WorldWideScience

Sample records for energy vulnerabilities self-sufficient

  1. Energy Self-Sufficient Island

    International Nuclear Information System (INIS)

    Bratic, S.; Krajacic, G.; Duic, N.; Cotar, A.; Jardas, D.

    2011-01-01

    In order to analyze energy self-sufficient island, example of a smaller island, connected to the power system of a bigger island with an undersea cable, was taken. Mounting substation 10/0,4 is situated on the island and for the moment it provides enough electricity using the medium voltage line. It is assumed that the island is situated on the north part of the Adriatic Sea. The most important problem that occurs on the island is the population drop that occurs for a significant number of years, therefore, life standard needs to be improved, and economic development needs to be encouraged immediately. Local authorities to stimulate sustainable development on the island through different projects, to breath in a new life to the island, open new jobs and attract new people to come live there. Because of the planned development and increase of the population, energy projects, planned as a support to sustainable development, and later achievement of the energy self-sufficiency, is described in this paper. Therefore, Rewisland methodology appliance is described taking into the account three possible scenarios of energy development. Each scenario is calculated until year 2030. Also, what is taken into the account is 100% usage of renewable sources of energy in 2030. Scenario PTV, PP, EE - This scenario includes installation of solar photovoltaic modules and solar thermal collectors on the buildings roofs, as well as well as implementation of energy efficiency on the island (replacement of the street light bulbs with LED lightning, replacement of the old windows and doors on the houses, as well as the installation of the thermal insulation). Scenario PV island - This scenario, similarly to the previous one, includes installation of solar photovoltaic modules and solar thermal collectors an the residential buildings, as well as the 2 MW photovoltaic power plant and ''Green Hotel'', a building that satisfies all of its energy needs completely from renewable energy sources

  2. Energy self-sufficiency in Northampton, Massachusetts

    Energy Technology Data Exchange (ETDEWEB)

    1979-10-01

    The study is not an engineering analysis but begins the process of exploring the potential for conservation and local renewable-resource development in a specific community, Northampton, Massachusetts, with the social, institutional, and environmental factors in that community taken into account. Section I is an extensive executive summary of the full study, and Section II is a detailed examination of the potential for increased local energy self-sufficiency in Northampton, including current and future demand estimates, the possible role of conservation and renewable resources, and a discussion of the economic and social implications of alternative energy systems. (MOW)

  3. Ideal energy self-sufficient bioclimatic house

    Energy Technology Data Exchange (ETDEWEB)

    Talamo, C.

    1990-04-01

    This paper points out some of the interesting architectural features of a conceptual house being designed to be self-sufficient relative to the use of conventional energy sources. Brief notes are given on the following special design characteristics: the house's orientation and form - essentially a V - shaped two storey design with an orientation such as to maximize the surface area exposed to winter insolation; its special low emissivity glazing equipped with nightfall insulating screens; the adoption of maximized insulation, in which case cost benefits were assessed based on amortization over the entire life span of the house; hybrid space heating and ventilation systems involving the integration of pumps and ventilators for air circulation, and the use of a varied mix of active and passive solar heating and cooling systems.

  4. Energy Strategic Planning & Self-Sufficiency Project

    Energy Technology Data Exchange (ETDEWEB)

    Greg Retzlaff

    2005-03-30

    This report provides information regarding options available, their advantages and disadvantages, and the costs for pursuing activities to advance Smith River Rancheria toward an energy program that reduces their energy costs, allows greater self-sufficiency and stimulates economic development and employment opportunities within and around the reservation. The primary subjects addressed in this report are as follow: (1) Baseline Assessment of Current Energy Costs--An evaluation of the historical energy costs for Smith River was conducted to identify the costs for each component of their energy supply to better assess changes that can be considered for energy cost reductions. (2) Research Viable Energy Options--This includes a general description of many power generation technologies and identification of their relative costs, advantages and disadvantages. Through this research the generation technology options that are most suited for this application were identified. (3) Project Development Considerations--The basic steps and associated challenges of developing a generation project utilizing the selected technologies are identified and discussed. This included items like selling to third parties, wheeling, electrical interconnections, fuel supply, permitting, standby power, and transmission studies. (4) Energy Conservation--The myriad of federal, state and utility programs offered for low-income weatherization and utility bill payment assistance are identified, their qualification requirements discussed, and the subsequent benefits outlined. (5) Establishing an Energy Organization--The report includes a high level discussion of formation of a utility to serve the Tribal membership. The value or advantages of such action is discussed along with some of the challenges. (6) Training--Training opportunities available to the Tribal membership are identified.

