i) to the generally accepted good engineering practice based on area specific loss potential and ii) to a highly detailed representation of flood vulnerability based on a building typology using urban structure types. Comparisons are drawn in terms of

  3. Data management for geospatial vulnerability assessment of interdependencies in US power generation

    Energy Technology Data Exchange (ETDEWEB)

    Shih, C.Y.; Scown, C.D.; Soibelman, L.; Matthews, H.S.; Garrett, J.H.; Dodrill, K.; McSurdy, S. [Carnegie Mellon University, Pittsburgh, PA (United States). Dept. of Civil & Environmental Engineering

    2009-09-15

    Critical infrastructures maintain our society's stability, security, and quality of life. These systems are also interdependent, which means that the disruption of one infrastructure system can significantly impact the operation of other systems. Because of the heavy reliance on electricity production, it is important to assess possible vulnerabilities. Determining the source of these vulnerabilities can provide insight for risk management and emergency response efforts. This research uses data warehousing and visualization techniques to explore the interdependencies between coal mines, rail transportation, and electric power plants. By merging geospatial and nonspatial data, we are able to model the potential impacts of a disruption to one or more mines, rail lines, or power plants, and visually display the results using a geographical information system. A scenario involving a severe earthquake in the New Madrid Seismic Zone is used to demonstrate the capabilities of the model when given input in the form of a potentially impacted area. This type of interactive analysis can help decision makers to understand the vulnerabilities of the coal distribution network and the potential impact it can have on electricity production.

  4. Defining energy vulnerability in mobility. Measuring energy vulnerability in mobility. Acting against energy vulnerability in mobility. Discussing energy vulnerability in mobility. Task no. 4

    International Nuclear Information System (INIS)

    Jouffe, Yves; Massot, Marie-Helene; Noble, Cyprien

    2015-01-01

    Extensive expansion of urban areas generates transportation needs and energy expenses for mobility. Households already impacted by fuel poverty also suffer from energy vulnerability in their mobility. This report was prepared in the framework of the study of fuel poverty in France in the light of several indicators from existing inquiries, databases and modeling tools. The report is organised in 4 parts dealing with: the definition of energy vulnerability in mobility, its measurement, the possible remedial actions, and the discussions about energy vulnerability in mobility through working group meetings, respectively

  5. Real-time graphic display system for ROSA-V Large Scale Test Facility

    International Nuclear Information System (INIS)

    Kondo, Masaya; Anoda, Yoshinari; Osaki, Hideki; Kukita, Yutaka; Takigawa, Yoshio.

    1993-11-01

    A real-time graphic display system was developed for the ROSA-V Large Scale Test Facility (LSTF) experiments simulating accident management measures for prevention of severe core damage in pressurized water reactors (PWRs). The system works on an IBM workstation (Power Station RS/6000 model 560) and accommodates 512 channels out of about 2500 total measurements in the LSTF. It has three major functions: (a) displaying the coolant inventory distribution in the facility primary and secondary systems; (b) displaying the measured quantities at desired locations in the facility; and (c) displaying the time histories of measured quantities. The coolant inventory distribution is derived from differential pressure measurements along vertical sections and gamma-ray densitometer measurements for horizontal legs. The color display indicates liquid subcooling calculated from pressure and temperature at individual locations. (author)

  6. Individual differences in discriminatory fear learning under conditions of ambiguity: a vulnerability factor for anxiety disorders?

    NARCIS (Netherlands)

    Arnaudova, I.; Krypotos, A.M.; Effting, M.; Boddez, Y.; Kindt, M.; Beckers, T.

    2013-01-01

    Complex fear learning procedures might be better suited than the common differential fear-conditioning paradigm for detecting individual differences related to vulnerability for anxiety disorders. Two such procedures are the blocking procedure and the protection-from-overshadowing procedure. Their

  7. Enhancement of global flood damage assessments using building material based vulnerability curves

    Science.gov (United States)

    Englhardt, Johanna; de Ruiter, Marleen; de Moel, Hans; Aerts, Jeroen

    2017-04-01

    This study discusses the development of an enhanced approach for flood damage and risk assessments using vulnerability curves that are based on building material information. The approach draws upon common practices in earthquake vulnerability assessments, and is an alternative for land-use or building occupancy approach in flood risk assessment models. The approach is of particular importance for studies where there is a large variation in building material, such as large scale studies or studies in developing countries. A case study of Ethiopia is used to demonstrate the impact of the different methodological approaches on direct damage assessments due to flooding. Generally, flood damage assessments use damage curves for different land-use or occupancy types (i.e. urban or residential and commercial classes). However, these categories do not necessarily relate directly to vulnerability of damage by flood waters. For this, the construction type and building material may be more important, as is used in earthquake risk assessments. For this study, we use building material classification data of the PAGER1 project to define new building material based vulnerability classes for flood damage. This approach will be compared to the widely applied land-use based vulnerability curves such as used by De Moel et al. (2011). The case of Ethiopia demonstrates and compares the feasibility of this novel flood vulnerability method on a country level which holds the potential to be scaled up to a global level. The study shows that flood vulnerability based on building material also allows for better differentiation between flood damage in urban and rural settings, opening doors to better link to poverty studies when such exposure data is available. Furthermore, this new approach paves the road to the enhancement of multi-risk assessments as the method enables the comparison of vulnerability across different natural hazard types that also use material-based vulnerability curves

  8. Vulnerability to climate change of cocoa in West Africa: Patterns, opportunities and limits to adaptation.

    Science.gov (United States)

    Schroth, Götz; Läderach, Peter; Martinez-Valle, Armando Isaac; Bunn, Christian; Jassogne, Laurence

    2016-06-15

    The West African cocoa belt, reaching from Sierra Leone to southern Cameroon, is the origin of about 70% of the world's cocoa (Theobroma cacao), which in turn is the basis of the livelihoods of about two million farmers. We analyze cocoa's vulnerability to climate change in the West African cocoa belt, based on climate projections for the 2050s of 19 Global Circulation Models under the Intergovernmental Panel on Climate Change intermediate emissions scenario RCP 6.0. We use a combination of a statistical model of climatic suitability (Maxent) and the analysis of individual, potentially limiting climate variables. We find that: 1) contrary to expectation, maximum dry season temperatures are projected to become as or more limiting for cocoa as dry season water availability; 2) to reduce the vulnerability of cocoa to excessive dry season temperatures, the systematic use of adaptation strategies like shade trees in cocoa farms will be necessary, in reversal of the current trend of shade reduction; 3) there is a strong differentiation of climate vulnerability within the cocoa belt, with the most vulnerable areas near the forest-savanna transition in Nigeria and eastern Côte d'Ivoire, and the least vulnerable areas in the southern parts of Cameroon, Ghana, Côte d'Ivoire and Liberia; 4) this spatial differentiation of climate vulnerability may lead to future shifts in cocoa production within the region, with the opportunity of partially compensating losses and gains, but also the risk of local production expansion leading to new deforestation. We conclude that adaptation strategies for cocoa in West Africa need to focus at several levels, from the consideration of tolerance to high temperatures in cocoa breeding programs, the promotion of shade trees in cocoa farms, to policies incentivizing the intensification of cocoa production on existing farms where future climate conditions permit and the establishment of new farms in already deforested areas. Copyright © 2016

  9. Grandiose and Vulnerable Narcissism in Borderline Personality Disorder.

    Science.gov (United States)

    Euler, Sebastian; Stöbi, Dominik; Sowislo, Julia; Ritzler, Franziska; Huber, Christian G; Lang, Undine E; Wrege, Johannes; Walter, Marc

    2018-02-21

    Little is known about narcissistic traits in borderline personality disorder (BPD). This exploratory study aimed to illustrate the associations between total, grandiose, and vulnerable narcissism and gender, diagnostic features of BPD and narcissistic personality disorder (NPD), and psychopathology in BPD patients. The Pathological Narcissism Inventory and psychometric measures for impulsivity, anger, borderline symptom severity, personality organization, depression, and rejection sensitivity were completed by 65 BPD patients. Statistical analyses were conducted using the t test, Pearson correlation, and multivariate regression analyses. Male BPD patients displayed higher narcissistic scores than females (p personality disorders. Future studies are advised to apply complementary measures and take new diagnostic approaches of DSM-5 and ICD-11 into account. © 2018 S. Karger AG, Basel.

  10. Spatiotemporal heterogeneity in prey abundance and vulnerability shapes the foraging tactics of an omnivore

    Science.gov (United States)

    Rayl, Nathaniel; Bastille-Rousseau, Guillaume; Organ, John F.; Mumma, Matthew; Mahoney, Shane P.; Soulliere, Colleen; Lewis, Keith; Otto, Robert; Murray, Dennis; Waits, Lisette; Fuller, Todd

    2018-01-01

    Prey abundance and prey vulnerability vary across space and time, but we know little about how they mediate predator–prey interactions and predator foraging tactics. To evaluate the interplay between prey abundance, prey vulnerability and predator space use, we examined patterns of black bear (Ursus americanus) predation of caribou (Rangifer tarandus) neonates in Newfoundland, Canada using data from 317 collared individuals (9 bears, 34 adult female caribou, 274 caribou calves).During the caribou calving season, we predicted that landscape features would influence calf vulnerability to bear predation, and that bears would actively hunt calves by selecting areas associated with increased calf vulnerability. Further, we hypothesized that bears would dynamically adjust their foraging tactics in response to spatiotemporal changes in calf abundance and vulnerability (collectively, calf availability). Accordingly, we expected bears to actively hunt calves when they were most abundant and vulnerable, but switch to foraging on other resources as calf availability declined.As predicted, landscape heterogeneity influenced risk of mortality, and bears displayed the strongest selection for areas where they were most likely to kill calves, which suggested they were actively hunting caribou. Initially, the per‐capita rate at which bears killed calves followed a type‐I functional response, but as the calving season progressed and calf vulnerability declined, kill rates dissociated from calf abundance. In support of our hypothesis, bears adjusted their foraging tactics when they were less efficient at catching calves, highlighting the influence that predation phenology may have on predator space use. Contrary to our expectations, however, bears appeared to continue to hunt caribou as calf availability declined, but switched from a tactic of selecting areas of increased calf vulnerability to a tactic that maximized encounter rates with calves.Our results reveal that

  11. Are older people a vulnerable group? Philosophical and bioethical perspectives on ageing and vulnerability.

    Science.gov (United States)

    Bozzaro, Claudia; Boldt, Joachim; Schweda, Mark

    2018-05-01

    The elderly are often considered a vulnerable group in public and academic bioethical debates and regulations. In this paper, we examine and challenge this assumption and its ethical implications. We begin by systematically delineating the different concepts of vulnerability commonly used in bioethics, before then examining whether these concepts can be applied to old age. We argue that old age should not, in and of itself, be used as a marker of vulnerability, since ageing is a process that can develop in a variety of different ways and is not always associated with particular experiences of vulnerability. We, therefore, turn to more fundamental phenomenological considerations in order to reconstruct from a first person perspective the intricate interconnections between the experiences of ageing and vulnerability. According to this account, ageing and old age are phenomena in which the basic anthropological vulnerability of human beings can manifest itself in an increased likelihood of harm and exploitation. Thus, we plead for a combined model of vulnerability that helps to avoid problems related to the current concepts of vulnerability. We conclude first that old age as such is not a sufficient criterion for being categorized as vulnerable in applied ethics, and second that reflections on ageing can help to develop a better understanding of the central role of vulnerability in human existence and in applied ethics. © 2018 John Wiley & Sons Ltd.

  12. Dynamics of immune system vulnerabilities

    Science.gov (United States)

    Stromberg, Sean P.

    The adaptive immune system can be viewed as a complex system, which adapts, over time, to reflect the history of infections experienced by the organism. Understanding its operation requires viewing it in terms of tradeoffs under constraints and evolutionary history. It typically displays "robust, yet fragile" behavior, meaning common tasks are robust to small changes but novel threats or changes in environment can have dire consequences. In this dissertation we use mechanistic models to study several biological processes: the immune response, the homeostasis of cells in the lymphatic system, and the process that normally prevents autoreactive cells from entering the lymphatic system. Using these models we then study the effects of these processes interacting. We show that the mechanisms that regulate the numbers of cells in the immune system, in conjunction with the immune response, can act to suppress autoreactive cells from proliferating, thus showing quantitatively how pathogenic infections can suppress autoimmune disease. We also show that over long periods of time this same effect can thin the repertoire of cells that defend against novel threats, leading to an age correlated vulnerability. This vulnerability is shown to be a consequence of system dynamics, not due to degradation of immune system components with age. Finally, modeling a specific tolerance mechanism that normally prevents autoimmune disease, in conjunction with models of the immune response and homeostasis we look at the consequences of the immune system mistakenly incorporating pathogenic molecules into its tolerizing mechanisms. The signature of this dynamic matches closely that of the dengue virus system.

  13. Intermittently chaotic oscillations for a differential-delay equation with Gaussian nonlinearity

    Science.gov (United States)

    Hamilton, Ian

    1992-01-01

    For a differential-delay equation the time dependence of the variable is a function of the variable at a previous time. We consider a differential-delay equation with Gaussian nonlinearity that displays intermittent chaos. Although not the first example of a differential-delay equation that displays such behavior, for this example the intermittency is classified as type III, and the origin of the intermittent chaos may be qualitatively understood from the limiting forms of the equation for large and small variable magnitudes.

  14. Molecular basis for vulnerability to mitochondrial and oxidative stress in a neuroendocrine CRI-G1 cell line.

    Directory of Open Access Journals (Sweden)

    Natasha Chandiramani

    2011-01-01

    Full Text Available Many age-associated disorders (including diabetes, cancer, and neurodegenerative diseases are linked to mitochondrial dysfunction, which leads to impaired cellular bioenergetics and increased oxidative stress. However, it is not known what genetic and molecular pathways underlie differential vulnerability to mitochondrial dysfunction observed among different cell types.Starting with an insulinoma cell line as a model for a neuronal/endocrine cell type, we isolated a novel subclonal line (named CRI-G1-RS that was more susceptible to cell death induced by mitochondrial respiratory chain inhibitors than the parental CRI-G1 line (renamed CRI-G1-RR for clarity. Compared to parental RR cells, RS cells were also more vulnerable to direct oxidative stress, but equally vulnerable to mitochondrial uncoupling and less vulnerable to protein kinase inhibition-induced apoptosis. Thus, differential vulnerability to mitochondrial toxins between these two cell types likely reflects differences in their ability to handle metabolically generated reactive oxygen species rather than differences in ATP production/utilization or in downstream apoptotic machinery. Genome-wide gene expression analysis and follow-up biochemical studies revealed that, in this experimental system, increased vulnerability to mitochondrial and oxidative stress was associated with (1 inhibition of ARE/Nrf2/Keap1 antioxidant pathway; (2 decreased expression of antioxidant and phase I/II conjugation enzymes, most of which are Nrf2 transcriptional targets; (3 increased expression of molecular chaperones, many of which are also considered Nrf2 transcriptional targets; (4 increased expression of β cell-specific genes and transcription factors that specify/maintain β cell fate; and (5 reconstitution of glucose-stimulated insulin secretion.The molecular profile presented here will enable identification of individual genes or gene clusters that shape vulnerability to mitochondrial dysfunction and

  15. Trajectory Optimization for Differential Flat Systems

    OpenAIRE

    Kahina Louadj; Benjamas Panomruttanarug; Alexandre Carlos Brandao Ramos; Felix Mora-Camino

    2016-01-01

    International audience; The purpose of this communication is to investigate the applicability of Variational Calculus to the optimization of the operation of differentially flat systems. After introducingcharacteristic properties of differentially flat systems, the applicability of variational calculus to the optimization of flat output trajectories is displayed. Two illustrative examples are also presented.

  16. Vulnerability of damage-accumulating systems

    International Nuclear Information System (INIS)

    Lind, Niels C.

    1996-01-01

    Disastrous failures have shown that systems can be highly vulnerable. Quantified vulnerability can help designers and regulators to decide how much vulnerability is tolerable. Vulnerability of a system to a specified disturbance is defined as the ratio of the probability of failure of the disturbed system to the probability of failure of the undisturbed system. This vulnerability can be specialized to particular system types. It is adapted here to systems that are expected to deteriorate while in service due to processes such as fatigue, creep, corrosion, aging, neglect or insufficient maintenance. Application is illustrated by vulnerability to fatigue under constant and variable stress

  17. Burning With Envy? Dispositional and Situational Influences on Envy in Grandiose and Vulnerable Narcissism.

    Science.gov (United States)

    Neufeld, Darren C; Johnson, Edward A

    2016-10-01

    Research on narcissism and envy suggests a variable relationship that may reflect differences between how vulnerable and grandiose narcissism relate to precursors of envy. Accordingly, we proposed a model in which dispositional envy and relative deprivation differentially mediate envy's association with narcissistic vulnerability, grandiosity, and entitlement. To test the model, 330 young adults completed dispositional measures of narcissism, entitlement, and envy; one week later, participants reported on deprivation and envy feelings toward a peer who outperformed others on an intelligence test for a cash prize (Study 1) or earned higher monetary payouts in a betting game (Study 2). In both studies, structural equation modeling broadly supported the proposed model. Vulnerable narcissism robustly predicted episodic envy via dispositional envy. Entitlement-a narcissistic facet common to grandiosity and vulnerability-was a significant indirect predictor via relative deprivation. Study 2 also found that (a) the grandiose leadership/authority facet indirectly curbed envy feelings via dispositional envy, and (b) episodic envy contributed to schadenfreude feelings, which promoted efforts to sabotage a successful rival. Whereas vulnerable narcissists appear dispositionally envy-prone, grandiose narcissists may be dispositionally protected. Both, however, are susceptible to envy through entitlement when relative deprivation is encountered. © 2015 Wiley Periodicals, Inc.

  18. Vulnerability of advanced encryption standard algorithm to differential power analysis attacks implemented on ATmega-128 microcontroller

    CSIR Research Space (South Africa)

    Mpalane, Kealeboga

    2016-09-01

    Full Text Available A wide variety of cryptographic embedded devices including smartcards, ASICs and FPGAs must be secure against breaking in. However, these devices are vulnerable to side channel attacks. A side channel attack uses physical attributes...

  19. Identification of human embryonic progenitor cell targeting peptides using phage display.

    Directory of Open Access Journals (Sweden)

    Paola A Bignone

    Full Text Available Human pluripotent stem (hPS cells are capable of differentiation into derivatives of all three primary embryonic germ layers and can self-renew indefinitely. They therefore offer a potentially scalable source of replacement cells to treat a variety of degenerative diseases. The ability to reprogram adult cells to induced pluripotent stem (iPS cells has now enabled the possibility of patient-specific hPS cells as a source of cells for disease modeling, drug discovery, and potentially, cell replacement therapies. While reprogramming technology has dramatically increased the availability of normal and diseased hPS cell lines for basic research, a major bottleneck is the critical unmet need for more efficient methods of deriving well-defined cell populations from hPS cells. Phage display is a powerful method for selecting affinity ligands that could be used for identifying and potentially purifying a variety of cell types derived from hPS cells. However, identification of specific progenitor cell-binding peptides using phage display may be hindered by the large cellular heterogeneity present in differentiating hPS cell populations. We therefore tested the hypothesis that peptides selected for their ability to bind a clonal cell line derived from hPS cells would bind early progenitor cell types emerging from differentiating hPS cells. The human embryonic stem (hES cell-derived embryonic progenitor cell line, W10, was used and cell-targeting peptides were identified. Competition studies demonstrated specificity of peptide binding to the target cell surface. Efficient peptide targeted cell labeling was accomplished using multivalent peptide-quantum dot complexes as detected by fluorescence microscopy and flow cytometry. The cell-binding peptides were selective for differentiated hPS cells, had little or no binding on pluripotent cells, but preferential binding to certain embryonic progenitor cell lines and early endodermal hPS cell derivatives. Taken

  20. Mangrove vulnerability index using GIS

    Science.gov (United States)

    Yunus, Mohd Zulkifli Mohd; Ahmad, Fatimah Shafinaz; Ibrahim, Nuremira

    2018-02-01

    Climate change, particularly its associated sea level rise, is major threat to mangrove coastal areas, and it is essential to develop ways to reduce vulnerability through strategic management planning. Environmental vulnerability can be understood as a function of exposure to impacts and the sensitivity and adaptive capacity of ecological systems towards environmental tensors. Mangrove vulnerability ranking using up to 14 parameters found in study area, which is in Pulau Kukup and Sg Pulai, where 1 is low vulnerability and 5 is very high vulnerability. Mangrove Vulnerability Index (MVI) is divided into 3 main categories Physical Mangrove Index (PMI), Biological Mangrove Index (BMI) and Hazard Mangrove Index (HMI).

  1. Automated Software Vulnerability Analysis

    Science.gov (United States)

    Sezer, Emre C.; Kil, Chongkyung; Ning, Peng

    Despite decades of research, software continues to have vulnerabilities. Successful exploitations of these vulnerabilities by attackers cost millions of dollars to businesses and individuals. Unfortunately, most effective defensive measures, such as patching and intrusion prevention systems, require an intimate knowledge of the vulnerabilities. Many systems for detecting attacks have been proposed. However, the analysis of the exploited vulnerabilities is left to security experts and programmers. Both the human effortinvolved and the slow analysis process are unfavorable for timely defensive measure to be deployed. The problem is exacerbated by zero-day attacks.

  2. 3D display system using monocular multiview displays

    Science.gov (United States)

    Sakamoto, Kunio; Saruta, Kazuki; Takeda, Kazutoki

    2002-05-01

    A 3D head mounted display (HMD) system is useful for constructing a virtual space. The authors have researched the virtual-reality systems connected with computer networks for real-time remote control and developed a low-priced real-time 3D display for building these systems. We developed a 3D HMD system using monocular multi-view displays. The 3D displaying technique of this monocular multi-view display is based on the concept of the super multi-view proposed by Kajiki at TAO (Telecommunications Advancement Organization of Japan) in 1996. Our 3D HMD has two monocular multi-view displays (used as a visual display unit) in order to display a picture to the left eye and the right eye. The left and right images are a pair of stereoscopic images for the left and right eyes, then stereoscopic 3D images are observed.

  3. The Transcription Factor Orthodenticle Homeobox 2 Influences Axonal Projections and Vulnerability of Midbrain Dopaminergic Neurons

    Science.gov (United States)

    Chung, Chee Yeun; Licznerski, Pawel; Alavian, Kambiz N.; Simeone, Antonio; Lin, Zhicheng; Martin, Eden; Vance, Jeffery; Isacson, Ole

    2010-01-01

    Two adjacent groups of midbrain dopaminergic neurons, A9 (substantia nigra pars compacta) and A10 (ventral tegmental area), have distinct projections and exhibit differential vulnerability in Parkinson's disease. Little is known about transcription factors that influence midbrain dopaminergic subgroup phenotypes or their potential role in disease.…

  4. What Does Vulnerability Mean?

    Science.gov (United States)

    Parley, Fiona F

    2011-01-01

    Protection of those deemed vulnerable has received increasing attention since 2000. This article reports on care staff views of vulnerability using original data from a research study (Parley. "Vulnerability and abuse: an exploration of views of care staff working with people who have learning disabilities," PhD Thesis, 2007) in which care staff…

  5. Circular displays: control/display arrangements and stereotype strength with eight different display locations.

    Science.gov (United States)

    Chan, Alan H S; Hoffmann, Errol R

    2015-01-01

    Two experiments are reported that were designed to investigate control/display arrangements having high stereotype strengths when using circular displays. Eight display locations relative to the operator and control were tested with rotational and translational controls situated on different planes according to the Frame of Reference Transformation Tool (FORT) model of Wickens et al. (2010). (Left. No, Right! Development of the Frame of Reference Transformation Tool (FORT), Proceedings of the Human Factors and Ergonomics Society 54th Annual Meeting, 54: 1022-1026). In many cases, there was little effect of display locations, indicating the importance of the Worringham and Beringer (1998. Directional stimulus-response compatibility: a test of three alternative principles. Ergonomics, 41(6), 864-880) Visual Field principle and an extension of this principle for rotary controls (Hoffmann and Chan (2013). The Worringham and Beringer 'visual field' principle for rotary controls. Ergonomics, 56(10), 1620-1624). The initial indicator position (12, 3, 6 and 9 o'clock) had a major effect on control/display stereotype strength for many of the six controls tested. Best display/control arrangements are listed for each of the different control types (rotational and translational) and for the planes on which they are mounted. Data have application where a circular display is used due to limited display panel space and applies to space-craft, robotics operators, hospital equipment and home appliances. Practitioner Summary: Circular displays are often used when there is limited space available on a control panel. Display/control arrangements having high stereotype strength are listed for four initial indicator positions. These arrangements are best for design purposes.

  6. Redistributing vulnerabilities

    DEFF Research Database (Denmark)

    Seeberg, Jens; Padmawati, Retna Siwi

    2015-01-01

    It is widely accepted that the social distribution of vulnerability in a given society may turn hazardous events into disasters. This distributional approach draws attention to continuities that explain catastrophes by virtue of the workings of society prior to the event. In this paper, we draw...... attention to the social processes whereby vulnerability is modified and renegotiated during the post-disaster period where resources for disaster alleviation and reconstruction enter local communities. Specifically, we explore the social dynamics of house damage classification in the wake of the 2006...... Central Java earthquake, and we explore relations between citizens and the state during post-disaster house reconstruction. We argue that disastrous outcomes of catastrophic events do not follow pre-existing fault lines of vulnerability in a simple or predictable manner, and that the social process...

  7. Modelling farm vulnerability to flooding: A step toward vulnerability mitigation policies appraisal

    Science.gov (United States)

    Brémond, P.; Abrami, G.; Blanc, C.; Grelot, F.

    2009-04-01

    Recent catastrophic flood events such as Elbe in 2002 or Rhône in 2003 have shown limits of flood management policies relying on dykes protection: worsening of flood impacts downstream, increased damage by dykes rupture. Those events, among others, contributes to radical changes on the philosophy of flood prevention, with the promotion of new orientations for mitigating flood exposition. Two new trends may have a significant impact on rural areas: floodplain restoration and vulnerability mitigation. The Rhône River program, which is an contract of objectives signed between French Government and local collectivites, is highly illustrative of these new trends and their impact on agricultural sector. In this program, it appears that areas to be concerned by floodplain restoration are agricultural ones, because their supposed vulnerability to flood is expected to be less important to urban areas. As a consequence, agricultural sector is particularly concerned by planned actions on mitigation of assets vulnerability, an important part of the program (financial support of European Union of 7.5 Million euros). Mitigation of agricultural assets vulnerability reveals particularly interesting for two following reasons. Firstly, it is a way to maintain agricultural activities in floodplains yet existing, without promoting flood protection. Secondly, in case of floodplain restoration, vulnerability mitigation is a way for local authorities to compensate over-flooding impacts. In practice, local authorities may financially support farmers for implementing measures to mitigate their farm vulnerability. On the Rhône River, an important work has already been done to identify farm vulnerability to flooding, and propose measures to mitigate it. More than 3 000 farms exposed to flood risk have been identified representing 88 690 ha of agricultural areas which is estimated to generate damage between 400 and 800 Million euros depending on the season of occurrence for a catastrophic

  8. A subjective evaluation of high-chroma color with wide color-gamut display

    Science.gov (United States)

    Kishimoto, Junko; Yamaguchi, Masahiro; Ohyama, Nagaaki

    2009-01-01

    Displays tends to expand its color gamut, such as multi-primary color display, Adobe RGB and so on. Therefore displays got possible to display high chroma colors. However sometimes, we feel unnatural some for the image which only expanded chroma. Appropriate gamut mapping method to expand color gamut is not proposed very much. We are attempting preferred expanded color reproduction on wide color gamut display utilizing high chroma colors effectively. As a first step, we have conducted an experiment to investigate the psychological effect of color schemes including highly saturated colors. We used the six-primary-color projector that we have developed for the presentation of test colors. The six-primary-color projector's gamut volume in CIELAB space is about 1.8 times larger than the normal RGB projector. We conducted a subjective evaluation experiment using the SD (Semantic Differential) technique to find the quantitative psychological effect of high chroma colors.

  9. Poverty and Vulnerability - An Interdisciplinary Approach

    OpenAIRE

    Makoka, Donald; Kaplan, Marcus

    2005-01-01

    This paper describes the concepts of poverty and vulnerability as well as the interconnections and differences between them using an interdisciplinary approach. While poverty is a static concept, vulnerability has a forward-looking dimension. We, therefore, review the methodologies that different disciplines use to measure poverty and vulnerability. In particular, the differences between vulnerability to natural disasters, vulnerability to climate change, as well as vulnerability to poverty a...

  10. Vulnerability of complex networks

    Science.gov (United States)

    Mishkovski, Igor; Biey, Mario; Kocarev, Ljupco

    2011-01-01

    We consider normalized average edge betweenness of a network as a metric of network vulnerability. We suggest that normalized average edge betweenness together with is relative difference when certain number of nodes and/or edges are removed from the network is a measure of network vulnerability, called vulnerability index. Vulnerability index is calculated for four synthetic networks: Erdős-Rényi (ER) random networks, Barabási-Albert (BA) model of scale-free networks, Watts-Strogatz (WS) model of small-world networks, and geometric random networks. Real-world networks for which vulnerability index is calculated include: two human brain networks, three urban networks, one collaboration network, and two power grid networks. We find that WS model of small-world networks and biological networks (human brain networks) are the most robust networks among all networks studied in the paper.

  11. Investigating vulnerability to eating disorders: biases in emotional processing.

    Science.gov (United States)

    Pringle, A; Harmer, C J; Cooper, M J

    2010-04-01

    Biases in emotional processing and cognitions about the self are thought to play a role in the maintenance of eating disorders (EDs). However, little is known about whether these difficulties exist pre-morbidly and how they might contribute to risk. Female dieters (n=82) completed a battery of tasks designed to assess the processing of social cues (facial emotion recognition), cognitions about the self [Self-Schema Processing Task (SSPT)] and ED-specific cognitions about eating, weight and shape (emotional Stroop). The 26-item Eating Attitudes Test (EAT-26; Garner et al. 1982) was used to assess subclinical ED symptoms; this was used as an index of vulnerability within this at-risk group. Regression analyses showed that biases in the processing of both neutral and angry faces were predictive of our measure of vulnerability (EAT-26). In the self-schema task, biases in the processing of negative self descriptors previously found to be common in EDs predicted vulnerability. Biases in the processing of shape-related words on the Stroop task were also predictive; however, these biases were more important in dieters who also displayed biases in the self-schema task. We were also able to demonstrate that these biases are specific and separable from more general negative biases that could be attributed to depressive symptoms. These results suggest that specific biases in the processing of social cues, cognitions about the self, and also about eating, weight and shape information, may be important in understanding risk and preventing relapse in EDs.

  12. Spatiotemporal heterogeneity in prey abundance and vulnerability shapes the foraging tactics of an omnivore.

    Science.gov (United States)

    Rayl, Nathaniel D; Bastille-Rousseau, Guillaume; Organ, John F; Mumma, Matthew A; Mahoney, Shane P; Soulliere, Colleen E; Lewis, Keith P; Otto, Robert D; Murray, Dennis L; Waits, Lisette P; Fuller, Todd K

    2018-05-01

    Prey abundance and prey vulnerability vary across space and time, but we know little about how they mediate predator-prey interactions and predator foraging tactics. To evaluate the interplay between prey abundance, prey vulnerability and predator space use, we examined patterns of black bear (Ursus americanus) predation of caribou (Rangifer tarandus) neonates in Newfoundland, Canada using data from 317 collared individuals (9 bears, 34 adult female caribou, 274 caribou calves). During the caribou calving season, we predicted that landscape features would influence calf vulnerability to bear predation, and that bears would actively hunt calves by selecting areas associated with increased calf vulnerability. Further, we hypothesized that bears would dynamically adjust their foraging tactics in response to spatiotemporal changes in calf abundance and vulnerability (collectively, calf availability). Accordingly, we expected bears to actively hunt calves when they were most abundant and vulnerable, but switch to foraging on other resources as calf availability declined. As predicted, landscape heterogeneity influenced risk of mortality, and bears displayed the strongest selection for areas where they were most likely to kill calves, which suggested they were actively hunting caribou. Initially, the per-capita rate at which bears killed calves followed a type-I functional response, but as the calving season progressed and calf vulnerability declined, kill rates dissociated from calf abundance. In support of our hypothesis, bears adjusted their foraging tactics when they were less efficient at catching calves, highlighting the influence that predation phenology may have on predator space use. Contrary to our expectations, however, bears appeared to continue to hunt caribou as calf availability declined, but switched from a tactic of selecting areas of increased calf vulnerability to a tactic that maximized encounter rates with calves. Our results reveal that generalist

  13. The effect of display movement angle, indicator type and display location on control/display stereotype strength.

    Science.gov (United States)

    Hoffmann, Errol R; Chan, Alan H S

    2017-08-01

    Much research on stereotype strength relating display and control movements for displays moving in the vertical or horizontal directions has been reported. Here we report effects of display movement angle, where the display moves at angles (relative to the vertical) of between 0° and 180°. The experiment used six different controls, four display locations relative to the operator and three types of indicator. Indicator types were included because of the strong effects of the 'scale-side principle' that are variable with display angle. A directional indicator had higher stereotype strength than a neutral indicator, and showed an apparent reversal in control/display stereotype direction beyond an angle of 90°. However, with a neutral indicator this control reversal was not present. Practitioner Summary: The effects of display moving at angles other than the four cardinal directions, types of control, location of display and types of indicator are investigated. Indicator types (directional and neutral) have an effect on stereotype strength and may cause an apparent control reversal with change of display movement angle.

  14. The Pricing of Vulnerable Options in a Fractional Brownian Motion Environment

    Directory of Open Access Journals (Sweden)

    Chao Wang

    2015-01-01

    Full Text Available Under the assumption of the stock price, interest rate, and default intensity obeying the stochastic differential equation driven by fractional Brownian motion, the jump-diffusion model is established for the financial market in fractional Brownian motion setting. With the changes of measures, the traditional pricing method is simplified and the general pricing formula is obtained for the European vulnerable option with stochastic interest rate. At the same time, the explicit expression for it comes into being.

  15. Childhood adversity, parental vulnerability and disorder: examining inter-generational transmission of risk.

    Science.gov (United States)

    Bifulco, A; Moran, P M; Ball, C; Jacobs, C; Baines, R; Bunn, A; Cavagin, J

    2002-11-01

    An investigation of intergenerational factors associated with psychiatric disorder in late adolescence/early adulthood was undertaken to differentiate influences from maternal disorder, maternal poor psychosocial functioning and poor parenting, on offspring. The sample comprised an intensively studied series of 276 mother-offspring pairs in a relatively deprived inner-city London area with high rates of lone parenthood and socio-economic disadvantage. The paired sample was collected over two time periods: first a consecutively screened series of mothers and offspring in 1985-90 (n = 172 pairs) and second a 'vulnerable' series of mothers and offspring in 1995-99 (n = 104 pairs). The vulnerable mothers were selected for poor interpersonal functioning and/or low self-esteem and the consecutive series were used for comparison. Rates of childhood adversity and disorder in the offspring were examined in the two groups. Maternal characteristics including psychosocial vulnerability and depression were then examined in relation to risk transmission. Offspring of vulnerable mothers had a fourfold higher rate of yearly disorder than those in the comparison series (43% vs. 11%, p maternal vulnerability and neglect/abuse of offspring provided the best model for offspring disorder. Maternal history of depression had no direct effect on offspring disorder; its effects were entirely mediated by offspring neglect/abuse. Maternal childhood adversity also had no direct effect. Results are discussed in relation to psychosocial models of risk transmission for disorder. Maternal poor psychosocial functioning needs to be identified as a factor requiring intervention in order to stem escalation of risk across generations.

  16. Differential Gene Expression of Longan Under Simulated Acid Rain Stress.

    Science.gov (United States)

    Zheng, Shan; Pan, Tengfei; Ma, Cuilan; Qiu, Dongliang

    2017-05-01

    Differential gene expression profile was studied in Dimocarpus longan Lour. in response to treatments of simulated acid rain with pH 2.5, 3.5, and a control (pH 5.6) using differential display reverse transcription polymerase chain reaction (DDRT-PCR). Results showed that mRNA differential display conditions were optimized to find an expressed sequence tag (EST) related with acid rain stress. The potential encoding products had 80% similarity with a transcription initiation factor IIF of Gossypium raimondii and 81% similarity with a protein product of Theobroma cacao. This fragment is the transcription factor activated by second messenger substances in longan leaves after signal perception of acid rain.

  17. Silver-staining mRNA differential display method and cloning of tumor related genes in HepG2 cell line%银染mRNA差异显示法克隆肝癌相关基因

    Institute of Scientific and Technical Information of China (English)

    王新; 黄裕新; 闻勤生; 王庆莉

    2001-01-01

    AIM To develop mRNA differential display polymerize chain reaction (DD-PCR) method with silver staining and to clone the liver cancer related genes in HepG2 cell line. METHODS Total RNA was extracted from the HepG2 cells and L02 cells. Their first strains of cDNA were produced by reverse transcription (RT). The cDNA were amplified by PCR using an anchored primer 5 dT11G combined with eight arbitrary primers respectively. The products of PCR were analyzed on a denaturing 60 g*L-1 polyacrylamide gel. The differential DNA bands on gel were seen by silver-staining.RESULTS Several liver cancer related genes were isolated and identified by the sensitive silver-staining mRNA differential display developed. CONCLUSION The established mRNA differential display method with silver staining is a simple, efficient means which has higher value for screening and cloning differentially expressed genes.%目的建立银染mRNA差异显示方法,筛选并克隆肝癌相关基因. 方法以建系的人肝癌细胞HepG2和正常的肝细胞L02的总RNA为模板,用5-dT11G锚定引物和8条随机引物(AP1~AP8)组合进行RT-PCR扩增,PCR产物经60 g*L-1尿素变性聚丙烯酰胺凝胶电泳分离后,凝胶银盐染色显示差异的DNA片段. 结果建立了快速敏感的银染mRNA差异显示方法,分离并克隆了一些肝癌相关基因. 结论建立的银染mRNA差异显示法简单、有效,在差异表达基因的筛选中有较高的实用价值.

  18. Developing a Climate-Induced Social Vulnerability Index for Urban Areas: A Case Study of East Tennessee

    Energy Technology Data Exchange (ETDEWEB)

    Omitaomu, Olufemi A. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Carvalhaes, Thomaz M. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-09-01

    Census American Community Survey 2008-2012 data are used to construct a spatially explicit Climate-Induced Social Vulnerability Index (CSVI) for the East Tennessee area. This CSVI is a combination of a Social Vulnerability Index (SVI) and a Climate Index. A method is replicated and adapted to derive a custom SVI by Census tract for the counties participating in the East Tennessee Index, and a Climate Index is developed for the same area based on indicators for climate hazards. The resulting datasets are exported as a raster to be integrated and combined within the Urban Climate Adaptation Tool (Urban-CAT) to act as an indicator for communities which may be differentially vulnerable to changes in climate. Results for the SVI are mapped separately from the complete CSVI in this document as results for the latter are in development.

  19. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  20. Unequal Exposure or Unequal Vulnerability? Contributions of Neighborhood Conditions and Cardiovascular Risk Factors to Socioeconomic Inequality in Incident Cardiovascular Disease in the Multi-Ethnic Study of Atherosclerosis.

    Science.gov (United States)

    Hussein, Mustafa; Diez Roux, Ana V; Mujahid, Mahasin S; Hastert, Theresa A; Kershaw, Kiarri N; Bertoni, Alain G; Baylin, Ana

    2017-11-23

    Risk factors can drive socioeconomic inequalities in cardiovascular disease (CVD) through differential exposure and differential vulnerability. We show how econometric decomposition directly enables simultaneous, policy-oriented assessment of these two mechanisms. We specifically estimated contributions via these mechanisms of neighborhood environment and proximal risk factors to socioeconomic inequality in CVD incidence. We followed 5,608 participants in the Multi-Ethnic Study of Atherosclerosis (2000-2012) until the first CVD event (median follow-up 12.2 years). We used a summary measure of baseline socioeconomic position (SEP). Covariates included baseline demographics, neighborhood, psychosocial, behavioral, and biomedical risk factors. Using Poisson models, we decomposed the difference (inequality) in incidence rates between low- and high-SEP groups into contributions of 1) differences in covariate means (differential exposure), and 2) differences in CVD risk associated with covariates (differential vulnerability). Notwithstanding large uncertainty in neighborhood estimates, our analysis suggests that differential exposure to poorer neighborhood socioeconomic conditions, adverse social environment, diabetes, and hypertension accounts for most of inequality. Psychosocial and behavioral contributions were negligible. Further, neighborhood SEP, female gender, and White race were more strongly associated with CVD among low-SEP (vs. high-SEP) participants. These differentials in vulnerability also accounted for nontrivial portions of the inequality, and could have important implications for intervention. © The Author(s) 2017. Published by Oxford University Press on behalf of the Johns Hopkins Bloomberg School of Public Health. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  1. Tracking socioeconomic vulnerability using network analysis: insights from an avian influenza outbreak in an ostrich production network.

    Directory of Open Access Journals (Sweden)

    Christine Moore

    Full Text Available BACKGROUND: The focus of management in many complex systems is shifting towards facilitation, adaptation, building resilience, and reducing vulnerability. Resilience management requires the development and application of general heuristics and methods for tracking changes in both resilience and vulnerability. We explored the emergence of vulnerability in the South African domestic ostrich industry, an animal production system which typically involves 3-4 movements of each bird during its lifetime. This system has experienced several disease outbreaks, and the aim of this study was to investigate whether these movements have contributed to the vulnerability of this system to large disease outbreaks. METHODOLOGY/PRINCIPAL FINDINGS: The ostrich production system requires numerous movements of birds between different farm types associated with growth (i.e. Hatchery to juvenile rearing farm to adult rearing farm. We used 5 years of movement records between 2005 and 2011 prior to an outbreak of Highly Pathogenic Avian Influenza (H5N2. These data were analyzed using a network analysis in which the farms were represented as nodes and the movements of birds as links. We tested the hypothesis that increasing economic efficiency in the domestic ostrich industry in South Africa made the system more vulnerable to outbreak of Highly Pathogenic Avian Influenza (H5N2. Our results indicated that as time progressed, the network became increasingly vulnerable to pathogen outbreaks. The farms that became infected during the outbreak displayed network qualities, such as significantly higher connectivity and centrality, which predisposed them to be more vulnerable to disease outbreak. CONCLUSIONS/SIGNIFICANCE: Taken in the context of previous research, our results provide strong support for the application of network analysis to track vulnerability, while also providing useful practical implications for system monitoring and management.

  2. Energy vulnerability relationships

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  3. Vulnerability of housing buildings in Bucharest, Romania

    Science.gov (United States)

    Bostenaru, M.

    2009-04-01

    stylistically the "national style" flourished), - the time 1920-1940 for the type with reinforced concrete skeleton for gravitational loads only (in which the "interwar style" or Romanian Modernism flourished), - the time immediately after 1940 (when a strong earthquake struck Bucharest), somehow 1940-1947, when the former structural type was continued, but with some improvements, for which a type with reinforced concrete diagonals was considered, - the time 1947-1977, before the strong earthquake from 1977, when cast-in-situ reinforced concrete structural wall buildings were spread. Two types are considered, one which displayed low earthquake vulnerability and one which displayed high earthquake vulnerability, - the time 1977-1989, after the strong earthquake from 1977 and before the fall on the communist regime, when taking as a reason the strong earthquake the regime started to implement another type of buildings, which structurally often were still reinforced concrete structural wall type, but prefabricated, - the time after 1989, when for more flexibility moment resisting frame was built, and also some of the unfinished moment resisting frame buildings were completed. To have such a complete description of all the building type in a country is not common for the World Housing Encyclopedia, and having them for Romania was due to a particular effort of the author. At the same time the database allows finding similar types in other parts of the world. Broadly speaking, each report included two sections, the first one more extended, on the vulnerability of buildings and the second on the seismic retrofit. The reports contain completed check lists, descriptions of the structural system, photographs and drawings. The accent in this presentation will be on the identification of seismic deficiencies and earthquake resilient features, and the connected typical damages, which all describe the vulnerability.

  4. A relative vulnerability estimation of flood disaster using data envelopment analysis in the Dongting Lake region of Hunan

    Science.gov (United States)

    Li, C.-H.; Li, N.; Wu, L.-C.; Hu, A.-J.

    2013-07-01

    scale, the occurrence of a vibrating flood vulnerability trend is observed. A different picture is displayed with the disaster driver risk level, disaster environment stability level and disaster bearer sensitivity level. The flood relative vulnerability estimation method based on DEA is characteristic of good comparability, which takes the relative efficiency of disaster system input-output into account, and portrays a very diverse but consistent picture with varying time steps. Therefore, among different spatial and time domains, we could compare the disaster situations with what was reflected by the same disaster. Additionally, the method overcomes the subjectivity of a comprehensive flood index caused by using an a priori weighting system, which exists in disaster vulnerability estimation of current disasters.

  5. Genetic population structure of the vulnerable bog fritillary butterfly.

    Science.gov (United States)

    Vandewoestijne, S; Baguette, M

    2004-01-01

    Populations of the bog fritillary butterfly Proclossiana eunomia (Lepidoptera, Nymphalidae) occur in patchy habitat in central and western Europe. P. eunomia is a vulnerable species in the Belgian Ardennes and the number of occupied sites has significantly decreased in this region since the 1960s. RAPD (random amplified polymorphic DNA) markers were used to study the consequences of habitat loss and fragmentation on the genetic population structure of this species. Gene diversity was lower in populations with smaller population sizes. Genetic subdivision was high (Fst=0.0887) considering the small spatial scale of this study (150 km2). The most geographically isolated population was also the most genetically differentiated one. The genetic population structure and genetic differentiation detected in this study were explained by (1) differences in altitude of the sampled locations and, (2) lower dispersal propensity and dispersal rate in fragmented landscapes versus continuous landscapes. Results from the RAPD analyses were compared with a previous allozyme based study on the same populations. The results of this study suggest that increased fragmentation has lead to a greater genetic differentiation between remaining P. eunomia populations.

  6. Memory Vulnerability Diagnosis for Binary Program

    Directory of Open Access Journals (Sweden)

    Tang Feng-Yi

    2016-01-01

    Full Text Available Vulnerability diagnosis is important for program security analysis. It is a further step to understand the vulnerability after it is detected, as well as a preparatory step for vulnerability repair or exploitation. This paper mainly analyses the inner theories of major memory vulnerabilities and the threats of them. And then suggests some methods to diagnose several types of memory vulnerabilities for the binary programs, which is a difficult task due to the lack of source code. The diagnosis methods target at buffer overflow, use after free (UAF and format string vulnerabilities. We carried out some tests on the Linux platform to validate the effectiveness of the diagnosis methods. It is proved that the methods can judge the type of the vulnerability given a binary program.

  7. Data Gathering Bias: Trait Vulnerability to Psychotic Symptoms?

    Directory of Open Access Journals (Sweden)

    Ana Catalan

    Full Text Available Jumping to conclusions (JTC is associated with psychotic disorder and psychotic symptoms. If JTC represents a trait, the rate should be (i increased in people with elevated levels of psychosis proneness such as individuals diagnosed with borderline personality disorder (BPD, and (ii show a degree of stability over time.The JTC rate was examined in 3 groups: patients with first episode psychosis (FEP, BPD patients and controls, using the Beads Task. PANSS, SIS-R and CAPE scales were used to assess positive psychotic symptoms. Four WAIS III subtests were used to assess IQ.A total of 61 FEP, 26 BPD and 150 controls were evaluated. 29 FEP were revaluated after one year. 44% of FEP (OR = 8.4, 95% CI: 3.9-17.9 displayed a JTC reasoning bias versus 19% of BPD (OR = 2.5, 95% CI: 0.8-7.8 and 9% of controls. JTC was not associated with level of psychotic symptoms or specifically delusionality across the different groups. Differences between FEP and controls were independent of sex, educational level, cannabis use and IQ. After one year, 47.8% of FEP with JTC at baseline again displayed JTC.JTC in part reflects trait vulnerability to develop disorders with expression of psychotic symptoms.

  8. A data mining approach to derive flood-related economic vulnerability of companies

    Science.gov (United States)

    Sieg, Tobias; Kreibich, Heidi; Vogel, Kristin; Merz, Bruno

    2017-04-01

    The assessment of vulnerability gained more and more attention in flood risk research during the recent years. However, there is still not much knowledge available about flood vulnerability of companies and its influencing factors. This study follows the natural sciences concept which defines vulnerability as the degree of loss to a given element at risk resulting from flooding of a given magnitude. Machine learning algorithms like Random Forests (RFs) are promising approaches, since they consider many influencing variables and as such allow for a detailed assessment of flood vulnerability. Only these variables which are meaningful for the differentiation of a certain target variable are used by the derived models. This allows for an identification of relevant damage influencing variables and hence for a more detailed picture of flood vulnerability of companies. This study aims to identify relevant damage influencing variables by means of the variable importance provided by Random Forests. The data sets used are taken from two surveys conducted after the floods in the Elbe and Danube catchments in the years 2002 and 2013 in Germany. Damage to buildings (n = 430), equipment (n = 651) as well as goods and stock (n = 530) are taken into account. The analysis is done for the entire data set as well as for four groups of different company sectors and the corresponding data subsets. Relevant damage influencing variables separated by sector and assets are identified as, for example, the degree of contamination or precautionary measures undertaken before the flood event. The results provide insight into the damage processes and improve data-acquisition in future surveys by, for instance, asking specific questions for company sectors and assets.

  9. Vulnerability Identification Errors in Security Risk Assessments

    OpenAIRE

    Taubenberger, Stefan

    2014-01-01

    At present, companies rely on information technology systems to achieve their business objectives, making them vulnerable to cybersecurity threats. Information security risk assessments help organisations to identify their risks and vulnerabilities. An accurate identification of risks and vulnerabilities is a challenge, because the input data is uncertain. So-called ’vulnerability identification errors‘ can occur if false positive vulnerabilities are identified, or if vulnerabilities remain u...

  10. Fuzzing and Vulnerabilities Search

    OpenAIRE

    Stanislav Evgenyevich Kirillov; Nikolai Petrovich Lavrentiev

    2013-01-01

    Fuzzing for vulnerabilities can be very effective if we know the input data format. This work contains description of network message format recovery algorithm and the usage of restored data model in fuzzing and vulnerabilities search.

  11. spatially identifying vulnerable areas

    African Journals Online (AJOL)

    The model structure is aimed at understanding the critical vulnerable factors that ... This paper incorporates multiple criteria and rank risk factors. ..... In terms of quantifying vulnerable areas within the country, the analysis is done based on 9 ...

  12. Fuzzing and Vulnerabilities Search

    Directory of Open Access Journals (Sweden)

    Stanislav Evgenyevich Kirillov

    2013-02-01

    Full Text Available Fuzzing for vulnerabilities can be very effective if we know the input data format. This work contains description of network message format recovery algorithm and the usage of restored data model in fuzzing and vulnerabilities search.

  13. Free and Open Source Software for land degradation vulnerability assessment

    Science.gov (United States)

    Imbrenda, Vito; Calamita, Giuseppe; Coluzzi, Rosa; D'Emilio, Mariagrazia; Lanfredi, Maria Teresa; Perrone, Angela; Ragosta, Maria; Simoniello, Tiziana

    2013-04-01

    the vulnerability to anthropic factors mainly connected with agricultural and grazing management. To achieve the final ESAs Index depicting the overall vulnerability to degradation of the investigated area we applied the geometric mean to cross normalized indices related to each examined component. In this context QGIS was used to display data and to perform basic GIS calculations, whereas GRASS was used for map-algebra operations and image processing. Finally R was used for computing statistical analysis (Principal Component Analysis) aimed to determine the relative importance of each adopted indicator. Our results show that GRASS, QGIS and R software are suitable to map land degradation vulnerability and identify highly vulnerable areas in which rehabilitation/recovery interventions are urgent. In addition they allow us to put into evidence the most important drivers of degradation thus supplying basic information for the setting up of intervention strategies. Ultimately, Free Open Source Software deliver a fair chance for geoscientific investigations thanks to their high interoperability and flexibility enabling to preserve the accuracy of the data and to reduce processing time. Moreover, the presence of several communities that steadily support users allows for achieving high quality results, making free open source software a valuable and easy alternative to conventional commercial software.

  14. Selective vulnerability in brain hypoxia

    DEFF Research Database (Denmark)

    Cervos-Navarro, J.; Diemer, Nils Henrik

    1991-01-01

    Neuropathology, selective vulnerability, brain hypoxia, vascular factors, excitotoxicity, ion homeostasis......Neuropathology, selective vulnerability, brain hypoxia, vascular factors, excitotoxicity, ion homeostasis...

  15. Web Application Vulnerabilities

    OpenAIRE

    Yadav, Bhanu

    2014-01-01

    Web application security has been a major issue in information technology since the evolvement of dynamic web application. The main objective of this project was to carry out a detailed study on the top three web application vulnerabilities such as injection, cross site scripting, broken authentication and session management, present the situation where an application can be vulnerable to these web threats and finally provide preventative measures against them. ...

  16. Mapping human vulnerability to climate change in the Brazilian Amazon: The construction of a municipal vulnerability index.

    Science.gov (United States)

    Menezes, Júlia Alves; Confalonieri, Ulisses; Madureira, Ana Paula; Duval, Isabela de Brito; Santos, Rhavena Barbosa Dos; Margonari, Carina

    2018-01-01

    Vulnerability, understood as the propensity to be adversely affected, has attained importance in the context of climate change by helping to understand what makes populations and territories predisposed to its impacts. Conditions of vulnerability may vary depending on the characteristics of each territory studied-social, environmental, infrastructural, public policies, among others. Thus, the present study aimed to evaluate what makes the municipalities of the state of Amazonas, Brazil, vulnerable to climate change in the context of the largest tropical forest in the world, and which regions of the State are the most susceptible. A Municipal Vulnerability Index was developed, which was used to associate current socio-environmental characteristics of municipalities with climate change scenarios in order to identify those that may be most affected by climate change. The results showed that poor adaptive capacity and poverty had the most influence on current vulnerability of the municipalities of Amazonas with the most vulnerable areas being the southern, northern, and eastern regions of the state. When current vulnerability was related to future climate change projections, the most vulnerable areas were the northern, northeastern, extreme southern, and southwestern regions. From a socio-environmental and climatic point of view, these regions should be a priority for public policy efforts to reduce their vulnerability and prepare them to cope with the adverse aspects of climate change.

  17. Mapping human vulnerability to climate change in the Brazilian Amazon: The construction of a municipal vulnerability index.

    Directory of Open Access Journals (Sweden)

    Júlia Alves Menezes

    Full Text Available Vulnerability, understood as the propensity to be adversely affected, has attained importance in the context of climate change by helping to understand what makes populations and territories predisposed to its impacts. Conditions of vulnerability may vary depending on the characteristics of each territory studied-social, environmental, infrastructural, public policies, among others. Thus, the present study aimed to evaluate what makes the municipalities of the state of Amazonas, Brazil, vulnerable to climate change in the context of the largest tropical forest in the world, and which regions of the State are the most susceptible. A Municipal Vulnerability Index was developed, which was used to associate current socio-environmental characteristics of municipalities with climate change scenarios in order to identify those that may be most affected by climate change. The results showed that poor adaptive capacity and poverty had the most influence on current vulnerability of the municipalities of Amazonas with the most vulnerable areas being the southern, northern, and eastern regions of the state. When current vulnerability was related to future climate change projections, the most vulnerable areas were the northern, northeastern, extreme southern, and southwestern regions. From a socio-environmental and climatic point of view, these regions should be a priority for public policy efforts to reduce their vulnerability and prepare them to cope with the adverse aspects of climate change.

  18. A digital data acquisition and display system for ITU TRIGA Mark II reactor

    International Nuclear Information System (INIS)

    Can, B.; Omuz, S.

    2008-01-01

    Full text: In this study, a digital data acquisition and display system realized for ITU TRIGA Mark-II Reactor is described. This system is realized in order to help the reactor operator and to increase reactor console capacity. The system consists of two main units, which are host computers and RTI-815F, analog devices, data acquisition card. RTI-815F is multi-function analog/digital input/output board that plugs into one of the available long expansion slots in the IBM-PC, PC/XT, PC/AT, or equivalent personal computers. It has 16 analog input channels for single-ended input signals or 8 analog input channels for differential input signals. But its channel capacity can be increased to 32 input channels for single-ended input signals or 16 input channels for differential input signals. RTI-815F board contains 2 analog output channels, 8 digital input channels and 8 digital output channels. In the ITD TRIGA Mark-II Reactor, 6 fuel temperature channels, 3 water temperature channels, 3 control rod position channels and 4 power channels are chosen as analog input signals for RTI-815F. Its digital outputs are assigned to cooling tower fan, primary and secondary pump reactor scram, control rod rundown. During operation, data are automatically archived to disk and displayed on screen. The channel selection time and sampling time can be adjusted. The simulated movement and position of control rods in the reactor core can be noted and displayed. The changes of power, fuel temperature and water temperature can be displayed on the screen as a graphic. In this system both period and reactivity are calculated and displayed on the screen. (authors)

  19. A relative vulnerability estimation of flood disaster using data envelopment analysis in the Dongting Lake region of Hunan

    Directory of Open Access Journals (Sweden)

    C.-H. Li

    2013-07-01

    . On a temporal scale, the occurrence of a vibrating flood vulnerability trend is observed. A different picture is displayed with the disaster driver risk level, disaster environment stability level and disaster bearer sensitivity level. The flood relative vulnerability estimation method based on DEA is characteristic of good comparability, which takes the relative efficiency of disaster system input–output into account, and portrays a very diverse but consistent picture with varying time steps. Therefore, among different spatial and time domains, we could compare the disaster situations with what was reflected by the same disaster. Additionally, the method overcomes the subjectivity of a comprehensive flood index caused by using an a priori weighting system, which exists in disaster vulnerability estimation of current disasters.

  20. Rating Emotion Communication: Display and Concealment as Effects of Culture, Gender, Emotion Type, and Relationship

    Directory of Open Access Journals (Sweden)

    Arne Vikan

    2009-01-01

    Full Text Available Students from a collectivistic (Brazilian, n= 401 and an individualistic (Norwegian, n= 418culture rated their ability to display and conceal anger, sadness, and anxiety in relation to immediate family, partner, friends, and "other persons." Norwegians showed higher display ratings for anger and sadness, and higher concealment ratings for anger and anxiety. Display ratings were much higher, and concealment ratings much lower in relation to close persons than in relation to "other persons." A culture x relationship interaction was that Brazilian' ratings suggested more emotional openness to friends than to family and partner, whereas Norwegians showed the inverse patterns. Gender differences supported previous research by showing higher display and lower concealment ratings, and less differentiation between relationships by females.

  1. Mining Bug Databases for Unidentified Software Vulnerabilities

    Energy Technology Data Exchange (ETDEWEB)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  2. Open Source Vulnerability Database Project

    Directory of Open Access Journals (Sweden)

    Jake Kouns

    2008-06-01

    Full Text Available This article introduces the Open Source Vulnerability Database (OSVDB project which manages a global collection of computer security vulnerabilities, available for free use by the information security community. This collection contains information on known security weaknesses in operating systems, software products, protocols, hardware devices, and other infrastructure elements of information technology. The OSVDB project is intended to be the centralized global open source vulnerability collection on the Internet.

  3. Implications of Shared Interactive Displays for Work at a Surgery Ward: Coordination, Articulation Work and Context-awareness

    DEFF Research Database (Denmark)

    Bossen, Claus; Jensen, Lis Witte Kjær

    2008-01-01

    We report on experiences gained from the use at a surgery ward of shared interactive displays to support coordination and communication.  The displays merge large displays, video feed, RFID tag, chat and mobile phones to facilitate better coordination and articulation of work tasks and enhance...... appropriate meaning to new clues by clinicians and learning new ways of cooperating. Trade-offs had to be made, since work and benefits were differentially redistributed. We propose that computer support for medical work should support flexible appropriation and learning....

  4. Tsunami survivors' perspectives on vulnerability and vulnerability reduction: evidence from Koh Phi Phi Don and Khao Lak, Thailand.

    Science.gov (United States)

    Steckley, Marylynn; Doberstein, Brent

    2011-07-01

    This paper presents the results of primary research with 40 survivors of the 2004 Indian Ocean tsunami in two communities: Khao Lak (n=20) and Koh Phi Phi Don (n=20), Thailand. It traces tsunami survivors' perceptions of vulnerability, determines whether residents felt that the tsunami affected different communities differently, identifies the populations and sub-community groups that survivors distinguished as being more vulnerable than others, highlights community-generated ideas about vulnerability reduction, and pinpoints a range of additional vulnerability reduction actions. Tsunami survivors most consistently identified the 'most vulnerable' community sub-populations as women, children, the elderly, foreigners, and the poor. In Khao Lak, however, respondents added 'Burmese migrants' to this list, whereas in Koh Phi Phi Don, they added 'Thai Muslims'. Results suggest that the two case study communities, both small, coastal, tourism-dominated communities no more than 100 kilometres apart, have differing vulnerable sub-groups and environmental vulnerabilities, requiring different post-disaster vulnerability reduction efforts. © 2011 The Author(s). Disasters © Overseas Development Institute, 2011.

  5. European display scene

    Science.gov (United States)

    Bartlett, Christopher T.

    2000-08-01

    The manufacture of Flat Panel Displays (FPDs) is dominated by Far Eastern sources, particularly in Active Matrix Liquid Crystal Displays (AMLCD) and Plasma. The United States has a very powerful capability in micro-displays. It is not well known that Europe has a very active research capability which has lead to many innovations in display technology. In addition there is a capability in display manufacturing of organic technologies as well as the licensed build of Japanese or Korean designs. Finally, Europe has a display systems capability in military products which is world class.

  6. Effect of display location on control-display stereotype strength for translational and rotational controls with linear displays.

    Science.gov (United States)

    Chan, Alan H S; Hoffmann, Errol R

    2015-01-01

    Experiments were designed to investigate the effects of control type and display location, relative to the operator, on the strength of control/display stereotypes. The Worringham and Beringer Visual Field principle and an extension of this principle for rotary controls (Hoffmann E.R., and Chan A.H.S. 2013). "The Worringham and Beringer 'Visual Field' Principle for Rotary Controls. Ergonomics." 56 (10): 1620-1624) indicated that, for a number of different control types (rotary and lever) on different planes, there should be no significant effect of the display location relative to the seated operator. Past data were surveyed and stereotype strengths listed. Experiments filled gaps where data are not available. Six different control types and seven display locations were used, as in the Frame of Reference Transformation Tool (FORT) model of Wickens et al. (Wickens, C.D., Keller, J.W., and Small, R.L. (2010). "Left. No, Right! Development of the Frame of Reference Transformation Tool (FORT)." Proceedings of the Human Factors and Ergonomics Society 54th Annual Meeting September 2010, 54: 1022-1026). Control/display arrangements with high stereotype strengths were evaluated yielding data for designers of complex control/display arrangements where the control and display are in different planes and for where the operator is moving. It was found possible to predict display/control arrangements with high stereotype strength, based on past data. Practitioner Summary: Controls and displays in complex arrangements need to have high compatibility. These experiments provide arrangements for six different controls (rotary and translational) and seven different display locations relative to the operator.

  7. Cotton genetic resources and crop vulnerability

    Science.gov (United States)

    A report on the genetic vulnerability of cotton was provided to the National Genetic Resources Advisory Council. The report discussed crop vulnerabilities associated with emerging diseases, emerging pests, and a narrowing genetic base. To address these crop vulnerabilities, the report discussed the ...

  8. Vulnerability and resilience: a critical nexus.

    Science.gov (United States)

    Lotz, Mianna

    2016-02-01

    Not all forms of human fragility or vulnerability are unavoidable. Sometimes we knowingly and intentionally impose conditions of vulnerability on others; and sometimes we knowingly and intentionally enter into and assume conditions of vulnerability for ourselves (for example, when we decide to trust or forgive, enter into intimate relationships with others, become a parent, become a subject of medical or psychotherapeutic treatment, and the like). In this article, I propose a presently overlooked basis on which one might evaluate whether the imposition or assumption of vulnerability is acceptable, and on which one might ground a significant class of vulnerability-related obligations. Distinct from existing accounts of the importance of promoting autonomy in conditions of vulnerability, this article offers a preliminary exploration of the nature, role, and importance of resilience promotion, its relationship to autonomy promotion, and its prospects for improving human wellbeing in autonomy inhibiting conditions.

  9. Displays in scintigraphy

    International Nuclear Information System (INIS)

    Todd-Pokropek, A.E.; Pizer, S.M.

    1977-01-01

    Displays have several functions: to transmit images, to permit interaction, to quantitate features and to provide records. The main characteristics of displays used for image transmission are their resolution, dynamic range, signal-to-noise ratio and uniformity. Considerations of visual acuity suggest that the display element size should be much less than the data element size, and in current practice at least 256X256 for a gamma camera image. The dynamic range for image transmission should be such that at least 64 levels of grey (or equivalent) are displayed. Scanner displays are also considered, and in particular, the requirements of a whole-body camera are examined. A number of display systems and devices are presented including a 'new' heated object colour display system. Interaction with displays is considered, including background subtraction, contrast enhancement, position indication and region-of-interest generation. Such systems lead to methods of quantitation, which imply knowledge of the expected distributions. Methods for intercomparing displays are considered. Polaroid displays, which have for so long dominated the field, are in the process of being replaced by stored image displays, now that large cheap memories exist which give an equivalent image quality. The impact of this in nuclear medicine is yet to be seen, but a major effect will be to enable true quantitation. (author)

  10. Mentalizing skills do not differentiate believers from non-believers, but credibility enhancing displays do.

    Directory of Open Access Journals (Sweden)

    David L R Maij

    Full Text Available The ability to mentalize has been marked as an important cognitive mechanism enabling belief in supernatural agents. In five studies we cross-culturally investigated the relationship between mentalizing and belief in supernatural agents with large sample sizes (over 67,000 participants in total and different operationalizations of mentalizing. The relative importance of mentalizing for endorsing supernatural beliefs was directly compared with credibility enhancing displays-the extent to which people observed credible religious acts during their upbringing. We also compared autistic with neurotypical adolescents. The empathy quotient and the autism-spectrum quotient were not predictive of belief in supernatural agents in all countries (i.e., The Netherlands, Switzerland and the United States, although we did observe a curvilinear effect in the United States. We further observed a strong influence of credibility enhancing displays on belief in supernatural agents. These findings highlight the importance of cultural learning for acquiring supernatural beliefs and ask for reconsiderations of the importance of mentalizing.

  11. The relationship between ambient illumination and psychological factors in viewing of display Images

    Science.gov (United States)

    Iwanami, Takuya; Kikuchi, Ayano; Kaneko, Takashi; Hirai, Keita; Yano, Natsumi; Nakaguchi, Toshiya; Tsumura, Norimichi; Yoshida, Yasuhiro; Miyake, Yoichi

    2009-01-01

    In this paper, we have clarified the relationship between ambient illumination and psychological factors in viewing of display images. Psychological factors were obtained by the factor analysis with the results of the semantic differential (SD) method. In the psychological experiments, subjects evaluated the impressions of displayed images with changing ambient illuminating conditions. The illumination conditions were controlled by a fluorescent ceiling light and a color LED illumination which was located behind the display. We experimented under two kinds of conditions. One was the experiment with changing brightness of the ambient illumination. The other was the experiment with changing the colors of the background illumination. In the results of the experiment, two factors "realistic sensation, dynamism" and "comfortable," were extracted under different brightness of the ambient illumination of the display surroundings. It was shown that the "comfortable" was improved by the brightness of display surroundings. On the other hand, when the illumination color of surroundings was changed, three factors "comfortable," "realistic sensation, dynamism" and "activity" were extracted. It was also shown that the value of "comfortable" and "realistic sensation, dynamism" increased when the display surroundings were illuminated by the average color of the image contents.

  12. VT - Vermont Social Vulnerability Index

    Data.gov (United States)

    Vermont Center for Geographic Information — Social vulnerability refers to the resilience of communities when responding to or recovering from threats to public health. The Vermont Social Vulnerability Index...

  13. Animal models to study plaque vulnerability

    NARCIS (Netherlands)

    Schapira, K.; Heeneman, S.; Daemen, M. J. A. P.

    2007-01-01

    The need to identify and characterize vulnerable atherosclerotic lesions in humans has lead to the development of various animal models of plaque vulnerability. In this review, current concepts of the vulnerable plaque as it leads to an acute coronary event are described, such as plaque rupture,

  14. Monocular display unit for 3D display with correct depth perception

    Science.gov (United States)

    Sakamoto, Kunio; Hosomi, Takashi

    2009-11-01

    A study of virtual-reality system has been popular and its technology has been applied to medical engineering, educational engineering, a CAD/CAM system and so on. The 3D imaging display system has two types in the presentation method; one is a 3-D display system using a special glasses and the other is the monitor system requiring no special glasses. A liquid crystal display (LCD) recently comes into common use. It is possible for this display unit to provide the same size of displaying area as the image screen on the panel. A display system requiring no special glasses is useful for a 3D TV monitor, but this system has demerit such that the size of a monitor restricts the visual field for displaying images. Thus the conventional display can show only one screen, but it is impossible to enlarge the size of a screen, for example twice. To enlarge the display area, the authors have developed an enlarging method of display area using a mirror. Our extension method enables the observers to show the virtual image plane and to enlarge a screen area twice. In the developed display unit, we made use of an image separating technique using polarized glasses, a parallax barrier or a lenticular lens screen for 3D imaging. The mirror can generate the virtual image plane and it enlarges a screen area twice. Meanwhile the 3D display system using special glasses can also display virtual images over a wide area. In this paper, we present a monocular 3D vision system with accommodation mechanism, which is useful function for perceiving depth.

  15. Systematic drug screening reveals specific vulnerabilities and co-resistance patterns in endocrine-resistant breast cancer.

    Science.gov (United States)

    Kangaspeska, Sara; Hultsch, Susanne; Jaiswal, Alok; Edgren, Henrik; Mpindi, John-Patrick; Eldfors, Samuli; Brück, Oscar; Aittokallio, Tero; Kallioniemi, Olli

    2016-07-04

    The estrogen receptor (ER) inhibitor tamoxifen reduces breast cancer mortality by 31 % and has served as the standard treatment for ER-positive breast cancers for decades. However, 50 % of advanced ER-positive cancers display de novo resistance to tamoxifen, and acquired resistance evolves in 40 % of patients who initially respond. Mechanisms underlying resistance development remain poorly understood and new therapeutic opportunities are urgently needed. Here, we report the generation and characterization of seven tamoxifen-resistant breast cancer cell lines from four parental strains. Using high throughput drug sensitivity and resistance testing (DSRT) with 279 approved and investigational oncology drugs, exome-sequencing and network analysis, we for the first time, systematically determine the drug response profiles specific to tamoxifen resistance. We discovered emerging vulnerabilities towards specific drugs, such as ERK1/2-, proteasome- and BCL-family inhibitors as the cells became tamoxifen-resistant. Co-resistance to other drugs such as the survivin inhibitor YM155 and the chemotherapeutic agent paclitaxel also occurred. This study indicates that multiple molecular mechanisms dictate endocrine resistance, resulting in unexpected vulnerabilities to initially ineffective drugs, as well as in emerging co-resistances. Thus, combatting drug-resistant tumors will require patient-tailored strategies in order to identify new drug vulnerabilities, and to understand the associated co-resistance patterns.

  16. ICMPv6 RA Flooding Vulnerability Research

    Directory of Open Access Journals (Sweden)

    Linas Jočys

    2016-06-01

    Full Text Available ICMPv6 is the newest version of internet control message protocol, whose main purpose is to send error message indicating packet processing failure. It is know that ICMPv6 is technologically vulnerable. One of those vulnerabilities is the ICMPv6 RA flooding vulnerability, which can lead to systems in Local Area Network slow down or full stop. This paper will discuss Windows (XP, 7, 8.1 and Linux Ubuntu 14 operating systems resistance to RA flooding attack research and countermeasures to minimize this vulnerability.

  17. Assessing vulnerability of urban African communities

    DEFF Research Database (Denmark)

    Karlsson Nyed, Patrik; Jean-Baptiste, Nathalie; Herslund, Lise Byskov

    2014-01-01

    East African cities are in the process of assessing their vulnerabilities to climate change, but face difficulties in capturing the complexity of the various facets of vulnerability. This holistic approach, captures four different dimensions of vulnerability to flooding - Assets, Institutions......, Attitudes and the Physical environment, with Dar es Salaam, Tanzania, as a case city. The methodology is actively involving the expertise of the stakeholders, and uses GIS to analyze and compile the data. The final output is presented as a comprehensible map, delineating the varying vulnerability...

  18. Region-specific vulnerability to lipid peroxidation and evidence of neuronal mechanisms for polyunsaturated fatty acid biosynthesis in the healthy adult human central nervous system.

    Science.gov (United States)

    Naudí, Alba; Cabré, Rosanna; Dominguez-Gonzalez, Mayelin; Ayala, Victoria; Jové, Mariona; Mota-Martorell, Natalia; Piñol-Ripoll, Gerard; Gil-Villar, Maria Pilar; Rué, Montserrat; Portero-Otín, Manuel; Ferrer, Isidre; Pamplona, Reinald

    2017-05-01

    Lipids played a determinant role in the evolution of the brain. It is postulated that the morphological and functional diversity among neural cells of the human central nervous system (CNS) is projected and achieved through the expression of particular lipid profiles. The present study was designed to evaluate the differential vulnerability to oxidative stress mediated by lipids through a cross-regional comparative approach. To this end, we compared 12 different regions of CNS of healthy adult subjects, and the fatty acid profile and vulnerability to lipid peroxidation, were determined by gas chromatography (GC) and gas chromatography/mass spectrometry (GC/MS), respectively. In addition, different components involved in PUFA biosynthesis, as well as adaptive defense mechanisms against lipid peroxidation, were also measured by western blot and immunohistochemistry, respectively. We found that: i) four fatty acids (18.1n-9, 22:6n-3, 20:1n-9, and 18:0) are significant discriminators among CNS regions; ii) these differential fatty acid profiles generate a differential selective neural vulnerability (expressed by the peroxidizability index); iii) the cross-regional differences for the fatty acid profiles follow a caudal-cranial gradient which is directly related to changes in the biosynthesis pathways which can be ascribed to neuronal cells; and iv) the higher the peroxidizability index for a given human brain region, the lower concentration of the protein damage markers, likely supported by the presence of adaptive antioxidant mechanisms. In conclusion, our results suggest that there is a region-specific vulnerability to lipid peroxidation and offer evidence of neuronal mechanisms for polyunsaturated fatty acid biosynthesis in the human central nervous system. Copyright © 2017 Elsevier B.V. All rights reserved.

  19. Isolation and characterization of differentially expressed genes in ...

    African Journals Online (AJOL)

    USER

    Through reverse transcriptase-polymerase chain reaction analysis, priA homologue and AP-1 like transcription factor ... The oyster mushroom, Pleurotus ostreatus, and white button mushroom ..... differential display of RAPD. FEMS Microbiol.

  20. The Medicare Hospital Readmissions Reduction Program: potential unintended consequences for hospitals serving vulnerable populations.

    Science.gov (United States)

    Gu, Qian; Koenig, Lane; Faerberg, Jennifer; Steinberg, Caroline Rossi; Vaz, Christopher; Wheatley, Mary P

    2014-06-01

    To explore the impact of the Hospital Readmissions Reduction Program (HRRP) on hospitals serving vulnerable populations. Medicare inpatient claims to calculate condition-specific readmission rates. Medicare cost reports and other sources to determine a hospital's share of duals, profit margin, and characteristics. Regression analyses and projections were used to estimate risk-adjusted readmission rates and financial penalties under the HRRP. Findings were compared across groups of hospitals, determined based on their share of duals, to assess differential impacts of the HRRP. Both patient dual-eligible status and a hospital's dual-eligible share of Medicare discharges have a positive impact on risk-adjusted hospital readmission rates. Under current Centers for Medicare and Medicaid Service methodology, which does not adjust for socioeconomic status, high-dual hospitals are more likely to have excess readmissions than low-dual hospitals. As a result, HRRP penalties will disproportionately fall on high-dual hospitals, which are more likely to have negative all-payer margins, raising concerns of unintended consequences of the program for vulnerable populations. Policies to reduce hospital readmissions must balance the need to ensure continued access to quality care for vulnerable populations. © Health Research and Educational Trust.

  1. Motherhood, Marketization, and Consumer Vulnerability

    DEFF Research Database (Denmark)

    Davies, Andrea; Prothero, Andrea; Sørensen, Elin

    2010-01-01

    This article explores consumer vulnerability and the role of public policy by focusing on new mothers. Developing the consumer vulnerability model of Baker, Gentry, and Rittenburg, the authors consider how medical contexts, political and legal factors, economic resources, societal prescriptions...... a time of physical and psychological changes in mothers-to-be. This article illustrates that the extended market logic dominating contemporary mothering environments both contributes to and has the potential to exacerbate new mothers’ vulnerability, raising important challenges for public policy, both...

  2. Groundwater vulnerability mapping of Qatar aquifers

    Science.gov (United States)

    Baalousha, Husam Musa

    2016-12-01

    Qatar is one of the most arid countries in the world with limited water resources. With little rainfall and no surface water, groundwater is the only natural source of fresh water in the country. Whilst the country relies mainly on desalination of seawater to secure water supply, groundwater has extensively been used for irrigation over the last three decades, which caused adverse environmental impact. Vulnerability assessment is a widely used tool for groundwater protection and land-use management. Aquifers in Qatar are carbonate with lots of fractures, depressions and cavities. Karst aquifers are generally more vulnerable to contamination than other aquifers as any anthropogenic-sourced contaminant, especially above a highly fractured zone, can infiltrate quickly into the aquifer and spread over a wide area. The vulnerability assessment method presented in this study is based on two approaches: DRASTIC and EPIK, within the framework of Geographical Information System (GIS). Results of this study show that DRASTIC vulnerability method suits Qatar hydrogeological settings more than EPIK. The produced vulnerability map using DRASTIC shows coastal and karst areas have the highest vulnerability class. The southern part of the country is located in the low vulnerability class due to occurrence of shale formation within aquifer media, which averts downward movement of contaminants.

  3. A pragmatic analysis of vulnerability in clinical research.

    Science.gov (United States)

    Wendler, David

    2017-09-01

    Identifying which subjects are vulnerable, and implementing safeguards to protect them, is widely regarded as essential to clinical research. Commentators have endorsed a number of responses to these challenges and have thereby made significant progress in understanding vulnerability in clinical research. At the same time, this literature points to a central contradiction which calls into question its potential to protect vulnerable subjects in practice. Specifically, analysis suggests that all human subjects are vulnerable and vulnerability in clinical research is comparative and context dependent, in the sense that individuals are vulnerable relative to others and in some contexts only. Yet, if everyone is vulnerable, there seems to be no point in citing the vulnerability of some individuals. Moreover, the conclusion that everyone is vulnerable seems inconsistent with the claims that vulnerability is comparative and context dependent, raising concern over whether it will be possible to develop a comprehensive account of vulnerability that is internally consistent. The solution to this dilemma lies in recognition of the fact that the practical significance of claims regarding vulnerability depends on the context in which they are used. The claims that appear to lead to the central contradiction are in fact accurate conclusions that follow from different uses of the term 'vulnerability'. The present manuscript describes this 'pragmatic' approach to vulnerability in clinical research and considers its implications for ensuring that subjects receive appropriate protection. Published 2017. This article is a U.S. Government work and is in the public domain in the USA.

  4. Automating Flood Hazard Mapping Methods for Near Real-time Storm Surge Inundation and Vulnerability Assessment

    Science.gov (United States)

    Weigel, A. M.; Griffin, R.; Gallagher, D.

    2015-12-01

    Storm surge has enough destructive power to damage buildings and infrastructure, erode beaches, and threaten human life across large geographic areas, hence posing the greatest threat of all the hurricane hazards. The United States Gulf of Mexico has proven vulnerable to hurricanes as it has been hit by some of the most destructive hurricanes on record. With projected rises in sea level and increases in hurricane activity, there is a need to better understand the associated risks for disaster mitigation, preparedness, and response. GIS has become a critical tool in enhancing disaster planning, risk assessment, and emergency response by communicating spatial information through a multi-layer approach. However, there is a need for a near real-time method of identifying areas with a high risk of being impacted by storm surge. Research was conducted alongside Baron, a private industry weather enterprise, to facilitate automated modeling and visualization of storm surge inundation and vulnerability on a near real-time basis. This research successfully automated current flood hazard mapping techniques using a GIS framework written in a Python programming environment, and displayed resulting data through an Application Program Interface (API). Data used for this methodology included high resolution topography, NOAA Probabilistic Surge model outputs parsed from Rich Site Summary (RSS) feeds, and the NOAA Census tract level Social Vulnerability Index (SoVI). The development process required extensive data processing and management to provide high resolution visualizations of potential flooding and population vulnerability in a timely manner. The accuracy of the developed methodology was assessed using Hurricane Isaac as a case study, which through a USGS and NOAA partnership, contained ample data for statistical analysis. This research successfully created a fully automated, near real-time method for mapping high resolution storm surge inundation and vulnerability for the

  5. Not the usual suspects: addressing layers of vulnerability.

    Science.gov (United States)

    Luna, Florencia; Vanderpoel, Sheryl

    2013-07-01

    This paper challenges the traditional account of vulnerability in healthcare which conceptualizes vulnerability as a list of identifiable subpopulations. This list of 'usual suspects', focusing on groups from lower resource settings, is a narrow account of vulnerability. In this article we argue that in certain circumstances middle-class individuals can be also rendered vulnerable. We propose a relational and layered account of vulnerability and explore this concept using the case study of cord blood (CB) banking. In the first section, two different approaches to 'vulnerability' are contrasted: categorical versus layered. In the second section, we describe CB banking and present a case study of CB banking in Argentina. We examine the types of pressure that middle-class pregnant women feel when considering CB collection and storage. In section three, we use the CB banking case study to critique the categorical approach to vulnerability: this model is unable to account for the ways in which these women are vulnerable. A layered account of vulnerability identifies several ways in which middle-class women are vulnerable. Finally, by utilizing the layered approach, this paper suggests how public health policies could be designed to overcome vulnerabilities. © 2013 John Wiley & Sons Ltd.

  6. Exploring spatial patterns of vulnerability for diverse biodiversity descriptors in regional conservation planning.

    Science.gov (United States)

    Vimal, Ruppert; Pluvinet, Pascal; Sacca, Céline; Mazagol, Pierre-Olivier; Etlicher, Bernard; Thompson, John D

    2012-03-01

    In this study, we developed a multi-criteria assessment of spatial variability of the vulnerability of three different biodiversity descriptors: sites of high conservation interest by virtue of the presence of rare or remarkable species, extensive areas of high ecological integrity, and landscape diversity in grid cells across an entire region. We assessed vulnerability in relation to (a) direct threats in and around sites to a distance of 2 km associated with intensive agriculture, building and road infrastructure and (b) indirect effects of human population density on a wider scale (50 km). The different combinations of biodiversity and threat indicators allowed us to set differential priorities for biodiversity conservation and assess their spatial variation. For example, with this method we identified sites and grid cells which combined high biodiversity with either high threat values or low threat values for the three different biodiversity indicators. In these two classes the priorities for conservation planning will be different, reduce threat values in the former and restrain any increase in the latter. We also identified low priority sites (low biodiversity with either high or low threats). This procedure thus allows for the integration of a spatial ranking of vulnerability into priority setting for regional conservation planning. Copyright © 2011 Elsevier Ltd. All rights reserved.

  7. Extending Vulnerability Assessment to Include Life Stages Considerations.

    Science.gov (United States)

    Hodgson, Emma E; Essington, Timothy E; Kaplan, Isaac C

    2016-01-01

    Species are experiencing a suite of novel stressors from anthropogenic activities that have impacts at multiple scales. Vulnerability assessment is one tool to evaluate the likely impacts that these stressors pose to species so that high-vulnerability cases can be identified and prioritized for monitoring, protection, or mitigation. Commonly used semi-quantitative methods lack a framework to explicitly account for differences in exposure to stressors and organism responses across life stages. Here we propose a modification to commonly used spatial vulnerability assessment methods that includes such an approach, using ocean acidification in the California Current as an illustrative case study. Life stage considerations were included by assessing vulnerability of each life stage to ocean acidification and were used to estimate population vulnerability in two ways. We set population vulnerability equal to: (1) the maximum stage vulnerability and (2) a weighted mean across all stages, with weights calculated using Lefkovitch matrix models. Vulnerability was found to vary across life stages for the six species explored in this case study: two krill-Euphausia pacifica and Thysanoessa spinifera, pteropod-Limacina helicina, pink shrimp-Pandalus jordani, Dungeness crab-Metacarcinus magister and Pacific hake-Merluccius productus. The maximum vulnerability estimates ranged from larval to subadult and adult stages with no consistent stage having maximum vulnerability across species. Similarly, integrated vulnerability metrics varied greatly across species. A comparison showed that some species had vulnerabilities that were similar between the two metrics, while other species' vulnerabilities varied substantially between the two metrics. These differences primarily resulted from cases where the most vulnerable stage had a low relative weight. We compare these methods and explore circumstances where each method may be appropriate.

  8. Measuring emotional and cognitive empathy using dynamic, naturalistic, and spontaneous emotion displays.

    Science.gov (United States)

    Buck, Ross; Powers, Stacie R; Hull, Kyle S

    2017-10-01

    Most measures of nonverbal receiving ability use posed expressions as stimuli. As empathy measures, such stimuli lack ecological validity, as the participant is not actually experiencing emotion. An alternative approach uses natural and dynamic displays of spontaneous expressions. The Communication of Affect Receiving Ability Test (CARAT) uses as stimuli spontaneous facial expressions and gestures filmed by an unobtrusive camera of solitary participants responding to emotional images. This article reports the development and initial validation of the CARAT-Spontaneous, Posed, Regulated (CARAT-SPR), which measures both abilities to detect emotion from spontaneous displays (emotion communication accuracy) and to differentiate spontaneous, posed, and regulated displays (expression categorization ability). Although spontaneous displays are natural responses to emotional images, posed displays involve asking the sender to display "as if" responding to a particular sort of image when no image is in fact present (simulation), while Regulated displays involve asking the sender to display "as if" responding to a particular sort of image when an image of opposite valence is in fact present (masking). Expression categorization ability involves judging deception-simulation and masking-and conceptually involves a kind of perspective-taking or cognitive empathy. Emotion communication using spontaneous clips achieved a high level of accuracy and was strongly correlated with ratings of sender expressivity. Expression categorization ability was not significantly correlated with expressivity ratings and was modestly negatively correlated with emotion communication accuracy. In a brief version of the CARAT-SPR, women showed evidence of greater emotion signal detection, whereas men reported greater confidence in expression categorization. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  9. Multi-dimensional flood vulnerability assessment using data envelopment analysis

    Science.gov (United States)

    Zahid, Zalina; Saharizan, Nurul Syuhada; Hamzah, Paezah; Hussin, Siti Aida Sheikh; Khairi, Siti Shaliza Mohd

    2017-11-01

    Malaysia has been greatly impacted by flood during monsoon seasons. Even though flood prone areas are well identified, assessment on the vulnerability of the disaster is lacking. Assessment of flood vulnerability, defined as the potential for loss when a disaster occurs, is addressed in this paper. The focus is on the development of flood vulnerability measurement in 11 states in Peninsular Malaysia using a non-parametric approach of Data Envelopment Analysis. Scores for three dimensions of flood vulnerability (Population Vulnerability, Social Vulnerability and Biophysical) were calculated using secondary data of selected input and output variables across an 11-year period from 2004 to 2014. The results showed that Johor and Pahang were the most vulnerable to flood in terms of Population Vulnerability, followed by Kelantan, the most vulnerable to flood in terms of Social Vulnerability and Kedah, Pahang and Terengganu were the most vulnerable to flood in terms of Biophysical Vulnerability among the eleven states. The results also showed that the state of Johor, Pahang and Kelantan to be most vulnerable across the three dimensions. Flood vulnerability assessment is important as it provides invaluable information that will allow the authority to identify and develop plans for flood mitigation and to reduce the vulnerability of flood at the affected regions.

  10. Modeling Coastal Vulnerability through Space and Time.

    Science.gov (United States)

    Hopper, Thomas; Meixler, Marcia S

    2016-01-01

    Coastal ecosystems experience a wide range of stressors including wave forces, storm surge, sea-level rise, and anthropogenic modification and are thus vulnerable to erosion. Urban coastal ecosystems are especially important due to the large populations these limited ecosystems serve. However, few studies have addressed the issue of urban coastal vulnerability at the landscape scale with spatial data that are finely resolved. The purpose of this study was to model and map coastal vulnerability and the role of natural habitats in reducing vulnerability in Jamaica Bay, New York, in terms of nine coastal vulnerability metrics (relief, wave exposure, geomorphology, natural habitats, exposure, exposure with no habitat, habitat role, erodible shoreline, and surge) under past (1609), current (2015), and future (2080) scenarios using InVEST 3.2.0. We analyzed vulnerability results both spatially and across all time periods, by stakeholder (ownership) and by distance to damage from Hurricane Sandy. We found significant differences in vulnerability metrics between past, current and future scenarios for all nine metrics except relief and wave exposure. The marsh islands in the center of the bay are currently vulnerable. In the future, these islands will likely be inundated, placing additional areas of the shoreline increasingly at risk. Significant differences in vulnerability exist between stakeholders; the Breezy Point Cooperative and Gateway National Recreation Area had the largest erodible shoreline segments. Significant correlations exist for all vulnerability (exposure/surge) and storm damage combinations except for exposure and distance to artificial debris. Coastal protective features, ranging from storm surge barriers and levees to natural features (e.g. wetlands), have been promoted to decrease future flood risk to communities in coastal areas around the world. Our methods of combining coastal vulnerability results with additional data and across multiple time

  11. Social vulnerability assessment: a growing practice in Europe?

    Science.gov (United States)

    Tapsell, S.; McC arthy, S.

    2012-04-01

    This paper builds upon work on social vulnerability from the CapHaz-Net consortium, an ongoing research project funded by the European Commission in its 7th Framework Programme. The project focuses on the social dimensions of natural hazards, as well as on regional practices of risk prevention and management, and aims at improving the resilience of European societies to natural hazards, paying particular attention to social capacity building. The topic of social vulnerability is one of seven themes being addressed in the project. There are various rationales for examining the relevance of social vulnerability to natural hazards. Vulnerability assessment has now been accepted as a requirement for the effective development of emergency management capability, and assessment of social vulnerability has been recognised as being integral to understanding the risk to natural hazards. The aim of our research was to examine social vulnerability, how it might be understood in the context of natural hazards in Europe, and how social vulnerability can be addressed to increase social capacity. The work comprised a review of research on social vulnerability to different natural hazards within Europe and included concepts and definitions of social vulnerability (and related concepts), the purpose of vulnerability assessment and who decides who is vulnerable, different approaches to assessing or measuring social vulnerability (such as the use of 'classical' quantitative vulnerability indicators and qualitative community-based approaches, along with the advantages and disadvantages of both), conceptual frameworks for assessing social vulnerability and three case studies of social vulnerability studies within Europe: flash floods in the Italian Alps, fluvial flooding in Germany and heat waves in Spain. The review reveals variable application of social vulnerability analysis across Europe and there are indications why this might be the case. Reasons could range from the scale of

  12. Invisible Display in Aluminum

    DEFF Research Database (Denmark)

    Prichystal, Jan Phuklin; Hansen, Hans Nørgaard; Bladt, Henrik Henriksen

    2005-01-01

    Bang & Olufsen a/s has been working with ideas for invisible integration of displays in metal surfaces. Invisible integration of information displays traditionally has been possible by placing displays behind transparent or semitransparent materials such as plastic or glass. The wish for an integ......Bang & Olufsen a/s has been working with ideas for invisible integration of displays in metal surfaces. Invisible integration of information displays traditionally has been possible by placing displays behind transparent or semitransparent materials such as plastic or glass. The wish...... for an integrated display in a metal surface is often ruled by design and functionality of a product. The integration of displays in metal surfaces requires metal removal in order to clear the area of the display to some extent. The idea behind an invisible display in Aluminum concerns the processing of a metal...

  13. Enhancing the Security of Personal Identification Numbers with Three-Dimensional Displays

    Directory of Open Access Journals (Sweden)

    Mun-Kyu Lee

    2016-01-01

    Full Text Available Passwords and personal identification numbers (PINs are convenient and ubiquitous, but they are quite vulnerable to attackers who stand near the user (“shoulder-surfers”. This problem may be partially resolved by changing the user interface, but previous solutions of this kind still give shoulder-surfing attackers a significant advantage over brute force search. This paper provides a novel solution based on three dimensions, particularly suitable for glasses-free three-dimensional (3D displays found in many smartphones and handheld game consoles. A user at the “3D spot” may log in easily, while nearby shoulder-surfers gain no advantage. A detailed experimental usability analysis is performed to demonstrate the effectiveness of the proposed scheme in comparison to the existing methods.

  14. A vulnerability-centric requirements engineering framework : Analyzing security attacks, countermeasures, and requirements based on vulnerabilities

    NARCIS (Netherlands)

    Elahi, G.; Yu, E.; Zannone, N.

    2010-01-01

    Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a methodological framework for security requirements

  15. Cross‐disease comparison of amyotrophic lateral sclerosis and spinal muscular atrophy reveals conservation of selective vulnerability but differential neuromuscular junction pathology

    Science.gov (United States)

    Nijssen, Jik; Frost‐Nylen, Johanna

    2015-01-01

    Neuromuscular junctions are primary pathological targets in the lethal motor neuron diseases spinal muscular atrophy (SMA) and amyotrophic lateral sclerosis (ALS). Synaptic pathology and denervation of target muscle fibers has been reported prior to the appearance of clinical symptoms in mouse models of both diseases, suggesting that neuromuscular junctions are highly vulnerable from the very early stages, and are a key target for therapeutic intervention. Here we examined neuromuscular pathology longitudinally in three clinically relevant muscle groups in mouse models of ALS and SMA in order to assess their relative vulnerabilities. We show for the first time that neuromuscular junctions of the extraocular muscles (responsible for the control of eye movement) were resistant to degeneration in endstage SMA mice, as well as in late symptomatic ALS mice. Tongue muscle neuromuscular junctions were also spared in both animal models. Conversely, neuromuscular junctions of the lumbrical muscles of the hind‐paw were vulnerable in both SMA and ALS, with a loss of neuronal innervation and shrinkage of motor endplates in both diseases. Thus, the pattern of selective vulnerability was conserved across these two models of motor neuron disease. However, the first evidence of neuromuscular pathology occurred at different timepoints of disease progression, with much earlier evidence of presynaptic involvement in ALS, progressing to changes on the postsynaptic side. Conversely, in SMA changes appeared concomitantly at the neuromuscular junction, suggesting that mechanisms of neuromuscular disruption are distinct in these diseases. J. Comp. Neurol. 524:1424–1442, 2016. © 2015 The Authors The Journal of Comparative Neurology Published by Wiley Periodicals, Inc. PMID:26502195

  16. A measure of vulnerability and damage tolerance

    International Nuclear Information System (INIS)

    Lind, Niels C.

    1995-01-01

    The purpose of the paper is to present probabilistic definitions of 'vulnerability' and 'damage tolerance'. A new measure of damage is also proposed. Disastrous failures, such as of the Titanic or the Chernobyl reactor, have revealed that some systems can be highly vulnerable. A seemingly insignificant damage can reduce such a system's resistance severely. Attempts to write design code requirements for damage tolerance or structural integrity have not been successful so far. One reason is that these ideas have not been defined with the necessary precision. The suggested definitions aim to be general, applicable to all engineered systems, and readily specializable to particular system types. Vulnerability is defined as the ratio of the failure probability of the damaged system to the failure probability of the undamaged system. It is argued that 'vulnerability' and 'damage tolerance' are complementary concepts. Damage tolerance is defined as the reciprocal of vulnerability. Vulnerability and damage tolerance both concern hypothetical future damage. A damage factor, applicable for the analysis of an existing structure in an assessed state of damage, is defined analogous to vulnerability. Application is illustrated by examples

  17. Assessing the Security Vulnerabilities of Correctional Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Morrison, G.S.; Spencer, D.S.

    1998-10-27

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  18. Drug abuse: vulnerability and transition to addiction.

    Science.gov (United States)

    Le Moal, M

    2009-05-01

    Intrinsic vulnerability is central to the transition of recreational drug use to misuse. Several factors contribute to vulnerability, inherent or acquired, and they account for the huge individual differences observed concerning the propensity to enter in the addiction process. Some of the multifactional causes for a vulnerable phenotype will be examined: genetic factors, age and gender influences, various comorbidities and epidemiological observations. Stress-induced vulnerability will be particularly reviewed because it provides a good model for a pathophysiological research and for relating environmental events to biological consequences of drug vulnerability, namely through the striato-cortical dopamine system. Experimental studies are generally blind concerning these historical factors that contribute vulnerability and a critical evaluation of current animal models is needed. The transition of the last stage of the process, addiction, is conceptualized as a progression from homeostasis to allostasis and then, to pathology.

  19. Advanced Colorimetry of Display Systems: Tetra-Chroma3 Display Unit

    Directory of Open Access Journals (Sweden)

    J. Kaiser

    2005-06-01

    Full Text Available High-fidelity color image reproduction is one of the key issues invisual telecommunication systems, for electronic commerce,telemedicine, digital museum and so on. All colorimetric standards ofdisplay systems are up to the present day trichromatic. But, from theshape of a horseshoe-area of all existing colors in the CIE xychromaticity diagram it follows that with three real reproductivelights, the stated area in the CIE xy chromaticity diagram cannot beoverlaid. The expansion of the color gamut of a display device ispossible in a few ways. In this paper, the way of increasing the numberof primaries is studied. The fourth cyan primary is added to threeconventional ones to enlarge the color gamut of reproduction towardscyans and yellow-oranges. The original method of color management forthis new display unit is introduced. In addition, the color gamut ofthe designed additive-based display is successfully compared with thecolor gamut of a modern subtractive-based system. A display with morethan three primary colors is called a multiprimary color display. Thevery advantageous property of such display is the possibility todisplay metameric colors.

  20. Differential Susceptibility to Social Contexts : Putting "For Better and For Worse" to the test

    NARCIS (Netherlands)

    Slagt, M.I.

    2017-01-01

    The differential susceptibility model asserts that individuals vary in their general susceptibility to environmental influences.Crucially, the very children that are disproportionately vulnerable to harsh and low-quality parenting, may benefit disproportionately from supportive and high-quality

  1. Differential topology

    CERN Document Server

    Guillemin, Victor

    2010-01-01

    Differential Topology provides an elementary and intuitive introduction to the study of smooth manifolds. In the years since its first publication, Guillemin and Pollack's book has become a standard text on the subject. It is a jewel of mathematical exposition, judiciously picking exactly the right mixture of detail and generality to display the richness within. The text is mostly self-contained, requiring only undergraduate analysis and linear algebra. By relying on a unifying idea-transversality-the authors are able to avoid the use of big machinery or ad hoc techniques to establish the main

  2. Safeguard Vulnerability Analysis Program (SVAP)

    International Nuclear Information System (INIS)

    Gilman, F.M.; Dittmore, M.H.; Orvis, W.J.; Wahler, P.S.

    1980-01-01

    This report gives an overview of the Safeguard Vulnerability Analysis Program (SVAP) developed at Lawrence Livermore National Laboratory. SVAP was designed as an automated method of analyzing the safeguard systems at nuclear facilities for vulnerabilities relating to the theft or diversion of nuclear materials. SVAP addresses one class of safeguard threat: theft or diversion of nuclear materials by nonviolent insiders, acting individually or in collusion. SVAP is a user-oriented tool which uses an interactive input medium for preprocessing the large amounts of safeguards data. Its output includes concise summary data as well as detailed vulnerability information

  3. Vulnerability of multiple-barrier systems

    International Nuclear Information System (INIS)

    Lind, N.C.