  5. Energy self-sufficiency: dream or reality

    Energy Technology Data Exchange (ETDEWEB)

    1982-01-01

    Twenty six papers from a June 1982 joint conference of the National Research Council of Canada and the Petroleum Society of CIM address areas in which Canadian industry could apply theoretical and experimental mechanics to solve major problems. The papers are grouped under six headings: Coal, Drilling/Completion, Frontier, General, Heavy Oil/Oil sands, and Nuclear. A separate abstract was prepared for each of the papers selected for the Energy Data Base (EDB).

  6. National Energy Plan 1997 - 2010; Sustainable Energy self-sufficiency

    International Nuclear Information System (INIS)

    1997-01-01

    The present revision of the PEN consists of two parts, a diagnosis and a strategy. In the diagnosis; the evolution and the changes are analyzed foreseen in the international and national environments to establish the form like the energy sector is affected and it responds to these conditions. In second part it revises the strategy to incorporate the required adjustments of agreement with the changes in the environment, the demand perspectives and sector and national politics limits. In the international thing, the process of transformation of the system economic World cup will contribute to strengthen the liberalization actions, deregulation and privatization of the economies of the development countries. Great part of the dynamics growth, will be sustained then in the private investment and in an atmosphere of global competition. The formation of regional blocks opens favorable perspectives for new cooperation forms and development of resources. In the case of the American hemisphere and with reference to the energy sector, one has an important potential to improve the self-sufficiency starting from regional supplies, especially starting from fossil resources. This expectation is important for Colombia that has well-known reservations and important potentials in these resources. The tendencies waited in the fossil resources are more favorable for the countries than they can have reservations and growing production of petroleum and of natural gas. Nevertheless, the development of the coal maintains favorable expectations, but with important requirements as for efficiency and quality in the production that it guarantee the positioning in a more and more concerned market. In the environmental thing, the growth foreseen in the consumption of fossil fuels also bears to the increment in the 2010 in the greenhouse gases, at levels between 36% and 49% superiors to those of 1990. That most of this increment will originate in the in the development countries and

  7. CANDU: Meeting the demand for energy self-sufficiency

    International Nuclear Information System (INIS)

    Lawson, D.S.

    1985-01-01

    The success of the CANDU program can been seen quickly by examining the comparison of typical electricity bills in various provinces of Canada. The provinces of Quebec and Manitoba benefit b extensive hydro electric schemes, many of which were constructed years ago at low capital cost. In Ontario, the economic growth has outstripped these low cost sources of hydro power and hence the province has to rely on thermal sources of electricity generation. The success of the CANDU program is shown by the fact that it can contribute over a third of electricity in Ontario while keeping the total electricity rate comparable with that of those provinces that can rely on low cost hydro sources. Energy self-sufficiency encompasses a spectrum of requirements. One consideration would be the reliable supply and control of fuel during the operating life of a power plant: A greater degree of self-sufficiency would be obtained by having an involvement in the building and engineering of the power plant prior to its operation

  8. India's baseline plan for nuclear energy self-sufficiency

    International Nuclear Information System (INIS)

    Bucher, R.G.