    1996-01-01

    'Vulnerability' is defined as the ratio of the probability of failure of a damaged system to the probability of failure of the undamaged system. This definition applies to all engineered systems and can be specialized to particular system types. Some disastrous failures (e.g., Chernobyl) have shown that systems can be highly vulnerable. open-quotes Defense in depthclose quotes is a powerful design principle, reducing vulnerability when the consequences of failure can be catastrophic. In the nuclear industry, defense in depth is widely used in radiation protection, reactor control, and shutdown systems. A multiple-barrier system is a simple example of a system that has defense in depth. The idea is that the system is not vulnerable. It cannot fail if one barrier fails because there is another to take its place. This idea is untenable in waste management, but a quantified vulnerability of a system can help owners, designers, and regulators decide how much defense in depth is desirable or enough. Many multiple-barrier systems can be modeled as systems of components physically in a series, each individually able to prevent failure. Components typically have bimodal distributions of the service time to failure, as illustrated by an example of application to a hypothetical nuclear fuel waste repository

  4. Response terminated displays unload selective attention.

    Science.gov (United States)

    Roper, Zachary J J; Vecera, Shaun P

    2013-01-01

    Perceptual load theory successfully replaced the early vs. late selection debate by appealing to adaptive control over the efficiency of selective attention. Early selection is observed unless perceptual load (p-Load) is sufficiently low to grant attentional "spill-over" to task-irrelevant stimuli. Many studies exploring load theory have used limited display durations that perhaps impose artificial limits on encoding processes. We extended the exposure duration in a classic p-Load task to alleviate temporal encoding demands that may otherwise tax mnemonic consolidation processes. If the load effect arises from perceptual demands alone, then freeing-up available mnemonic resources by extending the exposure duration should have little effect. The results of Experiment 1 falsify this prediction. We observed a reliable flanker effect under high p-Load, response-terminated displays. Next, we orthogonally manipulated exposure duration and task-relevance. Counter-intuitively, we found that the likelihood of observing the flanker effect under high p-Load resides with the duration of the task-relevant array, not the flanker itself. We propose that stimulus and encoding demands interact to produce the load effect. Our account clarifies how task parameters differentially impinge upon cognitive processes to produce attentional "spill-over" by appealing to visual short-term memory as an additional processing bottleneck when stimuli are briefly presented.

  5. Fluctuation between grandiose and vulnerable narcissism.

    Science.gov (United States)

    Gore, Whitney L; Widiger, Thomas A

    2016-10-01

    Current literature on narcissistic personality disorder has emphasized a distinction between grandiose and vulnerable narcissism. Some researchers have further suggested that narcissistic persons fluctuate between grandiose and vulnerable narcissism. However, this perception has been confined largely to clinical experience with no systematic research testing the hypothesis. Clinicians and clinical psychology professors in the current study identified 143 persons who fit a description of either a grandiose or a vulnerable narcissist and indicated the extent to which these persons ever demonstrated traits of the complementary variant. The results supported the fluctuation hypothesis, particularly for episodes of vulnerable narcissism in persons identified as a grandiose narcissist. Correlations of the grandiose and vulnerable narcissism traits with a brief five-factor model measure corroborated past trait descriptions of the 2 respective variants of narcissism. The results of the current study are compared with existing cross-sectional and longitudinal research, and suggestions for future research are provided. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  6. Methods to Secure Databases Against Vulnerabilities

    Science.gov (United States)

    2015-12-01

    for several languages such as C, C++, PHP, Java and Python [16]. MySQL will work well with very large databases. The documentation references...using Eclipse and connected to each database management system using Python and Java drivers provided by MySQL , MongoDB, and Datastax (for Cassandra...tiers in Python and Java . Problem MySQL MongoDB Cassandra 1. Injection a. Tautologies Vulnerable Vulnerable Not Vulnerable b. Illegal query

  7. Determining Vulnerability Importance in Environmental Impact Assessment

    International Nuclear Information System (INIS)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-01

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: ► The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. ► The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. ► A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. ► Results in Colombia highlight the usefulness and objectivity of this method.

  8. Microlaser-based displays

    Science.gov (United States)

    Bergstedt, Robert; Fink, Charles G.; Flint, Graham W.; Hargis, David E.; Peppler, Philipp W.

    1997-07-01

    Laser Power Corporation has developed a new type of projection display, based upon microlaser technology and a novel scan architecture, which provides the foundation for bright, extremely high resolution images. A review of projection technologies is presented along with the limitations of each and the difficulties they experience in trying to generate high resolution imagery. The design of the microlaser based projector is discussed along with the advantage of this technology. High power red, green, and blue microlasers have been designed and developed specifically for use in projection displays. These sources, in combination with high resolution, high contrast modulator, produce a 24 bit color gamut, capable of supporting the full range of real world colors. The new scan architecture, which reduces the modulation rate and scan speeds required, is described. This scan architecture, along with the inherent brightness of the laser provides the fundamentals necessary to produce a 5120 by 4096 resolution display. The brightness and color uniformity of the display is excellent, allowing for tiling of the displays with far fewer artifacts than those in a traditionally tiled display. Applications for the display include simulators, command and control centers, and electronic cinema.

  9. Nested archetypes of vulnerability in African drylands: where lies potential for sustainable agricultural intensification?

    Science.gov (United States)

    Sietz, D.; Ordoñez, J. C.; Kok, M. T. J.; Janssen, P.; Hilderink, H. B. M.; Tittonell, P.; Van Dijk, H.

    2017-09-01

    western and some parts of southeastern and eastern Africa. Insights into the nestedness of archetypes allowed a more differentiated discussion of vulnerability and sustainable intensification opportunities, enhancing the evaluation of key interlinkages between land management and food security. The archetypes may support the transfer of successful intensification strategies based on similarities among the drylands in sub-Saharan Africa.

  10. Analysis of Zero-Day Vulnerabilities in Java

    OpenAIRE

    Marius Popa

    2013-01-01

    The zero-day vulnerability is a security lack of the computer system that is unknown to software vendor. This kind of vulnerability permits building attack strategies for gaining the access to the resources and data of a computer system. The main issue of the topic is how a computer system can be protected by zero-day vulnerabilities using the actual security procedures and tools for identifying the potential attacks that exploit the vulnerabilities unknown to computer users and software prov...

  11. Assessing environmental vulnerability in EIA-The content and context of the vulnerability concept in an alternative approach to standard EIA procedure

    International Nuclear Information System (INIS)

    Kvaerner, Jens; Swensen, Grete; Erikstad, Lars

    2006-01-01

    In the traditional EIA procedure environmental vulnerability is only considered to a minor extent in the early stages when project alternatives are worked out. In Norway, an alternative approach to EIA, an integrated vulnerability model (IVM), emphasising environmental vulnerability and alternatives development in the early stages of EIA, has been tried out in a few pilot cases. This paper examines the content and use of the vulnerability concept in the IVM approach, and discusses the concept in an EIA context. The vulnerability concept is best suited to overview analyses and large scale spatial considerations. The concept is particularly useful in the early stages of EIA when alternatives are designed and screened. By introducing analyses of environmental vulnerability at the start of the EIA process, the environment can be a more decisive issue for the creation of project alternatives as well as improving the basis for scoping. Vulnerability and value aspects should be considered as separate dimensions. There is a need to operate with a specification between general and specific vulnerability. The concept of environmental vulnerability has proven useful in a wide range of disciplines. Different disciplines have different lengths of experience regarding vulnerability. In disciplines such as landscape planning and hydrogeology we find elements suitable as cornerstones in the further development of an interdisciplinary methodology. Further development of vulnerability criteria in different disciplines and increased public involvement in the early stages of EIA are recommended

  12. Social vulnerability indicators as a sustainable planning tool

    International Nuclear Information System (INIS)

    Lee, Yung-Jaan

    2014-01-01

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts

  13. Social vulnerability indicators as a sustainable planning tool

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Yung-Jaan, E-mail: yungjaanlee@gmail.com

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study

  14. Handbook of display technology

    CERN Document Server

    Castellano, Joseph A

    1992-01-01

    This book presents a comprehensive review of technical and commercial aspects of display technology. It provides design engineers with the information needed to select proper technology for new products. The book focuses on flat, thin displays such as light-emitting diodes, plasma display panels, and liquid crystal displays, but it also includes material on cathode ray tubes. Displays include a large number of products from televisions, auto dashboards, radios, and household appliances, to gasoline pumps, heart monitors, microwave ovens, and more.For more information on display tech

  15. ColorPhylo: A Color Code to Accurately Display Taxonomic Classifications.

    Science.gov (United States)

    Lespinats, Sylvain; Fertil, Bernard

    2011-01-01

    Color may be very useful to visualise complex data. As far as taxonomy is concerned, color may help observing various species' characteristics in correlation with classification. However, choosing the number of subclasses to display is often a complex task: on the one hand, assigning a limited number of colors to taxa of interest hides the structure imbedded in the subtrees of the taxonomy; on the other hand, differentiating a high number of taxa by giving them specific colors, without considering the underlying taxonomy, may lead to unreadable results since relationships between displayed taxa would not be supported by the color code. In the present paper, an automatic color coding scheme is proposed to visualise the levels of taxonomic relationships displayed as overlay on any kind of data plot. To achieve this goal, a dimensionality reduction method allows displaying taxonomic "distances" onto a Euclidean two-dimensional space. The resulting map is projected onto a 2D color space (the Hue, Saturation, Brightness colorimetric space with brightness set to 1). Proximity in the taxonomic classification corresponds to proximity on the map and is therefore materialised by color proximity. As a result, each species is related to a color code showing its position in the taxonomic tree. The so called ColorPhylo displays taxonomic relationships intuitively and can be combined with any biological result. A Matlab version of ColorPhylo is available at http://sy.lespi.free.fr/ColorPhylo-homepage.html. Meanwhile, an ad-hoc distance in case of taxonomy with unknown edge lengths is proposed.

  16. Liquid crystal display

    International Nuclear Information System (INIS)

    Takami, K.

    1981-01-01

    An improved liquid crystal display device is described which can display letters, numerals and other necessary patterns in the night time using a minimized amount of radioactive material. To achieve this a self-luminous light source is placed in a limited region corresponding to a specific display area. (U.K.)

  17. What is shared, what is different? Core relational themes and expressive displays of eight positive emotions.

    Science.gov (United States)

    Campos, Belinda; Shiota, Michelle N; Keltner, Dacher; Gonzaga, Gian C; Goetz, Jennifer L

    2013-01-01

    Understanding positive emotions' shared and differentiating features can yield valuable insight into the structure of positive emotion space and identify emotion states, or aspects of emotion states, that are most relevant for particular psychological processes and outcomes. We report two studies that examined core relational themes (Study 1) and expressive displays (Study 2) for eight positive emotion constructs--amusement, awe, contentment, gratitude, interest, joy, love, and pride. Across studies, all eight emotions shared one quality: high positive valence. Distinctive core relational theme and expressive display patterns were found for four emotions--amusement, awe, interest, and pride. Gratitude was associated with a distinct core relational theme but not an expressive display. Joy and love were each associated with a distinct expressive display but their core relational themes also characterised pride and gratitude, respectively. Contentment was associated with a distinct expressive display but not a core relational theme. The implications of this work for the study of positive emotion are discussed.

  18. INFORMATION DISPLAY: CONSIDERATIONS FOR DESIGNING COMPUTER-BASED DISPLAY SYSTEMS

    International Nuclear Information System (INIS)

    O'HARA, J.M.; PIRUS, D.; BELTRATCCHI, L.

    2004-01-01

    This paper discussed the presentation of information in computer-based control rooms. Issues associated with the typical displays currently in use are discussed. It is concluded that these displays should be augmented with new displays designed to better meet the information needs of plant personnel and to minimize the need for interface management tasks (the activities personnel have to do to access and organize the information they need). Several approaches to information design are discussed, specifically addressing: (1) monitoring, detection, and situation assessment; (2) routine task performance; and (3) teamwork, crew coordination, collaborative work

  19. Weak differentiability of scalar hysteresis operators

    Czech Academy of Sciences Publication Activity Database

    Brokate, M.; Krejčí, Pavel

    2015-01-01

    Roč. 35, č. 6 (2015), s. 2405-2421 ISSN 1078-0947 R&D Projects: GA ČR GAP201/10/2315 Institutional support: RVO:67985840 Keywords : hysteresis * differentiability * variational inequality Subject RIV: BA - General Mathematics Impact factor: 1.127, year: 2015 http://www.aimsciences.org/journals/displayArticlesnew.jsp?paperID=10677

  20. Global analysis of urban surface water supply vulnerability

    International Nuclear Information System (INIS)

    Padowski, Julie C; Gorelick, Steven M

    2014-01-01

    This study presents a global analysis of urban water supply vulnerability in 71 surface-water supplied cities, with populations exceeding 750 000 and lacking source water diversity. Vulnerability represents the failure of an urban supply-basin to simultaneously meet demands from human, environmental and agricultural users. We assess a baseline (2010) condition and a future scenario (2040) that considers increased demand from urban population growth and projected agricultural demand. We do not account for climate change, which can potentially exacerbate or reduce urban supply vulnerability. In 2010, 35% of large cities are vulnerable as they compete with agricultural users. By 2040, without additional measures 45% of cities are vulnerable due to increased agricultural and urban demands. Of the vulnerable cities in 2040, the majority are river-supplied with mean flows so low (1200 liters per person per day, l/p/d) that the cities experience ‘chronic water scarcity’ (1370 l/p/d). Reservoirs supply the majority of cities facing individual future threats, revealing that constructed storage potentially provides tenuous water security. In 2040, of the 32 vulnerable cities, 14 would reduce their vulnerability via reallocating water by reducing environmental flows, and 16 would similarly benefit by transferring water from irrigated agriculture. Approximately half remain vulnerable under either potential remedy. (letter)

  1. Unique B cell differentiation profile in tolerant kidney transplant patients.

    Science.gov (United States)

    Chesneau, M; Pallier, A; Braza, F; Lacombe, G; Le Gallou, S; Baron, D; Giral, M; Danger, R; Guerif, P; Aubert-Wastiaux, H; Néel, A; Michel, L; Laplaud, D-A; Degauque, N; Soulillou, J-P; Tarte, K; Brouard, S

    2014-01-01

    Operationally tolerant patients (TOL) display a higher number of blood B cells and transcriptional B cell signature. As they rarely develop an allo-immune response, they could display an abnormal B cell differentiation. We used an in vitro culture system to explore T-dependent differentiation of B cells into plasma cells. B cell phenotype, apoptosis, proliferation, cytokine, immunoglobulin production and markers of differentiation were followed in blood of these patients. Tolerant recipients show a higher frequency of CD20(+) CD24(hi) CD38(hi) transitional and CD20(+) CD38(lo) CD24(lo) naïve B cells compared to patients with stable graft function, correlating with a decreased frequency of CD20(-) CD38(+) CD138(+) differentiated plasma cells, suggestive of abnormal B cell differentiation. B cells from TOL proliferate normally but produce more IL-10. In addition, B cells from tolerant recipients exhibit a defective expression of factors of the end step of differentiation into plasma cells and show a higher propensity for cell death apoptosis compared to patients with stable graft function. This in vitro profile is consistent with down-regulation of B cell differentiation genes and anti-apoptotic B cell genes in these patients in vivo. These data suggest that a balance between B cells producing IL-10 and a deficiency in plasma cells may encourage an environment favorable to the tolerance maintenance. © Copyright 2013 The American Society of Transplantation and the American Society of Transplant Surgeons.

  2. The Function of Vulnerable and at-risk Women in Prevention of HIV/AIDS

    Directory of Open Access Journals (Sweden)

    AA Kolahi

    2012-07-01

    Full Text Available

    Background and Objectives: Regarding little information about sexual behavior of vulnerable women to AIDS, mentioned in the second report of Ministry of Health and Medical Education (2006, this study has been conducted to determine the function of vulnerable and at-risk women to AIDS in Tehran in 2009.

     

    Methods: This descriptive study was done on 128 vulnerable and at-risk women who participated in this study in Tehran in 2009. The samples were a combination of available visitor passed to Drop-in Centers, behavioral or triangular clinic and those who were introduced by participant women through Respondent Driven Sampling. Data were collected by trained interviewers. Quantitative and qualitative descriptive statistics was reported as numbers, percentages, and, also, Mean and Standard deviation respectively. Analytical findings and determination of differentiations and correlation were evaluated based on Chi-squared test.

     

    Results: In this study only 22 (17.2% of participants mentioned that they have always used condom. Partner unwillingness was the most common reason (64% for not using condom. Twenty-four percent of participants have received free condom from triangular, Drop-in and health centers in the last year. Only 32(25% had done HIV test.

     

    Conclusion: The study showed the function of at-risk women in prevention of HIV/AIDS is not satisfactory. If the situation continues in this way, vulnerable women and society will be at more risk.

     

  3. Extreme rainfall, vulnerability and risk: a continental-scale assessment for South America

    Science.gov (United States)

    Vorosmarty, Charles J.; de Guenni, Lelys Bravo; Wollheim, Wilfred M.; Pellerin, Brian A.; Bjerklie, David M.; Cardoso, Manoel; D'Almeida, Cassiano; Colon, Lilybeth

    2013-01-01

    Extreme weather continues to preoccupy society as a formidable public safety concern bearing huge economic costs. While attention has focused on global climate change and how it could intensify key elements of the water cycle such as precipitation and river discharge, it is the conjunction of geophysical and socioeconomic forces that shapes human sensitivity and risks to weather extremes. We demonstrate here the use of high-resolution geophysical and population datasets together with documentary reports of rainfall-induced damage across South America over a multi-decadal, retrospective time domain (1960–2000). We define and map extreme precipitation hazard, exposure, affectedpopulations, vulnerability and risk, and use these variables to analyse the impact of floods as a water security issue. Geospatial experiments uncover major sources of risk from natural climate variability and population growth, with change in climate extremes bearing a minor role. While rural populations display greatest relative sensitivity to extreme rainfall, urban settings show the highest rates of increasing risk. In the coming decades, rapid urbanization will make South American cities the focal point of future climate threats but also an opportunity for reducing vulnerability, protecting lives and sustaining economic development through both traditional and ecosystem-based disaster risk management systems.

  4. Extreme rainfall, vulnerability and risk: a continental-scale assessment for South America.

    Science.gov (United States)

    Vörösmarty, Charles J; Bravo de Guenni, Lelys; Wollheim, Wilfred M; Pellerin, Brian; Bjerklie, David; Cardoso, Manoel; D'Almeida, Cassiano; Green, Pamela; Colon, Lilybeth

    2013-11-13

    Extreme weather continues to preoccupy society as a formidable public safety concern bearing huge economic costs. While attention has focused on global climate change and how it could intensify key elements of the water cycle such as precipitation and river discharge, it is the conjunction of geophysical and socioeconomic forces that shapes human sensitivity and risks to weather extremes. We demonstrate here the use of high-resolution geophysical and population datasets together with documentary reports of rainfall-induced damage across South America over a multi-decadal, retrospective time domain (1960-2000). We define and map extreme precipitation hazard, exposure, affectedpopulations, vulnerability and risk, and use these variables to analyse the impact of floods as a water security issue. Geospatial experiments uncover major sources of risk from natural climate variability and population growth, with change in climate extremes bearing a minor role. While rural populations display greatest relative sensitivity to extreme rainfall, urban settings show the highest rates of increasing risk. In the coming decades, rapid urbanization will make South American cities the focal point of future climate threats but also an opportunity for reducing vulnerability, protecting lives and sustaining economic development through both traditional and ecosystem-based disaster risk management systems.

  5. An application of the process computer and CRT display system in BWR nuclear power station

    International Nuclear Information System (INIS)

    Goto, Seiichiro; Aoki, Retsu; Kawahara, Haruo; Sato, Takahisa

    1975-01-01

    A color CRT display system was combined with a process computer in some BWR nuclear power plants in Japan. Although the present control system uses the CRT display system only as an output device of the process computer, it has various advantages over conventional control panel as an efficient plant-operator interface. Various graphic displays are classified into four categories. The first is operational guide which includes the display of control rod worth minimizer and that of rod block monitor. The second is the display of the results of core performance calculation which include axial and radial distributions of power output, exit quality, channel flow rate, CHFR (critical heat flux ratio), FLPD (fraction of linear power density), etc. The third is the display of process variables and corresponding computational values. The readings of LPRM, control rod position and the process data concerning turbines and feed water system are included in this category. The fourth category includes the differential axial power distribution between base power distribution (obtained from TIP) and the reading of each LPRM detector, and the display of various input parameters being used by the process computer. Many photographs are presented to show examples of those applications. (Aoki, K.)

  6. Groundwater vulnerability map for South Africa

    African Journals Online (AJOL)

    Chiedza Musekiwa

    Coastal vulnerability is the degree to which a coastal system is susceptible to, ... methods, indicator-based approaches, GIS-based decision support systems and ..... E 2005, 'Coastal Vulnerability and Risk Parameters', European Water, vol.

  7. Human Pluripotent Stem Cells and Derived Neuroprogenitors Display Differential Degrees of Susceptibility to BH3 Mimetics ABT-263, WEHI-539 and ABT-199.

    Directory of Open Access Journals (Sweden)

    Carolina Paola García

    Full Text Available Human embryonic stem cells (hESCs are hypersensitive to genotoxic stress and display lower survival ability relative to their differentiated progeny. Herein, we attempted to investigate the source of this difference by comparing the DNA damage responses triggered by the topoisomerase I inhibitor camptothecin, in hESCs, human induced pluripotent stem cells (hiPSCs and hESCs-derived neuroprogenitors (NP. We observed that upon camptothecin exposure pluripotent stem cells underwent apoptosis more swiftly and at a higher rate than differentiated cells. However, the cellular response encompassing ataxia-telangiectasia mutated kinase activation and p53 phosphorylation both on serine 15 as well as on serine 46 resulted very similar among the aforementioned cell types. Importantly, we observed that hESCs and hiPSCs express lower levels of the anti-apoptotic protein Bcl-2 than NP. To assess whether Bcl-2 abundance could account for this differential response we treated cells with ABT-263, WEHI-539 and ABT-199, small molecules that preferentially target the BH3-binding pocket of Bcl-xL and/or Bcl-2 and reduce their ability to sequester pro-apoptotic factors. We found that in the absence of stress stimuli, NP exhibited a higher sensitivity to ABT- 263 and WEHI-539 than hESCs and hiPSCs. Conversely, all tested cell types appeared to be highly resistant to the Bcl-2 specific inhibitor, ABT-199. However, in all cases we determined that ABT-263 or WEHI-539 treatment exacerbated camptothecin-induced apoptosis. Importantly, similar responses were observed after siRNA-mediated down-regulation of Bcl-xL or Bcl-2. Taken together, our results suggest that Bcl-xL contrary to Bcl-2 contributes to ensure cell survival and also functions as a primary suppressor of DNA double-strand brake induced apoptosis both in pluripotent and derived NP cells. The emerging knowledge of the relative dependence of pluripotent and progenitor cells on Bcl-2 and Bcl-xL activities may help

  8. Detecting C Program Vulnerabilities

    OpenAIRE

    Anton, Ermakov; Natalia, Kushik

    2011-01-01

    C/C++ language is widely used for developing tools in various applications, in particular, software tools for critical systems are often written in C language. Therefore, the security of such software should be thoroughly tested, i.e., the absence of vulnerabilities has to be confirmed. When detecting C program vulnerabilities static source code analysis can be used. In this paper, we present a short survey of existing software tools for such analysis and show that for some kinds of C code vu...

  9. Mental vulnerability as a risk factor for depression

    DEFF Research Database (Denmark)

    Østergaard, Ditte; Dalton, Susanne Oksbjerg; Bidstrup, Pernille Envold

    2012-01-01

    Mental vulnerability (i.e. a tendency to experience psychosomatic symptoms, mental symptoms or interpersonal problems) is associated with various diseases. This study investigated whether mental vulnerability is associated with hospitalization for depression.......Mental vulnerability (i.e. a tendency to experience psychosomatic symptoms, mental symptoms or interpersonal problems) is associated with various diseases. This study investigated whether mental vulnerability is associated with hospitalization for depression....

  10. Liquid Crystal Airborne Display

    Science.gov (United States)

    1977-08-01

    Cum.nings, J. P., et al., Properties and Limitations oe Liquid Crystals for Aircraft Displays, Honeywell Corporate Researc ."I Center, Final Report HR-72...basic module could be used to build displays for both the commercial and military! 157- marhecs, and so would establi sh a broad and sizable market ... market for the display becomes a reality; therein lies, f TABLE 16 THE COURSE OF FUTURE DISPLAY DEVELOPMENT Today 1976-77 1980 1985 Display Size 2" 1 3.2

  11. Fuzzy vulnerability matrix

    International Nuclear Information System (INIS)

    Baron, Jorge H.; Rivera, S.S.

    2000-01-01

    The so-called vulnerability matrix is used in the evaluation part of the probabilistic safety assessment for a nuclear power plant, during the containment event trees calculations. This matrix is established from what is knows as Numerical Categories for Engineering Judgement. This matrix is usually established with numerical values obtained with traditional arithmetic using the set theory. The representation of this matrix with fuzzy numbers is much more adequate, due to the fact that the Numerical Categories for Engineering Judgement are better represented with linguistic variables, such as 'highly probable', 'probable', 'impossible', etc. In the present paper a methodology to obtain a Fuzzy Vulnerability Matrix is presented, starting from the recommendations on the Numerical Categories for Engineering Judgement. (author)

  12. Vulnerability, Health Agency and Capability to Health.

    Science.gov (United States)

    Straehle, Christine

    2016-01-01

    One of the defining features of the capability approach (CA) to health, as developed in Venkatapuram's book Health Justice, is its aim to enable individual health agency. Furthermore, the CA to health hopes to provide a strong guideline for assessing the health-enabling content of social and political conditions. In this article, I employ the recent literature on the liberal concept of vulnerability to assess the CA. I distinguish two kinds of vulnerability. Considering circumstantial vulnerability, I argue that liberal accounts of vulnerability concerned with individual autonomy, align with the CA to health. Individuals should, as far as possible, be able to make health-enabling decisions about their lives, and their capability to do so should certainly not be hindered by public policy. The CA to health and a vulnerability-based analysis then work alongside to define moral responsibilities and designate those who hold them. Both approaches demand social policy to address circumstances that hinder individuals from taking health-enabling decisions. A background condition of vulnerability, on the other hand, even though it hampers the capability for health, does not warrant the strong moral claim proposed by the CA to health to define health as a meta-capability that should guide social policy. Nothing in our designing social policy could change the challenge to health agency when we deal with background conditions of vulnerability. © 2016 John Wiley & Sons Ltd.

  13. Vulnerability of Forests in India: A National Scale Assessment.

    Science.gov (United States)

    Sharma, Jagmohan; Upgupta, Sujata; Jayaraman, Mathangi; Chaturvedi, Rajiv Kumar; Bala, Govindswamy; Ravindranath, N H

    2017-09-01

    Forests are subjected to stress from climatic and non-climatic sources. In this study, we have reported the results of inherent, as well as climate change driven vulnerability assessments for Indian forests. To assess inherent vulnerability of forests under current climate, we have used four indicators, namely biological richness, disturbance index, canopy cover, and slope. The assessment is presented as spatial profile of inherent vulnerability in low, medium, high and very high vulnerability classes. Fourty percent forest grid points in India show high or very high inherent vulnerability. Plantation forests show higher inherent vulnerability than natural forests. We assess the climate change driven vulnerability by combining the results of inherent vulnerability assessment with the climate change impact projections simulated by the Integrated Biosphere Simulator dynamic global vegetation model. While 46% forest grid points show high, very high, or extremely high vulnerability under future climate in the short term (2030s) under both representative concentration pathways 4.5 and 8.5, such grid points are 49 and 54%, respectively, in the long term (2080s). Generally, forests in the higher rainfall zones show lower vulnerability as compared to drier forests under future climate. Minimizing anthropogenic disturbance and conserving biodiversity can potentially reduce forest vulnerability under climate change. For disturbed forests and plantations, adaptive management aimed at forest restoration is necessary to build long-term resilience.

  14. Power Efficient Design of DisplayPort (7.0) Using Low-voltage differential signaling IO Standard Via UltraScale Field Programming Gate Arrays

    DEFF Research Database (Denmark)

    Das, Bhagwan; Abdullah, M.F.L.; Hussain, Dil muhammed Akbar

    2017-01-01

    Port (7.0) need be reduced. In this paper, a power efficient design for DisplayPort (7.0) is proposed using LVDS IO Standard. The proposed design is tested for different frequencies; 500 MHz, 700 MHz, 1.0 GHz, and 1.6 GHz. The design is implemented using vhdl in UltraScale FPGA. It is determined...... the designed vhdl based design of DisplayPort (7.0) can reduced 92% using LVDS IO Standard for all frequencies; 500 MHz, 700 MHz, 1.0 GHz, and 1.6 GHz, compared to vhdl based design of DisplayPort (7.0) without using IO Standard. The proposed design of vhdl based design of DisplayPort (7.0) using LVDS IO...... Standard offers no power consumption for DisplayPort (7.0) in standby mode. The vhdl based design of DisplayPort (7.0) using LVDS IO Standard will be helpful to process the high resolution video at low power consumption....

  15. Racial Differences in Posttraumatic Stress Disorder Vulnerability Following Hurricane Katrina Among a Sample of Adult Cigarette Smokers from New Orleans.

    Science.gov (United States)

    Alexander, Adam C; Ali, Jeanelle; McDevitt-Murphy, Meghan E; Forde, David R; Stockton, Michelle; Read, Mary; Ward, Kenneth D

    2017-02-01

    Although blacks are more likely than whites to experience posttraumatic stress disorder (PTSD) after a natural disaster, the reasons for this disparity are unclear. This study explores whether race is associated with PTSD after adjusting for differences in preexisting vulnerabilities, exposure to stressors, and loss of social support due to Hurricane Katrina using a representative sample of 279 black and white adult current and past smokers who were present when Hurricane Katrina struck, and identified it as the most traumatic event in their lifetime. Multiple logistic regression models evaluated whether differential vulnerability (pre-hurricane physical and mental health functioning, and education level), differential exposure to hurricane-related stressors, and loss of social support deterioration reduced the association of race with PTSD. Blacks were more likely than whites to screen positive for PTSD (49 vs. 39 %, respectively, p = 0.030). Although blacks reported greater pre-hurricane vulnerability (worse mental health functioning and lower educational attainment) and hurricane-related stressor exposure and had less social support after the hurricane, only pre-hurricane mental health functioning attenuated the association of race with screening positive for PTSD. Thus, racial differences in pre-hurricane functioning, particularly poorer mental health, may partially explain racial disparities in PTSD after natural disasters, such as Hurricane Katrina. Future studies should examine these associations prospectively using representative cohorts of black and whites and include measures of residential segregation and discrimination, which may further our understanding of racial disparities in PTSD after a natural disaster.

  16. A selective and differential medium for Vibrio harveyi.

    Science.gov (United States)

    Harris, L; Owens, L; Smith, S

    1996-01-01

    A new medium, termed Vibrio harveyi agar, has been developed for the isolation and enumeration of V. harveyi. It is possible to differentiate V. harveyi colonies from the colonies of strains representing 15 other Vibrio species with this medium. This medium has been shown to inhibit the growth of two strains of marine Pseudomonas spp. and two strains of marine Flavobacterium spp. but to allow the growth of Photobacterium strains. Colonies displaying typical V. harveyi morphology were isolated from the larval rearing water of a commercial prawn hatchery with V. harveyi agar as a primary isolation medium and were positively identified, by conventional tests, as V. harveyi. This agar displays great potential as a primary isolation medium and offers significant advantages over thiosulfate-citrate-bile salts-sucrose agar as a medium for differentiating V. harveyi from other marine and estuarine Vibrio species. PMID:8795252

  17. JAVA Stereo Display Toolkit

    Science.gov (United States)

    Edmonds, Karina

    2008-01-01

    This toolkit provides a common interface for displaying graphical user interface (GUI) components in stereo using either specialized stereo display hardware (e.g., liquid crystal shutter or polarized glasses) or anaglyph display (red/blue glasses) on standard workstation displays. An application using this toolkit will work without modification in either environment, allowing stereo software to reach a wider audience without sacrificing high-quality display on dedicated hardware. The toolkit is written in Java for use with the Swing GUI Toolkit and has cross-platform compatibility. It hooks into the graphics system, allowing any standard Swing component to be displayed in stereo. It uses the OpenGL graphics library to control the stereo hardware and to perform the rendering. It also supports anaglyph and special stereo hardware using the same API (application-program interface), and has the ability to simulate color stereo in anaglyph mode by combining the red band of the left image with the green/blue bands of the right image. This is a low-level toolkit that accomplishes simply the display of components (including the JadeDisplay image display component). It does not include higher-level functions such as disparity adjustment, 3D cursor, or overlays all of which can be built using this toolkit.

  18. The trypanosome transcriptome is remodelled during differentiation but displays limited responsiveness within life stages

    Directory of Open Access Journals (Sweden)

    Sergeenko Tatiana

    2008-06-01

    Full Text Available Abstract Background Trypanosomatids utilise polycistronic transcription for production of the vast majority of protein-coding mRNAs, which operates in the absence of gene-specific promoters. Resolution of nascent transcripts by polyadenylation and trans-splicing, together with specific rates of mRNA turnover, serve to generate steady state transcript levels that can differ in abundance across several orders of magnitude and can be developmentally regulated. We used a targeted oligonucleotide microarray, representing the strongly developmentally-regulated T. brucei membrane trafficking system and ~10% of the Trypanosoma brucei genome, to investigate both between-stage, or differentiation-dependent, transcriptome changes and within-stage flexibility in response to various challenges. Results 6% of the gene cohort are developmentally regulated, including several small GTPases, SNAREs, vesicle coat factors and protein kinases both consistent with and extending previous data. Therefore substantial differentiation-dependent remodeling of the trypanosome transcriptome is associated with membrane transport. Both the microarray and qRT-PCR were then used to analyse transcriptome changes resulting from specific gene over-expression, knockdown, altered culture conditions and chemical stress. Firstly, manipulation of Rab5 expression results in co-ordinate changes to clathrin protein expression levels and endocytotic activity, but no detectable changes to steady-state mRNA levels, which indicates that the effect is mediated post-transcriptionally. Secondly, knockdown of clathrin or the variant surface glycoprotein failed to perturb transcription. Thirdly, exposure to dithiothreitol or tunicamycin revealed no evidence for a classical unfolded protein response, mediated in higher eukaryotes by transcriptional changes. Finally, altered serum levels invoked little transcriptome alteration beyond changes to expression of ESAG6/7, the transferrin receptor

  19. Response terminated displays unload selective attention

    Directory of Open Access Journals (Sweden)

    Zachary Joseph Jackson Roper

    2013-12-01

    Full Text Available Perceptual load theory successfully replaced the early versus late selection debate by appealing to adaptive control over the efficiency of selective attention. Early selection is observed unless perceptual load (p-Load is sufficiently low to grant attentional ‘spill-over‘ to task-irrelevant stimuli. Many studies exploring load theory have used limited display durations that perhaps impose artificial limits on encoding processes. We extended the exposure duration in a classic p-Load task to alleviate temporal encoding demands that may otherwise tax mnemonic consolidation processes. If the load effect arises from perceptual demands alone, then freeing-up available mnemonic resources by extending the exposure duration should have little effect. The results of Experiment 1 falsify this prediction. We observed a reliable flanker effect under high p-Load, response-terminated displays. Next, we orthogonally manipulated exposure duration and task-relevance. Counter-intuitively, we found that the likelihood of observing the flanker effect under high p-Load resides with the duration of the task-relevant array, not the flanker itself. We propose that stimulus and encoding demands interact to produce the load effect. Our account clarifies how task parameters differentially impinge upon cognitive processes to produce attentional ‘spill-over’ by appealing to visual short-term memory as an additional processing bottleneck when stimuli are briefly presented.

  20. The SAVI vulnerability assessment model

    International Nuclear Information System (INIS)

    Winblad, A.E.

    1987-01-01

    The assessment model ''Systematic Analysis of Vulnerability to Intrusion'' (SAVI) presented in this report is a PC-based path analysis model. It can provide estimates of protection system effectiveness (or vulnerability) against a spectrum of outsider threats including collusion with an insider adversary. It calculates one measure of system effectiveness, the probability of interruption P(I), for all potential adversary paths. SAVI can perform both theft and sabotage vulnerability analyses. For theft, the analysis is based on the assumption that adversaries should be interrupted either before they can accomplish removal of the target material from its normal location or removal from the site boundary. For sabotage, the analysis is based on the assumption that adversaries should be interrupted before completion of their sabotage task

  1. Europe's vulnerability to energy crises

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-01-15

    The growing dependency of Europe as a whole on energy imports and anticipated further increases in energy prices reinforce the concerns about meeting the energy demand in the future. The objective of the Study is to identify the threats leading to potential energy crises and suggest solutions for facing, in an appropriate way, the related key challenges. In addition, the Study intends to develop a number of indicators effective enough to assess the level of different types of vulnerability, as well the overall vulnerability of a country or region, including threats to physical disruption, higher energy prices etc. The use of vulnerability indicators is highly recommended for all WEC-European countries, as well as to policy makers and market players.

  2. A receptor tyrosine kinase, UFO/Axl, and other genes isolated by a modified differential display PCR are overexpressed in metastatic prostatic carcinoma cell line DU145.

    Science.gov (United States)

    Jacob, A N; Kalapurakal, J; Davidson, W R; Kandpal, G; Dunson, N; Prashar, Y; Kandpal, R P

    1999-01-01

    We have used a modified differential display PCR protocol for isolating 3' restriction fragments of cDNAs specifically expressed or overexpressed in metastatic prostate carcinoma cell line DU145. Several cDNA fragments were identified that matched to milk fat globule protein, UFO/Axl, a receptor tyrosine kinase, human homologue of a Xenopus maternal transcript, laminin and laminin receptor, human carcinoma-associated antigen, and some expressed sequence tags. The transcript for milk fat globule protein, a marker protein shown to be overexpressed in breast tumors, was elevated in DU145 cells. The expression of UFO/Axl, a receptor tyrosine kinase, was considerably higher in DU145 cells as compared to normal prostate cells and prostatic carcinoma cell line PC-3. The overexpression of UFO oncogene in DU145 cells is discussed in the context of prostate cancer metastasis.

  3. The Unfair Commercial Practices Directive and Vulnerable Consumers

    DEFF Research Database (Denmark)

    Trzaskowski, Jan

    the economic behaviour of consumers ‘below 1 average’ even though the practice does not meet the requirements of professional diligence. The Directive’s adoption of the European Court of Justice’s ‘average consumer’ entails that protection is generally provided only for those who are far from vulnerable......Consumer protection is deeply anchored in EU law, including the Treaty and the Charter of Fundamental Rights. This article discusses the concept of consumer vulnerability and how vulnerable consumers are protected in the context of commercial practices which is fully harmonised by the Unfair....... The Directive’s Article 5(3) concerning vulnerable consumers protects only—and to a limited extent—groups who are vulnerable due to mental or physical infirmity, age or credulity. Even though consumers make many good choices, all consumers are vulnerable in certain situations—often due to time constraints...

  4. Latest development of display technologies

    International Nuclear Information System (INIS)

    Gao Hong-Yue; Yao Qiu-Xiang; Liu Pan; Zheng Zhi-Qiang; Liu Ji-Cheng; Zheng Hua-Dong; Zeng Chao; Yu Ying-Jie; Sun Tao; Zeng Zhen-Xiang

    2016-01-01

    In this review we will focus on recent progress in the field of two-dimensional (2D) and three-dimensional (3D) display technologies. We present the current display materials and their applications, including organic light-emitting diodes (OLEDs), flexible OLEDs quantum dot light emitting diodes (QLEDs), active-matrix organic light emitting diodes (AMOLEDs), electronic paper (E-paper), curved displays, stereoscopic 3D displays, volumetric 3D displays, light field 3D displays, and holographic 3D displays. Conventional 2D display devices, such as liquid crystal devices (LCDs) often result in ambiguity in high-dimensional data images because of lacking true depth information. This review thus provides a detailed description of 3D display technologies. (topical review)

  5. Energy Vulnerability and EU-Russia Energy Relations

    Directory of Open Access Journals (Sweden)

    Edward Hunter Christie

    2009-08-01

    Full Text Available The concept of energy vulnerability is reviewed and discussed with a focus on Russia’s foreign energy relations, in particular those with European countries. A definition and a conceptual framework for quantifying energy vulnerability are proposed in the context of a review of recent research on energy vulnerability indices. In particular it is suggested that source country diversification should be reflected using the expected shortfall measure used in financial economics, rather than the Herfindahl-Hirschman or Shannon-Wiener indices, and that the former should then enter a calibrated function in order to yield expected economic loss. The issues of asymmetric failure probabilities and accidental versus intentional supply disruptions are then discussed with examples of recent Russian actions. Energy vulnerability measurement and modelling should ultimately inform policy. In particular, member states should legislate that no energy infrastructure project by one or more member states may increase the energy vulnerability of another member state. Additionally, European environmental policies, notably the EU ETS, should be amended so as to account for induced changes in energy vulnerability. Finally, member states should increase the level of transparency and disclosure with respect to gas import statistics and gas supply contracts.

  6. Vulnerability maps for Druzba crude oil pipeline

    International Nuclear Information System (INIS)

    Hladik, P.; Hosnedl, P.; Buresova, H.; Corbet, J.

    2012-01-01

    Maps of risk for individual environmental aspects within the protection zone of the Czech part of the Druzba crude oil pipeline (505.7 km) were developed based on a modified 'H and V index' method. Risk data were added into a GIS of the Druzba pipeline so that the system could be used as conceptual material in the field of environmental protection (a base for the new SCADA system). Considered environmental aspects were assessed in terms of their vulnerability. The criteria were defined as the vulnerability of the aquatic environment (surface waters and ground waters), the vulnerability of soil environment and the vulnerability of biotic components of the environment. (authors)

  7. Ethical practice in internet research involving vulnerable people: lessons from a self-harm discussion forum study (SharpTalk).

    Science.gov (United States)

    Sharkey, Siobhan; Jones, Ray; Smithson, Janet; Hewis, Elaine; Emmens, Tobit; Ford, Tamsin; Owens, Christabel

    2011-12-01

    The internet is widely used for health information and support, often by vulnerable people. Internet-based research raises both familiar and new ethical problems for researchers and ethics committees. While guidelines for internet-based research are available, it is unclear to what extent ethics committees use these. Experience of gaining research ethics approval for a UK study (SharpTalk), involving internet-based discussion groups with young people who self-harm and health professionals is described. During ethical review, unsurprisingly, concerns were raised about the vulnerability of potential participants. These were dominated by the issue of anonymity, which also affected participant safety and consent. These ethical problems are discussed, and our solutions, which included: participant usernames specific to the study, a closed website, private messaging facilities, a direct contact email to researchers, information about forum rules displayed on the website, a 'report' button for participants, links to online support, and a discussion room for forum moderators. This experience with SharpTalk suggests that an approach to ethics, which recognises the relational aspects of research with vulnerable people, is particularly useful for internet-based health research. The solutions presented here can act as guidance for researchers developing proposals and for ethics committees reviewing them.

  8. Displays and simulators

    Science.gov (United States)

    Mohon, N.

    A 'simulator' is defined as a machine which imitates the behavior of a real system in a very precise manner. The major components of a simulator and their interaction are outlined in brief form, taking into account the major components of an aircraft flight simulator. Particular attention is given to the visual display portion of the simulator, the basic components of the display, their interactions, and their characteristics. Real image displays are considered along with virtual image displays, and image generators. Attention is given to an advanced simulator for pilot training, a holographic pancake window, a scan laser image generator, the construction of an infrared target simulator, and the Apollo Command Module Simulator.

  9. Systematic drug screening reveals specific vulnerabilities and co-resistance patterns in endocrine-resistant breast cancer

    International Nuclear Information System (INIS)

    Kangaspeska, Sara; Hultsch, Susanne; Jaiswal, Alok; Edgren, Henrik; Mpindi, John-Patrick; Eldfors, Samuli; Brück, Oscar; Aittokallio, Tero; Kallioniemi, Olli

    2016-01-01

    The estrogen receptor (ER) inhibitor tamoxifen reduces breast cancer mortality by 31 % and has served as the standard treatment for ER-positive breast cancers for decades. However, 50 % of advanced ER-positive cancers display de novo resistance to tamoxifen, and acquired resistance evolves in 40 % of patients who initially respond. Mechanisms underlying resistance development remain poorly understood and new therapeutic opportunities are urgently needed. Here, we report the generation and characterization of seven tamoxifen-resistant breast cancer cell lines from four parental strains. Using high throughput drug sensitivity and resistance testing (DSRT) with 279 approved and investigational oncology drugs, exome-sequencing and network analysis, we for the first time, systematically determine the drug response profiles specific to tamoxifen resistance. We discovered emerging vulnerabilities towards specific drugs, such as ERK1/2-, proteasome- and BCL-family inhibitors as the cells became tamoxifen-resistant. Co-resistance to other drugs such as the survivin inhibitor YM155 and the chemotherapeutic agent paclitaxel also occurred. This study indicates that multiple molecular mechanisms dictate endocrine resistance, resulting in unexpected vulnerabilities to initially ineffective drugs, as well as in emerging co-resistances. Thus, combatting drug-resistant tumors will require patient-tailored strategies in order to identify new drug vulnerabilities, and to understand the associated co-resistance patterns. The online version of this article (doi:10.1186/s12885-016-2452-5) contains supplementary material, which is available to authorized users

  10. Displays enabling mobile multimedia

    Science.gov (United States)

    Kimmel, Jyrki

    2007-02-01

    With the rapid advances in telecommunications networks, mobile multimedia delivery to handsets is now a reality. While a truly immersive multimedia experience is still far ahead in the mobile world, significant advances have been made in the constituent audio-visual technologies to make this become possible. One of the critical components in multimedia delivery is the mobile handset display. While such alternatives as headset-style near-to-eye displays, autostereoscopic displays, mini-projectors, and roll-out flexible displays can deliver either a larger virtual screen size than the pocketable dimensions of the mobile device can offer, or an added degree of immersion by adding the illusion of the third dimension in the viewing experience, there are still challenges in the full deployment of such displays in real-life mobile communication terminals. Meanwhile, direct-view display technologies have developed steadily, and can provide a development platform for an even better viewing experience for multimedia in the near future. The paper presents an overview of the mobile display technology space with an emphasis on the advances and potential in developing direct-view displays further to meet the goal of enabling multimedia in the mobile domain.

  11. On Integrity of Flexible Displays

    Science.gov (United States)

    Bouten, Piet C. P.

    Nowadays two display types are dominant in the display market: the bulky cathode ray tube (CRT) and liquid crystal displays (LCD). Both types use glass as substrate material. The LCD display is the dominant player for mobile applications, in for instance mobile phones and portable computers. In the development of displays and their applications a clear interest exists to replace the rigid rectangular display cells by free-shaped, curved or even roll-up cells. These types of applications require flexible displays.

  12. The politics of vulnerability and resilience

    NARCIS (Netherlands)

    Frerks, G.E.; Warner, J.F.; Weijs, B.

    2011-01-01

    Much conceptual confusion exists over the concepts of vulnerability and (social) resilience, reinforced by the different paradigms (the article identifies four) and disciplinary traditions underlying their use. While since the 1980s the social construction of "vulnerability" as a driver for disaster

  13. Identification of ligand-selective peptidic ActRIIB-antagonists using phage display technology

    Directory of Open Access Journals (Sweden)

    Kotaro Sakamoto

    2017-09-01

    Full Text Available ActRIIB (activin receptor type-2B is an activin receptor subtype constitutively expressed in the whole body, playing a role in cellular proliferation, differentiation, and metabolism. For its various physiological activities, ActRIIB interacts with activin and multiple other ligands including myostatin (MSTN, growth differentiation factor 11 (GDF11, and bone morphogenetic protein 9 (BMP9. Notably, the protein-protein interaction (PPI between ActRIIB and MSTN negatively controls muscular development. Therefore, this PPI has been targeted for effective treatment of muscle degenerative diseases such as muscular dystrophy and sarcopenia. Here, we report the identification of ligand-selective peptidic ActRIIB-antagonists by phage display technology. Our peptides bound to the extracellular domain of ActRIIB, inhibited PPIs between ActRIIB expressed on the cell surface and its ligands, and subsequently suppressed activation of Smad that serves as the downstream signal of the ActRIIB pathway. Interestingly, these peptidic antagonists displayed different ligand selectivities; the AR2mini peptide inhibited multiple ligands (activin A, MSTN, GDF11, and BMP9, AR9 inhibited MSTN and GDF11, while AR8 selectively inhibited MSTN. This is the first report of artificial peptidic ActRIIB-antagonists possessing ligand-selectivity.

  14. Vulnerability of schools to floods in Nyando River catchment, Kenya.

    Science.gov (United States)

    Ochola, Samuel O; Eitel, Bernhard; Olago, Daniel O

    2010-07-01

    This paper assesses the vulnerability of schools to floods in the Nyando River catchment (3,600 km(2)) in western Kenya and identifies measures needed to reduce this vulnerability. It surveys 130 schools in the lower reaches, where flooding is a recurrent phenomenon. Of the primary schools assessed, 40% were vulnerable, 48% were marginally vulnerable and 12% were not vulnerable. Of the secondary schools, 8% were vulnerable, 73% were marginally vulnerable and 19% were not vulnerable. Vulnerability to floods is due to a lack of funds, poor building standards, local topography, soil types and inadequate drainage. The Constituencies Development Fund (CDF), established in 2003, provides financial support to cover school construction and reconstruction costs; CDF Committees are expected to adopt school building standards. In an effort to promote safe and resilient construction and retrofitting to withstand floods, this paper presents vulnerability reduction strategies and recommendations for incorporating minimum standards in the on-going Primary School Infrastructure Programme Design.

  15. IPCC Climate Change 2013: Impacts, Adaptation and Vulnerability: Key findings and lessons learned

    Science.gov (United States)

    Giorgi, Filippo; Field, Christopher; Barros, Vicente

    2014-05-01

    The Working Group II contribution to the Fifth Assessment Report of the Intergivernmental Panel on Climate Change, Impacts, Adaptation and Vulnerability, will be completed and approved in March 2014. It includes two parts, Part A covering Global and Sectoral Aspects, and Part B, covering Regional Aspects. The WGII report spans a very broad range of topics which are approached in a strong interdisciplinary context. It highlights how observed impacts of climate change are now widespread and consequential, particularly for natural systems, and can be observed on all continents and across the oceans. Vulnerability to climate change depends on interactions with non-climatic stressors and inequalities, resulting in highly differential risks associated with climate change. It is also found that adaptation is already occurring across scales and is embedded in many planning processes. Continued sustained warming thrughout the 21st century will exacerbate risks and vulnerabilities across multiple sectors, such as freshwater resources, terrestrial and inland water systems, coastal and marine systems, food production, human health, security and livelihood. The report stresses how risks and vulnerabilities need to be assessed within a multi-stressor and regionally specific context, and can be reduced and managed by adopting climate-resilient pathwyas combining suitable adaptation and mitigation options with synergies and tradeoffs occurring both within and across regions. The Working group II report includes a large number of Chapters (30) and contributors (310 including authors and review editors), with expertise in a broad range of disciplines, from the physical science to the impact and socio-economic sciences. The communication across chapters and disciplines has been a challenge, and will continue to be one as the Global Change problem will increasingly require a fully integrated and holistic approach. Note that text on this abstract is not approved at the time its

  16. Into the Wild: Neuroergonomic Differentiation of Hand-Held and Augmented Reality Wearable Displays during Outdoor Navigation with Functional Near Infrared Spectroscopy.

    Science.gov (United States)

    McKendrick, Ryan; Parasuraman, Raja; Murtza, Rabia; Formwalt, Alice; Baccus, Wendy; Paczynski, Martin; Ayaz, Hasan

    2016-01-01

    Highly mobile computing devices promise to improve quality of life, productivity, and performance. Increased situation awareness and reduced mental workload are two potential means by which this can be accomplished. However, it is difficult to measure these concepts in the "wild". We employed ultra-portable battery operated and wireless functional near infrared spectroscopy (fNIRS) to non-invasively measure hemodynamic changes in the brain's Prefrontal cortex (PFC). Measurements were taken during navigation of a college campus with either a hand-held display, or an Augmented reality wearable display (ARWD). Hemodynamic measures were also paired with secondary tasks of visual perception and auditory working memory to provide behavioral assessment of situation awareness and mental workload. Navigating with an augmented reality wearable display produced the least workload during the auditory working memory task, and a trend for improved situation awareness in our measures of prefrontal hemodynamics. The hemodynamics associated with errors were also different between the two devices. Errors with an augmented reality wearable display were associated with increased prefrontal activity and the opposite was observed for the hand-held display. This suggests that the cognitive mechanisms underlying errors between the two devices differ. These findings show fNIRS is a valuable tool for assessing new technology in ecologically valid settings and that ARWDs offer benefits with regards to mental workload while navigating, and potentially superior situation awareness with improved display design.

  17. Establishment of the method of surface shaded display for brain PET imaging

    International Nuclear Information System (INIS)

    Zhang Xiangsong; Tang Anwu; He Zuoxiang

    2003-01-01

    Objective: To establish the method of surface shaded display (SSD) for brain PET imaging. Methods: The original brain PET images volume data were transferred to the personal computer by the local area network, and scaled into 256 grayscale values between 0 and 255. An appropriate threshold could be selected with three differential methods: depended on the histogram or maximum percentage of the volume data and the opposite value percentage of the lesion. The list of vertices and triangles describing the contour surface was produced with a high resolution three dimensional (3D) surface construction algorithm. Results: The final software of SSD for brain PET imaging with interactive user interface can produce 3D brain PET images which can be rotated, scaled, and saved or outputted with several image formats. Conclusion: The method of SSD for brain PET imaging can directly and integrally reflect the surface of brain cortex, and be helpful to locate lesions and display the range of lesions, but can not reflect the severity of lesions, nor can display the structure under brain cortex

  18. Vulnerabilities Classification for Safe Development on Android

    Directory of Open Access Journals (Sweden)

    Ricardo Luis D. M. Ferreira

    2016-06-01

    Full Text Available The global sales market is currently led by devices with the Android operating system. In 2015, more than 1 billion smartphones were sold, of which 81.5% were operated by the Android platform. In 2017, it is estimated that 267.78 billion applications will be downloaded from Google Play. According to Qian, 90% of applications are vulnerable, despite the recommendations of rules and standards for the safe software development. This study presents a classification of vulnerabilities, indicating the vulnerability, the safety aspect defined by the Brazilian Association of Technical Standards (Associação Brasileira de Normas Técnicas - ABNT norm NBR ISO/IEC 27002 which will be violated, which lines of code generate the vulnerability and what should be done to avoid it, and the threat agent used by each of them. This classification allows the identification of possible points of vulnerability, allowing the developer to correct the identified gaps.

  19. Oil vulnerability index of oil-importing countries

    International Nuclear Information System (INIS)

    Gupta, Eshita

    2008-01-01

    This paper assesses the relative oil vulnerability of 26 net oil-importing countries for the year 2004 on the basis of various indicators - the ratio of value of oil imports to gross domestic product (GDP), oil consumption per unit of GDP, GDP per capita and oil share in total energy supply, ratio of domestic reserves to oil consumption, exposure to geopolitical oil market concentration risks as measured by net oil import dependence, diversification of supply sources, political risk in oil-supplying countries, and market liquidity. The approach using the principal component technique has been adopted to combine these individual indicators into a composite index of oil vulnerability. Such an index captures the relative sensitivity of various economies towards developments of the international oil market, with a higher index indicating higher vulnerability. The results show that there are considerable differences in the values of individual indicators of oil vulnerability and overall oil vulnerability index among the countries (both inter and intraregional). (author)

  20. Oil vulnerability index of oil-importing countries

    Energy Technology Data Exchange (ETDEWEB)

    Gupta, Eshita [The Energy and Resources Institute, Darbari Seth Block, Habitat Place, New Delhi 110 003 (India)

    2008-03-15

    This paper assesses the relative oil vulnerability of 26 net oil-importing countries for the year 2004 on the basis of various indicators - the ratio of value of oil imports to gross domestic product (GDP), oil consumption per unit of GDP, GDP per capita and oil share in total energy supply, ratio of domestic reserves to oil consumption, exposure to geopolitical oil market concentration risks as measured by net oil import dependence, diversification of supply sources, political risk in oil-supplying countries, and market liquidity. The approach using the principal component technique has been adopted to combine these individual indicators into a composite index of oil vulnerability. Such an index captures the relative sensitivity of various economies towards developments of the international oil market, with a higher index indicating higher vulnerability. The results show that there are considerable differences in the values of individual indicators of oil vulnerability and overall oil vulnerability index among the countries (both inter and intraregional). (author)

  1. Groundwater Vulnerability Map for South Africa | Musekiwa | South ...

    African Journals Online (AJOL)

    Vulnerability of groundwater is a relative, non-measurable and dimensionless property which is based on the concept that some land areas are more vulnerable to groundwater contamination than others. Maps showing groundwater vulnerability assist with the identification of areas more susceptible to contamination than ...

  2. 6 CFR 27.400 - Chemical-terrorism vulnerability information.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Chemical-terrorism vulnerability information. 27... FACILITY ANTI-TERRORISM STANDARDS Other § 27.400 Chemical-terrorism vulnerability information. (a... that constitute Chemical-terrorism Vulnerability Information (CVI), as defined in § 27.400(b). The...

  3. Book Display as Adult Service

    Directory of Open Access Journals (Sweden)

    Matthew S. Moore

    1997-03-01

    Full Text Available 無Book display as an adult service is defined as choosing and positioning adult books from the collection to increase their circulation. The author contrasts bookstore arrangement for sales versus library arrangement for access. The paper considers the library-as-a-whole as a display, examines the right size for an in-library display, and discusses mass displays, end-caps, on-shelf displays, and the Tiffany approach. The author proposes that an effective display depends on an imaginative, unifying theme, and that book displays are part of the joy of libraries.

  4. Phthalate-induced toxicity: Identifying the vulnerable pathways during sexual differentiation in the male rat

    Science.gov (United States)

    Human exposures to phthalate ester plasticizer compounds are widespread. Studies in rodents have demonstrated that in utero exposure to various phthalates throughout sexual differentiation (GD14-18) results in decreased fetal testicular androgen production, and ultimately leads t...

  5. Nuclear material production cycle vulnerability analysis

    International Nuclear Information System (INIS)

    Bott, T.F.

    1996-01-01

    This paper discusses a method for rapidly and systematically identifying vulnerable equipment in a nuclear material or similar production process and ranking that equipment according to its attractiveness to a malevolent attacker. A multistep approach was used in the analysis. First, the entire production cycle was modeled as a flow diagram. This flow diagram was analyzed using graph theoretical methods to identify processes in the production cycle and their locations. Models of processes that were judged to be particularly vulnerable based on the cycle analysis then were developed in greater detail to identify equipment in that process that is vulnerable to intentional damage

  6. Comparative studies of groundwater vulnerability assessment

    Science.gov (United States)

    Maria, Rizka

    2018-02-01

    Pollution of groundwater is a primary issue because aquifers are susceptible to contamination from land use and anthropogenic impacts. Groundwater susceptibility is intrinsic and specific. Intrinsic vulnerability refers to an aquifer that is susceptible to pollution and to the geological and hydrogeological features. Vulnerability assessment is an essential step in assessing groundwater contamination. This approach provides a visual analysis for helping planners and decision makers to achieve the sustainable management of water resources. Comparative studies are applying different methodologies to result in the basic evaluation of the groundwater vulnerability. Based on the comparison of methods, there are several advantages and disadvantages. SI can be overlaid on DRASTIC and Pesticide DRASTIC to extract the divergence in sensitivity. DRASTIC identifies low susceptibility and underestimates the pollution risk while Pesticide DRASTIC and SI represents better risk and is recommended for the future. SINTACS method generates very high vulnerability zones with surface waters and aquifer interactions. GOD method could be adequate for vulnerability mapping in karstified carbonate aquifers at small-moderate scales, and EPIK method can be used for large scale. GOD method is suitable for designing large area such as land management while DRASTIC has good accuracy and more real use in geoenvironmental detailed studies.

  7. An Extreme-Value Approach to Anomaly Vulnerability Identification

    Science.gov (United States)

    Everett, Chris; Maggio, Gaspare; Groen, Frank

    2010-01-01

    The objective of this paper is to present a method for importance analysis in parametric probabilistic modeling where the result of interest is the identification of potential engineering vulnerabilities associated with postulated anomalies in system behavior. In the context of Accident Precursor Analysis (APA), under which this method has been developed, these vulnerabilities, designated as anomaly vulnerabilities, are conditions that produce high risk in the presence of anomalous system behavior. The method defines a parameter-specific Parameter Vulnerability Importance measure (PVI), which identifies anomaly risk-model parameter values that indicate the potential presence of anomaly vulnerabilities, and allows them to be prioritized for further investigation. This entails analyzing each uncertain risk-model parameter over its credible range of values to determine where it produces the maximum risk. A parameter that produces high system risk for a particular range of values suggests that the system is vulnerable to the modeled anomalous conditions, if indeed the true parameter value lies in that range. Thus, PVI analysis provides a means of identifying and prioritizing anomaly-related engineering issues that at the very least warrant improved understanding to reduce uncertainty, such that true vulnerabilities may be identified and proper corrective actions taken.

  8. Assessing vulnerability

    NARCIS (Netherlands)

    Hellmuth, M.; Kabat, P.

    2003-01-01

    It is in the shantytowns and rural villages of the Third World that floods and droughts strike hardest and deepest. Vulnerability to the vagaries of climate depends not only on location, but, crucially, on the capacity of the victims to cope with the impacts of extreme weather. So, where are the

  9. Detection of sunflower oil in extra virgin olive oil by fast differential scanning calorimetry

    NARCIS (Netherlands)

    Wetten, I.A.; Herwaarden, A.W.; Splinter, R.; Boerrigter-Eenling, R.; Ruth, van S.M.

    2015-01-01

    Extra virgin olive oil (EVOO) is an economically valuable product, due to its high quality and premium price. Therefore it is vulnerable for adulteration by means of the addition of cheaper vegetable oils. Differential scanning calorimetry (DSC) has been suggested as a fast technique for the

  10. Seasonal changes in plant-water relations influence patterns of leaf display in Miombo woodlands: evidence of water conservative strategies.

    Science.gov (United States)

    Vinya, Royd; Malhi, Yadvinder; Brown, Nick D; Fisher, Joshua B; Brodribb, Timothy; Aragão, Luiz E O C

    2018-06-15

    Water availability has frequently been linked to seasonal leaf display in seasonally dry ecosystems, but there have been few ecohydrological investigations of this link. Miombo woodland is a dominant seasonally dry tropical forest ecosystem type in southern Africa; however, there are few data on the relationship between seasonal dynamics in plant-water relations and patterns of leaf display for Miombo woodland. Here we investigate this relationship among nine key Miombo woodland tree species differing in drought tolerance ability and leaf phenology. Results of this study showed that seasonal patterns of leaf phenology varied significantly with seasonal changes in stem water relations among the nine species. Leaf shedding coincided with the attainment of seasonal minimum stem water potential. Leaf flush occurred following xylem rehydration at the peak of the dry season suggesting that endogenous plant factors play a pivotal role in seasonal leaf display in this forest type. Drought-tolerant deciduous species suffered significantly higher seasonal losses in xylem hydraulic conductivity than the drought-intolerant semi-evergreen tree species (P water stress in seasonally dry tropical forests selects for water conservative traits that protect the vulnerable xylem transport system. Therefore, seasonal rhythms in xylem transport dictate patterns of leaf display in seasonally dry tropical forests.

  11. Reconceptualizing Vulnerability in Personal Narrative Writing with Youths

    Science.gov (United States)

    Johnson, Elisabeth

    2014-01-01

    Through a student/teacher classroom conflict, the author explores ways adults produce student writers as vulnerable. Drawing on post-structural concepts of adolescence, identity production, interrogation, and vulnerability, the author details how an English teacher invited students to perform vulnerability in personal narratives about issues like…

  12. Working up a Debt: Students as Vulnerable Consumers

    Science.gov (United States)

    Robson, Julie; Farquhar, Jillian Dawes; Hindle, Christopher

    2017-01-01

    Students are recognized as vulnerable consumers where financial matters are concerned, particularly with reference to indebtedness. This study examines student indebtedness in order to initiate wider debate about student vulnerability. We consider vulnerability as dynamic and temporal, linked to an event that renders the consumer susceptible to…

  13. Áreas vulnerables en el centro de Madrid

    Directory of Open Access Journals (Sweden)

    Agustín Hernández Aja

    2007-07-01

    This document shows an vulnerability analysis of the central area of Madrid taken it as the field of APE-00.01. Its objective is to delimit “vulnerable areas” so there can be evaluated the opportunities for interve trough them and then define the best tools in detriment of their vulnerability reasons. To determinate those areas we have developed a sociodemographic analysis where we have found those units of population with vulnerable values. Once determinated, we have synthetize them to define them as easy drafts that makes understandable the work area for later on establish a vulnerable areas catalogue with spatial homogeneity and significant size. The basic nucleus of the análisis has been the sociodemographic fact, based on homogeneus data sources for all the area so they could be referenced to specific spacial areas. In each case has been advised other possible indicators of vulnerability including a signifier selection of thrm on the fifth chapter.

  14. Statistics of software vulnerability detection in certification testing

    Science.gov (United States)

    Barabanov, A. V.; Markov, A. S.; Tsirlov, V. L.

    2018-05-01

    The paper discusses practical aspects of introduction of the methods to detect software vulnerability in the day-to-day activities of the accredited testing laboratory. It presents the approval results of the vulnerability detection methods as part of the study of the open source software and the software that is a test object of the certification tests under information security requirements, including software for communication networks. Results of the study showing the allocation of identified vulnerabilities by types of attacks, country of origin, programming languages used in the development, methods for detecting vulnerability, etc. are given. The experience of foreign information security certification systems related to the detection of certified software vulnerabilities is analyzed. The main conclusion based on the study is the need to implement practices for developing secure software in the development life cycle processes. The conclusions and recommendations for the testing laboratories on the implementation of the vulnerability analysis methods are laid down.

  15. Vulnerability, Borderline Personality Disorders. Clinical and ...

    African Journals Online (AJOL)

    Borderline personality disorder and vulnerability are difficult to assess and are rather elusive to define. A case study material is presented from a cognitive analytical model. An attempt of the dominant features of cognitive analytical therapy and discussion of vulnerability in relation to personality disorder is provided.

  16. [Aged woman's vulnerability related to AIDS].

    Science.gov (United States)

    Silva, Carla Marins; Lopes, Fernanda Maria do Valle Martins; Vargens, Octavio Muniz da Costa

    2010-09-01

    This article is a systhematic literature review including the period from 1994 to 2009, whose objective was to discuss the aged woman's vulnerability in relation to Acquired Imunodeficiency Syndrome (Aids). The search for scientific texts was accomplished in the following databases: Biblioteca Virtual em Saúde, Scientific Eletronic Library Online (SciELO), Literatura Latino-Americana e do Caribe em Ciências da Saúde (LILACS) and Medical Literature Analysis and Retrieval System Online (MEDLINE). The descriptors used were vulnerability, woman and Aids. Eighteen texts were analyzed, including articles in scientific journals, thesis and dissertations. As a conclusion, it was noted that aged women and vulnerability to Aids are directly related, through gender characteristics including submission and that were built historical and socially. We consider as fundamental the development of studies which may generate publications accessible to women, in order to help them see themselves as persons vulnerable to Aids contagion just for being women.

  17. Extinction vulnerability of coral reef fishes.

    Science.gov (United States)

    Graham, Nicholas A J; Chabanet, Pascale; Evans, Richard D; Jennings, Simon; Letourneur, Yves; Aaron Macneil, M; McClanahan, Tim R; Ohman, Marcus C; Polunin, Nicholas V C; Wilson, Shaun K

    2011-04-01

    With rapidly increasing rates of contemporary extinction, predicting extinction vulnerability and identifying how multiple stressors drive non-random species loss have become key challenges in ecology. These assessments are crucial for avoiding the loss of key functional groups that sustain ecosystem processes and services. We developed a novel predictive framework of species extinction vulnerability and applied it to coral reef fishes. Although relatively few coral reef fishes are at risk of global extinction from climate disturbances, a negative convex relationship between fish species locally vulnerable to climate change vs. fisheries exploitation indicates that the entire community is vulnerable on the many reefs where both stressors co-occur. Fishes involved in maintaining key ecosystem functions are more at risk from fishing than climate disturbances. This finding is encouraging as local and regional commitment to fisheries management action can maintain reef ecosystem functions pending progress towards the more complex global problem of stabilizing the climate. © 2011 Blackwell Publishing Ltd/CNRS.

  18. The vulnerability of Australian rural communities to climate variability and change: Part I—Conceptualising and measuring vulnerability

    NARCIS (Netherlands)

    Nelson, R.; Kokic, P.; Crimp, S.; Meinke, H.B.; Howden, S.M.

    2010-01-01

    Vulnerability is a term frequently used to describe the potential threat to rural communities posed by climate variability and change. Despite growing use of the term, analytical measures of vulnerability that are useful for prioritising and evaluating policy responses are yet to evolve. Demand for

  19. Research Analysis of temporal and spatial characteristics of eco-environmental vulnerability in the Xianshui River basin based on GIS

    Science.gov (United States)

    Yao, Kun; Bai, Lin; Li, Xiao Ju; Wang, Xiao

    2018-05-01

    The Xianshui River basin is an important ecological barrier and water conservation area of Qinghai-Tibet plateau. To master the spatial and temporal differentiation of ecological environment is beneficial to the realization of the protection of regional ecological environment and the development of restoration measures. In this paper, the evaluation index system of ecological environment vulnerability was constructed from topography, climate, soil, land use and social economy. In this study, GIS and information entropy theory are combined to complete the analysis of spatial and temporal variation of vulnerability of ecological environment vulnerability in 2000-2015 years, and the main results are as follows: The ecological vulnerability of the watershed is characterized by the obvious vertical distribution, which is characterized by the gradual increase of the vulnerability of the south to the north. The evaluation results were classified as potential, micro, mild, moderate and severe, with the proportion of each grade being Micro > mild > potential > moderate > severity. The proportion of light and below accounts for more than 80% of the whole area, and the whole basin is at a medium vulnerable level. The change of overall trend indicates that the overall ecological environment of the basin has improved obviously in 15 years. The driving force factor analysis shows that the national environmental protection and restoration project is playing a significant role and plays a major driving role in the obvious improvement of the ecological environment in the basin area. However, there are still a few parts of the region that are deteriorating. This is mainly due to the special natural environment and over exploitation of hydropower resources.

  20. Augmenting digital displays with computation

    Science.gov (United States)

    Liu, Jing

    As we inevitably step deeper and deeper into a world connected via the Internet, more and more information will be exchanged digitally. Displays are the interface between digital information and each individual. Naturally, one fundamental goal of displays is to reproduce information as realistically as possible since humans still care a lot about what happens in the real world. Human eyes are the receiving end of such information exchange; therefore it is impossible to study displays without studying the human visual system. In fact, the design of displays is rather closely coupled with what human eyes are capable of perceiving. For example, we are less interested in building displays that emit light in the invisible spectrum. This dissertation explores how we can augment displays with computation, which takes both display hardware and the human visual system into consideration. Four novel projects on display technologies are included in this dissertation: First, we propose a software-based approach to driving multiview autostereoscopic displays. Our display algorithm can dynamically assign views to hardware display zones based on multiple observers' current head positions, substantially reducing crosstalk and stereo inversion. Second, we present a dense projector array that creates a seamless 3D viewing experience for multiple viewers. We smoothly interpolate the set of viewer heights and distances on a per-vertex basis across the arrays field of view, reducing image distortion, crosstalk, and artifacts from tracking errors. Third, we propose a method for high dynamic range display calibration that takes into account the variation of the chrominance error over luminance. We propose a data structure for enabling efficient representation and querying of the calibration function, which also allows user-guided balancing between memory consumption and the amount of computation. Fourth, we present user studies that demonstrate that the ˜ 60 Hz critical flicker fusion

  1. A synthesized biophysical and social vulnerability assessment for Taiwan

    Science.gov (United States)

    Lee, Yung-Jaan

    2017-11-01

    Taiwan, located in the Western Pacific, is a country that is one of the most vulnerable to disasters that are associated with the changing climate; it is located within the Ring of Fire, which is the most geologically active region in the world. The environmental and geological conditions in Taiwan are sensitive and vulnerable to such disasters. Owing to increasing urbanization in Taiwan, floods and climate-related disasters have taken an increasing toll on human lives. As global warming accelerates the rising of sea levels and increasing of the frequency of extreme weather events, disasters will continue to affect socioeconomic development and human conditions. Under such circumstances, researchers and policymakers alike must recognize the importance of providing useful knowledge concerning vulnerability, disaster recovery and resilience. Strategies for reducing vulnerability and climate-related disaster risks and for increasing resilience involve preparedness, mitigation and adaptation. In the last two decades, extreme climate events have caused severe flash floods, debris flows, landslides, and other disasters and have had negative effects of many sectors, including agriculture, infrastructure and health. Since climate change is expected to have a continued impact on socio-economic development, this work develops a vulnerability assessment framework that integrates both biophysical and social vulnerability and supports synthesized vulnerability analyses to identify vulnerable areas in Taiwan. Owing to its geographical, geological and climatic features, Taiwan is susceptible to earthquakes, typhoons, droughts and various induced disasters. Therefore, Taiwan has the urgent task of establishing a framework for assessing vulnerability as a planning and policy tool that can be used to identify not only the regions that require special attention but also hotspots in which efforts should be made to reduce vulnerability and the risk of climate-related disaster. To

  2. Mental Vulnerability as a Predictor of Early Mortality

    DEFF Research Database (Denmark)

    Eplov, Lene F.; Jørgensen, Torben; Segel, S.

    2005-01-01

    BACKGROUND: Studies have demonstrated that mental vulnerability (ie, a tendency to experience psychosomatic symptoms or inadequate interpersonal interactions) is associated with various diseases. The objective of our study is to evaluate whether mental vulnerability is a risk factor for early...... mortality. METHODS: We conducted a prospective cohort study of 3 random samples of the population in Copenhagen County, Denmark selected in 1976, 1982-1984, and 1991 (n = 6435). Baseline data collection included measures of mental vulnerability, social factors, comorbidity, biologic risk markers (eg, blood...... of mortality as the result of natural causes. The association between mental vulnerability and survival was examined using Kaplan-Meir plots and Cox proportional-hazard models adjusting for possible confounding factors. RESULTS: With respect to mental vulnerability, 79% of the sample was classified...

  3. Social fear and social phobia types among community youth: differential clinical features and vulnerability factors.

    Science.gov (United States)

    Knappe, Susanne; Beesdo-Baum, Katja; Fehm, Lydia; Stein, Murray B; Lieb, Roselind; Wittchen, Hans-Ulrich

    2011-01-01

    To compare different social fears and social phobia subtypes with regard to clinical (age of onset, avoidance, impairment, comorbidities) and vulnerability factors (behavioural inhibition (BI), parental psychopathology and parental rearing) among community youth. Fears of 6 social situations and Social Phobia (SP), along with their clinical features, were assessed using the Munich-Composite International Diagnostic Interview (DIA-X/M-CIDI) in a population-based sample of N = 3021 14-24 year olds that were followed up for 10 years. BI and parental rearing were assessed using self-report questionnaires. Parental psychopathology was assessed directly in parents via DIA-X/M-CIDI, supplemented by offsprings' family history reports. In the total sample, 20.0%, 11.6%, 11.7% reported fear of 1, 2, 3 or more social situations, respectively; rates were 24.2%, 18.7%, and 57.1% in SP-cases (6.6% of the total sample). Exploring the factorial structure indicated rather unidimensionality of social fears than mutual distinction of social fears by interaction vs. performance situations. Except for fear of taking tests and public speaking, social fears rarely occurred in isolation. Social fears of both interaction and performance situations were associated with severe avoidance (vs. fear of either situation; Odds Ratios, OR = 1.5, 95%CI: 1.1-1.9) and impairment (OR = 3.6, 95%CI: 2.6-4.9), and more comorbid anxiety and depressive disorders (OR range 3.2-5.8, p > .001). Fear of interaction situations was associated with higher BI (vs. performance-related fears, OR range 1.2-2.1, p social fears differ in their clinical and vulnerability factors from performance-related social fears. The current DSM-IV specifier of "generalized" SP may fall short of adequately denoting these differences. Fear of taking tests appears to be conceptually and, possibly, etiologically distinct from other social fears, and may be better placed in another category (e.g., as a type of specific phobia

  4. Assessing intrinsic and specific vulnerability models ability to indicate groundwater vulnerability to groups of similar pesticides: A comparative study

    Science.gov (United States)

    Douglas, Steven; Dixon, Barnali; Griffin, Dale W.

    2018-01-01

    With continued population growth and increasing use of fresh groundwater resources, protection of this valuable resource is critical. A cost effective means to assess risk of groundwater contamination potential will provide a useful tool to protect these resources. Integrating geospatial methods offers a means to quantify the risk of contaminant potential in cost effective and spatially explicit ways. This research was designed to compare the ability of intrinsic (DRASTIC) and specific (Attenuation Factor; AF) vulnerability models to indicate groundwater vulnerability areas by comparing model results to the presence of pesticides from groundwater sample datasets. A logistic regression was used to assess the relationship between the environmental variables and the presence or absence of pesticides within regions of varying vulnerability. According to the DRASTIC model, more than 20% of the study area is very highly vulnerable. Approximately 30% is very highly vulnerable according to the AF model. When groundwater concentrations of individual pesticides were compared to model predictions, the results were mixed. Model predictability improved when concentrations of the group of similar pesticides were compared to model results. Compared to the DRASTIC model, the AF model more accurately predicts the distribution of the number of contaminated wells within each vulnerability class.

  5. Assessing local vulnerability to climate change in Ecuador.

    Science.gov (United States)

    Fernandez, Mario Andres; Bucaram, Santiago J; Renteria, Willington

    2015-01-01

    Vulnerability assessments have become necessary to increase the understanding of climate-sensitive systems and inform resource allocation in developing countries. Challenges arise when poor economic and social development combines with heterogeneous climatic conditions. Thus, finding and harmonizing good-quality data at local scale may be a significant hurdle for vulnerability research. In this paper we assess vulnerability to climate change at a local level in Ecuador. We take Ecuador as a case study as socioeconomic data are readily available. To incorporate the spatial and temporal pattern of the climatic variables we use reanalysis datasets and empirical orthogonal functions. Our assessment strategy relies on the statistical behavior of climatic and socioeconomic indicators for the weighting and aggregation mechanism into a composite vulnerability indicator. Rather than assuming equal contribution to the formation of the composite indicator, we assume that the weights of the indicators vary inversely as the variance over the cantons (administrative division of Ecuador). This approach captures the multi-dimensionality of vulnerability in a comprehensive form. We find that the least vulnerable cantons concentrate around Ecuador's largest cities (e.g. Quito and Guayaquil); however, approximately 20 % of the national population lives in other cantons that are categorized as highly and very highly vulnerable to climate change. Results also show that the main determinants of high vulnerability are the lack of land tenure in agricultural areas and the nonexistence of government-funded programs directed to environmental and climate change management.

  6. Plutonium Vulnerability Management Plan

    International Nuclear Information System (INIS)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy's response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department's Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B

  7. Cell type-specific gene expression of midbrain dopaminergic neurons reveals molecules involved in their vulnerability and protection.

    Science.gov (United States)

    Chung, Chee Yeun; Seo, Hyemyung; Sonntag, Kai Christian; Brooks, Andrew; Lin, Ling; Isacson, Ole

    2005-07-01

    Molecular differences between dopamine (DA) neurons may explain why the mesostriatal DA neurons in the A9 region preferentially degenerate in Parkinson's disease (PD) and toxic models, whereas the adjacent A10 region mesolimbic and mesocortical DA neurons are relatively spared. To characterize innate physiological differences between A9 and A10 DA neurons, we determined gene expression profiles in these neurons in the adult mouse by laser capture microdissection, microarray analysis and real-time PCR. We found 42 genes relatively elevated in A9 DA neurons, whereas 61 genes were elevated in A10 DA neurons [> 2-fold; false discovery rate (FDR) neurotoxic or protective biochemical pathways. Three A9-elevated molecules [G-protein coupled inwardly rectifying K channel 2 (GIRK2), adenine nucleotide translocator 2 (ANT-2) and the growth factor IGF-1] and three A10-elevated peptides (GRP, CGRP and PACAP) were further examined in both alpha-synuclein overexpressing PC12 (PC12-alphaSyn) cells and rat primary ventral mesencephalic (VM) cultures exposed to MPP+ neurotoxicity. GIRK2-positive DA neurons were more vulnerable to MPP+ toxicity and overexpression of GIRK2 increased the vulnerability of PC12-alphaSyn cells to the toxin. Blocking of ANT decreased vulnerability to MPP+ in both cell culture systems. Exposing cells to IGF-1, GRP and PACAP decreased vulnerability of both cell types to MPP+, whereas CGRP protected PC12-alphaSyn cells but not primary VM DA neurons. These results indicate that certain differentially expressed molecules in A9 and A10 DA neurons may play key roles in their relative vulnerability to toxins and PD.

  8. VuWiki: An Ontology-Based Semantic Wiki for Vulnerability Assessments

    Science.gov (United States)

    Khazai, Bijan; Kunz-Plapp, Tina; Büscher, Christian; Wegner, Antje

    2014-05-01

    The concept of vulnerability, as well as its implementation in vulnerability assessments, is used in various disciplines and contexts ranging from disaster management and reduction to ecology, public health or climate change and adaptation, and a corresponding multitude of ideas about how to conceptualize and measure vulnerability exists. Three decades of research in vulnerability have generated a complex and growing body of knowledge that challenges newcomers, practitioners and even experienced researchers. To provide a structured representation of the knowledge field "vulnerability assessment", we have set up an ontology-based semantic wiki for reviewing and representing vulnerability assessments: VuWiki, www.vuwiki.org. Based on a survey of 55 vulnerability assessment studies, we first developed an ontology as an explicit reference system for describing vulnerability assessments. We developed the ontology in a theoretically controlled manner based on general systems theory and guided by principles for ontology development in the field of earth and environment (Raskin and Pan 2005). Four key questions form the first level "branches" or categories of the developed ontology: (1) Vulnerability of what? (2) Vulnerability to what? (3) What reference framework was used in the vulnerability assessment?, and (4) What methodological approach was used in the vulnerability assessment? These questions correspond to the basic, abstract structure of the knowledge domain of vulnerability assessments and have been deduced from theories and concepts of various disciplines. The ontology was then implemented in a semantic wiki which allows for the classification and annotation of vulnerability assessments. As a semantic wiki, VuWiki does not aim at "synthesizing" a holistic and overarching model of vulnerability. Instead, it provides both scientists and practitioners with a uniform ontology as a reference system and offers easy and structured access to the knowledge field of

  9. Ignorance, Vulnerability and the Occurrence of "Radical Surprises": Theoretical Reflections and Empirical Findings

    Science.gov (United States)

    Kuhlicke, C.

    2009-04-01

    By definition natural disasters always contain a moment of surprise. Their occurrence is mostly unforeseen and unexpected. They hit people unprepared, overwhelm them and expose their helplessness. Yet, there is surprisingly little known on the reasons for their being surprised. Aren't natural disasters expectable and foreseeable after all? Aren't the return rates of most hazards well known and shouldn't people be better prepared? The central question of this presentation is hence: Why do natural disasters so often radically surprise people at all (and how can we explain this being surprised)? In the first part of the presentation, it is argued that most approaches to vulnerability are not able to grasp this moment of surprise. On the contrary, they have their strength in unravelling the expectable: A person who is marginalized or even oppressed in everyday life is also vulnerable during times of crisis and stress, at least this is the central assumption of most vulnerability studies. In the second part, an understanding of vulnerability is developed, which allows taking into account such radical surprises. First, two forms of the unknown are differentiated: An area of the unknown an actor is more or less aware of (ignorance), and an area, which is not even known to be not known (nescience). The discovery of the latter is mostly associated with a "radical surprise", since it is per definition impossible to prepare for it. Second, a definition of vulnerability is proposed, which allows capturing the dynamics of surprises: People are vulnerable when they discover their nescience exceeding by definition previously established routines, stocks of knowledge and resources—in a general sense their capacities—to deal with their physical and/or social environment. This definition explicitly takes the view of different actors serious and departs from their being surprised. In the third part findings of a case study are presented, the 2002 flood in Germany. It is shown

  10. IL-34 and CSF-1 display an equivalent macrophage differentiation ability but a different polarization potential.

    Science.gov (United States)

    Boulakirba, Sonia; Pfeifer, Anja; Mhaidly, Rana; Obba, Sandrine; Goulard, Michael; Schmitt, Thomas; Chaintreuil, Paul; Calleja, Anne; Furstoss, Nathan; Orange, François; Lacas-Gervais, Sandra; Boyer, Laurent; Marchetti, Sandrine; Verhoeyen, Els; Luciano, Frederic; Robert, Guillaume; Auberger, Patrick; Jacquel, Arnaud

    2018-01-10

    CSF-1 and IL-34 share the CSF-1 receptor and no differences have been reported in the signaling pathways triggered by both ligands in human monocytes. IL-34 promotes the differentiation and survival of monocytes, macrophages and osteoclasts, as CSF-1 does. However, IL-34 binds other receptors, suggesting that differences exist in the effect of both cytokines. In the present study, we compared the differentiation and polarization abilities of human primary monocytes in response to CSF-1 or IL-34. CSF-1R engagement by one or the other ligands leads to AKT and caspase activation and autophagy induction through expression and activation of AMPK and ULK1. As no differences were detected on monocyte differentiation, we investigated the effect of CSF-1 and IL-34 on macrophage polarization into the M1 or M2 phenotype. We highlighted a striking increase in IL-10 and CCL17 secretion in M1 and M2 macrophages derived from IL-34 stimulated monocytes, respectively, compared to CSF-1 stimulated monocytes. Variations in the secretome induced by CSF-1 or IL-34 may account for their different ability to polarize naïve T cells into Th1 cells. In conclusion, our findings indicate that CSF-1 and IL-34 exhibit the same ability to induce human monocyte differentiation but may have a different ability to polarize macrophages.

  11. Display of adenoregulin with a novel Pichia pastoris cell surface display system.

    Science.gov (United States)

    Ren, Ren; Jiang, Zhengbing; Liu, Meiyun; Tao, Xinyi; Ma, Yushu; Wei, Dongzhi

    2007-02-01

    Two Pichia pastoris cell surface display vectors were constructed. The vectors consisted of the flocculation functional domain of Flo1p with its own secretion signal sequence or the alpha-factor secretion signal sequence, a polyhistidine (6xHis) tag for detection, an enterokinase recognition site, and the insertion sites for target proteins. Adenoregulin (ADR) is a 33-amino-acid antimicrobial peptide isolated from Phyllomedusa bicolor skin. The ADR was expressed and displayed on the Pichia pastoris KM71 cell surface with the system reported. The displayed recombinant ADR fusion protein was detected by fluorescence microscopy and confocal laser scanning microscopy (CLSM). The antimicrobial activity of the recombinant adenoregulin was detected after proteolytic cleavage of the fusion protein on cell surface. The validity of the Pichia pastoris cell surface display vectors was proved by the displayed ADR.

  12. Climate change & extreme weather vulnerability assessment framework.

    Science.gov (United States)

    2012-12-01

    The Federal Highway Administrations (FHWAs) Climate Change and Extreme Weather Vulnerability : Assessment Framework is a guide for transportation agencies interested in assessing their vulnerability : to climate change and extreme weather event...

  13. County Population Vulnerability

    Data.gov (United States)

    City and County of Durham, North Carolina — This layer summarizes the social vulnerability index for populations within each county in the United States at scales 1:3m and below. It answers the question...

  14. IL-34 and CSF-1 display an equivalent macrophage differentiation ability but a different polarization potential

    OpenAIRE

    Boulakirba, Sonia; Pfeifer, Anja; Mhaidly, Rana; Obba, Sandrine; Goulard, Michael; Schmitt, Thomas; Chaintreuil, Paul; Calleja, Anne; Furstoss, Nathan; Orange, François; Lacas-Gervais, Sandra; Boyer, Laurent; Marchetti, Sandrine; Verhoeyen, Els; Luciano, Frederic

    2018-01-01

    CSF-1 and IL-34 share the CSF-1 receptor and no differences have been reported in the signaling pathways triggered by both ligands in human monocytes. IL-34 promotes the differentiation and survival of monocytes, macrophages and osteoclasts, as CSF-1 does. However, IL-34 binds other receptors, suggesting that differences exist in the effect of both cytokines. In the present study, we compared the differentiation and polarization abilities of human primary monocytes in response to CSF-1 or IL-...

  15. The double tragedy of agriculture vulnerability to climate variability in Africa: How vulnerable is smallholder agriculture to rainfall variability in Ghana?

    Directory of Open Access Journals (Sweden)

    Emmanuel K. Derbile

    2016-04-01

    Full Text Available This article analysed vulnerability of smallholder agriculture to climate variability, particularly the alternating incidences of drought and heavy precipitation events in Ghana. Although there is an unmet need for understanding the linkages between climate change and livelihoods, the urgent need for climate change adaptation planning (CCAP in response to climate change makes vulnerability assessment even more compelling in development research. The data for analysis were collected from two complementary studies. These included a regional survey in the Upper West Region and an in-depth study in three selected communities in the Sissala East District. The results showed that smallholder agriculture is significantly vulnerable to climate variability in the region and that three layers of vulnerability can be identified in a ladder of vulnerability. Firstly, farmers are confronted with the double tragedy of droughts and heavy precipitation events, which adversely affect both crops and livestock. Secondly, farmers have to decide on crops for adaptation, but each option – whether indigenous crops, new early-maturing crops or genetically modified crops – predisposes farmers to a different set of risks. Finally, the overall impact is a higher-level vulnerability, namely the risk of total livelihood failure and food insecurity. The article recommended CCAP and an endogenous development (ED approach to addressing agriculture vulnerability to climate variability within the framework of decentralisation and local governance in Ghana. Keywords: Climate variability; agriculture; vulnerability; endogenous development; Ghana

  16. Windows Server 2012 vulnerabilities and security

    Directory of Open Access Journals (Sweden)

    Gabriel R. López

    2015-09-01

    Full Text Available This investigation analyses the history of the vulnerabilities of the base system Windows Server 2012 highlighting the most critic vulnerabilities given every 4 months since its creation until the current date of the research. It was organized by the type of vulnerabilities based on the classification of the NIST. Next, given the official vulnerabilities of the system, the authors show how a critical vulnerability is treated by Microsoft in order to countermeasure the security flaw. Then, the authors present the recommended security approaches for Windows Server 2012, which focus on the baseline software given by Microsoft, update, patch and change management, hardening practices and the application of Active Directory Rights Management Services (AD RMS. AD RMS is considered as an important feature since it is able to protect the system even though it is compromised using access lists at a document level. Finally, the investigation of the state of the art related to the security of Windows Server 2012 shows an analysis of solutions given by third parties vendors, which offer security products to secure the base system objective of this study. The recommended solution given by the authors present the security vendor Symantec with its successful features and also characteristics that the authors considered that may have to be improved in future versions of the security solution.

  17. Integrated flash flood vulnerability assessment: Insights from East Attica, Greece

    Science.gov (United States)

    Karagiorgos, Konstantinos; Thaler, Thomas; Heiser, Micha; Hübl, Johannes; Fuchs, Sven

    2016-10-01

    In the framework of flood risk assessment, vulnerability is a key concept to assess the susceptibility of elements at risk. Besides the increasing amount of studies on flash floods available, in-depth information on vulnerability in Mediterranean countries was missing so far. Moreover, current approaches in vulnerability research are driven by a divide between social scientists who tend to view vulnerability as representing a set of socio-economic factors, and natural scientists who view vulnerability in terms of the degree of loss to an element at risk. Further, vulnerability studies in response to flash flood processes are rarely answered in the literature. In order to close this gap, this paper implemented an integrated vulnerability approach focusing on residential buildings exposed to flash floods in Greece. In general, both physical and social vulnerability was comparable low, which is interpreted as a result from (a) specific building regulations in Greece as well as general design principles leading to less structural susceptibility of elements at risk exposed, and (b) relatively low economic losses leading to less social vulnerability of citizens exposed. The population show high risk awareness and coping capacity to response to natural hazards event and in the same time the impact of the events are quite low, because of the already high use of local protection measures. The low vulnerability score for East Attica can be attributed especially to the low physical vulnerability and the moderate socio-economic well-being of the area. The consequence is to focus risk management strategies mainly in the reduction of the social vulnerability. By analysing both physical and social vulnerability an attempt was made to bridge the gap between scholars from sciences and humanities, and to integrate the results of the analysis into the broader vulnerability context.

  18. Flat panel display - Impurity doping technology for flat panel displays

    Energy Technology Data Exchange (ETDEWEB)

    Suzuki, Toshiharu [Advanced Technology Planning, Sumitomo Eaton Nova Corporation, SBS Tower 9F, 10-1, Yoga 4-chome, Setagaya-ku, 158-0097 Tokyo (Japan)]. E-mail: suzuki_tsh@senova.co.jp

    2005-08-01

    Features of the flat panel displays (FPDs) such as liquid crystal display (LCD) and organic light emitting diode (OLED) display, etc. using low temperature poly-Si (LTPS) thin film transistors (TFTs) are briefly reviewed comparing with other FPDs. The requirements for fabricating TFTs used for high performance FPDs and system on glass (SoG) are addressed. This paper focuses on the impurity doping technology, which is one of the key technologies together with crystallization by laser annealing, formation of high quality gate insulator and gate-insulator/poly-Si interface. The issues to be solved in impurity doping technology for state of the art and future TFTs are clarified.

  19. Flat panel display - Impurity doping technology for flat panel displays

    International Nuclear Information System (INIS)

    Suzuki, Toshiharu

    2005-01-01

    Features of the flat panel displays (FPDs) such as liquid crystal display (LCD) and organic light emitting diode (OLED) display, etc. using low temperature poly-Si (LTPS) thin film transistors (TFTs) are briefly reviewed comparing with other FPDs. The requirements for fabricating TFTs used for high performance FPDs and system on glass (SoG) are addressed. This paper focuses on the impurity doping technology, which is one of the key technologies together with crystallization by laser annealing, formation of high quality gate insulator and gate-insulator/poly-Si interface. The issues to be solved in impurity doping technology for state of the art and future TFTs are clarified

  20. Handbook of Visual Display Technology

    CERN Document Server

    Cranton, Wayne; Fihn, Mark

    2012-01-01

    The Handbook of Visual Display Technology is a unique work offering a comprehensive description of the science, technology, economic and human interface factors associated with the displays industry. An invaluable compilation of information, the Handbook will serve as a single reference source with expert contributions from over 150 international display professionals and academic researchers. All classes of display device are covered including LCDs, reflective displays, flexible solutions and emissive devices such as OLEDs and plasma displays, with discussion of established principles, emergent technologies, and particular areas of application. The wide-ranging content also encompasses the fundamental science of light and vision, image manipulation, core materials and processing techniques, display driving and metrology.

  1. Polymer Dispersed Liquid Crystal Displays

    Science.gov (United States)

    Doane, J. William

    The following sections are included: * INTRODUCTION AND HISTORICAL DEVELOPMENT * PDLC MATERIALS PREPARATION * Polymerization induced phase separation (PIPS) * Thermally induced phase separation (TIPS) * Solvent induced phase separation (SIPS) * Encapsulation (NCAP) * RESPONSE VOLTAGE * Dielectric and resistive effects * Radial configuration * Bipolar configuration * Other director configurations * RESPONSE TIME * DISPLAY CONTRAST * Light scattering and index matching * Incorporation of dyes * Contrast measurements * PDLC DISPLAY DEVICES AND INNOVATIONS * Reflective direct view displays * Large-scale, flexible displays * Switchable windows * Projection displays * High definition spatial light modulator * Haze-free PDLC shutters: wide angle view displays * ENVIRONMENTAL STABILITY * ACKNOWLEDGEMENTS * REFERENCES

  2. Information rich display design

    International Nuclear Information System (INIS)

    Welch, Robin; Braseth, Alf Ove; Veland, Oeystein

    2004-01-01

    This paper presents the concept Information Rich Displays. The purpose of Information Rich Displays (IRDs) is to condensate prevailing information in process displays in such a way that each display format (picture) contains more relevant information for the user. Compared to traditional process control displays, this new concept allows the operator to attain key information at a glance and at the same time allows for improved monitoring of larger portions of the process. This again allows for reduced navigation between both process and trend displays and ease the cognitive demand on the operator. This concept has been created while working on designing display prototypes for the offshore petroleum production facilities of tomorrow. Offshore installations basically consist of wells, separation trains (where oil, gas and water are separated from each other), an oil tax measurement system (where oil quality is measured and the pressure increased to allow for export), gas compression (compression of gas for export) and utility systems (water treatment, chemical systems etc.). This means that an offshore control room operator has to deal with a complex process that comprises several functionally different systems. The need for a new approach to offshore display format design is in particular based on shortcomings in today's designs related to the keyhole effect, where the display format only reveals a fraction of the whole process. Furthermore, the upcoming introduction of larger off- and on-shore operation centres will increase the size and complexity of the operators' work domain. In the light of the increased demands on the operator, the proposed IRDs aim to counter the negative effects this may have on the workload. In this work we have attempted to classify the wide range of different roles an operator can have in different situations. The information content and amount being presented to the operator in a display should be viewed in context of the roles the

  3. Perspectives on contextual vulnerability in discourses of climate conflict

    Science.gov (United States)

    Okpara, U. T.; Stringer, L. C.; Dougill, A. J.

    2016-02-01

    The science of climate security and conflict is replete with controversies. Yet the increasing vulnerability of politically fragile countries to the security consequences of climate change is widely acknowledged. Although climate conflict reflects a continuum of conditional forces that coalesce around the notion of vulnerability, how different portrayals of vulnerability influence the discursive formation of climate conflict relations remains an exceptional but under-researched issue. This paper combines a systematic discourse analysis with a vulnerability interpretation diagnostic tool to explore (i) how discourses of climate conflict are constructed and represented, (ii) how vulnerability is communicated across discourse lines, and (iii) the strength of contextual vulnerability against a deterministic narrative of scarcity-induced conflict, such as that pertaining to land. Systematically characterising climate conflict discourses based on the central issues constructed, assumptions about mechanistic relationships, implicit normative judgements and vulnerability portrayals, provides a useful way of understanding where discourses differ. While discourses show a wide range of opinions "for" and "against" climate conflict relations, engagement with vulnerability has been less pronounced - except for the dominant context centrism discourse concerned about human security (particularly in Africa). In exploring this discourse, we observe an increasing sense of contextual vulnerability that is oriented towards a concern for complexity rather than predictability. The article concludes by illustrating that a turn towards contextual vulnerability thinking will help advance a constructivist theory-informed climate conflict scholarship that recognises historicity, specificity, and variability as crucial elements of contextual totalities of any area affected by climate conflict.

  4. Narrative self-constitution and vulnerability to co-authoring.

    Science.gov (United States)

    McConnell, Doug

    2016-02-01

    All people are vulnerable to having their self-concepts shaped by others. This article investigates that vulnerability using a theory of narrative self-constitution. According to narrative self-constitution, people depend on others to develop and maintain skills of self-narration and they are vulnerable to having the content of their self-narratives co-authored by others. This theoretical framework highlights how vulnerability to co-authoring is essential to developing a self-narrative and, thus, the possibility of autonomy. However, this vulnerability equally entails that co-authors can undermine autonomy by contributing disvalued content to the agent's self-narrative and undermining her authorial skills. I illustrate these processes with the first-hand reports of several women who survived sexual abuse as children. Their narratives of survival and healing reveal the challenges involved in (re)developing the skills required to manage vulnerability to co-authoring and how others can help in this process. Finally, I discuss some of the implications of co-authoring for the healthcare professional and the therapeutic relationship.

  5. Blown by the wind: the ecology of male courtship display behavior in orchid bees.

    Science.gov (United States)

    Pokorny, Tamara; Vogler, Ira; Losch, René; Schlütting, Patrick; Juarez, Pedro; Bissantz, Nicolai; Ramírez, Santiago R; Eltz, Thomas

    2017-04-01

    Many insects rely on chemical signals to transmit precise information on the location, identity, and quality of potential mates. Chemical signals are often broadcasted at sites with physical properties that maximize signal propagation and signal transmission. Male neotropical orchid bees (Euglossini) perch and display on vertical branches and tree trunks in the forest to expose volatile blends (perfumes) that they previously collected from their environment. Previous studies have shown that the chemical composition of perfume blends is highly differentiated even between closely related species. However, variation in behavioral components of perfume exposure and male display remain poorly understood. We conducted a four-year study on orchid bee display sites (8 species) in pacific Costa Rica, using field observations along with chemical analysis and cage experiments to assess display niche partitioning among sympatric species. We evaluated the influence of physical factors (terrain, wind, light) on the distribution of perch sites and on display behavior, and tested a prediction of the sex pheromone-analogue hypothesis, i.e., that displaying males have above-average quantities or qualities of acquired perfumes. Males of different species displayed in the same general area and sometimes in close proximity to each other, but partitioned the display niche by selecting different perch diameters, display heights, and by displaying at different times of the day. Most perch sites were located inside the forest on elevated ground, especially along ridges, where stronger winds may help disperse perfume signals. Furthermore, the angular position of displaying males on perches was narrowly determined by wind direction, with males being positioned on the downwind side of the perch, where they would be most conspicuous to conspecifics approaching on an odor trail. Although our results generally support the hypothesis that perfumes serve as pheromone analogues, we did not find

  6. Modeling groundwater vulnerability to pollution using Optimized DRASTIC model

    International Nuclear Information System (INIS)

    Mogaji, Kehinde Anthony; Lim, Hwee San; Abdullar, Khiruddin

    2014-01-01

    The prediction accuracy of the conventional DRASTIC model (CDM) algorithm for groundwater vulnerability assessment is severely limited by the inherent subjectivity and uncertainty in the integration of data obtained from various sources. This study attempts to overcome these problems by exploring the potential of the analytic hierarchy process (AHP) technique as a decision support model to optimize the CDM algorithm. The AHP technique was utilized to compute the normalized weights for the seven parameters of the CDM to generate an optimized DRASTIC model (ODM) algorithm. The DRASTIC parameters integrated with the ODM algorithm predicted which among the study areas is more likely to become contaminated as a result of activities at or near the land surface potential. Five vulnerability zones, namely: no vulnerable(NV), very low vulnerable (VLV), low vulnerable (LV), moderate vulnerable (MV) and high vulnerable (HV) were identified based on the vulnerability index values estimated with the ODM algorithm. Results show that more than 50% of the area belongs to both moderate and high vulnerable zones on the account of the spatial analysis of the produced ODM-based groundwater vulnerability prediction map (GVPM).The prediction accuracy of the ODM-based – GVPM with the groundwater pH and manganese (Mn) concentrations established correlation factors (CRs) result of 90 % and 86 % compared to the CRs result of 62 % and 50 % obtained for the validation accuracy of the CDM – based GVPM. The comparative results, indicated that the ODM-based produced GVPM is more reliable than the CDM – based produced GVPM in the study area. The study established the efficacy of AHP as a spatial decision support technique in enhancing environmental decision making with particular reference to future groundwater vulnerability assessment

  7. A knowledge integration approach to flood vulnerability

    Science.gov (United States)

    Mazzorana, Bruno; Fuchs, Sven

    2014-05-01

    Understanding, qualifying and quantifying vulnerability is an essential need for implementing effective and efficient flood risk mitigation strategies; in particular if possible synergies between different mitigation alternatives, such as active and passive measures, should be achieved. In order to combine different risk management options it is necessary to take an interdisciplinary approach to vulnerability reduction, and as a result the affected society may be willing to accept a certain degree of self-responsibility. However, due to differing mono-disciplinary approaches and regional foci undertaken until now, different aspects of vulnerability to natural hazards in general and to floods in particular remain uncovered and as a result the developed management options remain sub-optimal. Taking an even more fundamental viewpoint, the empirical vulnerability functions used in risk assessment specifically fail to capture physical principles of the damage-generating mechanisms to the build environment. The aim of this paper is to partially close this gap by discussing a balanced knowledge integration approach which can be used to resolve the multidisciplinary disorder in flood vulnerability research. Modelling techniques such as mathematical-physical modelling of the flood hazard impact to and response from the building envelope affected, and formative scenario analyses of possible consequences in terms of damage and loss are used in synergy to provide an enhanced understanding of vulnerability and to render the derived knowledge into interdisciplinary mitigation strategies. The outlined formal procedure allows for a convincing knowledge alignment of quantified, but partial, information about vulnerability as a result of the application of physical and engineering notions and valuable, but often underspecified, qualitative argumentation strings emerging from the adopted socio-economic viewpoint.

  8. Coastal vulnerability: climate change and natural hazards perspectives

    Science.gov (United States)

    Romieu, E.; Vinchon, C.

    2009-04-01

    Introduction Studying coastal zones as a territorial concept (Integrated coastal zone management) is an essential issue for managers, as they have to consider many different topics (natural hazards, resources management, tourism, climate change…). The recent approach in terms of "coastal vulnerability" studies (since the 90's) is the main tool used nowadays to help them in evaluating impacts of natural hazards on coastal zones, specially considering climate change. This present communication aims to highlight the difficulties in integrating this concept in risk analysis as it is usually practiced in natural hazards sciences. 1) Coastal vulnerability as a recent issue The concept of coastal vulnerability mainly appears in the International panel on climate change works of 1992 (IPCC. 2001), where it is presented as essential for climate change adaptation. The concept has been defined by a common methodology which proposes the assessment of seven indicators, in regards to a sea level rise of 1m in 2100: people affected, people at risk, capital value at loss, land at loss, wetland at loss, potential adaptation costs, people at risk assuming this adaptation. Many national assessments have been implemented (Nicholls, et al. 1995) and a global assessment was proposed for three indicators (Nicholls, et al. 1999). The DINAS-Coast project reuses this methodology to produce the DIVA-tool for coastal managers (Vafeidis, et al. 2004). Besides, many other methodologies for national or regional coastal vulnerability assessments have been developed (review by (UNFCCC. 2008). The use of aggregated vulnerability indicators (including geomorphology, hydrodynamics, climate change…) is widespread: the USGS coastal vulnerability index is used worldwide and was completed by a social vulnerability index (Boruff, et al. 2005). Those index-based methods propose a vulnerability mapping which visualise indicators of erosion, submersion and/or socio economic sensibility in coastal zones

  9. Social vulnerability to climate-induced natural disasters

    DEFF Research Database (Denmark)

    Rubin, Olivier

    2014-01-01

    This paper conducts an analysis of the socioeconomic determinants of Vietnam's cross-provincial variations in natural disaster vulnerability. The purpose is twofold: (i) to capture disaggregated vulnerability variations normally obscured by national statistics, thereby providing more nuanced...... insights into Vietnam's vulnerability to natural disasters; and (ii) to take advantage of the fact that the overall political system and key institutional structures to a large extent are constant across Vietnam's provinces, which makes the analysis a novel addition to the many disaster studies based...

  10. Assessing European wild fire vulnerability

    Science.gov (United States)

    Oehler, F.; Oliveira, S.; Barredo, J. I.; Camia, A.; Ayanz, J. San Miguel; Pettenella, D.; Mavsar, R.

    2012-04-01

    Wild fire vulnerability is a measure of potential socio-economic damage caused by a fire in a specific area. As such it is an important component of long-term fire risk management, helping policy-makers take informed decisions about adequate expenditures for fire prevention and suppression, and to target those regions at highest risk. This paper presents a first approach to assess wild fire vulnerability at the European level. A conservative approach was chosen that assesses the cost of restoring the previous land cover after a potential fire. Based on the CORINE Land Cover, a restoration cost was established for each land cover class at country level, and an average restoration time was assigned according to the recovery capacity of the land cover. The damage caused by fire was then assessed by discounting the cost of restoring the previous land cover over the restoration period. Three different vulnerability scenarios were considered assuming low, medium and high fire severity causing different levels of damage. Over Europe, the potential damage of wild land fires ranges from 10 - 13, 732 Euro*ha-1*yr-1 for low fire severity, 32 - 45,772 Euro*ha-1*yr-1 for medium fire severity and 54 - 77,812 Euro*ha-1*yr-1 for high fire severity. The least vulnerable are natural grasslands, moors and heathland and sclerophyllous vegetation, while the highest cost occurs for restoring broad-leaved forest. Preliminary validation comparing these estimates with official damage assessments for past fires shows reasonable results. The restoration cost approach allows for a straightforward, data extensive assessment of fire vulnerability at European level. A disadvantage is the inherent simplification of the evaluation procedure with the underestimation of non-markets goods and services. Thus, a second approach has been developed, valuing individual wild land goods and services and assessing their annual flow which is lost for a certain period of time in case of a fire event. However

  11. Vulnerability Assessments in Ethical Hacking

    OpenAIRE

    Ashiqur Rahman ,; Md. SarwarAlam Rasel; Asaduzzaman Noman; Shakh Md. Alimuzjaman Alim

    2016-01-01

    Ethical hackers use the same methods and techniques to test and bypass a system's defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found, they document them and provide actionable advice on how to fix them so the organization can improve its overall security. The purpose of ethical hacking is to evaluate the security of a network or system's infrastructure. It entails finding and attempting to exploit any vulnerabilities to de...

  12. Software Design Level Security Vulnerabilities

    OpenAIRE

    S. Rehman; K. Mustafa

    2011-01-01

    Several thousand software design vulnerabilities have been reported through established databases. But they need to be structured and classified to be optimally usable in the pursuit of minimal and effective mitigation mechanism. In order we developed a criterion set for a communicative description of the same to serve the purpose as a taxonomic description of security vulnerabilities, arising in the design phase of Software development lifecycle. This description is a part of an effort to id...

  13. AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid

    Directory of Open Access Journals (Sweden)

    Jongbin Ko

    2014-01-01

    Full Text Available A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification.

  14. AVQS: attack route-based vulnerability quantification scheme for smart grid.

    Science.gov (United States)

    Ko, Jongbin; Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik

    2014-01-01

    A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification.

  15. New approach to analyzing vulnerability

    International Nuclear Information System (INIS)

    O'Callaghan, P.B.; Carlson, R.L.; Riedeman, G.W.

    1986-01-01

    The Westinghouse Hanford Company (WHC) has recently completed construction of the Fuel Cycle Plant (FCP) at Richland, Washington. At start-up the facility will fabricate driver fuel for the Fast Flux Test Facility in the Secure Automated Fabrication line. After construction completion, but before facility certification, the Department of Energy (DOE) Richland Operation Office requested that a vulnerability analysis be performed which assumed multiple insiders as a threat to the security system. A unique method of analyzing facility vulnerabilities was developed at the Security Applications Center (SAC), which is managed by WHC for DOE. The method that was developed verifies a previous vulnerability assessment, as well as introducing a modeling technique which analyzes security alarms in relation to delaying factors and possible insider activities. With this information it is possible to assess the relative strength or weakness of various possible routes to and from a target within a facility

  16. Climate change: are we all vulnerable?: Reconsidering inequalities

    International Nuclear Information System (INIS)

    Magnan, Alexandre

    2013-01-01

    This bibliographical note presents a book in which the author reviews two generally accepted ideas: first, the poorest communities would be the most vulnerable to climate change due to their weak adaptation capacities, and second, such an adaptation would only be an issue of projection on a long term. Based on his works on coastal areas and on his experience on issues of vulnerability and adaptation to climate change he shows that all societies are potentially vulnerable. He uses the notion of 'impact chains', introduces three global parameters for these chains (temperatures, sea level, and precipitation regime), and outlines the always increasing complexity of causes-consequences relationships. He discusses two key concepts: vulnerability as the degree at which a system might be affected by climate changes, and the adaptation capacity which is developed by societies to reduce their vulnerability to environmental changes

  17. Susceptibility to mountain hazards in Austria - paradigms of vulnerability revisited

    Science.gov (United States)

    Fuchs, Sven

    2010-05-01

    The concept of vulnerability is pillared by multiple disciplinary theories underpinning either a technical or a social origin of the concept and resulting in a range of paradigms for either a qualitative or quantitative assessment of vulnerability. However, efforts to reduce susceptibility to hazards and to create disaster-resilient communities require intersections among these theories, since human activity cannot be seen independently from the environmental setting. Acknowledging different roots of disciplinary paradigms, issues determining structural, economic, institutional and social vulnerability are discussed with respect to mountain hazards in Austria. The underlying idea of taking such an integrative viewpoint was the cognition that human action in mountain environments affects the state of vulnerability, and the state of vulnerability in turn shapes the possibilities of human action. It is argued that structural vulnerability as originator results in considerable economic vulnerability, generated by the institutional settings of dealing with natural hazards and shaped by the overall societal framework. Hence, the vulnerability of a specific location and within a considered point of time is triggered by the hazardous event and the related physical susceptibility of structures, such as buildings located on a torrent fan. Depending on the specific institutional settings, economic vulnerability of individuals or of the society results, above all with respect to imperfect loss compensation mechanisms in the areas under investigation. While this potential for harm can be addressed as social vulnerability, the concept of institutional vulnerability has been developed with respect to the overall political settings of governmental risk management. As a result, the concept of vulnerability, as being used in natural sciences, can be extended by integration of possible reasons why such physical susceptibility of structures exists, and by integration of compensation

  18. Identification of vulnerability within a child and family health service.

    Science.gov (United States)

    Kimla, Katarina; Nathanson, Dania; Woolfenden, Susan; Zwi, Karen

    2017-11-21

    Objective The aims of the present study were to describe the prevalence of vulnerability in a cohort of newborns, identify the factors that increase the risk of vulnerability and examine whether those who are most vulnerable are receiving home visits. Methods A prospective cross-sectional study was performed using data collected from questionnaires completed by child and family health nurses and obstetric discharge summaries for each mother-baby dyad. Descriptive frequencies and percentages are used to describe the proportions of children who were vulnerable, offered services and had risk factors for vulnerability. Categorical data were compared using Pearson's Chi-squared analysis. Results In all, 1517 newborns were included in the present study. Of these, 40.5% were identified as vulnerable and 13.9% had two or more risk factors for vulnerability (95% confidence interval (CI) 12-16%). The most common risk factors were biological. Across all newborns, 33.7% were visited at home, and 74.6% of vulnerable newborns were offered a home visit. Children identified as vulnerable were more likely to have a home visit than those who were not (z for 95% CI=1.96; Pvulnerability allowed the offer of home visiting to be directed towards those most likely to benefit. What is known about the topic? Of the Australian child population, 10-20% are vulnerable to adverse health, developmental and wellbeing outcomes. Vulnerable infants are at a greater risk of becoming vulnerable children, adolescents and adults over the life course. Biological and psychosocial risk factors for vulnerability are well described. Families with the greatest need are often the least likely to access or receive support, and have lower utilisation of preventative health services despite evidence that support in the first few years of life can significantly improve long-term outcomes. What does this paper add? This paper provides a detailed description of vulnerabilities in a cohort of newborns and

  19. A socioeconomic profile of vulnerable land to desertification in Italy.

    Science.gov (United States)

    Salvati, Luca

    2014-01-01

    Climate changes, soil vulnerability, loss in biodiversity, and growing human pressure are threatening Mediterranean-type ecosystems which are increasingly considered as a desertification hotspot. In this region, land vulnerability to desertification strongly depends on the interplay between natural and anthropogenic factors. The present study proposes a multivariate exploratory analysis of the relationship between the spatial distribution of land vulnerability to desertification and the socioeconomic contexts found in three geographical divisions of Italy (north, center and south) based on statistical indicators. A total of 111 indicators describing different themes (demography, human settlements, labor market and human capital, rural development, income and wealth) were used to discriminate vulnerable from non-vulnerable areas. The resulting socioeconomic profile of vulnerable areas in northern and southern Italy diverged significantly, the importance of demographic and economic indicators being higher in southern Italy than in northern Italy. On the contrary, human settlement indicators were found more important to discriminate vulnerable and non-vulnerable areas in northern Italy, suggesting a role for peri-urbanization in shaping the future vulnerable areas. An in-depth knowledge of the socioeconomic characteristics of vulnerable land may contribute to scenarios' modeling and the development of more effective policies to combat desertification. © 2013 Elsevier B.V. All rights reserved.

  20. Display of nuclear medicine imaging studies

    International Nuclear Information System (INIS)

    Singh, B.; Kataria, S.K.; Samuel, A.M.

    2002-08-01

    Nuclear medicine imaging studies involve evaluation of a large amount of image data. Digital signal processing techniques have introduced processing algorithms that increase the information content of the display. Nuclear medicine imaging studies require interactive selection of suitable form of display and pre-display processing. Static imaging study requires pre-display processing to detect focal defects. Point operations (histogram modification) along with zoom and capability to display more than one image in one screen is essential. This album mode of display is also applicable to dynamic, MUGA and SPECT data. Isometric display or 3-D graph of the image data is helpful in some cases e.g. point spread function, flood field data. Cine display is used on a sequence of images e.g. dynamic, MUGA and SPECT imaging studies -to assess the spatial movement of tracer with time. Following methods are used at the investigator's discretion for inspection of the 3-D object. 1) Display of orthogonal projections, 2) Display of album of user selected coronal/ sagital/ transverse orthogonal slices, 3) Display of three orthogonal slices through user selected point, 4) Display of a set of orthogonal slices generated in the user-selected volume, 5) Generation and display of 3-D shaded surface. 6) Generation of volume data and display along with the 3-D shaded surface, 7) Side by side display orthogonal slices of two 3-D objects. Displaying a set of two-dimensional slices of a 3-D reconstructed object through shows all the defects but lacks the 3-D perspective. Display of shaded surface lacks the ability to show the embedded defects. Volume display -combining the 3-D surface and gray level volume data is perhaps the best form of display. This report describes these forms of display along with the theory. (author)

  1. Climate change vulnerability assessment in Georgia

    Science.gov (United States)

    Binita KC; J. Marshall Shepherd; Cassandra Johnson Gaither

    2015-01-01

    Climate change is occurring in the Southeastern United States, and one manifestation is changes in frequency and intensity of extreme events. A vulnerability assessment is performed in the state of Georgia (United States) at the county level from 1975 to 2012 in decadal increments. Climate change vulnerability is typically measured as a function of exposure to physical...

  2. Predicting Vulnerability Risks Using Software Characteristics

    Science.gov (United States)

    Roumani, Yaman

    2012-01-01

    Software vulnerabilities have been regarded as one of the key reasons for computer security breaches that have resulted in billions of dollars in losses per year (Telang and Wattal 2005). With the growth of the software industry and the Internet, the number of vulnerability attacks and the ease with which an attack can be made have increased. From…

  3. Mental vulnerability--a risk factor for ischemic heart disease

    DEFF Research Database (Denmark)

    Eplov, Lene Falgaard; Jørgensen, Torben; Birket-Smith, Morten

    2006-01-01

    OBJECTIVE: The purpose of this study is to examine whether mental vulnerability is a risk factor for the development of ischemic heart disease (IHD) after adjustment for well-established risk factors. METHODS: In three prospective cohort studies in Copenhagen County, Denmark, we recorded the level...... of mental vulnerability and possible risk factors to IHD at baseline. For follow-up, the sample was linked to relevant registries to identify all cases of fatal and nonfatal IHD. The relationship between mental vulnerability and IHD was examined using both Kaplan-Meir and Cox proportional hazard models...... adjusting for possible confounding factors. RESULTS: Mental vulnerability was significantly associated with the risk for IHD (medium mental vulnerability: hazard ratio 1.41, 95% confidence interval 1.04-1.91; and high mental vulnerability: hazard ratio 2.05; 95% confidence interval 1.46-2.88), after...

  4. Partial differential equations & boundary value problems with Maple

    CERN Document Server

    Articolo, George A

    2009-01-01

    Partial Differential Equations and Boundary Value Problems with Maple presents all of the material normally covered in a standard course on partial differential equations, while focusing on the natural union between this material and the powerful computational software, Maple. The Maple commands are so intuitive and easy to learn, students can learn what they need to know about the software in a matter of hours- an investment that provides substantial returns. Maple''s animation capabilities allow students and practitioners to see real-time displays of the solutions of partial differential equations.  Maple files can be found on the books website. Ancillary list: Maple files- http://www.elsevierdirect.com/companion.jsp?ISBN=9780123747327  Provides a quick overview of the software w/simple commands needed to get startedIncludes review material on linear algebra and Ordinary Differential equations, and their contribution in solving partial differential equationsIncorporates an early introduction to Sturm-L...

  5. Neonicotinoids target distinct nicotinic acetylcholine receptors and neurons, leading to differential risks to bumblebees

    Science.gov (United States)

    Moffat, Christopher; Buckland, Stephen T.; Samson, Andrew J.; McArthur, Robin; Chamosa Pino, Victor; Bollan, Karen A.; Huang, Jeffrey T.-J.; Connolly, Christopher N.

    2016-04-01

    There is growing concern over the risk to bee populations from neonicotinoid insecticides and the long-term consequences of reduced numbers of insect pollinators to essential ecosystem services and food security. Our knowledge of the risk of neonicotinoids to bees is based on studies of imidacloprid and thiamethoxam and these findings are extrapolated to clothianidin based on its higher potency at nicotinic acetylcholine receptors. This study addresses the specificity and consequences of all three neonicotinoids to determine their relative risk to bumblebees at field-relevant levels (2.5 ppb). We find compound-specific effects at all levels (individual cells, bees and whole colonies in semi-field conditions). Imidacloprid and clothianidin display distinct, overlapping, abilities to stimulate Kenyon cells, indicating the potential to differentially influence bumblebee behavior. Bee immobility was induced only by imidacloprid, and an increased vulnerability to clothianidin toxicity only occurred following chronic exposure to clothianidin or thiamethoxam. At the whole colony level, only thiamethoxam altered the sex ratio (more males present) and only clothianidin increased queen production. Finally, both imidacloprid and thiamethoxam caused deficits in colony strength, while no detrimental effects of clothianidin were observed. Given these findings, neonicotinoid risk needs to be considered independently for each compound and target species.

  6. Display technologies for augmented reality

    Science.gov (United States)

    Lee, Byoungho; Lee, Seungjae; Jang, Changwon; Hong, Jong-Young; Li, Gang

    2018-02-01

    With the virtue of rapid progress in optics, sensors, and computer science, we are witnessing that commercial products or prototypes for augmented reality (AR) are penetrating into the consumer markets. AR is spotlighted as expected to provide much more immersive and realistic experience than ordinary displays. However, there are several barriers to be overcome for successful commercialization of AR. Here, we explore challenging and important topics for AR such as image combiners, enhancement of display performance, and focus cue reproduction. Image combiners are essential to integrate virtual images with real-world. Display performance (e.g. field of view and resolution) is important for more immersive experience and focus cue reproduction may mitigate visual fatigue caused by vergence-accommodation conflict. We also demonstrate emerging technologies to overcome these issues: index-matched anisotropic crystal lens (IMACL), retinal projection displays, and 3D display with focus cues. For image combiners, a novel optical element called IMACL provides relatively wide field of view. Retinal projection displays may enhance field of view and resolution of AR displays. Focus cues could be reconstructed via multi-layer displays and holographic displays. Experimental results of our prototypes are explained.

  7. Rockfall vulnerability assessment for reinforced concrete buildings

    Science.gov (United States)

    Mavrouli, O.; Corominas, J.

    2010-10-01

    The vulnerability of buildings to the impact of rockfalls is a topic that has recently attracted increasing attention in the scientific literature. The quantification of the vulnerability, when based on empirical or heuristic approaches requires data recorded from historical rockfalls, which are not always available. This is the reason why appropriate alternatives are required. The use of analytical and numerical models can be one of them. In this paper, a methodology is proposed for the analytical evaluation of the vulnerability of reinforced concrete buildings. The vulnerability is included in the risk equation by incorporating the uncertainty of the impact location of the rock block and the subsequent damage level. The output is a weighted vulnerability that ranges from 0 to 1 and expresses the potential damage that a rock block causes to a building in function of its velocity and size. The vulnerability is calculated by the sum of the products of the probability of block impact on each element of the building and its associated damage state, the latter expressed in relative recovery cost terms. The probability of exceeding a specific damage state such as non-structural, local, partial, extensive or total collapse is also important for the quantification of risk and to this purpose, several sets of fragility curves for various rock diameters and increasing velocities have been prepared. An example is shown for the case of a simple reinforced concrete building and impact energies from 0 to 4075 kJ.

  8. Aircraft vulnerability analysis by modelling and simulation

    CSIR Research Space (South Africa)

    Willers, CJ

    2014-09-01

    Full Text Available attributable to misuse of the weapon or to missile performance restrictions. This paper analyses some of the factors affecting aircraft vulnerability and demonstrates a structured analysis of the risk and aircraft vulnerability problem. The aircraft...

  9. Helping air quality managers identify vulnerable communities

    CSIR Research Space (South Africa)

    Wright, C

    2008-10-01

    Full Text Available population exposure and vulnerability risk prioritisation model is proposed for potential use by air quality managers in conjunction with their air quality management plans. The model includes factors such as vulnerability caused by poverty, respiratory...

  10. Vulnerabilities in snakebites in Sao Paulo, Brazil

    Directory of Open Access Journals (Sweden)

    Maria Rita Bertolozzi

    2015-01-01

    Full Text Available ABSTRACTOBJECTIVE To describe elements of vulnerability of victims of snakebite.METHODS This qualitative, descriptive, cross-sectional study had, as theoretical framework, the concept of vulnerability in individual, social, and programmatic dimensions. We interviewed 21 patients admitted into a hospital specialized in the care of accidents caused by venomous animals. The interviews were analyzed according to a discourse analysis technique.RESULTS Patients were mainly young men, living in remote countryside areas, where health services frequently have limited resources. We found social and individual conditions of vulnerability, such as precarious schooling, low professional qualification, housing without access to piped water, no sewage treated, and no regular garbage collection, and lack of knowledge on this health problem. Regarding the programmatic dimension, we found limited accessibility to the health services that could affect the prognosis and the frequency of sequelae and deaths.CONCLUSIONS Considering such vulnerabilities evoke the need to improve the program for control the Accidents by Venomous Animals and the training of health workers, we highlight the potential use of the concept of vulnerability, which may amplify the understanding and the recommendations for the practice and education related to snakebites.

  11. Assessing the social vulnerability to malaria in Rwanda.

    Science.gov (United States)

    Bizimana, Jean-Pierre; Twarabamenye, Emmanuel; Kienberger, Stefan

    2015-01-07

    Since 2004, malaria interventions in Rwanda have resulted in substantial decline of malaria incidence. However, this achievement is fragile as potentials for local malaria transmissions remain. The risk of getting malaria infection is partially explained by social conditions of vulnerable populations. Since vulnerability to malaria is both influenced by social and environmental factors, its complexity cannot be measured by a single value. The aim of this paper is, therefore, to apply a composite indicator approach for assessing social vulnerability to malaria in Rwanda. This assessment informs the decision-makers in targeting malaria interventions and allocating limited resources to reduce malaria burden in Rwanda. A literature review was used to conceptualize the social vulnerability to malaria and to select the appropriate vulnerability indicators. Indicators used in the index creation were classified into susceptibility and lack of resilience vulnerability domains. The main steps followed include selection of indicators and datasets, imputation of missing values, descriptive statistics, normalization and weighting of indicators, local sensitivity analysis and indicators aggregation. Correlation analysis helped to empirically evidence the association between the indicators and malaria incidence. The high values of social vulnerability to malaria are found in Gicumbi, Rusizi, Nyaruguru and Gisagara, and low values in Muhanga, Nyarugenge, Kicukiro and Nyanza. The most influential susceptibility indicators to increase malaria are population change (r = 0.729), average number of persons per bedroom (r = 0.531), number of households affected by droughts and famines (r = 0.591), and area used for irrigation (r = 0.611). The bed net ownership (r = -0.398) and poor housing wall materials (0.378) are the lack of resilience indicators that significantly correlate with malaria incidence. The developed composite index social vulnerability to malaria

  12. Next generation smart window display using transparent organic display and light blocking screen.

    Science.gov (United States)

    Kim, Gyeong Woo; Lampande, Raju; Choe, Dong Cheol; Ko, Ik Jang; Park, Jin Hwan; Pode, Ramchandra; Kwon, Jang Hyuk

    2018-04-02

    Transparent organic light emitting diodes (TOLED) have widespread applications in the next-generation display devices particularly in the large size transparent window and interactive displays. Herein, we report high performance and stable attractive smart window displays using facile process. Advanced smart window display is realized by integrating the high performance light blocking screen and highly transparent white OLED panel. The full smart window display reveals a maximum transmittance as high as 64.2% at the wavelength of 600 nm and extremely good along with tunable ambient contrast ratio (171.94:1) compared to that of normal TOLED (4.54:1). Furthermore, the performance decisive light blocking screen has demonstrated an excellent optical and electrical characteristics such as i) high transmittance (85.56% at 562nm) at light-penetrating state, ii) superior absorbance (2.30 at 562nm) in light interrupting mode, iii) high optical contrast (85.50 at 562 nm), iv) high optical stability for more than 25,000 cycle of driving, v) fast switching time of 1.9 sec, and vi) low driving voltage of 1.7 V. The experimental results of smart window display are also validated using optical simulation. The proposed smart window display technology allows us to adjust the intensity of daylight entering the system quickly and conveniently.

  13. Visual merchandising window display

    Directory of Open Access Journals (Sweden)

    Opris (Cas. Stanila M.

    2013-12-01

    Full Text Available Window display plays a major part in the selling strategies; it does not only include the simple display of goods, nowadays it is a form of art, also having the purpose of sustaining the brand image. This article wants to reveal the tools that are essential in creating a fabulous window display. Being a window designer is not an easy job, you have to always think ahead trends, to have a sense of colour, to know how to use light to attract customers in the store after only one glance at the window. The big store window displays are theatre scenes: with expensive backgrounds, special effects and high fashion mannequins. The final role of the displays is to convince customers to enter the store and trigger the purchasing act which is the final goal of the retail activity.

  14. Tripartite Governance: Enabling Successful Implementations with Vulnerable Populations.

    Science.gov (United States)

    Kennedy, Margaret Ann

    2016-01-01

    Vulnerable populations are often at a distinct disadvantage when it comes to the implementation of health information systems in an equitable, appropriate, and timely manner. The disadvantages experienced by vulnerable populations are innumerable and include lack of representation, lack of appropriate levels of funding, lack of resources and capacity, and lack of representation. Increasingly, models of representation for complex implementations involve a tripartite project governance model. This tripartite partnership distributes accountability across all partners, and ensures that vulnerable populations have an equitable contribution to the direction of implementation according to their needs. This article shares lessons learned and best practices from complex tripartite partnerships supporting implementations with vulnerable populations in Canada.

  15. Current diagnostic modalities for vulnerable plaque detection

    NARCIS (Netherlands)

    J.A. Schaar (Johannes); F. Mastik (Frits); E.S. Regar (Eveline); C.A. den Uil (Corstiaan); F.J.H. Gijsen (Frank); J.J. Wentzel (Jolanda); P.W.J.C. Serruys (Patrick); A.F.W. van der Steen (Ton)

    2007-01-01

    textabstractRupture of vulnerable plaques is the main cause of acute coronary syndrome and myocardial infarction. Identification of vulnerable plaques is therefore essential to enable the development of treatment modalities to stabilize such plaques. Several diagnostic methods are currently tested

  16. Childhood physical abuse and aggression: Shame and narcissistic vulnerability.

    Science.gov (United States)

    Keene, Amanda C; Epps, James

    2016-01-01

    This study examined narcissistic vulnerability and shame-proneness as potential mediators between childhood physical abuse (CPA) and adult anger and aggression. Participants were 400 undergraduate students, 134 of whom had a history of CPA. All participants completed self-report questionnaires assessing history of CPA, shame-proneness, narcissistic vulnerability, physical aggression, trait anger, and hostility. Results indicated abused participants were more angry and aggressive and experienced higher levels of shame-proneness and narcissistic vulnerability than nonabused participants. Multiple mediation analyses showed that narcissistic vulnerability, but not shame-proneness, partially mediated the relation between abuse and physical aggression. However, narcissistic vulnerability and shame-proneness both emerged as partial mediators between abuse and the anger and hostility variables. These findings suggest that narcissistic vulnerability and shame-proneness may function as mediators of adjustment following childhood maltreatment. Study limitations and recommendations for future research are discussed. Copyright © 2015 Elsevier Ltd. All rights reserved.

  17. Nuclear Medicine Image Display. Chapter 14

    Energy Technology Data Exchange (ETDEWEB)

    Bergmann, H. [Center for Medical Physics and Biomedical Engineering, Medical University of Vienna, Vienna (Austria)

    2014-12-15

    The final step in a medical imaging procedure is to display the image(s) on a suitable display system where it is presented to the medical specialist for diagnostic interpretation. The display of hard copy images on X ray film or photographic film has largely been replaced today by soft copy image display systems with cathode ray tube (CRT) or liquid crystal display (LCD) monitors as the image rendering device. Soft copy display requires a high quality display monitor and a certain amount of image processing to optimize the image both with respect to the properties of the display device and to some psychophysiological properties of the human visual system. A soft copy display system, therefore, consists of a display workstation providing some basic image processing functions and the display monitor as the intrinsic display device. Display devices of lower quality may be used during intermediate steps of the acquisition and analysis of a patient study. Display monitors with a quality suitable for diagnostic reading by the specialist medical doctor are called primary devices, also known as diagnostic devices. Monitors with lower quality but good enough to be used for positioning, processing of studies, presentation of images in the wards, etc. are referred to as secondary devices or clinical devices. Nuclear medicine images can be adequately displayed even for diagnostic purposes on secondary devices. However, the increasing use of X ray images on which to report jointly with images from nuclear medicine studies, such as those generated by dual modality imaging, notably by positron emission tomography (PET)/computed tomography (CT) and single photon emission computed tomography (SPECT)/CT, requires display devices capable of visualizing high resolution grey scale images at diagnostic quality, i.e. primary display devices. Both grey scale and colour display devices are used, the latter playing an important role in the display of processed nuclear medicine images and

  18. Nuclear Medicine Image Display. Chapter 14

    International Nuclear Information System (INIS)

    Bergmann, H.

    2014-01-01

    The final step in a medical imaging procedure is to display the image(s) on a suitable display system where it is presented to the medical specialist for diagnostic interpretation. The display of hard copy images on X ray film or photographic film has largely been replaced today by soft copy image display systems with cathode ray tube (CRT) or liquid crystal display (LCD) monitors as the image rendering device. Soft copy display requires a high quality display monitor and a certain amount of image processing to optimize the image both with respect to the properties of the display device and to some psychophysiological properties of the human visual system. A soft copy display system, therefore, consists of a display workstation providing some basic image processing functions and the display monitor as the intrinsic display device. Display devices of lower quality may be used during intermediate steps of the acquisition and analysis of a patient study. Display monitors with a quality suitable for diagnostic reading by the specialist medical doctor are called primary devices, also known as diagnostic devices. Monitors with lower quality but good enough to be used for positioning, processing of studies, presentation of images in the wards, etc. are referred to as secondary devices or clinical devices. Nuclear medicine images can be adequately displayed even for diagnostic purposes on secondary devices. However, the increasing use of X ray images on which to report jointly with images from nuclear medicine studies, such as those generated by dual modality imaging, notably by positron emission tomography (PET)/computed tomography (CT) and single photon emission computed tomography (SPECT)/CT, requires display devices capable of visualizing high resolution grey scale images at diagnostic quality, i.e. primary display devices. Both grey scale and colour display devices are used, the latter playing an important role in the display of processed nuclear medicine images and

  19. Factors Contributing to Exacerbating Vulnerabilities in Global Clinical Trials

    Science.gov (United States)

    da Silva, Ricardo E.; Amato, Angélica A.; Guilhem, Dirce B.; de Carvalho, Marta R.; Lima, Elisangela da C.; Novaes, Maria Rita C. G.

    2018-01-01

    Background: Although policies and guidelines make use of the concept of vulnerability, few define it. The European Union's directive for clinical trials does not include explanations for or the reasoning behind the designation of certain groups as vulnerable. Emerging economies from lower middle-income countries have, in recent years, had the largest average annual growth rate, as well as increase, in number of clinical trials registered in the US government's database. Nevertheless, careful supervision of research activities has to be ensured. Objective: To describe and analyze the features of the clinical trials involving vulnerable populations in various countries classified by development status and geographic region. Methods: Retrospective study that involved analysis of data obtained from the International Clinical Trials Registry Platform (ICTRP) database between 01/2014 and 12/2014 from countries with (i) highest trial densities during 2005 to 2012, (ii) highest average growth rate in clinical trials, and (iii) greatest trial capabilities. Results: Statistical analysis of this study showed that patients incapable of giving consent personally are 11.4 times more likely to be vulnerable patients than patients who are capable, and that patients in upper-middle-income countries are 1.7 times more likely to be vulnerable patients than patients from high-income countries when participating in global clinical trials. Malaysia (21%), Egypt (20%), Turkey (19%), Israel (18%), and Brazil (17%) had the highest percentages of vulnerable populations involving children. Conclusions: Although the inability to provide consent personally was a factor associated with vulnerability, arbitrary criteria may have been considered when classifying the populations of clinical trials as vulnerable. The EU Clinical Trials Register should provide guidance regarding exactly what aspects or factors should be taken into account to frame given populations as vulnerable, because

  20. Mapping social-ecological vulnerability to inform local decision making.

    Science.gov (United States)

    Thiault, Lauric; Marshall, Paul; Gelcich, Stefan; Collin, Antoine; Chlous, Frédérique; Claudet, Joachim

    2018-04-01

    An overarching challenge of natural resource management and biodiversity conservation is that relationships between people and nature are difficult to integrate into tools that can effectively guide decision making. Social-ecological vulnerability offers a valuable framework for identifying and understanding important social-ecological linkages, and the implications of dependencies and other feedback loops in the system. Unfortunately, its implementation at local scales has hitherto been limited due at least in part to the lack of operational tools for spatial representation of social-ecological vulnerability. We developed a method to map social-ecological vulnerability based on information on human-nature dependencies and ecosystem services at local scales. We applied our method to the small-scale fishery of Moorea, French Polynesia, by combining spatially explicit indicators of exposure, sensitivity, and adaptive capacity of both the resource (i.e., vulnerability of reef fish assemblages to fishing) and resource users (i.e., vulnerability of fishing households to the loss of fishing opportunity). Our results revealed that both social and ecological vulnerabilities varied considerably through space and highlighted areas where sources of vulnerability were high for both social and ecological subsystems (i.e., social-ecological vulnerability hotspots) and thus of high priority for management intervention. Our approach can be used to inform decisions about where biodiversity conservation strategies are likely to be more effective and how social impacts from policy decisions can be minimized. It provides a new perspective on human-nature linkages that can help guide sustainability management at local scales; delivers insights distinct from those provided by emphasis on a single vulnerability component (e.g., exposure); and demonstrates the feasibility and value of operationalizing the social-ecological vulnerability framework for policy, planning, and participatory

  1. Drought vulnerability assesssment and mapping in Morocco

    Science.gov (United States)

    Imani, Yasmina; Lahlou, Ouiam; Bennasser Alaoui, Si; Naumann, Gustavo; Barbosa, Paulo; Vogt, Juergen

    2014-05-01

    Drought vulnerability assessment and mapping in Morocco Authors: Yasmina Imani 1, Ouiam Lahlou 1, Si Bennasser Alaoui 1 Paulo Barbosa 2, Jurgen Vogt 2, Gustavo Naumann 2 1: Institut Agronomique et Vétérinaire Hassan II (IAV Hassan II), Rabat Morocco. 2: European Commission, Joint Research Centre (JRC), Institute for Environment and Sustainability (IES), Ispra, Italy. In Morocco, nearly 50% of the population lives in rural areas. They are mostly small subsistent farmers whose production depends almost entirely on rainfall. They are therefore very sensitive to drought episodes that may dramatically affect their incomes. Although, as a consequence of the increasing frequency, length and severity of drought episodes in the late 90's, the Moroccan government decided, to move on from a crisis to a risk management approach, drought management remains in practice mainly reactive and often ineffective. The lack of effectiveness of public policy is in part a consequence of the poor understanding of drought vulnerability at the rural community level, which prevents the development of efficient mitigation actions and adaptation strategies, tailored to the needs and specificities of each rural community. Thus, the aim of this study is to assess and map drought vulnerability at the rural commune level in the Oum Er-Rbia basin which is a very heterogeneous basin, showing a big variability of climates, landscapes, cropping systems and social habits. Agricultural data collected from the provincial and local administrations of Agriculture and socio-economic data from the National Department of Statistics were used to compute a composite vulnerability index (DVI) integrating four different components: (i) the renewable natural capacity, (ii) the economic capacity, (iii) human and civic resources, and (iv) infrastructure and technology. The drought vulnerability maps that were derived from the computation of the DVI shows that except very specific areas, most of the Oum er Rbia

  2. Vulnerability assessment and mitigation for the Chinese railway system under floods

    International Nuclear Information System (INIS)

    Hong, Liu; Ouyang, Min; Peeta, Srinivas; He, Xiaozheng; Yan, Yongze

    2015-01-01

    The economy of China and the travel needs of its citizens depend significantly on the continuous and reliable services provided by its railway system. However, this system is subject to frequent natural hazards, such as floods, earthquakes, and debris flow. A mechanism to assess the railway system vulnerability under these hazards and the design of effective vulnerability mitigation strategies are essential to the reliable functioning of the railway system. This article proposes a comprehensive methodology to quantitatively assess the railway system vulnerability under floods using historical data and GIS technology. The proposed methodology includes a network representation of the railway system, the generation of flood event scenarios, a method to estimate railway link vulnerability, and a quantitative vulnerability value computation approach. The railway system vulnerability is evaluated in terms of its service disruption related to the number of interrupted trains and the durations of interruption. A maintenance strategy to mitigate vulnerability is proposed that simultaneously considers link vulnerability and number of trains using it. Numerical experiments show that the flood-induced vulnerability of the proposed representation of the Chinese railway system reaches its maximum monthly value in July, and the proposed vulnerability mitigation strategy is more effective compared to other strategies. - Highlights: • We propose a methodology to assess flood-induced railway system vulnerability. • Railway system vulnerability is evaluated in terms of its service disruption. • Chinese railway system reaches its maximum monthly vulnerability in July. • We propose an effective maintenance strategy considering link vulnerability and burden

  3. Identifying Vulnerabilities and Hardening Attack Graphs for Networked Systems

    Energy Technology Data Exchange (ETDEWEB)

    Saha, Sudip; Vullinati, Anil K.; Halappanavar, Mahantesh; Chatterjee, Samrat

    2016-09-15

    We investigate efficient security control methods for protecting against vulnerabilities in networked systems. A large number of interdependent vulnerabilities typically exist in the computing nodes of a cyber-system; as vulnerabilities get exploited, starting from low level ones, they open up the doors to more critical vulnerabilities. These cannot be understood just by a topological analysis of the network, and we use the attack graph abstraction of Dewri et al. to study these problems. In contrast to earlier approaches based on heuristics and evolutionary algorithms, we study rigorous methods for quantifying the inherent vulnerability and hardening cost for the system. We develop algorithms with provable approximation guarantees, and evaluate them for real and synthetic attack graphs.

  4. Display systems for NPP control

    International Nuclear Information System (INIS)

    Rozov, S.S.

    1988-01-01

    Main trends in development of display systems used as the means for image displaying in NPP control systems are considered. It is shown that colour display devices appear to be the most universal means for concentrated data presentation. Along with digital means the display systems provide for high-speed response, sufficient for operative control of executive mechanisms. A conclusion is drawn that further development of display systems will move towards creation of large colour fields (on reflection base or with multicolour gas-discharge elements)

  5. Identifying and tracking attacks on networks: C3I displays and related technologies

    Science.gov (United States)

    Manes, Gavin W.; Dawkins, J.; Shenoi, Sujeet; Hale, John C.

    2003-09-01

    Converged network security is extremely challenging for several reasons; expanded system and technology perimeters, unexpected feature interaction, and complex interfaces all conspire to provide hackers with greater opportunities for compromising large networks. Preventive security services and architectures are essential, but in and of themselves do not eliminate all threat of compromise. Attack management systems mitigate this residual risk by facilitating incident detection, analysis and response. There are a wealth of attack detection and response tools for IP networks, but a dearth of such tools for wireless and public telephone networks. Moreover, methodologies and formalisms have yet to be identified that can yield a common model for vulnerabilities and attacks in converged networks. A comprehensive attack management system must coordinate detection tools for converged networks, derive fully-integrated attack and network models, perform vulnerability and multi-stage attack analysis, support large-scale attack visualization, and orchestrate strategic responses to cyber attacks that cross network boundaries. We present an architecture that embodies these principles for attack management. The attack management system described engages a suite of detection tools for various networking domains, feeding real-time attack data to a comprehensive modeling, analysis and visualization subsystem. The resulting early warning system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.

  6. Social Vulnerability and Ebola Virus Disease in Rural Liberia.

    Science.gov (United States)

    Stanturf, John A; Goodrick, Scott L; Warren, Melvin L; Charnley, Susan; Stegall, Christie M

    2015-01-01

    The Ebola virus disease (EVD) epidemic that has stricken thousands of people in the three West African countries of Liberia, Sierra Leone, and Guinea highlights the lack of adaptive capacity in post-conflict countries. The scarcity of health services in particular renders these populations vulnerable to multiple interacting stressors including food insecurity, climate change, and the cascading effects of disease epidemics such as EVD. However, the spatial distribution of vulnerable rural populations and the individual stressors contributing to their vulnerability are unknown. We developed a Social Vulnerability Classification using census indicators and mapped it at the district scale for Liberia. According to the Classification, we estimate that districts having the highest social vulnerability lie in the north and west of Liberia in Lofa, Bong, Grand Cape Mount, and Bomi Counties. Three of these counties together with the capital Monrovia and surrounding Montserrado and Margibi counties experienced the highest levels of EVD infections in Liberia. Vulnerability has multiple dimensions and a classification developed from multiple variables provides a more holistic view of vulnerability than single indicators such as food insecurity or scarcity of health care facilities. Few rural Liberians are food secure and many cannot reach a medical clinic in Liberia may be warranted. We demonstrate how social vulnerability index approaches can be applied in the context of disease outbreaks, and our methods are relevant elsewhere.

  7. Birth origin differentially affects depressive-like behaviours: are captive-born cynomolgus monkeys more vulnerable to depression than their wild-born counterparts?

    Directory of Open Access Journals (Sweden)

    Sandrine M J Camus

    Full Text Available BACKGROUND: Adverse early-life experience might lead to the expression of abnormal behaviours in animals and the predisposition to psychiatric disorder (e.g. major depressive disorder in Humans. Common breeding processes employ weaning and housing conditions different from what happens in the wild. METHODS: The present study, therefore, investigated whether birth origin impacts the possible existence of spontaneous atypical/abnormal behaviours displayed by 40 captive-born and 40 wild-born socially-housed cynomolgus macaques in farming conditions using an unbiased ethological scan-sampling analysis followed by multifactorial correspondence and hierarchical clustering analyses. RESULTS: We identified 10 distinct profiles (groups A to J that significantly differed on several behaviours, body postures, body orientations, distances between individuals and locations in the cage. Data suggest that 4 captive-born and 1 wild-born animals (groups G and J present depressive-like symptoms, unnatural early life events thereby increasing the risk of developing pathological symptoms. General differences were also highlighted between the captive- and wild-born populations, implying the expression of differential coping mechanisms in response to the same captive environment. CONCLUSIONS: Birth origin thus impacts the development of atypical ethologically-defined behavioural profiles, reminiscent of certain depressive-like symptoms. The use of unbiased behavioural observations might allow the identification of animal models of human mental/behavioural disorders and their most appropriate control groups.

  8. Vulnerability in north- central Vietnam

    DEFF Research Database (Denmark)

    Casse, Thorkil; Milhøj, Anders; Nguyen, Thao Phuong

    2015-01-01

    This article examines changes in livelihood strategies in response to flooding. It does so on the basis of a household survey which was undertaken in three provinces in north central Vietnam. All households in the survey were regularly affected by flooding, but only poor households experience a l...... the impact of flooding in the provinces. The article ends by looking at the vulnerability-resilience debate concluding that the poorer households could enter a vulnerability loop, unless new strategies to cope with natural hazards are suggested....

  9. Managing a network vulnerability assessment

    CERN Document Server

    Peltier, Thomas R; Blackley, John A

    2003-01-01

    Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.

  10. 6 CFR 27.215 - Security vulnerability assessments.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security vulnerability assessments. 27.215 Section 27.215 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.215 Security vulnerability...

  11. Tsunami vulnerability assessment in the western coastal belt in Sri Lanka

    Science.gov (United States)

    Ranagalage, M. M.

    2017-12-01

    26th December 2004 tsunami disaster has caused massive loss of life, damage to coastal infrastructures and disruption to economic activities in the coastal belt of Sri Lanka. Tsunami vulnerability assessment is a requirement for disaster risk and vulnerability reduction. It plays a major role in identifying the extent and level of vulnerabilities to disasters within the communities. There is a need for a clearer understanding of the disaster risk patterns and factors contributing to it in different parts of the coastal belt. The main objective of this study is to investigate tsunami vulnerability assessment of Moratuwa Municipal council area in Sri Lanka. We have selected Moratuwa area due to considering urbanization pattern and Tsunami hazards of the country. Different data sets such as one-meter resolution LiDAR data, orthophoto, population, housing data and road layer were employed in this study. We employed tsunami vulnerability model for 1796 housing units located there, for a tsunami scenario with a maximum run-up 8 meters. 86% of the total land area affected by the tsunami in 8 meters scenarios. Additionally, building population has been used to estimate population in different vulnerability levels. The result shows that 32% of the buildings have extremely critical vulnerability level, 46% have critical vulnerability level, 22% have high vulnerability level, and 1% have a moderate vulnerability. According to the population estimation model results, 18% reside building with extremely critical vulnerability, 43% with critical vulnerability, 36% with high vulnerability and 3% belong to moderate vulnerability level. The results of the study provide a clear picture of tsunami vulnerability. Outcomes of this analysis can use as a valuable tool for urban planners to assess the risk and extent of disaster risk reduction which could be achieved via suitable mitigation measures to manage the coastal belt in Sri Lanka.

  12. Perspectives on plant vulnerabilities ampersand other plant and containment improvements

    International Nuclear Information System (INIS)

    LaChance, J.; Kolaczkowski, A.; Kahn, J.

    1996-01-01

    The primary goal of the Individual Plant Examination (IPE) Program was for licensees to identify plant-unique vulnerabilities and actions to address these vulnerabilities. A review of these vulnerabilities and plant improvements that were identified in the IPEs was performed as part of the IPE Insights Program sponsored by the U.S. Nuclear Regulatory Commission (NRC). The purpose of this effort was to characterize the identified vulnerabilities and the impact of suggested plant improvements. No specific definition for open-quotes vulnerabilityclose quotes was provided in NRC Generic Letter 88-20 or in the subsequent NRC IPE submittal guidance documented in NUREG-1335. Thus licensees were left to use their own definitions. Only 20% of the plants explicitly stated that they had vulnerabilities. However, most licensees identified other plant improvements to address issues not explicitly classified as vulnerabilities, but pertaining to areas in which overall plant safety could potentially be increased. The various definitions of open-quotes vulnerabilityclose quotes used by the licensees, explicitly identified vulnerabilities, proposed plant improvements to address these vulnerabilities, and other plant improvements are summarized and discussed

  13. Macroeconomic Vulnerability in Developing Countries: Approaches and Issues

    OpenAIRE

    Anuradha Seth; Amr Ragab

    2012-01-01

    Economic vulnerability is approached from micro- and macroeconomic perspectives. While the microeconomic perspective is concerned with the impact of shocks on the well-being of individual households, the macroeconomic perspective focuses on the impact of these shocks on economic growth. This paper reviews the literature on macroeconomic vulnerability and finds that there is no single approach to understanding macroeconomic vulnerability in the context of financial and economic crises in devel...

  14. The principle of vulnerability and its potential applications in bioethics

    Directory of Open Access Journals (Sweden)

    Demény Enikő

    2016-12-01

    Full Text Available The principle of vulnerability is a specific principle within European Bioethics. On the one hand, vulnerability expresses human limits and frailty on the other hand it represents moral and ethical action principles. In this paper a discussion on the relationship between the concepts of autonomy, vulnerability and responsibility is proposed and presentation of some possible applications of the principle of vulnerability within bioethics. In conclusion, some potential benefits of applying the principle of vulnerability as well as possible difficulties in its application are highlighted.

  15. Ribosome display: next-generation display technologies for production of antibodies in vitro.

    Science.gov (United States)

    He, Mingyue; Khan, Farid

    2005-06-01

    Antibodies represent an important and growing class of biologic research reagents and biopharmaceutical products. They can be used as therapeutics in a variety of diseases. With the rapid expansion of proteomic studies and biomarker discovery, there is a need for the generation of highly specific binding reagents to study the vast number of proteins encoded by the genome. Display technologies provide powerful tools for obtaining antibodies. Aside from the preservation of natural antibody repertoires, they are capable of exploiting diversity by DNA recombination to create very large libraries for selection of novel molecules. In contrast to in vivo immunization processes, display technologies allow selection of antibodies under in vitro-defined selection condition(s), resulting in enrichment of antibodies with desired properties from large populations. In addition, in vitro selection enables the isolation of antibodies against difficult antigens including self-antigens, and this can be applied to the generation of human antibodies against human targets. Display technologies can also be combined with DNA mutagenesis for antibody evolution in vitro. Some methods are amenable to automation, permitting high-throughput generation of antibodies. Ribosome display is considered as representative of the next generation of display technologies since it overcomes the limitations of cell-based display methods by using a cell-free system, offering advantages of screening larger libraries and continuously expanding new diversity during selection. Production of display-derived antibodies can be achieved by choosing one of a variety of prokaryotic and eukaryotic cell-based expression systems. In the near future, cell-free protein synthesis may be developed as an alternative for large-scale generation of antibodies.

  16. An Integrated Method of Supply Chains Vulnerability Assessment

    Directory of Open Access Journals (Sweden)

    Jiaguo Liu

    2016-01-01

    Full Text Available Supply chain vulnerability identification and evaluation are extremely important to mitigate the supply chain risk. We present an integrated method to assess the supply chain vulnerability. The potential failure mode of the supply chain vulnerability is analyzed through the SCOR model. Combining the fuzzy theory and the gray theory, the correlation degree of each vulnerability indicator can be calculated and the target improvements can be carried out. In order to verify the effectiveness of the proposed method, we use Kendall’s tau coefficient to measure the effect of different methods. The result shows that the presented method has the highest consistency in the assessment compared with the other two methods.

  17. Anaphylaxis vulnerable groups

    African Journals Online (AJOL)

    Ehab

    Age groups vulnerable to serious attacks of anaphylaxis include infants, teenagers, pregnant women, and the elderly. Concomitant diseases, such as severe or uncontrolled asthma, cardiovascular disease, mastocytosis or clonal mast cell disorders and the concurrent use of some medications such as beta adrenergic ...

  18. Focus on CSIR research in water resources: improved methods for aquifer vulnerability assessments and protocols (AVAP) for producing vulnerability maps, taking into account information on soils

    CSIR Research Space (South Africa)

    Colvin, C

    2007-08-01

    Full Text Available for Aquifer Vulnerability Assessments and Protocols (AVAP) for producing vulnerability maps, taking into account information on soils Groundwater resources are increas- ingly threatened by pollution. The AVAP project was initiated to develop improved... characteristics. Both intrinsic and specific vulnerability are taken into account. The approach used to determine the vulnerability of the in- termediate zone involved the descrip- tion and quantification of the factors that influence vulnerability (unsatu...

  19. Large-screen display industry: market and technology trends for direct view and projection displays

    Science.gov (United States)

    Castellano, Joseph A.; Mentley, David E.

    1996-03-01

    Large screen information displays are defined as dynamic electronic displays that can be viewed by more than one person and are at least 2-feet wide. These large area displays for public viewing provide convenience, entertainment, security, and efficiency to the viewers. There are numerous uses for large screen information displays including those in advertising, transportation, traffic control, conference room presentations, computer aided design, banking, and military command/control. A noticeable characteristic of the large screen display market is the interchangeability of display types. For any given application, the user can usually choose from at least three alternative technologies, and sometimes from many more. Some display types have features that make them suitable for specific applications due to temperature, brightness, power consumption, or other such characteristic. The overall worldwide unit consumption of large screen information displays of all types and for all applications (excluding consumer TV) will increase from 401,109 units in 1995 to 655,797 units in 2002. On a unit consumption basis, applications in business and education represent the largest share of unit consumption over this time period; in 1995, this application represented 69.7% of the total. The market (value of shipments) will grow from DOL3.1 billion in 1995 to DOL3.9 billion in 2002. The market will be dominated by front LCD projectors and LCD overhead projector plates.

  20. Zika virus infection dysregulates human neural stem cell growth and inhibits differentiation into neuroprogenitor cells.

    Science.gov (United States)

    Devhare, Pradip; Meyer, Keith; Steele, Robert; Ray, Ratna B; Ray, Ranjit

    2017-10-12

    The current outbreak of Zika virus-associated diseases in South America and its threat to spread to other parts of the world has emerged as a global health emergency. A strong link between Zika virus and microcephaly exists, and the potential mechanisms associated with microcephaly are under intense investigation. In this study, we evaluated the effect of Zika virus infection of Asian and African lineages (PRVABC59 and MR766) in human neural stem cells (hNSCs). These two Zika virus strains displayed distinct infection pattern and growth rates in hNSCs. Zika virus MR766 strain increased serine 139 phosphorylation of histone H2AX (γH2AX), a known early cellular response proteins to DNA damage. On the other hand, PRVABC59 strain upregulated serine 15 phosphorylation of p53, p21 and PUMA expression. MR766-infected cells displayed poly (ADP-ribose) polymerase (PARP) and caspase-3 cleavage. Interestingly, infection of hNSCs by both strains of Zika virus for 24 h, followed by incubation in astrocyte differentiation medium, induced rounding and cell death. However, astrocytes generated from hNSCs by incubation in differentiation medium when infected with Zika virus displayed minimal cytopathic effect at an early time point. Infected hNSCs incubated in astrocyte differentiating medium displayed PARP cleavage within 24-36 h. Together, these results showed that two distinct strains of Zika virus potentiate hNSC growth inhibition by different mechanisms, but both viruses strongly induce death in early differentiating neuroprogenitor cells even at a very low multiplicity of infection. Our observations demonstrate further mechanistic insights for impaired neuronal homeostasis during active Zika virus infection.

  1. Zika virus infection dysregulates human neural stem cell growth and inhibits differentiation into neuroprogenitor cells

    Science.gov (United States)

    Devhare, Pradip; Meyer, Keith; Steele, Robert; Ray, Ratna B; Ray, Ranjit

    2017-01-01

    The current outbreak of Zika virus-associated diseases in South America and its threat to spread to other parts of the world has emerged as a global health emergency. A strong link between Zika virus and microcephaly exists, and the potential mechanisms associated with microcephaly are under intense investigation. In this study, we evaluated the effect of Zika virus infection of Asian and African lineages (PRVABC59 and MR766) in human neural stem cells (hNSCs). These two Zika virus strains displayed distinct infection pattern and growth rates in hNSCs. Zika virus MR766 strain increased serine 139 phosphorylation of histone H2AX (γH2AX), a known early cellular response proteins to DNA damage. On the other hand, PRVABC59 strain upregulated serine 15 phosphorylation of p53, p21 and PUMA expression. MR766-infected cells displayed poly (ADP-ribose) polymerase (PARP) and caspase-3 cleavage. Interestingly, infection of hNSCs by both strains of Zika virus for 24 h, followed by incubation in astrocyte differentiation medium, induced rounding and cell death. However, astrocytes generated from hNSCs by incubation in differentiation medium when infected with Zika virus displayed minimal cytopathic effect at an early time point. Infected hNSCs incubated in astrocyte differentiating medium displayed PARP cleavage within 24–36 h. Together, these results showed that two distinct strains of Zika virus potentiate hNSC growth inhibition by different mechanisms, but both viruses strongly induce death in early differentiating neuroprogenitor cells even at a very low multiplicity of infection. Our observations demonstrate further mechanistic insights for impaired neuronal homeostasis during active Zika virus infection. PMID:29022904

  2. Review Article: A comparison of flood and earthquake vulnerability assessment indicators

    Science.gov (United States)

    de Ruiter, Marleen C.; Ward, Philip J.; Daniell, James E.; Aerts, Jeroen C. J. H.

    2017-07-01

    In a cross-disciplinary study, we carried out an extensive literature review to increase understanding of vulnerability indicators used in the disciplines of earthquake- and flood vulnerability assessments. We provide insights into potential improvements in both fields by identifying and comparing quantitative vulnerability indicators grouped into physical and social categories. Next, a selection of index- and curve-based vulnerability models that use these indicators are described, comparing several characteristics such as temporal and spatial aspects. Earthquake vulnerability methods traditionally have a strong focus on object-based physical attributes used in vulnerability curve-based models, while flood vulnerability studies focus more on indicators applied to aggregated land-use classes in curve-based models. In assessing the differences and similarities between indicators used in earthquake and flood vulnerability models, we only include models that separately assess either of the two hazard types. Flood vulnerability studies could be improved using approaches from earthquake studies, such as developing object-based physical vulnerability curve assessments and incorporating time-of-the-day-based building occupation patterns. Likewise, earthquake assessments could learn from flood studies by refining their selection of social vulnerability indicators. Based on the lessons obtained in this study, we recommend future studies for exploring risk assessment methodologies across different hazard types.

  3. Assessing local vulnerability to climate change in Ecuador

    OpenAIRE

    Fernandez, Mario Andres; Bucaram, Santiago J.; Renteria, Willington

    2015-01-01

    Vulnerability assessments have become necessary to increase the understanding of climate-sensitive systems and inform resource allocation in developing countries. Challenges arise when poor economic and social development combines with heterogeneous climatic conditions. Thus, finding and harmonizing good-quality data at local scale may be a significant hurdle for vulnerability research. In this paper we assess vulnerability to climate change at a local level in Ecuador. We take Ecuador as a c...

  4. Mental vulnerability and survival after cancer

    DEFF Research Database (Denmark)

    Nakaya, Naoki; Bidstrup, Pernille E; Eplov, Lene F

    2009-01-01

    BACKGROUND: It has been hypothesized that personality traits affect survival after cancer, but studies have produced inconsistent results. This study examined the association between mental vulnerability and survival after cancer in Denmark in a prospective cohort study. METHODS: Between 1976...... and 2001, 12733 residents of Copenhagen completed a questionnaire eliciting information on a 12-item mental vulnerability scale, as well as various personal data. Follow-up in the Danish Cancer Registry until 2003 identified 884 incident cases of primary cancer, and follow-up for death from the date...... of cancer diagnosis until 2003 identified 382 deaths. Mental vulnerability scores were divided into 4 approximately equal-sized groups. Cox proportional hazards regression models were used to estimate the hazard ratio (HR) of all-cause mortality. RESULTS: Multivariate HR for all-cause mortality for persons...

  5. Explicit and implicit cognition: a preliminary test of a dual-process theory of cognitive vulnerability to depression.

    Science.gov (United States)

    Haeffel, Gerald J; Abramson, Lyn Y; Brazy, Paige C; Shah, James Y; Teachman, Bethany A; Nosek, Brian A

    2007-06-01

    Two studies were conducted to test a dual-process theory of cognitive vulnerability to depression. According to this theory, implicit and explicit cognitive processes have differential effects on depressive reactions to stressful life events. Implicit processes are hypothesized to be critical in determining an individual's immediate affective reaction to stress whereas explicit cognitions are thought to be more involved in long-term depressive reactions. Consistent with hypotheses, the results of study 1 (cross-sectional; N=237) showed that implicit, but not explicit, cognitions predicted immediate affective reactions to a lab stressor. Study 2 (longitudinal; N=251) also supported the dual-process model of cognitive vulnerability to depression. Results showed that both the implicit and explicit measures interacted with life stress to predict prospective changes in depressive symptoms, respectively. However, when both implicit and explicit predictors were entered into a regression equation simultaneously, only the explicit measure interacted with stress to remain a unique predictor of depressive symptoms over the five-week prospective interval.

  6. Workplace support after breast cancer treatment: recognition of vulnerability.

    Science.gov (United States)

    Tiedtke, Corine; Dierckx de Casterlé, Bernadette; Donceel, Peter; de Rijk, Angelique

    2015-01-01

    Support from the workplace seems to be a key element in addressing the poor return-to-work (RTW) rate of employees with breast cancer. We aim to acquire an in-depth understanding of how Flemish employees experience their RTW after breast cancer and the support from the workplace. Fourteen in-depth interviews of women who experienced breast cancer and returned to work (high school graduates, age range 42-55 years, mean age 48 at time of surgery) were analysed using the Qualitative Analysis Guide of Leuven (QUAGOL), based on a Grounded Theory approach. The key experiences were feeling vulnerable, feeling able to work and need for support. Although little diversity in RTW experiences was found, the background of the vulnerability varied. Women experienced support (which could be emotional or practical) only as adequate if it addressed their specific vulnerability. Employees felt particularly vulnerable. Vulnerability is not the same as low-work ability and as such it should be added as theoretical concept in RTW research. Adequate workplace support addresses the specific vulnerability of an individual woman. Our study offers a nuanced insight into the RTW process of breast cancer survivors. Upon actual return-to-work (RTW) after breast cancer treatment, women feel vulnerable but able to work and, hence, have a high need for workplace support. Support from the workplace during RTW after breast cancer treatment is experienced as adequate when it expresses genuine recognition of the individual woman's vulnerability.

  7. IT Security Vulnerability and Incident Response Management

    NARCIS (Netherlands)

    Hafkamp, W.H.M.; Paulus, S.; Pohlman, N.; Reimer, H.

    2006-01-01

    This paper summarises the results of a Dutch PhD research project on IT security vulnerability and incident response management, which is supervised by the University of Twente in the Netherlands and which is currently in its final stage. Vulnerabilities are ‘failures or weaknesses in computer

  8. Managing Risk, Reducing Vulnerability and Enhancing Productivity ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Managing Risk, Reducing Vulnerability and Enhancing Productivity under a Changing Climate. The countries of the Greater Horn of Africa are particularly vulnerable to drought, exacerbated by widespread poverty and dependence on rainfed agriculture. Even with normal rainfall, the region does not produce enough food to ...

  9. A preliminary analysis of quantifying computer security vulnerability data in "the wild"

    Science.gov (United States)

    Farris, Katheryn A.; McNamara, Sean R.; Goldstein, Adam; Cybenko, George

    2016-05-01

    A system of computers, networks and software has some level of vulnerability exposure that puts it at risk to criminal hackers. Presently, most vulnerability research uses data from software vendors, and the National Vulnerability Database (NVD). We propose an alternative path forward through grounding our analysis in data from the operational information security community, i.e. vulnerability data from "the wild". In this paper, we propose a vulnerability data parsing algorithm and an in-depth univariate and multivariate analysis of the vulnerability arrival and deletion process (also referred to as the vulnerability birth-death process). We find that vulnerability arrivals are best characterized by the log-normal distribution and vulnerability deletions are best characterized by the exponential distribution. These distributions can serve as prior probabilities for future Bayesian analysis. We also find that over 22% of the deleted vulnerability data have a rate of zero, and that the arrival vulnerability data is always greater than zero. Finally, we quantify and visualize the dependencies between vulnerability arrivals and deletions through a bivariate scatterplot and statistical observations.

  10. Assessing vulnerability to drought: identifying underlying factors across Europe

    Science.gov (United States)

    Urquijo, Julia; Gonzalez Tánago, Itziar; Ballesteros, Mario; De Stefano, Lucia

    2015-04-01

    Drought is considered one of the most severe and damaging natural hazards in terms of people and sectors affected and associated losses. Drought is a normal and recurrent climatic phenomenon that occurs worldwide, although its spatial and temporal characteristics vary significantly among climates. In the case of Europe, in the last thirty years, the region has suffered several drought events that have caused estimated economic damages over a €100 billion and have affected almost 20% of its territory and population. In recent years, there has been a growing awareness among experts and authorities of the need to shift from a reactive crisis approach to a drought risk management approach, as well as of the importance of designing and implementing policies, strategies and plans at country and river basin levels to deal with drought. The identification of whom and what is vulnerable to drought is a central aspect of drought risk mitigation and planning and several authors agree that societal vulnerability often determines drought risk more than the actual precipitation shortfalls. The final aim of a drought vulnerability assessment is to identify the underlying sources of drought impact, in order to develop policy options that help to enhance coping capacity and therefore to prevent drought impact. This study identifies and maps factors underlying vulnerability to drought across Europe. The identification of factors influencing vulnerability starts from the analysis of past drought impacts in four European socioeconomic sectors. This analysis, along with an extensive literature review, led to the selection of vulnerability factors that are both relevant and adequate for the European context. Adopting the IPCC model, vulnerability factors were grouped to describe exposure, sensitivity and adaptive capacity. The aggregation of these components has resulted in the mapping of vulnerability to drought across Europe at NUTS02 level. Final results have been compared with

  11. [Expectation of life at birth: sex differentials, trends, limits].

    Science.gov (United States)

    Aubenque, M; Damiani, P

    1981-01-01

    Using information available at the end of 1979, the authors present and analyze data on expectation of life at birth in 119 countries. Differences between developing and developed countries, trends over time, sex differentials, and limits on life expectancy are examined. The analysis reveals limits of approximately 73 years for men and 80 for women in the most developed countries. In France, which displays excessive male mortality, expectation of life increases more slowly for men. The authors attribute these sex differentials both to biological factors and to behavioral factors and ways of life.

  12. Transdisciplinary knowledge integration : cases from integrated assessment and vulnerability assessment

    NARCIS (Netherlands)

    Hinkel, J.

    2008-01-01

    Keywords: climate change, integrated assessment, knowledge integration, transdisciplinary research, vulnerability, vulnerability assessment.
    This thesis explores how transdisciplinary knowledge integration can be facilitated in the context of integrated assessments and vulnerability

  13. Assessment of human-natural system characteristics influencing global freshwater supply vulnerability

    Science.gov (United States)

    Padowski, Julie C.; Gorelick, Steven M.; Thompson, Barton H.; Rozelle, Scott; Fendorf, Scott

    2015-10-01

    Global freshwater vulnerability is a product of environmental and human dimensions, however, it is rarely assessed as such. Our approach identifies freshwater vulnerability using four broad categories: endowment, demand, infrastructure, and institutions, to capture impacts on natural and managed water systems within the coupled human-hydrologic environment. These categories are represented by 19 different endogenous and exogenous characteristics affecting water supply vulnerability. By evaluating 119 lower per capita income countries (Yemen and Djibouti nearly as vulnerable. Surprising similarities in vulnerability were also found among geographically disparate nations such as Vietnam, Sri Lanka, and Guatemala. Determining shared patterns of freshwater vulnerability provides insights into why water supply vulnerabilities are manifested in human-water systems at the national scale.

  14. Scalable Resolution Display Walls

    KAUST Repository

    Leigh, Jason; Johnson, Andrew; Renambot, Luc; Peterka, Tom; Jeong, Byungil; Sandin, Daniel J.; Talandis, Jonas; Jagodic, Ratko; Nam, Sungwon; Hur, Hyejung; Sun, Yiwen

    2013-01-01

    This article will describe the progress since 2000 on research and development in 2-D and 3-D scalable resolution display walls that are built from tiling individual lower resolution flat panel displays. The article will describe approaches and trends in display hardware construction, middleware architecture, and user-interaction design. The article will also highlight examples of use cases and the benefits the technology has brought to their respective disciplines. © 1963-2012 IEEE.

  15. Reducing vulnerability among pastoralists in Northern Kenya

    International Development Research Centre (IDRC) Digital Library (Canada)

    CCAA

    vulnerability among pastoralist communities in Mandera and Turkana in Northern Kenya, led by the Kenyan NGO ... to understand how people have experienced droughts and other ... norms and gender roles may make them more or less vulnerable, ... and see direct impacts on the resources they depend on for their.

  16. Hydrologic vulnerability of tribal reservation lands across the U.S.

    Science.gov (United States)

    Jones, C., Jr.; Leibowitz, S. G.; Sawicz, K. A.; Comeleo, R. L.; Stratton, L. E.

    2017-12-01

    We apply the hydrologic landscapes (HL) concept to assess the hydrologic vulnerability to climate of the United States (U.S.) with special emphasis on tribal lands. The basic assumption of the HL approach is that catchments that share similar physical and climatic characteristics are expected to have similar hydrologic characteristics. We map climate vulnerability by integrating a retrospective analysis of historical climate and hydrology into the HL approach, comparing this baseline of variability with future projections of temperature, precipitation, potential evapotranspiration, snow accumulation, climatic moisture, surplus water, and seasonality of the water surplus. Projections that are not within two standard deviations of the historical decadal average contribute to the vulnerability index for each metric. This allows stakeholders and/or water resource managers to understand the potential impacts of future conditions. The resulting vulnerability maps show that temperature and potential evapotranspiration are consistently projected to have high vulnerability indices across the U.S. including all tribal reservations. Precipitation vulnerability is not as spatially-uniform as temperature. Most areas with snow are projected to experience significant changes in future snow accumulation. The seasonality vulnerability map shows that mountainous areas in the West are most prone to changes in seasonality. This paper illustrates how the HL approach can help assess climatic and hydrologic vulnerability for disadvantaged groups across the U.S. By combining the HL concept and climate vulnerability analyses, we provide an approach that can assist tribal resource managers to perform vulnerability assessments and adaptation plans, which is a major priority for the tribes nationwide.

  17. Ecosystem Vulnerability Review: Proposal of an Interdisciplinary Ecosystem Assessment Approach

    Science.gov (United States)

    Weißhuhn, Peter; Müller, Felix; Wiggering, Hubert

    2018-06-01

    To safeguard the sustainable use of ecosystems and their services, early detection of potentially damaging changes in functional capabilities is needed. To support a proper ecosystem management, the analysis of an ecosystem's vulnerability provide information on its weaknesses as well as on its capacity to recover after suffering an impact. However, the application of the vulnerability concept to ecosystems is still an emerging topic. After providing background on the vulnerability concept, we summarize existing ecosystem vulnerability research on the basis of a systematic literature review with a special focus on ecosystem type, disciplinary background, and more detailed definition of the ecosystem vulnerability components. Using the Web of ScienceTM Core Collection, we overviewed the literature from 1991 onwards but used the 5 years from 2011 to 2015 for an in-depth analysis, including 129 articles. We found that ecosystem vulnerability analysis has been applied most notably in conservation biology, climate change research, and ecological risk assessments, pinpointing a limited spreading across the environmental sciences. It occurred primarily within marine and freshwater ecosystems. To avoid confusion, we recommend using the unambiguous term ecosystem vulnerability rather than ecological, environmental, population, or community vulnerability. Further, common ground has been identified, on which to define the ecosystem vulnerability components exposure, sensitivity, and adaptive capacity. We propose a framework for ecosystem assessments that coherently connects the concepts of vulnerability, resilience, and adaptability as different ecosystem responses. A short outlook on the possible operationalization of the concept by ecosystem vulnerabilty indices, and a conclusion section complete the review.

  18. The role of minimum supply and social vulnerability assessment for governing critical infrastructure failure: current gaps and future agenda

    Directory of Open Access Journals (Sweden)

    M. Garschagen

    2018-04-01

    Full Text Available Increased attention has lately been given to the resilience of critical infrastructure in the context of natural hazards and disasters. The major focus therein is on the sensitivity of critical infrastructure technologies and their management contingencies. However, strikingly little attention has been given to assessing and mitigating social vulnerabilities towards the failure of critical infrastructure and to the development, design and implementation of minimum supply standards in situations of major infrastructure failure. Addressing this gap and contributing to a more integrative perspective on critical infrastructure resilience is the objective of this paper. It asks which role social vulnerability assessments and minimum supply considerations can, should and do – or do not – play for the management and governance of critical infrastructure failure. In its first part, the paper provides a structured review on achievements and remaining gaps in the management of critical infrastructure and the understanding of social vulnerabilities towards disaster-related infrastructure failures. Special attention is given to the current state of minimum supply concepts with a regional focus on policies in Germany and the EU. In its second part, the paper then responds to the identified gaps by developing a heuristic model on the linkages of critical infrastructure management, social vulnerability and minimum supply. This framework helps to inform a vision of a future research agenda, which is presented in the paper's third part. Overall, the analysis suggests that the assessment of socially differentiated vulnerabilities towards critical infrastructure failure needs to be undertaken more stringently to inform the scientifically and politically difficult debate about minimum supply standards and the shared responsibilities for securing them.

  19. The role of minimum supply and social vulnerability assessment for governing critical infrastructure failure: current gaps and future agenda

    Science.gov (United States)

    Garschagen, Matthias; Sandholz, Simone

    2018-04-01

    Increased attention has lately been given to the resilience of critical infrastructure in the context of natural hazards and disasters. The major focus therein is on the sensitivity of critical infrastructure technologies and their management contingencies. However, strikingly little attention has been given to assessing and mitigating social vulnerabilities towards the failure of critical infrastructure and to the development, design and implementation of minimum supply standards in situations of major infrastructure failure. Addressing this gap and contributing to a more integrative perspective on critical infrastructure resilience is the objective of this paper. It asks which role social vulnerability assessments and minimum supply considerations can, should and do - or do not - play for the management and governance of critical infrastructure failure. In its first part, the paper provides a structured review on achievements and remaining gaps in the management of critical infrastructure and the understanding of social vulnerabilities towards disaster-related infrastructure failures. Special attention is given to the current state of minimum supply concepts with a regional focus on policies in Germany and the EU. In its second part, the paper then responds to the identified gaps by developing a heuristic model on the linkages of critical infrastructure management, social vulnerability and minimum supply. This framework helps to inform a vision of a future research agenda, which is presented in the paper's third part. Overall, the analysis suggests that the assessment of socially differentiated vulnerabilities towards critical infrastructure failure needs to be undertaken more stringently to inform the scientifically and politically difficult debate about minimum supply standards and the shared responsibilities for securing them.

  20. Evaluation of Synthetic Vision Display Concepts for Improved Awareness in Unusual Attitude Recovery Scenarios

    Science.gov (United States)

    Nicholas, Stephanie

    2016-01-01

    A recent study conducted by the Commercial Aviation Safety Team (CAST) determined 40 percent of all fixed-wing fatal accidents, between 2001 and 2011, were caused by Loss-of-Control (LOC) in flight (National Transportation Safety Board, 2015). Based on their findings, CAST recommended manufacturers develop and implement virtual day-visual meteorological conditions (VMC) display systems, such as synthetic vision or equivalent systems (CAST, 2016). In a 2015 simulation study conducted at NASA Langley Research Center (LaRC), researchers gathered to test and evaluate virtual day-VMC displays under realistic flight operation scenarios capable of inducing reduced attention states in pilots. Each display concept was evaluated to determine its efficacy to improve attitude awareness. During the experiment, Evaluation Pilots (EPs) were shown the following three display concepts on the Primary Flight Display (PFD): Baseline, Synthetic Vision (SV) with color gradient, and SV with texture. The baseline configuration was a standard, conventional 'blue over brown' display. Experiment scenarios were simulated over water to evaluate Unusual Attitude (UA) recovery over 'featureless terrain' environments. Thus, the SV with color gradient configuration presented a 'blue over blue' display with a linear blue color progression, to differentiate attitude changes between sky and ocean. The SV with texture configuration presented a 'blue over blue' display with a black checkerboard texture atop a synthetic ocean. These displays were paired with a Background Attitude Indicator (BAI) concept. The BAI was presented across all four Head-Down Displays (HDDs), displaying a wide field-of-view blue-over-blue attitude indicator. The BAI aligned with the PFD and showed through the background of the navigation displays with opaque transparency. Each EP participated in a two-part experiment series with a total seventy-five trial runs: Part I included a set of twenty-five Unusual Attitude Recovery (UAR

  1. X-Windows Widget for Image Display

    Science.gov (United States)

    Deen, Robert G.

    2011-01-01

    XvicImage is a high-performance XWindows (Motif-compliant) user interface widget for displaying images. It handles all aspects of low-level image display. The fully Motif-compliant image display widget handles the following tasks: (1) Image display, including dithering as needed (2) Zoom (3) Pan (4) Stretch (contrast enhancement, via lookup table) (5) Display of single-band or color data (6) Display of non-byte data (ints, floats) (7) Pseudocolor display (8) Full overlay support (drawing graphics on image) (9) Mouse-based panning (10) Cursor handling, shaping, and planting (disconnecting cursor from mouse) (11) Support for all user interaction events (passed to application) (12) Background loading and display of images (doesn't freeze the GUI) (13) Tiling of images.

  2. Vulnerability of birds to climate change in California's Sierra Nevada

    Directory of Open Access Journals (Sweden)

    Rodney B. Siegel

    2014-06-01

    Full Text Available In a rapidly changing climate, effective bird conservation requires not only reliable information about the current vulnerability of species of conservation concern, but also credible projections of their future vulnerability. Such projections may enable managers to preempt or reduce emerging climate-related threats through appropriate habitat management. We used NatureServe's Climate Change Vulnerability Index (CCVI to predict vulnerability to climate change of 168 bird species that breed in the Sierra Nevada mountains of California, USA. The CCVI assesses species-specific exposure and sensitivity to climate change within a defined geographic area, through the integration of (a species' range maps, (b information about species' natural history traits and ecological relationships, (c historic and current climate data, and (d spatially explicit climate change projections. We conducted the assessment under two different downscaled climate models with divergent projections about future precipitation through the middle of the 21st century. Assessments differed relatively little under the two climate models. Of five CCVI vulnerability ranking categories, only one species, White-tailed Ptarmigan (Lagopus leucura, received the most vulnerable rank, Extremely Vulnerable. No species received the second-highest vulnerability ranking, Highly Vulnerable. Sixteen species scored as Moderately Vulnerable using one or both climate models: Common Merganser (Mergus merganser, Osprey (Pandion haliaetus, Bald Eagle (Haliaeetus leucocephalus, Northern Goshawk (Accipiter gentilis, Peregrine Falcon (Falco peregrinus, Prairie Falcon (Falco mexicanus, Spotted Sandpiper (Actitis macularius, Great Gray Owl (Strix nebulosa, Black Swift (Cypseloides niger, Clark's Nutcracker (Nucifraga columbiana, American Dipper (Cinclus mexicanus, Swainson's Thrush (Catharus ustulatus, American Pipit (Anthus rubescens, Gray-crowned Rosy-Finch (Leucosticte tephrocotis, Pine Grosbeak

  3. GIS Based Measurement and Regulatory Zoning of Urban Ecological Vulnerability

    Directory of Open Access Journals (Sweden)

    Xiaorui Zhang

    2015-07-01

    Full Text Available Urban ecological vulnerability is measured on the basis of ecological sensitivity and resilience based on the concept analysis of vulnerability. GIS-based multicriteria decision analysis (GIS-MCDA methods are used, supported by the spatial analysis tools of GIS, to define different levels of vulnerability for areas of the urban ecology. These areas are further classified into different types of regulatory zones. Taking the city of Hefei in China as the empirical research site, this study uses GIS-MCDA, including the index system, index weights and overlay rules, to measure the degree of its ecological vulnerability on the GIS platform. There are eight indices in the system. Raking and analytical hierarchy process (AHP methods are used to calculate index weights according to the characteristics of the index system. The integrated overlay rule, including selection of the maximum value, and weighted linear combination (WLC are applied as the overlay rules. In this way, five types of vulnerability areas have been classified as follows: very low vulnerability, low vulnerability, medium vulnerability, high vulnerability and very high vulnerability. They can be further grouped into three types of regulatory zone of ecological green line, ecological grey line and ecological red line. The study demonstrates that ecological green line areas are the largest (53.61% of the total study area and can be intensively developed; ecological grey line areas (19.59% of the total area can serve as the ecological buffer zone, and ecological red line areas (26.80% cannot be developed and must be protected. The results indicate that ecological green line areas may provide sufficient room for future urban development in Hefei city. Finally, the respective regulatory countermeasures are put forward. This research provides a scientific basis for decision-making around urban ecological protection, construction and sustainable development. It also provides theoretical method

  4. Study on the visibility of an electroluminescent display for automobiles; Jidoshayo EL display no shininsei

    Energy Technology Data Exchange (ETDEWEB)

    Matsumoto, N; Harada, M; Idogaki, T [Denso Corp., Aichi (Japan)

    1997-10-01

    This report explores the visibility of an Electroluminescent (EL) display for automotive use. Displays for automobiles are exposed to the direct rays of the sun and forced to operate in wide temperature range. Therefore, luminous flux density by the lighting on EL display panel and operating environment temperature must be considered for the visibility evaluation. Sensory evaluation on the visibility and physical measurements such as contrast, chromaticity difference in accordance with the viewing angle change indicate that the visibility of the EL display for automobiles is advantageous over other displays. 6 refs., 11 figs., 1 tab.

  5. Laser illuminated flat panel display

    Energy Technology Data Exchange (ETDEWEB)

    Veligdan, J.T.

    1995-12-31

    A 10 inch laser illuminated flat panel Planar Optic Display (POD) screen has been constructed and tested. This POD screen technology is an entirely new concept in display technology. Although the initial display is flat and made of glass, this technology lends itself to applications where a plastic display might be wrapped around the viewer. The display screen is comprised of hundreds of planar optical waveguides where each glass waveguide represents a vertical line of resolution. A black cladding layer, having a lower index of refraction, is placed between each waveguide layer. Since the cladding makes the screen surface black, the contrast is high. The prototype display is 9 inches wide by 5 inches high and approximately I inch thick. A 3 milliwatt HeNe laser is used as the illumination source and a vector scanning technique is employed.

  6. Measuring vulnerability to disaster displacement

    Science.gov (United States)

    Brink, Susan A.; Khazai, Bijan; Power, Christopher; Wenzel, Friedemann

    2015-04-01

    Large scale disasters can cause devastating impacts in terms of population displacement. Between 2008 and 2013, on average 27 million people were displaced annually by disasters (Yonetani 2014). After large events such as hurricane Katrina or the Port-au-Prince earthquake, images of inadequate public shelter and concerns about large scale and often inequitable migration have been broadcast around the world. Population displacement can often be one of the most devastating and visible impacts of a natural disaster. Despite the importance of population displacement in disaster events, measures to understand the socio-economic vulnerability of a community often use broad metrics to estimate the total socio-economic risk of an event rather than focusing on the specific impacts that a community faces in a disaster. Population displacement is complex and multi-causal with the physical impact of a disaster interacting with vulnerability arising from the response, environmental issues (e.g., weather), cultural concerns (e.g., expectations of adequate shelter), and many individual factors (e.g., mobility, risk perception). In addition to the complexity of the causes, population displacement is difficult to measure because of the wide variety of different terms and definitions and its multi-dimensional nature. When we speak of severe population displacement, we may refer to a large number of displaced people, an extended length of displacement or associated difficulties such as poor shelter quality, risk of violence and crime in shelter communities, discrimination in aid, a lack of access to employment or other difficulties that can be associated with large scale population displacement. We have completed a thorough review of the literature on disaster population displacement. Research has been conducted on historic events to understand the types of negative impacts associated with population displacement and also the vulnerability of different groups to these impacts. We

  7. SSL/TLS Vulnerability Detection Using Black Box Approach

    Science.gov (United States)

    Gunawan, D.; Sitorus, E. H.; Rahmat, R. F.; Hizriadi, A.

    2018-03-01

    Socket Secure Layer (SSL) and Transport Layer Security (TLS) are cryptographic protocols that provide data encryption to secure the communication over a network. However, in some cases, there are vulnerability found in the implementation of SSL/TLS because of weak cipher key, certificate validation error or session handling error. One of the most vulnerable SSL/TLS bugs is heartbleed. As the security is essential in data communication, this research aims to build a scanner that detect the SSL/TLS vulnerability by using black box approach. This research will focus on heartbleed case. In addition, this research also gathers information about existing SSL in the server. The black box approach is used to test the output of a system without knowing the process inside the system itself. For testing purpose, this research scanned websites and found that some of the websites still have SSL/TLS vulnerability. Thus, the black box approach can be used to detect the vulnerability without considering the source code and the process inside the application.

  8. Examining social, physical, and environmental dimensions of tornado vulnerability in Texas.

    Science.gov (United States)

    Siebeneck, Laura

    2016-01-01

    To develop a vulnerability model that captures the social, physical, and environmental dimensions of tornado vulnerability of Texas counties. Guided by previous research and methodologies proposed in the hazards and emergency management literature, a principle components analysis is used to create a tornado vulnerability index. Data were gathered from open source information available through the US Census Bureau, American Community Surveys, and the Texas Natural Resources Information System. Texas counties. The results of the model yielded three indices that highlight geographic variability of social vulnerability, built environment vulnerability, and tornado hazard throughout Texas. Further analyses suggest that counties with the highest tornado vulnerability include those with high population densities and high tornado risk. This article demonstrates one method for assessing statewide tornado vulnerability and presents how the results of this type of analysis can be applied by emergency managers towards the reduction of tornado vulnerability in their communities.

  9. Vulnerability of networks of interacting Markov chains.

    Science.gov (United States)

    Kocarev, L; Zlatanov, N; Trajanov, D

    2010-05-13

    The concept of vulnerability is introduced for a model of random, dynamical interactions on networks. In this model, known as the influence model, the nodes are arranged in an arbitrary network, while the evolution of the status at a node is according to an internal Markov chain, but with transition probabilities that depend not only on the current status of that node but also on the statuses of the neighbouring nodes. Vulnerability is treated analytically and numerically for several networks with different topological structures, as well as for two real networks--the network of infrastructures and the EU power grid--identifying the most vulnerable nodes of these networks.

  10. DOE contractor vulnerability analysis: DPA or MAIT

    International Nuclear Information System (INIS)

    Six, D.E.; Nichols, D.H.

    1980-01-01

    Two vulnerability analysis techniques, Diversion Path Analysis (DPA) and Matrix Analysis of the Insider Threat (MAIT), were applied by EG and G Idaho, Inc. Safeguards and Security to the same item accountable SNM storage area at INEL. Technical and cost data for each methodology were collected and compared. A recommendation that MAIT be utilized for future vulnerability analyses of item accountable SNM storage and use areas operated by EG and G Idaho for DOE-ID resulted. Unclassified results of the two techniques and MAIT/DPA technical and cost comparisons will be presented which show that MAIT can be used for vulnerability analyses to comply with Department of Energy (DOE) requirements

  11. OLED displays and lighting

    CERN Document Server

    Koden, Mitsuhiro

    2017-01-01

    Organic light-emitting diodes (OLEDs) have emerged as the leading technology for the new display and lighting market. OLEDs are solid-state devices composed of thin films of organic molecules that create light with the application of electricity. OLEDs can provide brighter, crisper displays on electronic devices and use less power than conventional light-emitting diodes (LEDs) or liquid crystal displays (LCDs) used today. This book covers both the fundamentals and practical applications of flat and flexible OLEDs.

  12. Vulnerability and Adaptation to Climate Change: Agricultural ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-04-21

    Apr 21, 2016 ... Much of this biodiversity is highly vulnerable to climate change. ... an astonishing range of life forms found nowhere else on the planet. ... As well as improving information on climate change vulnerabilities, ... They also note negative effects on traditional knowledge, which is seen as losing its sacred power.

  13. Configuration Fuzzing for Software Vulnerability Detection.

    Science.gov (United States)

    Dai, Huning; Murphy, Christian; Kaiser, Gail

    2010-02-15

    Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environment. One approach to detecting these vulnerabilities is fuzz testing, which feeds a range of randomly modified inputs to a software application while monitoring it for failures. However, typical fuzz testing makes no guarantees regarding the syntactic and semantic validity of the input, or of how much of the input space will be explored. To address these problems, in this paper we present a new testing methodology called configuration fuzzing. Configuration fuzzing is a technique whereby the configuration of the running application is randomly modified at certain execution points, in order to check for vulnerabilities that only arise in certain conditions. As the application runs in the deployment environment, this testing technique continuously fuzzes the configuration and checks "security invariants" that, if violated, indicate a vulnerability; however, the fuzzing is performed in a duplicated copy of the original process, so that it does not affect the state of the running application. In addition to discussing the approach and describing a prototype framework for implementation, we also present the results of a case study to demonstrate the approach's efficiency.

  14. Virtuous aging and existential vulnerability.

    Science.gov (United States)

    Laceulle, Hanne

    2017-12-01

    In its efforts to overcome problematic views that associate aging with inevitable decline, contemporary gerontology shows a tendency to focus predominantly on age-related vulnerabilities that science may try to remedy and control. However, gerontology should also offer languages to address vulnerabilities that cannot be remedied because they intrinsically belong to the human condition. After all, these are increasingly radically encountered in later life and should therefore be reflected upon in the study of aging. Humanistic gerontology seems to be the most promising field to look for languages capable of contemplating such existential vulnerabilities. The potential contribution of philosophy in this field remains underdeveloped so far, however. This article therefore aims to introduce insights from the philosophical tradition to (humanistic) gerontology. More specifically, it focuses on the tradition of virtue ethics, arguing that virtue is a particularly relevant notion to explore in dealing with existential vulnerability in later life. The notion of virtue is clarified by discussing a selection of philosophical perspectives on this topic, by Aristotle, MacIntyre and Swanton. Next a brief overview will be given of some of the ways the notion of virtue has found its way into gerontological discourse so far. The article ends with an analysis of the merits of virtue-ethical discourse for the study of aging and later life, and pleads for more inclusion of philosophical ideas such as virtue in gerontology, as these can enrich our conceptual frameworks and help us relate to deep existential questions regarding the experience of aging. Copyright © 2017 Elsevier Inc. All rights reserved.

  15. Vulnerability of birds to climate change in California's Sierra Nevada

    OpenAIRE

    Rodney B. Siegel; Peter Pyle; James H. Thorne; Andrew J. Holguin; Christine A. Howell; Sarah Stock; Morgan W. Tingley

    2014-01-01

    In a rapidly changing climate, effective bird conservation requires not only reliable information about the current vulnerability of species of conservation concern, but also credible projections of their future vulnerability. Such projections may enable managers to preempt or reduce emerging climate-related threats through appropriate habitat management. We used NatureServe's Climate Change Vulnerability Index (CCVI) to predict vulnerability to climate change of 168 bird species that breed i...

  16. Vulnerability of European freshwater catchments to climate change.

    Science.gov (United States)

    Markovic, Danijela; Carrizo, Savrina F; Kärcher, Oskar; Walz, Ariane; David, Jonathan N W

    2017-09-01

    Climate change is expected to exacerbate the current threats to freshwater ecosystems, yet multifaceted studies on the potential impacts of climate change on freshwater biodiversity at scales that inform management planning are lacking. The aim of this study was to fill this void through the development of a novel framework for assessing climate change vulnerability tailored to freshwater ecosystems. The three dimensions of climate change vulnerability are as follows: (i) exposure to climate change, (ii) sensitivity to altered environmental conditions and (iii) resilience potential. Our vulnerability framework includes 1685 freshwater species of plants, fishes, molluscs, odonates, amphibians, crayfish and turtles alongside key features within and between catchments, such as topography and connectivity. Several methodologies were used to combine these dimensions across a variety of future climate change models and scenarios. The resulting indices were overlaid to assess the vulnerability of European freshwater ecosystems at the catchment scale (18 783 catchments). The Balkan Lakes Ohrid and Prespa and Mediterranean islands emerge as most vulnerable to climate change. For the 2030s, we showed a consensus among the applied methods whereby up to 573 lake and river catchments are highly vulnerable to climate change. The anthropogenic disruption of hydrological habitat connectivity by dams is the major factor reducing climate change resilience. A gap analysis demonstrated that the current European protected area network covers climate change. Priority should be placed on enhancing stakeholder cooperation at the major basin scale towards preventing further degradation of freshwater ecosystems and maintaining connectivity among catchments. The catchments identified as most vulnerable to climate change provide preliminary targets for development of climate change conservation management and mitigation strategies. © 2017 John Wiley & Sons Ltd.

  17. Rethinking vulnerability analysis and governance with emphasis on a participatory approach.

    Science.gov (United States)

    Rossignol, Nicolas; Delvenne, Pierre; Turcanu, Catrinel

    2015-01-01

    This article draws on vulnerability analysis as it emerged as a complement to classical risk analysis, and it aims at exploring its ability for nurturing risk and vulnerability governance actions. An analysis of the literature on vulnerability analysis allows us to formulate a three-fold critique: first, vulnerability analysis has been treated separately in the natural and the technological hazards fields. This separation prevents vulnerability from unleashing the full range of its potential, as it constrains appraisals into artificial categories and thus already closes down the outcomes of the analysis. Second, vulnerability analysis focused on assessment tools that are mainly quantitative, whereas qualitative appraisal is a key to assessing vulnerability in a comprehensive way and to informing policy making. Third, a systematic literature review of case studies reporting on participatory approaches to vulnerability analysis allows us to argue that participation has been important to address the above, but it remains too closed down in its approach and would benefit from embracing a more open, encompassing perspective. Therefore, we suggest rethinking vulnerability analysis as one part of a dynamic process between opening-up and closing-down strategies, in order to support a vulnerability governance framework. © 2014 Society for Risk Analysis.

  18. Dichroic Liquid Crystal Displays

    Science.gov (United States)

    Bahadur, Birendra

    The following sections are included: * INTRODUCTION * DICHROIC DYES * Chemical Structure * Chemical and Photochemical Stability * THEORETICAL MODELLING * DEFECTS CAUSED BY PROLONGED LIGHT IRRADIATION * CHEMICAL STRUCTURE AND PHOTOSTABILITY * OTHER PARAMETERS AFFECTING PHOTOSTABILITY * CELL PREPARATION * DICHROIC PARAMETERS AND THEIR MEASUREMENTS * Order Parameter and Dichroic Ratio Of Dyes * Absorbance, Order Parameter and Dichroic Ratio Measurements * IMPACT OF DYE STRUCTURE AND LIQUID CRYSTAL HOST ON PHYSICAL PROPERTIES OF A DICHROIC MIXTURE * Order Parameter and Dichroic Ratio * EFFECT OF LENGTH OF DICHROIC DYES ON THE ORDER PARAMETER * EFFECT OF THE BREADTH OF DYE ON THE ORDER PARAMETER * EFFECT OF THE HOST ON THE ORDER PARAMETER * TEMPERATURE VARIATION OF THE ORDER PARAMETER OF DYES IN A LIQUID CRYSTAL HOST * IMPACT OF DYE CONCENTRATION ON THE ORDER PARAMETER * Temperature Range * Viscosity * Dielectric Constant and Anisotropy * Refractive Indices and Birefringence * solubility43,153-156 * Absorption Wavelength and Auxochromic Groups * Molecular Engineering of Dichroic Dyes * OPTICAL, ELECTRO-OPTICAL AND LIFE PARAMETERS * Colour And CIE Colour space120,160-166 * CIE 1931 COLOUR SPACE * CIE 1976 CHROMATICITY DIAGRAM * CIE UNIFORM COLOUR SPACES & COLOUR DIFFERENCE FORMULAE120,160-166 * Electro-Optical Parameters120 * LUMINANCE * CONTRAST AND CONTRAST RATIO * SWITCHING SPEED * Life Parameters and Failure Modes * DICHROIC MIXTURE FORMULATION * Monochrome Mixture * Black Mixture * ACHROMATIC BLACK MIXTURE FOR HEILMEIER DISPLAYS * Effect of Illuminant on Display Colour * Colour of the Field-On State * Effect of Dye Linewidth * Optimum Centroid Wavelengths * Effect of Dye Concentration * Mixture Formulation Using More Than Three Dyes * ACHROMATIC MIXTURE FOR WHITE-TAYLOR TYPE DISPLAYS * HEILMEIER DISPLAYS * Theoretical Modelling * Threshold Characteristic * Effects of Dye Concentration on Electro-optical Parameters * Effect of Cholesteric Doping * Effect of Alignment

  19. Cognitive deficits in heart failure: Re-cognition of vulnerability as a strange new world.

    Science.gov (United States)

    Sloan, Rebecca S; Pressler, Susan J

    2009-01-01

    Patients with chronic heart failure (HF) have impairment in memory, psychomotor speed, and executive function. The aim of this study was to describe how individuals with HF and cognitive deficits manage self-care in their daily lives. Using an interpretive phenomenology method, HF patients completed unstructured face-to-face interviews about their ability to manage complex health regimens and maintain their health-related quality of life. Analysis of data was aided by use of Atlas.ti computer software. The sample consisted of 12 patients (10 men; aged 43-81 years) who had previously undergone neuropsychological testing and were found to have deficits in 3 or more cognitive domains. Patients confirmed that they followed the advice of healthcare providers by adherence to medication regimens, dietary sodium restrictions, and HF self-care. One overarching theme was identified: "Re-cognition of Vulnerability: A Strange New World." This theme was further differentiated into 3 components: (1) not recognizing cognitive deficits; (2) recognizing cognitive deficits, described as (a) never could remember anything, (b) just old age, (c) HF-related change, and (d) making normal accommodations; and (3) recognizing vulnerability, explained by perception of (a) cognitive, (b) physical, and (c) social vulnerabilities, as well as perception of (d) the nearness of death. Although the study was designed to focus on the cognitive changes in HF patients, it was difficult to separate cognitive, physical, and social challenges. These changes are most useful when taken as a constellation. Healthcare professionals can use the knowledge to identify problems and interventions for HF patients.

  20. Analyses Of Two End-User Software Vulnerability Exposure Metrics

    Energy Technology Data Exchange (ETDEWEB)

    Jason L. Wright; Miles McQueen; Lawrence Wellman

    2012-08-01

    The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

  1. Seychelles, a vulnerable or resilient SIDS? A local perspective

    Directory of Open Access Journals (Sweden)

    Dean Philpot

    2015-05-01

    Full Text Available This article analyses perceptions of residents of the Seychelles in the western Indian Ocean in relation to a long-running debate over small island developing states (SIDS as to whether they are vulnerable or resilient. The results of data obtained from 25 key informant interviews and 70 household surveys conducted in 2013 showed that respondents perceived their country to be both vulnerable and resilient. Moreover, the data revealed that the relationship between vulnerability and resilience was complex, and that five interpretations of that relationship were evident: conflict, compromise, complementarity, symbiosis and transformation. Also, the conceptual distance between the two terms – vulnerability and resilience – was shown to be closer than may be commonly assumed. Finally, the paper questions whether the debate over vulnerability versus resilience is rightly confined to SIDS or could be equally applied to other states.

  2. Subchondral mesenchymal stem cells from osteoarthritic knees display high osteogenic differentiation capacity through microRNA-29a regulation of HDAC4.

    Science.gov (United States)

    Lian, Wei-Shiung; Wu, Ren-Wen; Lee, Mel S; Chen, Yu-Shan; Sun, Yi-Chih; Wu, Shing-Long; Ke, Huei-Jing; Ko, Jih-Yang; Wang, Feng-Sheng

    2017-12-01

    Subchondral bone deterioration and osteophyte formation attributable to excessive mineralization are prominent features of end-stage knee osteoarthritis (OA). The cellular events underlying subchondral integrity diminishment remained elusive. This study was undertaken to characterize subchondral mesenchymal stem cells (SMSCs) isolated from patients with end-stage knee OA who required total knee arthroplasty. The SMSCs expressed surface antigens CD29, CD44, CD73, CD90, CD105, and CD166 and lacked CD31, CD45, and MHCII expression. The cell cultures exhibited higher proliferation and greater osteogenesis and chondrogenesis potencies, whereas their population-doubling time and adipogenic lineage commitment were lower than those of bone marrow MSCs (BMMSCs). They also displayed higher expressions of embryonic stem cell marker OCT3/4 and osteogenic factors Wnt3a, β-catenin, and microRNA-29a (miR-29a), concomitant with lower expressions of joint-deleterious factors HDAC4, TGF-β1, IL-1β, TNF-α, and MMP3, in comparison with those of BMMSCs. Knockdown of miR-29a lowered Wnt3a expression and osteogenic differentiation of the SMSCs through elevating HDAC4 translation, which directly regulated the 3'-untranslated region of HDAC4. Likewise, transgenic mice that overexpressed miR-29a in osteoblasts exhibited a high bone mass in the subchondral region. SMSCs in the transgenic mice showed a higher osteogenic differentiation and lower HDAC4 signaling than those in wild-type mice. Taken together, high osteogenesis potency existed in the SMSCs in the osteoarthritic knee. The miR-29a modulation of HDAC4 and Wnt3a signaling was attributable to the increase in osteogenesis. This study shed an emerging light on the characteristics of SMSCs and highlighted the contribution of SMSCs in the exacerbation of subchondral integrity in end-stage knee OA. Subchondral MSCs (SMSCs) from OA knee expressed embryonic stem cell marker Oct3/4. The SMSCs showed high proliferation and osteogenic and

  3. Modelling homogeneous regions of social vulnerability to malaria in Rwanda.

    Science.gov (United States)

    Bizimana, Jean Pierre; Kienberger, Stefan; Hagenlocher, Michael; Twarabamenye, Emmanuel

    2016-03-31

    Despite the decline in malaria incidence due to intense interventions, potentials for malaria transmission persist in Rwanda. To eradicate malaria in Rwanda, strategies need to expand beyond approaches that focus solely on malaria epidemiology and also consider the socioeconomic, demographic and biological/disease-related factors that determine the vulnerability of potentially exposed populations. This paper analyses current levels of social vulnerability to malaria in Rwanda by integrating a set of weighted vulnerability indicators. The paper uses regionalisation techniques as a spatially explicit approach for delineating homogeneous regions of social vulnerability to malaria. This overcomes the limitations of administrative boundaries for modelling the trans-boundary social vulnerability to malaria. The utilised approach revealed high levels of social vulnerability to malaria in the highland areas of Rwanda, as well as in remote areas where populations are more susceptible. Susceptibility may be due to the populations' lacking the capacity to anticipate mosquito bites, or lacking resilience to cope with or recover from malaria infection. By highlighting the most influential indicators of social vulnerability to malaria, the applied approach indicates which vulnerability domains need to be addressed, and where appropriate interventions are most required. Interventions to improve the socioeconomic development in highly vulnerable areas could prove highly effective, and provide sustainable outcomes against malaria in Rwanda. This would ultimately increase the resilience of the population and their capacity to better anticipate, cope with, and recover from possible infection.

  4. Absence of alsin function leads to corticospinal motor neuron vulnerability via novel disease mechanisms.

    Science.gov (United States)

    Gautam, Mukesh; Jara, Javier H; Sekerkova, Gabriella; Yasvoina, Marina V; Martina, Marco; Özdinler, P Hande

    2016-03-15

    Mutations in the ALS2 gene result in early-onset amyotrophic lateral sclerosis, infantile-onset ascending hereditary spastic paraplegia and juvenile primary lateral sclerosis, suggesting prominent upper motor neuron involvement. However, the importance of alsin function for corticospinal motor neuron (CSMN) health and stability remains unknown. To date, four separate alsin knockout (Alsin(KO)) mouse models have been generated, and despite hopes of mimicking human pathology, none displayed profound motor function defects. This, however, does not rule out the possibility of neuronal defects within CSMN, which is not easy to detect in these mice. Detailed cellular analysis of CSMN has been hampered due to their limited numbers and the complex and heterogeneous structure of the cerebral cortex. In an effort to visualize CSMN in vivo and to investigate precise aspects of neuronal abnormalities in the absence of alsin function, we generated Alsin(KO)-UeGFP mice, by crossing Alsin(KO) and UCHL1-eGFP mice, a CSMN reporter line. We find that CSMN display vacuolated apical dendrites with increased autophagy, shrinkage of soma size and axonal pathology even in the pons region. Immunocytochemistry coupled with electron microscopy reveal that alsin is important for maintaining cellular cytoarchitecture and integrity of cellular organelles. In its absence, CSMN displays selective defects both in mitochondria and Golgi apparatus. UCHL1-eGFP mice help understand the underlying cellular factors that lead to CSMN vulnerability in diseases, and our findings reveal unique importance of alsin function for CSMN health and stability. © The Author 2016. Published by Oxford University Press.

  5. Risk assessment by dynamic representation of vulnerability, exploitation, and impact

    Science.gov (United States)

    Cam, Hasan

    2015-05-01

    Assessing and quantifying cyber risk accurately in real-time is essential to providing security and mission assurance in any system and network. This paper presents a modeling and dynamic analysis approach to assessing cyber risk of a network in real-time by representing dynamically its vulnerabilities, exploitations, and impact using integrated Bayesian network and Markov models. Given the set of vulnerabilities detected by a vulnerability scanner in a network, this paper addresses how its risk can be assessed by estimating in real-time the exploit likelihood and impact of vulnerability exploitation on the network, based on real-time observations and measurements over the network. The dynamic representation of the network in terms of its vulnerabilities, sensor measurements, and observations is constructed dynamically using the integrated Bayesian network and Markov models. The transition rates of outgoing and incoming links of states in hidden Markov models are used in determining exploit likelihood and impact of attacks, whereas emission rates help quantify the attack states of vulnerabilities. Simulation results show the quantification and evolving risk scores over time for individual and aggregated vulnerabilities of a network.

  6. Intrinsic vulnerability assessment of Sette Comuni Plateau aquifer (Veneto Region, Italy).

    Science.gov (United States)

    Cucchi, Franco; Franceschini, Giuliana; Zini, Luca; Aurighi, Marina

    2008-09-01

    Maps illustrating the different degrees of vulnerability within a given area are integral to environmental protection and management policies. The assessment of the intrinsic vulnerability of karst areas is difficult since the type and stage of karst development and the related underground discharge behavior are difficult to determine and quantify. Geographic Information Systems techniques are applied to the evaluation of the vulnerability of an aquifer in the alpine karst area of the Sette Comuni Plateau, in the Veneto Region of northern Italy. The water resources of the studied aquifer are of particular importance to the local communities. This aquifer must therefore be protected from both inappropriate use as well as possible pollution. The SINTACS and SINTACS P(RO) K(ARST) vulnerability assessment methods have been utilized here to create the vulnerability map. SINTACS P(RO) K(ARST) is an adaptation of the parametric managerial model (SINTACS) to karst hydrostructures. The vulnerability map reveals vast zones (81% of the analyzed areas) with a high degree of vulnerability. The presence of well-developed karst structures in these highly vulnerable areas facilitate water percolation, thereby enhancing the groundwater vulnerability risk. Only 1.5 of the studied aquifer have extremely high-vulnerability levels, however these areas include all of the major springs utilized for human consumption. This vulnerability map of the Sette Comuni Plateau aquifer is an indispensable tool for both the effective management of water resources and as support to environmental planning in the Sette Comuni Plateau area.

  7. A Fluid Membrane-Based Soluble Ligand Display System for Live CellAssays

    Energy Technology Data Exchange (ETDEWEB)

    Nam, Jwa-Min; Nair, Pradeep N.; Neve, Richard M.; Gray, Joe W.; Groves, Jay T.

    2005-10-14

    Cell communication modulates numerous biological processes including proliferation, apoptosis, motility, invasion and differentiation. Correspondingly, there has been significant interest in the development of surface display strategies for the presentation of signaling molecules to living cells. This effort has primarily focused on naturally surface-bound ligands, such as extracellular matrix components and cell membranes. Soluble ligands (e.g. growth factors and cytokines) play an important role in intercellular communications, and their display in a surface-bound format would be of great utility in the design of array-based live cell assays. Recently, several cell microarray systems that display cDNA, RNAi, or small molecules in a surface array format were proven to be useful in accelerating high-throughput functional genetic studies and screening therapeutic agents. These surface display methods provide a flexible platform for the systematic, combinatorial investigation of genes and small molecules affecting cellular processes and phenotypes of interest. In an analogous sense, it would be an important advance if one could display soluble signaling ligands in a surface assay format that allows for systematic, patterned presentation of soluble ligands to live cells. Such a technique would make it possible to examine cellular phenotypes of interest in a parallel format with soluble signaling ligands as one of the display parameters. Herein we report a ligand-modified fluid supported lipid bilayer (SLB) assay system that can be used to functionally display soluble ligands to cells in situ (Figure 1A). By displaying soluble ligands on a SLB surface, both solution behavior (the ability to become locally enriched by reaction-diffusion processes) and solid behavior (the ability to control the spatial location of the ligands in an open system) could be combined. The method reported herein benefits from the naturally fluid state of the supported membrane, which allows

  8. Vulnerability of the global terrestrial ecosystems to climate change.

    Science.gov (United States)

    Li, Delong; Wu, Shuyao; Liu, Laibao; Zhang, Yatong; Li, Shuangcheng

    2018-05-27

    Climate change has far-reaching impacts on ecosystems. Recent attempts to quantify such impacts focus on measuring exposure to climate change but largely ignore ecosystem resistance and resilience, which may also affect the vulnerability outcomes. In this study, the relative vulnerability of global terrestrial ecosystems to short-term climate variability was assessed by simultaneously integrating exposure, sensitivity, and resilience at a high spatial resolution (0.05°). The results show that vulnerable areas are currently distributed primarily in plains. Responses to climate change vary among ecosystems and deserts and xeric shrublands are the most vulnerable biomes. Global vulnerability patterns are determined largely by exposure, while ecosystem sensitivity and resilience may exacerbate or alleviate external climate pressures at local scales; there is a highly significant negative correlation between exposure and sensitivity. Globally, 61.31% of the terrestrial vegetated area is capable of mitigating climate change impacts and those areas are concentrated in polar regions, boreal forests, tropical rainforests, and intact forests. Under current sensitivity and resilience conditions, vulnerable areas are projected to develop in high Northern Hemisphere latitudes in the future. The results suggest that integrating all three aspects of vulnerability (exposure, sensitivity, and resilience) may offer more comprehensive and spatially explicit adaptation strategies to reduce the impacts of climate change on terrestrial ecosystems. This article is protected by copyright. All rights reserved. This article is protected by copyright. All rights reserved.

  9. Vulnerability of Coastal Communities from Storm Surge and Flood Disasters

    Science.gov (United States)

    Bathi, Jejal Reddy; Das, Himangshu S.

    2016-01-01

    Disasters in the form of coastal storms and hurricanes can be very destructive. Preparing for anticipated effects of such disasters can help reduce the public health and economic burden. Identifying vulnerable population groups can help prioritize resources for the most needed communities. This paper presents a quantitative framework for vulnerability measurement that incorporates both socioeconomic and flood inundation vulnerability. The approach is demonstrated for three coastal communities in Mississippi with census tracts being the study unit. The vulnerability results are illustrated as thematic maps for easy usage by planners and emergency responders to assist in prioritizing their actions to vulnerable populations during storm surge and flood disasters. PMID:26907313

  10. Averaged differential expression for the discovery of biomarkers in the blood of patients with prostate cancer.

    Directory of Open Access Journals (Sweden)

    V Uma Bai

    Full Text Available The identification of a blood-based diagnostic marker is a goal in many areas of medicine, including the early diagnosis of prostate cancer. We describe the use of averaged differential display as an efficient mechanism for biomarker discovery in whole blood RNA. The process of averaging reduces the problem of clinical heterogeneity while simultaneously minimizing sample handling.RNA was isolated from the blood of prostate cancer patients and healthy controls. Samples were pooled and subjected to the averaged differential display process. Transcripts present at different levels between patients and controls were purified and sequenced for identification. Transcript levels in the blood of prostate cancer patients and controls were verified by quantitative RT-PCR. Means were compared using a t-test and a receiver-operating curve was generated. The Ring finger protein 19A (RNF19A transcript was identified as having higher levels in prostate cancer patients compared to healthy men through the averaged differential display process. Quantitative RT-PCR analysis confirmed a more than 2-fold higher level of RNF19A mRNA levels in the blood of patients with prostate cancer than in healthy controls (p = 0.0066. The accuracy of distinguishing cancer patients from healthy men using RNF19A mRNA levels in blood as determined by the area under the receiving operator curve was 0.727.Averaged differential display offers a simplified approach for the comprehensive screening of body fluids, such as blood, to identify biomarkers in patients with prostate cancer. Furthermore, this proof-of-concept study warrants further analysis of RNF19A as a clinically relevant biomarker for prostate cancer detection.

  11. Proteomic analysis of osteogenic differentiation of dental follicle precursor cells

    DEFF Research Database (Denmark)

    Morsczeck, Christian; Petersen, Jørgen; Völlner, Florian

    2009-01-01

    of differentiation. In the present study we applied 2-DE combined with capillary-LC-MS/MS analysis to profile differentially regulated proteins upon differentiation of dental follicle precursor cells (DFPCs). Out of 115 differentially regulated proteins, glutamine synthetase, lysosomal proteinase cathepsin B....... The bioinformatic analyses suggest that proteins associated with cell cycle progression and protein metabolism were down-regulated and proteins involved in catabolism, cell motility and biological quality were up-regulated. These results display the general physiological state of DFPCs before and after osteogenic...... proteins, plastin 3 T-isoform, beta-actin, superoxide dismutases, and transgelin were found to be highly up-regulated, whereas cofilin-1, pro-alpha 1 collagen, destrin, prolyl 4-hydrolase and dihydrolipoamide dehydrogenase were found to be highly down-regulated. The group of up-regulated proteins...

  12. Red Team Operations to Assess Information Technology Vulnerabilities

    NARCIS (Netherlands)

    Veltman, M.; Parker, R.L.

    1999-01-01

    All Information and Communication Technology (ICT) systems have vulnerabilities. Weaknesses in these systems are introduced either during the specification, implementation or operational phase. Leaving aside these introduced vulnerabilities are intentional or unintentional, the fact remains that

  13. Crosstalk evaluation in stereoscopic displays

    NARCIS (Netherlands)

    Wang, L.; Teunissen, C.; Tu, Yan; Chen, Li; Zhang, P.; Zhang, T.; Heynderickx, I.E.J.

    2011-01-01

    Substantial progress in liquid-crystal display and polarization film technology has enabled several types of stereoscopic displays. Despite all progress, some image distortions still exist in these 3-D displays, of which interocular crosstalk - light leakage of the image for one eye to the other eye

  14. Modulation of neuronal differentiation by CD40 isoforms

    International Nuclear Information System (INIS)

    Hou Huayu; Obregon, Demian; Lou, Deyan; Ehrhart, Jared; Fernandez, Frank; Silver, Archie; Tan Jun

    2008-01-01

    Neuron differentiation is a complex process involving various cell-cell interactions, and multiple signaling pathways. We showed previously that CD40 is expressed and functional on mouse and human neurons. In neurons, ligation of CD40 protects against serum withdrawal-induced injury and plays a role in survival and differentiation. CD40 deficient mice display neuron dysfunction, aberrant neuron morphologic changes, and associated gross brain abnormalities. Previous studies by Tone and colleagues suggested that five isoforms of CD40 exist with two predominant isoforms expressed in humans: signal-transducible CD40 type I and a C-terminal truncated, non-signal-transducible CD40 type II. We hypothesized that differential expression of CD40 isoform type I and type II in neurons may modulate neuron differentiation. Results show that adult wild-type, and CD40 -/- deficient mice predominantly express CD40 type I and II isoforms. Whereas adult wild-type mice express mostly CD40 type I in cerebral tissues at relatively high levels, in age and gender-matched CD40 -/- mice CD40 type I expression was almost completely absent; suggesting a predominance of the non-signal-transducible CD40 type II isoform. Younger, 1 day old wild-type mice displayed less CD40 type I, and more CD40 type II, as well as, greater expression of soluble CD40 (CD40L/CD40 signal inhibitor), compared with 1 month old mice. Neuron-like N2a cells express CD40 type I and type II isoforms while in an undifferentiated state, however once induced to differentiate, CD40 type I predominates. Further, differentiated N2a cells treated with CD40 ligand express high levels of neuron specific nuclear protein (NeuN); an effect reduced by anti-CD40 type I siRNA, but not by control (non-targeting) siRNA. Altogether these data suggest that CD40 isoforms may act in a temporal fashion to modulate neuron differentiation during brain development. Thus, modulation of neuronal CD40 isoforms and CD40 signaling may represent

  15. What if quality of damage data is poor: an Entity-Vulnerability approach for flood vulnerability assessment

    Science.gov (United States)

    Naso, Susanna; Chen, Albert S.; Djordjević, Slobodan; Aronica, Giuseppe T.

    2015-04-01

    The classical approach to flood defence, aimed at reducing the probability of flooding through hard defences, has been substituted by flood risk management approach which accepts the idea of coping with floods and aims at reducing not only the probability of flooding, but also the consequences. In this view, the concept of vulnerability becomes central, such as the (non-structural) measures for its increment. On 22 November 2011, an exceptional rainstorm hit the Longano catchment (North-East part of Sicily, Italy) producing local heavy rainfall, mud-debris flow and flash flooding. The flash flood involved property, buildings, roads and more than 100 commercial estates have suffered severe damages. Some days after the event, the municipality provided people forms to describe the damages that occurred on their properties. Unfortunately, the lack of common guidelines in compiling them, their coarseness and the impossibility to have monetary information on them (such us damage data from previous events), did not allow the implementation of a detailed damage analysis. What we're developing in this work is a method for a qualitative evaluation of the consequences of floods, based on vulnerability curves for structures and classes of entities at risk. The difficulty in deriving the vulnerability curves for different building typologies, as function of the water depth, was due to the lack of quantitative information both on damages caused by previous events and on buildings' value. To solve the problem we submitted a questionnaire to a team of experts asking for an estimation of building damages to different hypothetical inundation depths. What we wanted to obtain was deriving the vulnerability data from technicians' experience, believing in the fundamental importance of the collaboration among research and professional engineers. Through the elaboration and the synthesis of the experts' estimations we derived the vulnerability curves for different building typologies and

  16. Monitoring the Vulnerability of Energy Supply System

    International Nuclear Information System (INIS)

    Gnansonounou, E.

    2006-01-01

    Due to the increasing complexity of the world evolution, the public decision makers, the energy supply industry and the consumers in industrialised countries are more and more sensitive to the vulnerability of energy supply. The emergence of new big consumer countries and the perspective of oil and gas depletion at the end of the current century raise the concerns about how to share fairly the remaining resources for the common and sustainable development of the mankind. Erratic energy prices discourage investment and delay the energy transition. Voluntary measures are needed mainly in industrialised countries in order to develop alternative and sustainable energy sources and to avoid world struggle for energy procurement. In this contribution a synthetic energy vulnerability index is defined for monitoring energy supply vulnerability. The proposed index is based on energy intensity, oil and gas import dependency, CO 2 content of primary energy supply, electricity supply vulnerability and non-diversity in transport fuels. The preliminary assessment of this synthetic index for selected industrialised countries provides promising results that need however further refinement.(author)

  17. Analysis of computational vulnerabilities in digital repositories

    Directory of Open Access Journals (Sweden)

    Valdete Fernandes Belarmino

    2015-04-01

    Full Text Available Objective. Demonstrates the results of research that aimed to analyze the computational vulnerabilities of digital directories in public Universities. Argues the relevance of information in contemporary societies like an invaluable resource, emphasizing scientific information as an essential element to constitute scientific progress. Characterizes the emergence of Digital Repositories and highlights its use in academic environment to preserve, promote, disseminate and encourage the scientific production. Describes the main software for the construction of digital repositories. Method. The investigation identified and analyzed the vulnerabilities that are exposed the digital repositories using Penetration Testing running. Discriminating the levels of risk and the types of vulnerabilities. Results. From a sample of 30 repositories, we could examine 20, identified that: 5% of the repositories have critical vulnerabilities, 85% high, 25% medium and 100% lowers. Conclusions. Which demonstrates the necessity to adapt actions for these environments that promote informational security to minimizing the incidence of external and / or internal systems attacks.Abstract Grey Text – use bold for subheadings when needed.

  18. Vulnerability to Climate Change in Rural Nicaragua

    Science.gov (United States)

    Byrne, T. R.; Townshend, I.; Byrne, J. M.; McDaniel, S. A.

    2013-12-01

    While there is a growing recognition of the impact that climate change may have on human development, there has been a shift in focus from an impacts-led assessment approach towards a vulnerability-led assessment approach. This research operationalizes the IPCC's definition of vulnerability in a sub-national assessment to understand how different factors that shape vulnerability to climate change vary spatially across rural Nicaragua. The research utilizes the Food and Agriculture Organization of the United Nations' (FAO UN) CropWat model to evaluate how the annual yield of two of Nicaragua's staple crops may change under projected changes in temperature and precipitation. This analysis of agricultural sensitivity under exposure to climate change is then overlain with an indicator-based assessment of adaptive capacity in rural Nicaraguan farming households. Adaptive capacity was evaluated using household survey data from the 2001 National Household Survey on Living Standards Measurement, which was provided to us by the FAO UN. The result is a map representing current vulnerability to future climate change, and can serve as a basis for targeting policy interventions in rural Nicaragua.

  19. Groundwater vulnerability assessment in karstic aquifers using COP method.

    Science.gov (United States)

    Bagherzadeh, Somayeh; Kalantari, Nasrollah; Nobandegani, Amir Fadaei; Derakhshan, Zahra; Conti, Gea Oliveri; Ferrante, Margherita; Malekahmadi, Roya

    2018-05-02

    Access to safe and reliable drinking water is amongst the important indicators of development in each society, and water scarcity is one of the challenges and limitations affecting development at national and regional levels and social life and economic activity areas. Generally, there are two types of drinking water sources: the first type is surface waters, including lakes, rivers, and streams and the second type is groundwaters existing in aquifers. Amongst aquifers, karst aquifers play an important role in supplying water sources of the world. Therefore, protecting these aquifers from pollution sources is of paramount importance. COP method is amongst the methods to investigate the intrinsic vulnerability of this type of aquifers, so that areas susceptible to contamination can be determined before being contaminated and these sources can be protected. In the present study, COP method was employed in order to spot the regions that are prone to contamination in the region. This method uses the properties of overlying geological layers above the water table (O factor), the concentration of flow (C factor), and precipitation (P factor) over the aquifer, as the parameters to assess the intrinsic vulnerability of groundwater resources. In this regard, geographical information system (GIS) and remote sensing (RS) were utilized to prepare the mentioned factors and the intrinsic vulnerability map was obtained. The results of COP method indicated that the northwest and the west of the region are highly and very vulnerable. This study indicated that regions with low vulnerability were observed in eastern areas, which accounted for 15.6% of the area. Moderate vulnerability was 40% and related to the northeast and southeast of the area. High vulnerability was 38.2% and related to western and southwestern regions. Very high vulnerability was 6.2% and related to the northwest of the area. By means of the analysis of sensitivity of the model, it was determined that the focus

  20. 77 FR 28894 - Maritime Vulnerability Self-Assessment Tool

    Science.gov (United States)

    2012-05-16

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Maritime Vulnerability Self... maritime vulnerability self- assessment tool. SUMMARY: The Transportation Security Administration (TSA) announces that the TSA Maritime Self-Assessment Risk Module (TMSARM), developed to support the United States...

  1. Cognitive vulnerability to depression : genetic and environmental influences

    NARCIS (Netherlands)

    Antypa, Niki

    2011-01-01

    This thesis explores cognitive vulnerability to depression and the interplay between genetic and environmental influences. Cognitive vulnerability to depression is characterized by negative patterns of information processing. One aspect is cognitive reactivity - the tendency to respond with

  2. Consortium for military LCD display procurement

    Science.gov (United States)

    Echols, Gregg

    2002-08-01

    International Display Consortium (IDC) is the joining together of display companies to combined their buying power and obtained favorable terms with a major LCD manufacturer. Consolidating the buying power and grouping the demand enables the rugged display industry of avionics, ground vehicles, and ship based display manufacturers to have unencumbered access to high performance AMLCDs while greatly reducing risk and lowering cost. With an unrestricted supply of AMLCD displays, the consortium members have total control of their risk, cost, deliveries and added value partners. Every display manufacturer desires a very close relationship with a display vender. With IDC each consortium member achieves a close relationship. Consortium members enjoy cost effective access to high performance, industry standard sized LCD panels, and modified commercial displays with 100 degree C clearing points and portrait configurations. Consortium members also enjoy proposal support, technical support and long-term support.

  3. Tribbles 3 inhibits brown adipocyte differentiation and function by suppressing insulin signaling

    Energy Technology Data Exchange (ETDEWEB)

    Jeong, Ha-Won; Choi, Ran Hee; McClellan, Jamie L. [Division of Applied Physiology, Department of Exercise Science, University of South Carolina, Columbia, SC 29208 (United States); Piroli, Gerardo G.; Frizzell, Norma [Department of Pharmacology, Physiology & Neuroscience, University of South Carolina School of Medicine, Columbia, SC 29208 (United States); Tseng, Yu-Hua; Goodyear, Laurie J. [Research Division, Joslin Diabetes Center and Department of Medicine, Harvard Medical School, Boston, MA 02215 (United States); Koh, Ho-Jin, E-mail: kohh@mailbox.sc.edu [Division of Applied Physiology, Department of Exercise Science, University of South Carolina, Columbia, SC 29208 (United States)

    2016-02-19

    Recent studies have demonstrated that adult humans have substantial amounts of functioning brown adipose tissue (BAT). Since BAT has been implicated as an anti-obese and anti-diabetic tissue, it is important to understand the signaling molecules that regulate BAT function. There has been a link between insulin signaling and BAT metabolism as deletion or pharmaceutical inhibition of insulin signaling impairs BAT differentiation and function. Tribbles 3 (TRB3) is a pseudo kinase that has been shown to regulate metabolism and insulin signaling in multiple tissues but the role of TRB3 in BAT has not been studied. In this study, we found that TRB3 expression was present in BAT and overexpression of TRB3 in brown preadipocytes impaired differentiation and decreased expression of BAT markers. Furthermore, TRB3 overexpression resulted in significantly lower oxygen consumption rates for basal and proton leakage, indicating decreased BAT activity. Based on previous studies showing that deletion or pharmaceutical inhibition of insulin signaling impairs BAT differentiation and function, we assessed insulin signaling in brown preadipocytes and BAT in vivo. Overexpression of TRB3 in cells impaired insulin-stimulated IRS1 and Akt phosphorylation, whereas TRB3KO mice displayed improved IRS1 and Akt phosphorylation. Finally, deletion of IRS1 abolished the function of TRB3 to regulate BAT differentiation and metabolism. These data demonstrate that TRB3 inhibits insulin signaling in BAT, resulting in impaired differentiation and function. - Highlights: • TRB3 is expressed in brown adipose tissue and its expression is increased during differentiation. • Overexpression of TRB3 inhibits differentiation and its activity. • Overexpression of TRB3 in brown preadipocytes inhibits insulin signaling. • TRB3KO mice displays improved insulin signaling in brown adipose tissue. • Insulin signaling is required for the effects of TRB3 to regulate brown adipose tissue differentiation and

  4. Tribbles 3 inhibits brown adipocyte differentiation and function by suppressing insulin signaling

    International Nuclear Information System (INIS)

    Jeong, Ha-Won; Choi, Ran Hee; McClellan, Jamie L.; Piroli, Gerardo G.; Frizzell, Norma; Tseng, Yu-Hua; Goodyear, Laurie J.; Koh, Ho-Jin

    2016-01-01

    Recent studies have demonstrated that adult humans have substantial amounts of functioning brown adipose tissue (BAT). Since BAT has been implicated as an anti-obese and anti-diabetic tissue, it is important to understand the signaling molecules that regulate BAT function. There has been a link between insulin signaling and BAT metabolism as deletion or pharmaceutical inhibition of insulin signaling impairs BAT differentiation and function. Tribbles 3 (TRB3) is a pseudo kinase that has been shown to regulate metabolism and insulin signaling in multiple tissues but the role of TRB3 in BAT has not been studied. In this study, we found that TRB3 expression was present in BAT and overexpression of TRB3 in brown preadipocytes impaired differentiation and decreased expression of BAT markers. Furthermore, TRB3 overexpression resulted in significantly lower oxygen consumption rates for basal and proton leakage, indicating decreased BAT activity. Based on previous studies showing that deletion or pharmaceutical inhibition of insulin signaling impairs BAT differentiation and function, we assessed insulin signaling in brown preadipocytes and BAT in vivo. Overexpression of TRB3 in cells impaired insulin-stimulated IRS1 and Akt phosphorylation, whereas TRB3KO mice displayed improved IRS1 and Akt phosphorylation. Finally, deletion of IRS1 abolished the function of TRB3 to regulate BAT differentiation and metabolism. These data demonstrate that TRB3 inhibits insulin signaling in BAT, resulting in impaired differentiation and function. - Highlights: • TRB3 is expressed in brown adipose tissue and its expression is increased during differentiation. • Overexpression of TRB3 inhibits differentiation and its activity. • Overexpression of TRB3 in brown preadipocytes inhibits insulin signaling. • TRB3KO mice displays improved insulin signaling in brown adipose tissue. • Insulin signaling is required for the effects of TRB3 to regulate brown adipose tissue differentiation and

  5. Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation

    Science.gov (United States)

    Yoshioka, Katsunari; Inoue, Daisuke; Eto, Masashi; Hoshizawa, Yuji; Nogawa, Hiroki; Nakao, Koji

    Exploiting vulnerabilities of remote systems is one of the fundamental behaviors of malware that determines their potential hazards. Understanding what kind of propagation tactics each malware uses is essential in incident response because such information directly links with countermeasures such as writing a signature for IDS. Although recently malware sandbox analysis has been studied intensively, little work is done on securely observing the vulnerability exploitation by malware. In this paper, we propose a novel sandbox analysis method for securely observing malware's vulnerability exploitation in a totally isolated environment. In our sandbox, we prepare two victim hosts. We first execute the sample malware on one of these hosts and then let it attack the other host which is running multiple vulnerable services. As a simple realization of the proposed method, we have implemented a sandbox using Nepenthes, a low-interaction honeypot, as the second victim. Because Nepenthes can emulate a variety of vulnerable services, we can efficiently observe the propagation of sample malware. In the experiments, among 382 samples whose scan capabilities are confirmed, 381 samples successfully started exploiting vulnerabilities of the second victim. This indicates the certain level of feasibility of the proposed method.

  6. A new approach to analyzing vulnerability

    International Nuclear Information System (INIS)

    O'Callaghan, P.B.; Carlson, R.L.; Riedeman, G.W.

    1986-01-01

    The Westinghouse Hanford Company (WHC) has recently completed construction of the Fuel Cycle Plant (FCP) at Richland, Washington. At start-up the facility will fabricate driver fuel for the Fast Flux Test Facility in the Secure Automated Fabrication line. After construction completion, but before facility certification, the Department of Energy (DOE) Richland Operation Office requested that a vulnerability analysis be performed which assumed multiple insiders as a threat to the security system. A unique method of analyzing facility vulnerabilities was developed at the Security Applications Center (SAC), which is managed by WHC for DOE. The method that was developed verifies a previous vulnerability assessment, as well as introducing a modeling technique which analyzes security alarms in relation to delaying factors and possible insider activities. With this information it is possible to assess the relative strength or weakness of various possible routes to and from a target within a facility,

  7. Assessing species vulnerability to climate change

    Science.gov (United States)

    Pacifici, Michela; Foden, Wendy B.; Visconti, Piero; Watson, James E. M.; Butchart, Stuart H. M.; Kovacs, Kit M.; Scheffers, Brett R.; Hole, David G.; Martin, Tara G.; Akçakaya, H. Resit; Corlett, Richard T.; Huntley, Brian; Bickford, David; Carr, Jamie A.; Hoffmann, Ary A.; Midgley, Guy F.; Pearce-Kelly, Paul; Pearson, Richard G.; Williams, Stephen E.; Willis, Stephen G.; Young, Bruce; Rondinini, Carlo

    2015-03-01

    The effects of climate change on biodiversity are increasingly well documented, and many methods have been developed to assess species' vulnerability to climatic changes, both ongoing and projected in the coming decades. To minimize global biodiversity losses, conservationists need to identify those species that are likely to be most vulnerable to the impacts of climate change. In this Review, we summarize different currencies used for assessing species' climate change vulnerability. We describe three main approaches used to derive these currencies (correlative, mechanistic and trait-based), and their associated data requirements, spatial and temporal scales of application and modelling methods. We identify strengths and weaknesses of the approaches and highlight the sources of uncertainty inherent in each method that limit projection reliability. Finally, we provide guidance for conservation practitioners in selecting the most appropriate approach(es) for their planning needs and highlight priority areas for further assessments.

  8. Human Rights and Vulnerability. Examples of Sexism and Ageism

    Directory of Open Access Journals (Sweden)

    Mª DEL CARMEN BARRANCO AVILÉS

    2015-12-01

    Full Text Available A human rights based approach applied to the idea of ‘vulnerable group’ connects vulnerability and structural discrimination. The Convention on the Rights of Persons with Disability provides some elements that allow to state that we are facing a new paradigm in the International Human Rights Law. One of the keys for the understanding of this new framework is the assumption of the disadvantage related to vulnerability as, at least in a part, socially built and ideologically justified. Sexism and ageism are examples of how ideologies reinforce vulnerability of women, children and aged persons transforming them in groups which members are in risk of discrimination.

  9. Flood vulnerability of critical infrastructure in Cork, Ireland

    Directory of Open Access Journals (Sweden)

    de Bruijn Karin M.

    2016-01-01

    Full Text Available Recent flood events in Ireland and particularly in County Cork have caused significant disruption to health service provisions, interruption of water and power supplies, and damage to roads and other transportation infrastructure, affecting the lives of hundreds of thousands of people over a prolonged period of weeks. These events clearly reveal- the vulnerability of the critical infrastructure to flooding and the dependence of society on critical infrastructure. In order to reduce the flood vulnerability and increase the resilience of the critical infrastructure networks in the future, detailed evidence-based analysis and assessment is essential. To this end a case study has been carried out on Cork City which analyses this vulnerability as it was in 2009, and as it is currently, and identifies adaptation options to reduce the future vulnerability of critical infrastructure to flooding and to build a more resilient society. This paper describes the storyline approach and CIrcle tool and their application to Cork City which focused on the analysis of the flood vulnerability of critical infrastructure and the impacts of failure of the infrastructure for other critical functions and on society.

  10. Super high precision 200 ppi liquid crystal display series; Chokoseido 200 ppi ekisho display series

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-03-01

    In mobile equipment, in demand is a high precision liquid crystal display (LCD) having the power of expression equivalent to printed materials like magazines because of the necessity of displaying a large amount of information on a easily potable small screen. In addition, with the spread and high-quality image of digital still cameras, it is strongly desired to display photographed digital image data in high quality. Toshiba Corp., by low temperature polysilicone (p-Si) technology, commercialized the liquid crystal display series of 200 ppi (pixels per inch) precision dealing with the rise of the high-precision high-image quality LCD market. The super high precision of 200 ppi enables the display of smooth beautiful animation comparable to printed sheets of magazines and photographs. The display series are suitable for the display of various information services such as electronic books and electronic photo-viewers including internet. The screen sizes lined up are No. 4 type VGA (640x480 pixels) of a small pocket notebook size and No. 6.3 type XGA (1,024x768 pixels) of a paperback size, with a larger screen to be furthered. (translated by NEDO)

  11. What's in a word? Conflicting interpretations of vulnerability in climate change research

    International Nuclear Information System (INIS)

    O'Brien, Karen; Eriksen, Siri; Schjolden, Ane; Nygaard, Lynn

    2004-01-01

    In this paper, we discuss two competing interpretations of vulnerability in the climate change literature and consider the implications for both research and policy. The first interpretation, which can be referred to as the ''end point'' approach, views vulnerability as a residual of climate change impacts minus adaptation. The second interpretation, which takes vulnerability as a ''starting point'', views vulnerability as a general characteristic generated by multiple factors and processes. Viewing vulnerability as an end point considers that adaptations and adaptive capacity determine vulnerability, whereas viewing vulnerability as a starting point holds that vulnerability determines adaptive capacity. The practical consequences of these two interpretations are illustrated through the examples of Norway and Mozambique. We show that, if the underlying causes and contexts of vulnerability are not taken into account, there is a danger of underestimating the magnitude (large), scope (social arid environmental) and urgency (high) of climate change. (author)

  12. A Compressive Superresolution Display

    KAUST Repository

    Heide, Felix; Gregson, James; Wetzstein, Gordon; Raskar, Ramesh; Heidrich, Wolfgang

    2014-01-01

    In this paper, we introduce a new compressive display architecture for superresolution image presentation that exploits co-design of the optical device configuration and compressive computation. Our display allows for superresolution, HDR, or glasses-free 3D presentation.

  13. A Compressive Superresolution Display

    KAUST Repository

    Heide, Felix

    2014-06-22

    In this paper, we introduce a new compressive display architecture for superresolution image presentation that exploits co-design of the optical device configuration and compressive computation. Our display allows for superresolution, HDR, or glasses-free 3D presentation.

  14. Informality and employment vulnerability: application in sellers with subsistence work

    Science.gov (United States)

    Garzón-Duque, María Osley; Cardona-Arango, María Doris; Rodríguez-Ospina, Fabio León; Segura-Cardona, Angela María

    2017-01-01

    ABSTRACT OBJECTIVE To describe the origin, evolution, and application of the concept of employment vulnerability in workers who subsist on street sales. METHODS We have carried out an analysis of the literature in database in Spanish, Portuguese, and English, without restriction by country. This is a review of the gray literature of government reports, articles, and documents from Latin America and the Caribbean. We have analyzed information on the informal economy, social-employment vulnerability, and subsistence workers. RESULTS AND CONCLUSIONS The concept of informal economy is dispersed and suggested as synonymous with employment vulnerability. As a polysemic term, it generates confusion and difficulty in identifying defined profiles of employment vulnerability in informal subsistence workers, who sell their products on the streets and sidewalks of cities. The lack of a clear concept and profile of employment vulnerability for this type of workers generates a restriction on defined actions to reduce employment vulnerability. The profiles could facilitate access to the acquisition of assets that support their structure of opportunities, facilitating and mediating in the passage from vulnerability to social mobility with opportunities. We propose as a concept of employment vulnerability for subsistence workers in the informal sector, the condition of those who must work by day to eat at night, who have little or no ownership of assets, and who have a minimum structure of opportunities to prevent, face, and resist the critical situations that occur daily, putting at risk their subsistence and that of the persons who are their responsibility, thus making the connection between social and employment vulnerability. PMID:29020122

  15. Informality and employment vulnerability: application in sellers with subsistence work

    Directory of Open Access Journals (Sweden)

    María Osley Garzón-Duque

    2017-10-01

    Full Text Available ABSTRACT OBJECTIVE To describe the origin, evolution, and application of the concept of employment vulnerability in workers who subsist on street sales. METHODS We have carried out an analysis of the literature in database in Spanish, Portuguese, and English, without restriction by country. This is a review of the gray literature of government reports, articles, and documents from Latin America and the Caribbean. We have analyzed information on the informal economy, social-employment vulnerability, and subsistence workers. RESULTS AND CONCLUSIONS The concept of informal economy is dispersed and suggested as synonymous with employment vulnerability. As a polysemic term, it generates confusion and difficulty in identifying defined profiles of employment vulnerability in informal subsistence workers, who sell their products on the streets and sidewalks of cities. The lack of a clear concept and profile of employment vulnerability for this type of workers generates a restriction on defined actions to reduce employment vulnerability. The profiles could facilitate access to the acquisition of assets that support their structure of opportunities, facilitating and mediating in the passage from vulnerability to social mobility with opportunities. We propose as a concept of employment vulnerability for subsistence workers in the informal sector, the condition of those who must work by day to eat at night, who have little or no ownership of assets, and who have a minimum structure of opportunities to prevent, face, and resist the critical situations that occur daily, putting at risk their subsistence and that of the persons who are their responsibility, thus making the connection between social and employment vulnerability.

  16. Informality and employment vulnerability: application in sellers with subsistence work.

    Science.gov (United States)

    Garzón-Duque, María Osley; Cardona-Arango, María Doris; Rodríguez-Ospina, Fabio León; Segura-Cardona, Angela María

    2017-10-05

    To describe the origin, evolution, and application of the concept of employment vulnerability in workers who subsist on street sales. We have carried out an analysis of the literature in database in Spanish, Portuguese, and English, without restriction by country. This is a review of the gray literature of government reports, articles, and documents from Latin America and the Caribbean. We have analyzed information on the informal economy, social-employment vulnerability, and subsistence workers. The concept of informal economy is dispersed and suggested as synonymous with employment vulnerability. As a polysemic term, it generates confusion and difficulty in identifying defined profiles of employment vulnerability in informal subsistence workers, who sell their products on the streets and sidewalks of cities. The lack of a clear concept and profile of employment vulnerability for this type of workers generates a restriction on defined actions to reduce employment vulnerability. The profiles could facilitate access to the acquisition of assets that support their structure of opportunities, facilitating and mediating in the passage from vulnerability to social mobility with opportunities. We propose as a concept of employment vulnerability for subsistence workers in the informal sector, the condition of those who must work by day to eat at night, who have little or no ownership of assets, and who have a minimum structure of opportunities to prevent, face, and resist the critical situations that occur daily, putting at risk their subsistence and that of the persons who are their responsibility, thus making the connection between social and employment vulnerability.

  17. Perceptions of Risk and Vulnerability Following Exposure to a Major Natural Disaster: The Calgary Flood of 2013.

    Science.gov (United States)

    Tanner, Alexa; Árvai, Joseph

    2018-03-01

    Many studies have examined the general public's flood risk perceptions in the aftermath of local and regional flooding. However, relatively few studies have focused on large-scale events that affect tens of thousands of people within an urban center. Similarly, in spite of previous research on flood risks, unresolved questions persist regarding the variables that might influence perceptions of risk and vulnerability, along with management preferences. In light of the opportunities presented by these knowledge gaps, the research reported here examined public perceptions of flood risk and vulnerability, and management preferences, within the city of Calgary in the aftermath of extensive flooding in 2013. Our findings, which come from an online survey of residents, reveal that direct experience with flooding is not a differentiating factor for risk perceptions when comparing evacuees with nonevacuees who might all experience future risks. However, we do find that judgments about vulnerability-as a function of how people perceive physical distance-do differ according to one's evacuation experience. Our results also indicate that concern about climate change is an important predictor of flood risk perceptions, as is trust in government risk managers. In terms of mitigation preferences, our results reveal differences in support for large infrastructure projects based on whether respondents feel they might actually benefit from them. © 2017 Society for Risk Analysis.

  18. JTEC panel on display technologies in Japan

    Science.gov (United States)

    Tannas, Lawrence E., Jr.; Glenn, William E.; Credelle, Thomas; Doane, J. William; Firester, Arthur H.; Thompson, Malcolm

    1992-01-01

    This report is one in a series of reports that describes research and development efforts in Japan in the area of display technologies. The following are included in this report: flat panel displays (technical findings, liquid crystal display development and production, large flat panel displays (FPD's), electroluminescent displays and plasma panels, infrastructure in Japan's FPD industry, market and projected sales, and new a-Si active matrix liquid crystal display (AMLCD) factory); materials for flat panel displays (liquid crystal materials, and light-emissive display materials); manufacturing and infrastructure of active matrix liquid crystal displays (manufacturing logistics and equipment); passive matrix liquid crystal displays (LCD basics, twisted nematics LCD's, supertwisted nematic LCD's, ferroelectric LCD's, and a comparison of passive matrix LCD technology); active matrix technology (basic active matrix technology, investment environment, amorphous silicon, polysilicon, and commercial products and prototypes); and projection displays (comparison of Japanese and U.S. display research, and technical evaluation of work).

  19. Assessing infrastructure vulnerability to major floods

    Energy Technology Data Exchange (ETDEWEB)

    Jenssen, Lars

    1998-12-31

    This thesis proposes a method for assessing the direct effects of serious floods on a physical infrastructure or utility. This method should be useful in contingency planning and in the design of structures likely to be damaged by flooding. A review is given of (1) methods of floodplain management and strategies for mitigating floods, (2) methods of risk analysis that will become increasingly important in flood management, (3) methods for hydraulic computations, (4) a variety of scour assessment methods and (5) applications of geographic information systems (GIS) to the analysis of flood vulnerability. Three computer codes were developed: CULVCAP computes the headwater level for circular and box culverts, SCOUR for assessing riprap stability and scour depths, and FASTFLOOD prepares input rainfall series and input files for the rainfall-runoff model used in the case study. A road system in central Norway was chosen to study how to analyse the flood vulnerability of an infrastructure. Finally, the thesis proposes a method for analysing the flood vulnerability of physical infrastructure. The method involves a general stage that will provide data on which parts of the infrastructure are potentially vulnerable to flooding and how to analyse them, and a specific stage which is concerned with analysing one particular kind of physical infrastructure in a study area. 123 refs., 59 figs., 17 tabs= .

  20. Cyber/Physical Security Vulnerability Assessment Integration

    International Nuclear Information System (INIS)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-01-01

    This internally funded Laboratory-Directed R and D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  1. Legislative vulnerability of minority groups.

    Science.gov (United States)

    Paula, Carlos Eduardo Artiaga; Silva, Ana Paula da; Bittar, Cléria Maria Lôbo

    2017-12-01

    Minorities are in an inferior position in society and therefore vulnerable in many aspects. This study analyzes legislative vulnerability and aims to categorize as "weak" or "strong" the protection conferred by law to the following minorities: elderly, disabled, LGBT, Indians, women, children/ adolescents and black people. In order to do so, it was developed a documental research in 30 federal laws in which legal provisions were searched to protect minorities. Next, the articles were organized in the following categories: civil, criminal, administrative, labor and procedural, to be analyzed afterwards. Legal protection was considered "strong" when there were legal provisions that observed the five categories and "weak" when it did not meet this criterion. It was noted that six groups have "strong" legislative protection, which elides the assertion that minorities are outside the law. The exception is the LGBT group, whose legislative protection is weak. In addition, consecrating rights through laws strengthens the institutional channels for minorities to demand their rights. Finally, it was observed that the legislative protection granted tominorities is not homogeneous but rather discriminatory, and there is an interference by the majority group in the rights regulation of vulnerable groups.

  2. Vulnerability Analysis of Urban Drainage Systems: Tree vs. Loop Networks

    Directory of Open Access Journals (Sweden)

    Chi Zhang

    2017-03-01

    Full Text Available Vulnerability analysis of urban drainage networks plays an important role in urban flood management. This study analyzes and compares the vulnerability of tree and loop systems under various rainfall events to structural failure represented by pipe blockage. Different pipe blockage scenarios, in which one of the pipes in an urban drainage network is assumed to be blocked individually, are constructed and their impacts on the network are simulated under different storm events. Furthermore, a vulnerability index is defined to measure the vulnerability of the drainage systems before and after the implementation of adaptation measures. The results obtained indicate that the tree systems have a relatively larger proportion of critical hydraulic pipes than the loop systems, thus the vulnerability of tree systems is substantially greater than that of the loop systems. Furthermore, the vulnerability index of tree systems is reduced after they are converted into a loop system with the implementation of adaptation measures. This paper provides an insight into the differences in the vulnerability of tree and loop systems, and provides more evidence for development of adaptation measures (e.g., tanks to reduce urban flooding.

  3. Group I Paks Promote Skeletal Myoblast Differentiation In Vivo and In Vitro

    DEFF Research Database (Denmark)

    Joseph, Giselle A; Lu, Min; Radu, Maria

    2017-01-01

    fusion in Drosophila We report that both Pak1 and Pak2 are activated during mammalian myoblast differentiation. One pathway of activation is initiated by N-cadherin ligation and involves the cadherin coreceptor Cdo with its downstream effector, Cdc42. Individual genetic deletion of Pak1 and Pak2 in mice....... Furthermore, primary myoblasts lacking Pak1 and Pak2 display delayed expression of myogenic differentiation markers and myotube formation. These results identify Pak1 and Pak2 as redundant regulators of myoblast differentiation in vitro and in vivo and as components of the promyogenic Ncad/Cdo/Cdc42 signaling...

  4. Climate variability and vulnerability to poverty in Nicaragua

    NARCIS (Netherlands)

    C. Herrera (Carlos); R. Ruben (Ruerd); A.G. Dijkstra (Geske)

    2018-01-01

    textabstractThis study considers the effect of climate variability on vulnerability to poverty in Nicaragua. It discusses how such vulnerability could be measured and which heterogeneous effects can be expected. A multilevel empirical framework is applied, linking per capita consumption

  5. Seeing climate vulnerabilities through lived experience in Madagascar

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-04-21

    Apr 21, 2011 ... ... both vulnerability and strategies for reducing risk, and the project is in the process of producing a range ... of the team's effort to paint a composite map of climate vulnerability and risk to agrarian systems. ... Feeling stressed?

  6. THE VULNERABILITY TO WATER HAZARDS OF URBAN AREA TURDA– CÂMPIA TURZII

    Directory of Open Access Journals (Sweden)

    IOANA URCAN

    2012-12-01

    Full Text Available The vulnerability to water hazards of urban area Turda – Câmpia Turzii. The risk was defined as a social object whose primary component is vulnerability. This paper examines the way in which vulnerability was defined by highlighting its three aspects: physical, technical and social. The vulnerability involves a complex systematic approach especially when cities are analyzed. The economic, social heritage, the environmental elements can all become factors of vulnerability. In this paper the urban areas vulnerable towaterborne hazards, especially floods were mentioned. The means to reduce urban vulnerability were analyzed, highlighting the measures taken by the local communities to mitigate the crisis.

  7. Australian Children's Understanding of Display Rules

    Science.gov (United States)

    Choy, Grace

    2009-01-01

    Cultural display rules govern the manifestation of emotional expressions. In compliance with display rules, the facial expressions displayed (i.e. apparent emotion) may be incongruent with the emotion experienced (i.e. real emotion). This study investigates Australian Caucasian children's understanding of display rules. A sample of 80 four year…

  8. The case for transparent depth display

    NARCIS (Netherlands)

    Kooi, F.L.

    2003-01-01

    Purpose: The continuing developments in display technology have resulted in the ability to present increasing amounts of data on computer displays. One of the coming break-throughs is generally believed to be the introduction of '3-D displays': displays with a true sense of depth. Though these types

  9. Drought vulnerability assessment: The case of wheat farmers in Western Iran

    Science.gov (United States)

    Zarafshani, Kiumars; Sharafi, Lida; Azadi, Hossein; Hosseininia, Gholamhossein; De Maeyer, Philippe; Witlox, Frank

    2012-12-01

    Drought, as a natural and slow-onset phenomenon, creates numerous damages to agricultural communities. As a drought prone area in the Middle East, Iran has currently launched a crisis management approach to mitigate the harmful impacts of drought. However, thus far studies indicate that effective drought management strategies should be designed based upon vulnerability management which can increase farmers' ability to challenge the impacts. The purpose of this study was to assess drought vulnerability across three drought intensities (very high, extremely high, and critical) areas in Western Iran. Accordingly, a survey study was applied and 370 wheat farmers who all experienced drought during 2007-2009 were selected through a multi-stage stratified random sampling method. Face to face interviews were used to collect data on vulnerability indices from the farmers. Me-Bar and Valdez's vulnerability formula was applied to assess the vulnerability of wheat farmers during drought. Results revealed that the farmers' vulnerability is influenced mainly by economic, socio-cultural, psychological, technical, and infrastructural factors. The results also indicated that the farmers in Sarpole-Zahab township were most vulnerable compared to those in the Kermanshah township as the least vulnerable. Accordingly, some conclusions and recommendations are drawn for both policy-makers and practitioners who often must prioritize limited resources in the design vulnerability-reducing interventions.

  10. [DIFFERENTIAL DIAGNOSIS OF TUMOROID-LIKE ABSCESS AND LUNG CANCER].

    Science.gov (United States)

    Churylin, R

    2015-01-01

    The purpose of work is development and clarification of roentgenology displays of tumoroidea variant of abscess of lungs for differential diagnostics him with the cancer of lungs. Practically in most cases abscess of lungs there is a necessity of leadthrough of differential diagnostics with in a number of nosology forms, including with the cavernous form of peripheral cancer of lungs. The features of flow of roentgenologic picture of tumoroidea variant are resulted, alike symptoms, differ ences and signs which allow to set a correct diagnosis, are resulted, the value of follow-up of roent genologic research and use of computed tomography is underlined.

  11. Development of 10 highly-polymorphic microsatellite markers in the vulnerable Galápagos land iguanas (genus Conolophus).

    Science.gov (United States)

    Rosa, Sabrina F P; Monteyne, Daniel; Milinkovitch, Michel C

    2009-01-01

    The two species of Galápagos land iguanas (Conolophus subcristatus and C. pallidus) are listed as 'vulnerable' species by the International Union for the Conservation of Nature (IUCN Red List; http://www.iucnredlist.org). Here, we report on the isolation and characterization of 10 microsatellite markers using 562 individuals sampled on all Galápagos islands where Conolophus species occur today. We show that these 10 loci are highly polymorphic and display diagnostic alleles for five out of the six island populations. These markers will be useful for Conolophus population genetic analyses as well as for guiding ongoing captive breeding programmes. © 2009 The Authors. Journal compilation © 2009 Blackwell Publishing Ltd.

  12. Spatial variation of vulnerability in geographic areas of North Lebanon

    NARCIS (Netherlands)

    Issa, Sahar; van der Molen, I.; Nader, M.R.; Lovett, Jonathan Cranidge

    2014-01-01

    This paper examines the spatial variation in vulnerability between different geographical areas of the northern coastal region of Lebanon within the context of armed conflict. The study is based on the ‘vulnerability of space’ approach and will be positioned in the academic debate on vulnerability

  13. New ultraportable display technology and applications

    Science.gov (United States)

    Alvelda, Phillip; Lewis, Nancy D.

    1998-08-01

    MicroDisplay devices are based on a combination of technologies rooted in the extreme integration capability of conventionally fabricated CMOS active-matrix liquid crystal display substrates. Customized diffraction grating and optical distortion correction technology for lens-system compensation allow the elimination of many lenses and systems-level components. The MicroDisplay Corporation's miniature integrated information display technology is rapidly leading to many new defense and commercial applications. There are no moving parts in MicroDisplay substrates, and the fabrication of the color generating gratings, already part of the CMOS circuit fabrication process, is effectively cost and manufacturing process-free. The entire suite of the MicroDisplay Corporation's technologies was devised to create a line of application- specific integrated circuit single-chip display systems with integrated computing, memory, and communication circuitry. Next-generation portable communication, computer, and consumer electronic devices such as truly portable monitor and TV projectors, eyeglass and head mounted displays, pagers and Personal Communication Services hand-sets, and wristwatch-mounted video phones are among the may target commercial markets for MicroDisplay technology. Defense applications range from Maintenance and Repair support, to night-vision systems, to portable projectors for mobile command and control centers.

  14. Aircraft vulnerability analysis by modeling and simulation

    Science.gov (United States)

    Willers, Cornelius J.; Willers, Maria S.; de Waal, Alta

    2014-10-01

    Infrared missiles pose a significant threat to civilian and military aviation. ManPADS missiles are especially dangerous in the hands of rogue and undisciplined forces. Yet, not all the launched missiles hit their targets; the miss being either attributable to misuse of the weapon or to missile performance restrictions. This paper analyses some of the factors affecting aircraft vulnerability and demonstrates a structured analysis of the risk and aircraft vulnerability problem. The aircraft-missile engagement is a complex series of events, many of which are only partially understood. Aircraft and missile designers focus on the optimal design and performance of their respective systems, often testing only in a limited set of scenarios. Most missiles react to the contrast intensity, but the variability of the background is rarely considered. Finally, the vulnerability of the aircraft depends jointly on the missile's performance and the doctrine governing the missile's launch. These factors are considered in a holistic investigation. The view direction, altitude, time of day, sun position, latitude/longitude and terrain determine the background against which the aircraft is observed. Especially high gradients in sky radiance occur around the sun and on the horizon. This paper considers uncluttered background scenes (uniform terrain and clear sky) and presents examples of background radiance at all view angles across a sphere around the sensor. A detailed geometrical and spatially distributed radiometric model is used to model the aircraft. This model provides the signature at all possible view angles across the sphere around the aircraft. The signature is determined in absolute terms (no background) and in contrast terms (with background). It is shown that the background significantly affects the contrast signature as observed by the missile sensor. A simplified missile model is constructed by defining the thrust and mass profiles, maximum seeker tracking rate, maximum

  15. Vulnerability assessments as a political creation: tsunami management in Portugal.

    Science.gov (United States)

    Pronk, Maartje; Maat, Harro; Crane, Todd A

    2017-10-01

    Vulnerability assessments are a cornerstone of contemporary disaster research. This paper shows how research procedures and the presentation of results of vulnerability assessments are politically filtered. Using data from a study of tsunami risk assessment in Portugal, the paper demonstrates that approaches, measurement instruments, and research procedures for evaluating vulnerability are influenced by institutional preferences, lines of communication, or lack thereof, between stakeholder groups, and available technical expertise. The institutional setting and the pattern of stakeholder interactions form a filter, resulting in a particular conceptualisation of vulnerability, affecting its operationalisation via existing methods and technologies and its institutional embedding. The Portuguese case reveals a conceptualisation that is aligned with perceptions prevalent in national government bureaucracies and the exclusion of local stakeholders owing to selected methodologies and assessment procedures. The decisions taken by actors involved in these areas affect how vulnerability is assessed, and ultimately which vulnerability reduction policies will be recommended in the appraisal. © 2017 The Author(s). Disasters © Overseas Development Institute, 2017.

  16. Glioblastoma Stem Cells Respond to Differentiation Cues but Fail to Undergo Commitment and Terminal Cell-Cycle Arrest

    Directory of Open Access Journals (Sweden)

    Helena Carén

    2015-11-01

    Full Text Available Glioblastoma (GBM is an aggressive brain tumor whose growth is driven by stem cell-like cells. BMP signaling triggers cell-cycle exit and differentiation of GBM stem cells (GSCs and, therefore, might have therapeutic value. However, the epigenetic mechanisms that accompany differentiation remain poorly defined. It is also unclear whether cell-cycle arrest is terminal. Here we find only a subset of GSC cultures exhibit astrocyte differentiation in response to BMP. Although overtly differentiated non-cycling astrocytes are generated, they remain vulnerable to cell-cycle re-entry and fail to appropriately reconfigure DNA methylation patterns. Chromatin accessibility mapping identified loci that failed to alter in response to BMP and these were enriched in SOX transcription factor-binding motifs. SOX transcription factors, therefore, may limit differentiation commitment. A similar propensity for cell-cycle re-entry and de-differentiation was observed in GSC-derived oligodendrocyte-like cells. These findings highlight significant obstacles to BMP-induced differentiation as therapy for GBM.

  17. The Vulnerable Subject of Negligence Law

    OpenAIRE

    Stychin, C.

    2012-01-01

    The approach taken by English courts to the duty of care question in negligence has been subject to harsh criticism in recent years. This article examines this fundamental issue in tort law, drawing upon Canadian and Australian jurisprudence by way of comparison. From this analysis, the concept of vulnerability is developed as a productive means of understanding the duty of care. Vulnerability is of increasing interest in legal and political theory and it is of particular relevance to the law...

  18. Economic development and declining vulnerability to climate-related disasters in China

    Science.gov (United States)

    Wu, Jidong; Han, Guoyi; Zhou, Hongjian; Li, Ning

    2018-03-01

    Exposure and vulnerability are the main contributing factors of growing impact from climate-related disasters globally. Understanding the spatiotemporal dynamic patterns of vulnerability is important for designing effective disaster risk mitigation and adaptation measures. At national scale, most cross-country studies have suggested that economic vulnerability to disasters decreases as income increases, especially for developing countries. Research covering sub-national climate-related natural disasters is indispensable to obtaining a comprehensive understanding of the effect of regional economic growth on vulnerability reduction. Taking China as a case, this subnational scale study shows that economic development is correlated with the significant reduction in human fatalities but increase in direct economic losses (DELs) from climate-related disasters since 1949. The long-term trend in climate-related disaster vulnerability, reflected by mortality (1978-2015) and DELs (1990-2015) as a share of the total population and Gross Domestic Product, has seen significant decline among all economic regions in China. While notable differences remain among its West, Central and East economic regions, the temporal vulnerability change has been converging. The study further demonstrated that economic development level is correlated with human and economic vulnerability to climate-related disasters, and this vulnerability decreased with the increase of per-capita income. This study suggested that economic development can have nuanced effects on overall human and economic vulnerability to climate-related disasters. We argue that climate change science needs to acknowledge and examine the different pathways of vulnerability effects related to economic development.

  19. Importance of biometrics to addressing vulnerabilities of the U.S. infrastructure

    Science.gov (United States)

    Arndt, Craig M.; Hall, Nathaniel A.

    2004-08-01

    Human identification technologies are important threat countermeasures in minimizing select infrastructure vulnerabilities. Properly targeted countermeasures should be selected and integrated into an overall security solution based on disciplined analysis and modeling. Available data on infrastructure value, threat intelligence, and system vulnerabilities are carefully organized, analyzed and modeled. Prior to design and deployment of an effective countermeasure; the proper role and appropriateness of technology in addressing the overall set of vulnerabilities is established. Deployment of biometrics systems, as with other countermeasures, introduces potentially heightened vulnerabilities into the system. Heightened vulnerabilities may arise from both the newly introduced system complexities and an unfocused understanding of the set of vulnerabilities impacted by the new countermeasure. The countermeasure's own inherent vulnerabilities and those introduced by the system's integration with the existing system are analyzed and modeled to determine the overall vulnerability impact. The United States infrastructure is composed of government and private assets. The infrastructure is valued by their potential impact on several components: human physical safety, physical/information replacement/repair cost, potential contribution to future loss (criticality in weapons production), direct productivity output, national macro-economic output/productivity, and information integrity. These components must be considered in determining the overall impact of an infrastructure security breach. Cost/benefit analysis is then incorporated in the security technology deployment decision process. Overall security risks based on system vulnerabilities and threat intelligence determines areas of potential benefit. Biometric countermeasures are often considered when additional security at intended points of entry would minimize vulnerabilities.

  20. [Assessment of eco-environmental vulnerability of Hainan Island, China].

    Science.gov (United States)

    Huang, Bao-rong; Ouyang, Zhi-yun; Zhang, Hui-zhi; Zhang, Li-hua; Zheng, Hua

    2009-03-01

    Based on the assessment method of environmental vulnerability constructed by SOPAC and UNEP, this paper constructed an indicator system from three sub-themes including hazard, resistance, and damage to assess the eco-environmental vulnerability of Hainan Island. The results showed that Hainan Island was suffering a middling level eco-environmental hazard, and the main hazards came from some intensive human activities such as intensive agriculture, mass tourism, mining, and a mass of solid wastes thrown by islanders and tourists. Some geographical characters such as larger land area, larger altitude range, integrated geographical form, and abundant habitat types endowed Hainan Island higher resistance to environmental hazards. However, disturbed by historical accumulative artificial and natural hazards, the Island ecosystem had showed serious ecological damage, such as soil degradation and biodiversity loss. Comprehensively considered hazard, resistance, damage, and degradation, the comprehensive environmental vulnerability of the Island was at a middling level. Some indicators showed lower vulnerability, but some showed higher vulnerability.

  1. Defining Resilience and Vulnerability Based on Ontology Engineering Approach

    Science.gov (United States)

    Kumazawa, T.; Matsui, T.; Endo, A.

    2014-12-01

    It is necessary to reflect the concepts of resilience and vulnerability into the assessment framework of "Human-Environmental Security", but it is also in difficulty to identify the linkage between both concepts because of the difference of the academic community which has discussed each concept. The authors have been developing the ontology which deals with the sustainability of the social-ecological systems (SESs). Resilience and vulnerability are also the concepts in the target world which this ontology covers. Based on this point, this paper aims at explicating the semantic relationship between the concepts of resilience and vulnerability based on ontology engineering approach. For this purpose, we first examine the definitions of resilience and vulnerability which the existing literatures proposed. Second, we incorporate the definitions in the ontology dealing with sustainability of SESs. Finally, we focus on the "Water-Energy-Food Nexus Index" to assess Human-Environmental Security, and clarify how the concepts of resilience and vulnerability are linked semantically through the concepts included in these index items.

  2. Bibliographic Displays in OPACs and Web Catalogs: How Well Do They Comply with Display Guidelines?

    Science.gov (United States)

    Cherry, Joan M.

    1998-01-01

    Evaluation of data from assessments of full bibliographic displays in academic library OPACs (online public access catalogs) and World Wide Web catalogs against a checklist of desirable features found that OPAC displays scored 58% and Web displays scored 60%. Discusses weaknesses, focusing on those found in the majority of the displays…

  3. A nanobody:GFP bacterial platform that enables functional enzyme display and easy quantification of display capacity

    DEFF Research Database (Denmark)

    Wendel, Sofie; Christian Fischer, Emil; Martinez, Virginia

    2016-01-01

    Background: Bacterial surface display is an attractive technique for the production of cell-anchored, functional proteins and engineering of whole-cell catalysts. Although various outer membrane proteins have been used for surface display, an easy and versatile high-throughput-compatible assay...... to displaying the nanobody alone. We used flow cytometry to analyse display capability on single-cell versus population level and found that the signal peptide of the anchor has great effect on display efficiency.Conclusions: We have developed an inexpensive and easy read-out assay for surface display using...... nanobody: GFP interactions. The assay is compatible with the most common fluorescence detection methods, including multi-well plate whole-cell fluorescence detection, SDS-PAGE in-gel fluorescence, microscopy and flow cytometry. We anticipate that the platform will facilitate future in-depth studies...

  4. Method of Pentest Synthesis and Vulnerability Detection

    OpenAIRE

    Hahanova Irina Vitalyevna

    2012-01-01

    The structural method for penetration test generation and vulnerability simulation for infrastructure of telecommunication hardwaresoftware information cybernetic systems (CS), focused to protect against unauthorized access the services defined in the system specification by means of penetrating through legal interfaces of component interaction, which have vulnerabilities, is proposed. A protection service infrastructure is created with cybersystem and maintains it during the life cycle, serv...

  5. Fostering cooperation through the enhancement of own vulnerability

    NARCIS (Netherlands)

    Kopányi-Peuker, A.; Offerman, T.; Sloof, R.

    2013-01-01

    We consider the possibility that cooperation in a prisoner's dilemma is fostered by people's voluntary enhancement of their own vulnerability. The vulnerability of a player determines the effectiveness of possible punishment by the other. In the "Gradual" mechanism, players may condition their

  6. Fostering cooperation through the enhancement of own vulnerability

    NARCIS (Netherlands)

    Kopányi-Peuker, A.; Offerman, T.; Sloof, R.

    2012-01-01

    We consider the possibility that cooperation in a prisoner's dilemma is fostered by people's voluntarily enhancement of their own vulnerability. The vulnerability of a player determines the effectiveness of possible punishment by the other. In the "Gradual" mechanism, players may condition their

  7. Europe's vulnerability to energy crises

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-01-15

    The growing dependency of Europe as a whole on energy imports and anticipated further increases in energy prices reinforce the concerns about meeting the energy demand in the future. The objective of the Study is to identify the threats leading to potential energy crises and suggest solutions for facing, in an appropriate way, the related key challenges. In addition, the Study intends to develop a number of indicators effective enough to assess the level of different types of vulnerability, as well the overall vulnerability of a country or region, including threats to physical disruption, higher energy prices etc. The use of vulnerability indicators is highly recommended for all WEC-European countries, as well as to policy makers and market players.

  8. Detecting Network Vulnerabilities Through Graph TheoreticalMethods

    Energy Technology Data Exchange (ETDEWEB)

    Cesarz, Patrick; Pomann, Gina-Maria; Torre, Luis de la; Villarosa, Greta; Flournoy, Tamara; Pinar, Ali; Meza Juan

    2007-09-30

    Identifying vulnerabilities in power networks is an important problem, as even a small number of vulnerable connections can cause billions of dollars in damage to a network. In this paper, we investigate a graph theoretical formulation for identifying vulnerabilities of a network. We first try to find the most critical components in a network by finding an optimal solution for each possible cutsize constraint for the relaxed version of the inhibiting bisection problem, which aims to find loosely coupled subgraphs with significant demand/supply mismatch. Then we investigate finding critical components by finding a flow assignment that minimizes the maximum among flow assignments on all edges. We also report experiments on IEEE 30, IEEE 118, and WSCC 179 benchmark power networks.

  9. Assessing node risk and vulnerability in epidemics on networks

    Science.gov (United States)

    Rogers, T.

    2015-01-01

    Which nodes are most vulnerable to an epidemic spreading through a network, and which carry the highest risk of causing a major outbreak if they are the source of the infection? Here we show how these questions can be answered to good approximation using the cavity method. Several curious properties of node vulnerability and risk are explored: some nodes are more vulnerable than others to weaker infections, yet less vulnerable to stronger ones; a node is always more likely to be caught in an outbreak than it is to start one, except when the disease has a deterministic lifetime; the rank order of node risk depends on the details of the distribution of infectious periods.

  10. Reconfigurable Full-Page Braille Displays

    Science.gov (United States)

    Garner, H. Douglas

    1994-01-01

    Electrically actuated braille display cells of proposed type arrayed together to form full-page braille displays. Like other braille display cells, these provide changeable patterns of bumps driven by digitally recorded text stored on magnetic tapes or in solid-state electronic memories. Proposed cells contain electrorheological fluid. Viscosity of such fluid increases in strong electrostatic field.

  11. Social vulnerability assessment using spatial multi-criteria analysis (SEVI model) and the Social Vulnerability Index (SoVI model) - a case study for Bucharest, Romania

    Science.gov (United States)

    Armaş, I.; Gavriş, A.

    2013-06-01

    In recent decades, the development of vulnerability frameworks has enlarged the research in the natural hazards field. Despite progress in developing the vulnerability studies, there is more to investigate regarding the quantitative approach and clarification of the conceptual explanation of the social component. At the same time, some disaster-prone areas register limited attention. Among these, Romania's capital city, Bucharest, is the most earthquake-prone capital in Europe and the tenth in the world. The location is used to assess two multi-criteria methods for aggregating complex indicators: the social vulnerability index (SoVI model) and the spatial multi-criteria social vulnerability index (SEVI model). Using the data of the 2002 census we reduce the indicators through a factor analytical approach to create the indices and examine if they bear any resemblance to the known vulnerability of Bucharest city through an exploratory spatial data analysis (ESDA). This is a critical issue that may provide better understanding of the social vulnerability in the city and appropriate information for authorities and stakeholders to consider in their decision making. The study emphasizes that social vulnerability is an urban process that increased in a post-communist Bucharest, raising the concern that the population at risk lacks the capacity to cope with disasters. The assessment of the indices indicates a significant and similar clustering pattern of the census administrative units, with an overlap between the clustering areas affected by high social vulnerability. Our proposed SEVI model suggests adjustment sensitivity, useful in the expert-opinion accuracy.

  12. Recognizing Risk and Vulnerability in Research Ethics: Imagining the "What Ifs?"

    Science.gov (United States)

    Peter, Elizabeth; Friedland, Judith

    2017-04-01

    Research ethics committees (RECs) may misunderstand the vulnerability of participants, given their distance from the field. What RECs identify as the vulnerabilities that were not adequately recognized in protocols and how they attempt to protect the perceived vulnerability of participants and mitigate risks were examined using the response letters sent to researchers by three university-based RECs. Using a critical qualitative method informed by feminist ethics, we identified an overarching theme of recognizing and responding to cascading vulnerabilities and four subthemes: identifying vulnerable groups, recognizing potentially risky research, imagining the "what ifs," and mitigating perceived risks. An ethics approach that is up-close, as opposed to distant, is needed to foster closer relationships among participants, researchers, and RECs and to understand participant vulnerability and strength better.

  13. Operationalizing analysis of micro-level climate change vulnerability and adaptive capacity

    DEFF Research Database (Denmark)

    Jiao, Xi; Moinuddin, Hasan

    2016-01-01

    This paper explores vulnerability and adaptive capacity of rural communities in Southern Laos, where households are highly dependent on climate-sensitive natural resources and vulnerable to seasonal weather fluctuations. The speed and magnitude of climate-induced changes may seriously challenge...... their ability to adapt. Participatory group discussions and 271 household surveys in three villages highlight the current level of vulnerability and adaptive capacity towards climatic variability and risks. This paper visualizes three dimensions of the vulnerability framework at two levels using the Community...... Climate Vulnerability Index and household climate vulnerability cube. Results show that not only poor households are most at risk from climate change challenges, but also those better-off households highly dependent on specialized agricultural production are locally exposed to climate change risks...

  14. Collagen Type I Improves the Differentiation of Human Embryonic Stem Cells towards Definitive Endoderm

    DEFF Research Database (Denmark)

    Rasmussen, Camilla Holzmann; Petersen, Dorthe Roenn; Møller, Jonas Bech

    2015-01-01

    Human embryonic stem cells have the ability to generate all cell types in the body and can potentially provide an unlimited source of cells for cell replacement therapy to treat degenerative diseases such as diabetes. Current differentiation protocols of human embryonic stem cells towards insulin...... and consistent differentiation of stem cells to definitive endoderm. The results shed light on the importance of extracellular matrix proteins for differentiation and also points to a cost effective and easy method to improve differentiation....... embryonic stem cells to the definitive endoderm lineage. The percentage of definitive endoderm cells after differentiation on collagen I and fibronectin was >85% and 65%, respectively. The cells on collagen I substrates displayed different morphology and gene expression during differentiation as assessed...

  15. Vulnerability and the bioethics through the experiences of illness

    Directory of Open Access Journals (Sweden)

    Rolim-Neto Leite Modesto

    2012-03-01

    Full Text Available Background: Vulnerable people are relatively or absolutely incapable of protecting their own interests. Vulnerability is an anthropological attribute of human beings due to the simple fact of being alive. Brazilian society has long been established as a matter through the eyes of social scientists. In the name of it, the vulnerability in the doctor-patient context is now being a much-discussed issue. Purpose: This study aims to analyze the current studies regarding the insertion of vulnerability in the health issue, reflexively dealing with the ethical matters involved, as well as with the narratives’ insertion in this process. Methods: This article is based on data extracted from Scientific Electronic Library Online (Scielo and on secondary data from textbooks about vulnerability, ethics, physician-patient relationship and narratives. Results and discussion: Doctors are faced with dilemmas in clinical practice: moral, ethical, legal, social, religious and economic. On these occasions, question their own values. By listening carefully to the stories of patients, health professionals broaden their perspectives, organize and integrate complex situations, which assists in conducting these difficult situations. Conclusion: Reflect the concept of vulnerability raises (re think health practices, particularly in bringing to light the social experience of illness and hospitalization of the patient.

  16. Vulnerability and the bioethics through the experiences of illness

    Directory of Open Access Journals (Sweden)

    Rolim-Neto Leite Modesto

    2012-01-01

    Full Text Available Background: Vulnerable people are relatively or absolutely incapable of protecting their own interests. Vulnerability is an anthropological attribute of human beings due to the simple fact of being alive. Brazilian society has long been established as a matter through the eyes of social scientists. In the name of it, the vulnerability in the doctor-patient context is now being a much-discussed issue. Purpose: This study aims to analyze the current studies regarding the insertion of vulnerability in the health issue, reflexively dealing with the ethical matters involved, as well as with the narratives’ insertion in this process. Methods: This article is based on data extracted from Scientific Electronic Library Online (Scielo and on secondary data from textbooks about vulnerability, ethics, physician-patient relationship and narratives. Results and discussion: Doctors are faced with dilemmas in clinical practice: moral, ethical, legal, social, religious and economic. On these occasions, question their own values. By listening carefully to the stories of patients, health professionals broaden their perspectives, organize and integrate complex situations, which assists in conducting these difficult situations. Conclusion: Reflect the concept of vulnerability raises (re think health practices, particularly in bringing to light the social experience of illness and hospitalization of the patient.

  17. Display-management system for MFTF

    International Nuclear Information System (INIS)

    Nelson, D.O.

    1981-01-01

    The Mirror Fusion Test Facility (MFTF) is controlled by 65 local control microcomputers which are supervised by a local network of nine 32-bit minicomputers. Associated with seven of the nine computers are state-of-the-art graphics devices, each with extensive local processing capability. These devices provide the means for an operator to interact with the control software running on the minicomputers. It is critical that the information the operator views accurately reflects the current state of the experiment. This information is integrated into dynamically changing pictures called displays. The primary organizational component of the display system is the software-addressable segment. The segments created by the display creation software are managed by display managers associated with each graphics device. Each display manager uses sophisticated storage management mechanisms to keep the proper segments resident in the local graphics device storage

  18. An Empirical Measure of Computer Security Strength for Vulnerability Remediation

    Science.gov (United States)

    Villegas, Rafael

    2010-01-01

    Remediating all vulnerabilities on computer systems in a timely and cost effective manner is difficult given that the window of time between the announcement of a new vulnerability and an automated attack has decreased. Hence, organizations need to prioritize the vulnerability remediation process on their computer systems. The goal of this…

  19. “Mapping the regional variation in potential vulnerability in Indian ...

    African Journals Online (AJOL)

    GREG

    namely, Bio-Physical vulnerability index and Socio-Economic vulnerability index to develop the final overall vulnerability index. ... Agriculture is the backbone of Indian economy more spe- cifically of the rural livelihood security system. ... of the total workforce) in spite of the diversification of eco- nomic activity. It is also an ...

  20. Effective vulnerability assessments for physical security devices, systems, and programs

    International Nuclear Information System (INIS)

    Johnston, R.G.; Garcia, A.R.E.

    2002-01-01

    Full text: The efficacy of devices, systems, and programs used for physical security depend critically on having periodic and effective vulnerability assessments. Effective vulnerability assessments, in turn, require certain conditions and attributes. These include: a proper understanding of their purpose; not confusing vulnerability assessments with other kinds of metrics, analyses, tests, and security exercises; the view that vulnerabilities are inevitable, and that finding them is good news (since they can then be mitigated), not bad news; rejection of findings of no vulnerabilities; avoidance of mere 'compliance mode' rubber stamping; the use of the proper outside, independent, imaginative personnel; psychologically predisposed to finding and demonstrating problems; the absence of conflicts of interest; no unrealistic constraints on the possible attack tools, procedures, personnel, or strategies; efforts to not just find and demonstrate vulnerabilities, but also to suggest possible countermeasures; proper context; input and buy-in from ALL facility security personnel, especially low-level personnel; emphasis on the simplest, most relevant attacks first; no underestimation of potential adversaries; consideration of fault analysis attacks; awareness of Rohrbach's Maxim and Shannon's Maxim. In addition to these factors, we will cover some of the complex issues and problems associated with the design of vulnerability assessments. There will also be suggestions on how to conduct effective vulnerability assessments on a severely limited budget. We will conclude with a discussion of both conventional and unconventional ways of reporting results. (author)

  1. Data display with the Q system

    International Nuclear Information System (INIS)

    Oothoudt, M.A.

    1979-01-01

    The Q data-acquisition system for PDP-11 mini-computers at the Clinton P. Anderson Meson Physics Facility (LAMPF) provides experimenters with basic tools for on-line data display. Tasks are available to plot one- and two-parameter histograms on Tektronix 4000 series storage-tube terminals. The histograms to be displayed and the display format may be selected with simple keyboard commands. A task is also available to create and display live two-parameter scatter plots for any acquired or calculated quantities. Other tasks in the system manage the display data base, list display parameters and histogram contents on hardcopy devices, and save core histograms on disk or tape for off-line analysis. 8 figures

  2. A nanobody:GFP bacterial platform that enables functional enzyme display and easy quantification of display capacity.

    Science.gov (United States)

    Wendel, Sofie; Fischer, Emil C; Martínez, Virginia; Seppälä, Susanna; Nørholm, Morten H H

    2016-05-03

    Bacterial surface display is an attractive technique for the production of cell-anchored, functional proteins and engineering of whole-cell catalysts. Although various outer membrane proteins have been used for surface display, an easy and versatile high-throughput-compatible assay for evaluating and developing surface display systems is missing. Using a single domain antibody (also called nanobody) with high affinity for green fluorescent protein (GFP), we constructed a system that allows for fast, fluorescence-based detection of displayed proteins. The outer membrane hybrid protein LppOmpA and the autotransporter C-IgAP exposed the nanobody on the surface of Escherichia coli with very different efficiency. Both anchors were capable of functionally displaying the enzyme Chitinase A as a fusion with the nanobody, and this considerably increased expression levels compared to displaying the nanobody alone. We used flow cytometry to analyse display capability on single-cell versus population level and found that the signal peptide of the anchor has great effect on display efficiency. We have developed an inexpensive and easy read-out assay for surface display using nanobody:GFP interactions. The assay is compatible with the most common fluorescence detection methods, including multi-well plate whole-cell fluorescence detection, SDS-PAGE in-gel fluorescence, microscopy and flow cytometry. We anticipate that the platform will facilitate future in-depth studies on the mechanism of protein transport to the surface of living cells, as well as the optimisation of applications in industrial biotech.

  3. Assessment of groundwater vulnerability and sensitivity to pollution ...

    African Journals Online (AJOL)

    Groundwater pollution caused by human activity is a serious environmental problem in cities. Pollution vulnerability assessment of groundwater resources provides information on how to protect areas vulnerable to pollution. The present study is a detailed investigation of the potential for groundwater contamination through ...

  4. Vulnerability of southern plains agriculture to climate change

    Science.gov (United States)

    Climate is a key driver for all ecological and economic systems; therefore, climate change introduces additional uncertainty and vulnerability into these systems. Agriculture represents a major land use that is critical to the survival of human societies and it is highly vulnerable to climate. Clima...

  5. Agency and Vulnerability: Reconfiguring the Female Characters in ...

    African Journals Online (AJOL)

    This article recognizes the pressures on an individual's agency and vulnerability to societal containment as constant interplay that accounts for creative dimensions and responses intensified within a love relationship. It locates agency and vulnerability as mutually inclusive within the philosophical nexus of self-actualization ...

  6. Web vulnerability study of online pharmacy sites.

    Science.gov (United States)

    Kuzma, Joanne

    2011-01-01

    Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers' personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The objective is to identify the level of web application security vulnerabilities in online pharmacies and the common types of flaws, thus expanding on prior studies. Technical, managerial and legal recommendations on how to mitigate security issues are presented. The proposed four-step method first consists of choosing an online testing tool. The next steps involve choosing a list of 60 online pharmacy sites to test, and then running the software analysis to compile a list of flaws. Finally, an in-depth analysis is performed on the types of web application vulnerabilities. The majority of sites had serious vulnerabilities, with the majority of flaws being cross-site scripting or old versions of software that have not been updated. A method is proposed for the securing of web pharmacy sites, using a multi-phased approach of technical and managerial techniques together with a thorough understanding of national legal requirements for securing systems.

  7. Formal Vulnerability Assessment of a maritime transportation system

    International Nuclear Information System (INIS)

    Berle, Oyvind; Asbjornslett, Bjorn Egil; Rice, James B.

    2011-01-01

    World trade increasingly relies on longer, larger and more complex supply chains, where maritime transportation is a vital backbone of such operations. Long and complex supply chain systems are more prone to being vulnerable, though through reviews, no specific methods have been found to assess vulnerabilities of a maritime transportation system. Most existing supply chain risk assessment frameworks require risks to be foreseen to be mitigated, rather than giving transportation systems the ability to cope with unforeseen threats and hazards. In assessing cost-efficiency, societal vulnerability versus industrial cost of measures should be included. This conceptual paper presents a structured Formal Vulnerability Assessment (FVA) methodology, seeking to transfer the safety-oriented Formal Safety Assessment (FSA) framework into the domain of maritime supply chain vulnerability. To do so, the following two alterations are made: (1) The focus of the assessment is defined to ensure the ability of the transportation to serve as a throughput mechanism of goods, and to survive and recover from disruptive events. (2) To cope with low-frequency high-impact disruptive scenarios that were not necessarily foreseen, two parallel tracks of risk assessments need to be pursued-the cause-focused risk assessment as in the FSA, and a consequence-focused failure mode approach.

  8. Participatory flood vulnerability assessment: a multi-criteria approach

    Science.gov (United States)

    Madruga de Brito, Mariana; Evers, Mariele; Delos Santos Almoradie, Adrian

    2018-01-01

    This paper presents a participatory multi-criteria decision-making (MCDM) approach for flood vulnerability assessment while considering the relationships between vulnerability criteria. The applicability of the proposed framework is demonstrated in the municipalities of Lajeado and Estrela, Brazil. The model was co-constructed by 101 experts from governmental organizations, universities, research institutes, NGOs, and private companies. Participatory methods such as the Delphi survey, focus groups, and workshops were applied. A participatory problem structuration, in which the modellers work closely with end users, was used to establish the structure of the vulnerability index. The preferences of each participant regarding the criteria importance were spatially modelled through the analytical hierarchy process (AHP) and analytical network process (ANP) multi-criteria methods. Experts were also involved at the end of the modelling exercise for validation. The final product is a set of individual and group flood vulnerability maps. Both AHP and ANP proved to be effective for flood vulnerability assessment; however, ANP is preferred as it considers the dependences among criteria. The participatory approach enabled experts to learn from each other and acknowledge different perspectives towards social learning. The findings highlight that to enhance the credibility and deployment of model results, multiple viewpoints should be integrated without forcing consensus.

  9. Conceptual Design of Industrial Process Displays

    DEFF Research Database (Denmark)

    Pedersen, C.R.; Lind, Morten

    1999-01-01

    discusses aspects of process display design taking into account both the designer's and the operator's points of view. Three aspects are emphasized: the operator tasks, the display content and the display form. The distinction between these three aspects is the basis for proposing an outline for a display......Today, process displays used in industry are often designed on the basis of piping and instrumentation diagrams without any method of ensuring that the needs of the operators are fulfilled. Therefore, a method for a systematic approach to the design of process displays is needed. This paper...... by a simple example from a plant with batch processes. Later the method is applied to develop a supervisory display for a condenser system in a nuclear power plant. The differences between the continuous plant domain of power production and the batch processes from the example are analysed and broad...

  10. Mapping the Drivers of Climate Change Vulnerability for Australia's Threatened Species.

    Directory of Open Access Journals (Sweden)

    Jasmine R Lee

    Full Text Available Effective conservation management for climate adaptation rests on understanding the factors driving species' vulnerability in a spatially explicit manner so as to direct on-ground action. However, there have been only few attempts to map the spatial distribution of the factors driving vulnerability to climate change. Here we conduct a species-level assessment of climate change vulnerability for a sample of Australia's threatened species and map the distribution of species affected by each factor driving climate change vulnerability across the continent. Almost half of the threatened species assessed were considered vulnerable to the impacts of climate change: amphibians being the most vulnerable group, followed by plants, reptiles, mammals and birds. Species with more restricted distributions were more likely to show high climate change vulnerability than widespread species. The main factors driving climate change vulnerability were low genetic variation, dependence on a particular disturbance regime and reliance on a particular moisture regime or habitat. The geographic distribution of the species impacted by each driver varies markedly across the continent, for example species impacted by low genetic variation are prevalent across the human-dominated south-east of the country, while reliance on particular moisture regimes is prevalent across northern Australia. Our results show that actions to address climate adaptation will need to be spatially appropriate, and that in some regions a complex suite of factors driving climate change vulnerability will need to be addressed. Taxonomic and geographic variation in the factors driving climate change vulnerability highlights an urgent need for a spatial prioritisation of climate adaptation actions for threatened species.

  11. Calibration of groundwater vulnerability mapping using the generalized reduced gradient method.

    Science.gov (United States)

    Elçi, Alper

    2017-12-01

    Groundwater vulnerability assessment studies are essential in water resources management. Overlay-and-index methods such as DRASTIC are widely used for mapping of groundwater vulnerability, however, these methods mainly suffer from a subjective selection of model parameters. The objective of this study is to introduce a calibration procedure that results in a more accurate assessment of groundwater vulnerability. The improvement of the assessment is formulated as a parameter optimization problem using an objective function that is based on the correlation between actual groundwater contamination and vulnerability index values. The non-linear optimization problem is solved with the generalized-reduced-gradient (GRG) method, which is numerical algorithm based optimization method. To demonstrate the applicability of the procedure, a vulnerability map for the Tahtali stream basin is calibrated using nitrate concentration data. The calibration procedure is easy to implement and aims the maximization of correlation between observed pollutant concentrations and groundwater vulnerability index values. The influence of each vulnerability parameter in the calculation of the vulnerability index is assessed by performing a single-parameter sensitivity analysis. Results of the sensitivity analysis show that all factors are effective on the final vulnerability index. Calibration of the vulnerability map improves the correlation between index values and measured nitrate concentrations by 19%. The regression coefficient increases from 0.280 to 0.485. It is evident that the spatial distribution and the proportions of vulnerability class areas are significantly altered with the calibration process. Although the applicability of the calibration method is demonstrated on the DRASTIC model, the applicability of the approach is not specific to a certain model and can also be easily applied to other overlay-and-index methods. Copyright © 2017 Elsevier B.V. All rights reserved.

  12. Do Holocaust survivors show increased vulnerability or resilience to post-Holocaust cumulative adversity?

    Science.gov (United States)

    Shrira, Amit; Palgi, Yuval; Ben-Ezra, Menachem; Shmotkin, Dov

    2010-06-01

    Prior trauma can hinder coping with additional adversity or inoculate against the effect of recurrent adversity. The present study further addressed this issue by examining whether a subsample of Holocaust survivors and comparison groups, drawn from the Israeli component of the Survey of Health, Ageing, and Retirement in Europe, were differentially affected by post-Holocaust cumulative adversity. Post-Holocaust cumulative adversity had a stronger effect on the lifetime depression of Holocaust survivors than on that of comparisons. However, comparisons were more negatively affected by post-Holocaust cumulative adversity when examining markers of physical and cognitive functioning. Our findings suggest that previous trauma can both sensitize and immunize, as Holocaust survivors show general resilience intertwined with specific vulnerability when confronted with additional cumulative adversity.

  13. How Should We Treat the Vulnerable?: Qualitative Study of Authoritative Ethics Documents.

    Science.gov (United States)

    Zagorac, Ivana

    2016-01-01

    The aim of this study is to explore what actual guidance is provided by authoritative ethics documents regarding the recognition and protection of the vulnerable. The documents included in this analysis are the Belmont Report, the Declaration of Helsinki, The Council for International Organizations of Medical Sciences (CIOMS) Guidelines, and the UNESCO Universal Declaration on Bioethics and Human Rights, including its supplementary report on vulnerability. A qualitative analysis of these documents was conducted in light of three questions: what is vulnerability, who are the vulnerable, and how should the vulnerable be protected? The results show significant differences among the documents regarding the first two questions. None of the documents provides any guidance on the third question (how to protect the vulnerable). These results suggest a great discrepancy between the acknowledged importance of the concept of vulnerability and a general understanding of the scope, content, and practical implications of vulnerability.

  14. Spatial differences in drought vulnerability

    Science.gov (United States)

    Perčec Tadić, M.; Cindić, K.; Gajić-Čapka, M.; Zaninović, K.

    2012-04-01

    Drought causes the highest economic losses among all hydro-meteorological events in Croatia. It is the most frequent hazard, which produces the highest damages in the agricultural sector. The climate assessment in Croatia according to the aridity index (defined as the ratio of precipitation and potential evapotranspiration) shows that the susceptibility to desertification is present in the warm part of the year and it is mostly pronounced in the Adriatic region and the eastern Croatia lowland. The evidence of more frequent extreme drought events in the last decade is apparent. These facts were motivation to study the drought risk assessment in Croatia. One step in this issue is the construction of the vulnerability map. This map is a complex combination of the geomorphologic and climatological inputs (maps) that are presumed to be natural factors which modify the amount of moisture in the soil. In this study, the first version of the vulnerability map is followed by the updated one that additionally includes the soil types and the land use classes. The first input considered is the geomorphologic slope angle calculated from the digital elevation model (DEM). The SRTM DEM of 100 m resolution is used. The steeper slopes are more likely to lose water and to become dryer. The second climatological parameter, the solar irradiation map, gives for the territory of Croatia the maximum irradiation on the coast. The next meteorological parameter that influences the drought vulnerability is precipitation which is in this assessment included through the precipitation variability expressed by the coefficient of variation. Larger precipitation variability is related with the higher drought vulnerability. The preliminary results for Croatia, according to the recommended procedure in the framework of Drought Management Centre for Southeastern Europe (DMCSEE project), show the most sensitive areas to drought in the southern Adriatic coast and eastern continental lowland.

  15. Improvements in data display

    International Nuclear Information System (INIS)

    Ellis, G.W.

    1979-01-01

    An analog signal processor is described in this patent for connecting a source of analog signals to a cathode ray tube display in order to extend the dynamic range of the display. This has important applications in the field of computerised X-ray tomography since significant medical information, such as tumours in soft tissue, is often represented by minimal level changes in image density. Cathode ray tube displays are limited to approximately 15 intensity levels. Thus if both strong and weak absorption of the X-rays occurs, the dynamic range of the transmitted signals will be too large to permit small variations to be examined directly on a cathode ray display. Present tomographic image reconstruction methods are capable of quantising X-ray absorption density measurements into 256 or more distinct levels and a description is given of the electronics which enables the upper and lower range of intensity levels to be independently set and continuously varied. (UK)

  16. Mining of biomarker genes from expressed sequence tags and differential display reverse transcriptase-polymerase chain reaction in the self-fertilizing fish, Kryptolebias marmoratus and their expression patterns in response to exposure to an endocrine-disrupting alkylphenol, bisphenol A.

    Science.gov (United States)

    Lee, Young-Mi; Rhee, Jae-Sung; Hwang, Dae-Sik; Kim, Il-Chan; Raisuddin, Sheikh; Lee, Jae-Seong

    2007-06-30

    Expressed sequence tags (ESTs) and differentially expressed cDNAs from the self-fertilizing fish, Kryptolebias marmoratus were mined to develop alternative biomarkers for endocrine-disrupting chemicals (EDCs). 1,577 K. marmoratus cDNA clones were randomly sequenced from the 5'-end. These clones corresponded to 1,518 and 1,519 genes in medaka dbEST and zebrafish dbEST, respectively. Of the matched genes, 197 and 115 genes obtained Unigene IDs in medaka dbEST and zebrafish dbEST, respectively. Many of the annotated genes are potential biomarkers for environmental stresses. In a differential display reverse transcriptase-polymerase chain reaction (DD RT-PCR) study, 56 differential expressed genes were obtained from fish liver exposed to bisphenol A. Of these, 16 genes were identified after BLAST search to GenBank, and the annotated genes were mainly involved in catalytic activity and binding. The expression patterns of these 16 genes were validated by real-time RT-PCR of liver tissue from fish exposed to bisphenol A. Our findings suggest that expression of these 16 genes is modulated by endocrine disrupting chemicals, and therefore that they are potential biomarkers for environmental stress including EDCs exposure.

  17. Groundwater Vulnerability Assessment of the Tarkwa Mining Area ...

    African Journals Online (AJOL)

    In view of the extensive mining in the Tarkwa area, quality of groundwater has become an important issue. This study estimates aquifer vulnerability by applying the SINTACS model which uses seven environmental parameters to evaluate aquifer vulnerability and geographical information system (GIS) in the Tarkwa mining ...

  18. Social Protection and Vulnerable Communities in East Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Social protection mechanisms can reduce poverty and vulnerability, increase work and educational achievement, and promote economic growth. Formal social protection initiatives cover only a small proportion of the population in East Africa - those working in the formal sector. Vulnerable groups - such as the poor and ...

  19. Determining shallow aquifer vulnerability by the DRASTIC model ...

    Indian Academy of Sciences (India)

    Shallow aquifer vulnerability has been assessed using GIS-based DRASTIC model by incorporating the major geological and hydrogeological factors that affect and control the groundwater contamination in a granitic terrain. It provides a relative indication of aquifer vulnerability to the contamination. Further, it has been ...

  20. Network Vulnerability and Risk Assessment

    National Research Council Canada - National Science Library

    Alward, Randy G; Carley, Kathleen M; Madsen, Fredrik; Taylor, Vincent K; Vandenberghe, Grant

    2006-01-01

    .... The break out group discussed vulnerability presentation needs common across various application domains, particularly in support of network discovery and network analysis tasks in those domains...