    2009-01-01

    India's nuclear energy strategy has traditionally strived for energy self-sufficiency, driven largely by necessity following trade restrictions imposed by the Nuclear Suppliers Group (NSG) following India's 'peaceful nuclear explosion' of 1974. On September 6, 2008, the NSG agreed to create an exception opening nuclear trade with India, which may create opportunities for India to modify its baseline strategy. The purpose of this document is to describe India's 'baseline plan,' which was developed under constrained trade conditions, as a basis for understanding changes in India's path as a result of the opening of nuclear commerce. Note that this treatise is based upon publicly available information. No attempt is made to judge whether India can meet specified goals either in scope or schedule. In fact, the reader is warned a priori that India's delivery of stated goals has often fallen short or taken a significantly longer period to accomplish. It has been evident since the early days of nuclear power that India's natural resources would determine the direction of its civil nuclear power program. It's modest uranium but vast thorium reserves dictated that the country's primary objective would be thorium utilization. Estimates of India's natural deposits vary appreciably, but its uranium reserves are known to be extremely limited, totaling approximately 80,000 tons, on the order of 1% of the world's deposits; and nominally one-third of this ore is of very low uranium concentration. However, India's roughly 300,000 tons of thorium reserves account for approximately 30% of the world's total. Confronted with this reality, the future of India's nuclear power industry is strongly dependent on the development of a thorium-based nuclear fuel cycle as the only way to insure a stable, sustainable, and autonomous program. The path to India's nuclear energy self-sufficiency was first outlined in a seminal paper by Drs. H. J. Bhabha and N. B. Prasad presented at the Second

  9. Sustainability and energy self-sufficiency; overcoming the barriers

    Directory of Open Access Journals (Sweden)

    Rania Abdel Galil

    2015-12-01

    Nations Secretary-General Ban Ki-moon comes to mind: “energy is the golden thread that weaves together economic growth, social equity, and environmental sustainability”. If sustainable development is to be realized, if there is to be a universal access to modern energy services and energy self-sufficiency, the share of renewable energy sources and the global rate of improvement in energy efficiency need to intensify, in addition to a strong shift of attitudes and policy towards cleaner choices of energy.

  10. Transforming the energy system: Why municipalities strive for energy self-sufficiency

    International Nuclear Information System (INIS)

    Engelken, Maximilian; Römer, Benedikt; Drescher, Marcus; Welpe, Isabell

    2016-01-01

    Despite evidence that a rising number of municipalities in Germany are striving for energy self-sufficiency, there is little understanding of the driving factors behind this development. We investigate economic, ecological, social and energy system related factors that drive municipalities to strive for energy self-sufficiency with a focus on electricity supply. The empirical data for this study is based on insights generated through expert interviews (N =19) with mayors, energy experts and scientists as well as a quantitative study among mayors and energy officers (N =109) of German municipalities. Results show that environmental awareness, tax revenues and greater independence from private utilities are positively related to the mayors’ attitude towards the realization of energy self-sufficiency. Furthermore, citizens, the political environment, the mayor's political power, and his/her financial resources are relevant factors for a municipality striving for energy self-sufficiency. Policymakers need to decide whether or not to support mayors in this development. For suitable policy interventions, the results suggest the importance of an integrated approach that considers a combination of identified factors. Finally, we propose a morphological box to structure different aspects of energy self-sufficiency and categorize the present study. - Highlights: • Municipalities striving for energy self-sufficiency can play a key role in the transition of the energy system. • Tax revenues and environmental awareness main drivers behind mayors’ attitude towards energy self-sufficiency. • Citizens and the political environment main influencers of mayors striving for energy self-sufficiency. • 19 expert interviews analyzed for the framework of the study based on the theory of planned behavior (TPB). • 109 mayors and energy officers participated in the quantitative main survey.

  11. Energy political self-sufficiency endangers sustainable development

    International Nuclear Information System (INIS)

    Anon.

    1997-01-01

    The world energy council (WEC), in its report, draws attention to questions which, in its opinion, deserve better attention. The decision-makers, to whom this report is mainly aimed, are meant to be encouraged to deal with these subjects. These are: - measures to increase global energy efficiency, - technology transfer, - the prices of energy, -research and development financing, - preventative measures against air pollution, - nuclear energy

  12. Roadmap to a self-sufficient energy future

    International Nuclear Information System (INIS)

    Couture, T.; Coon, D.

    2007-11-01

    This paper presented a roadmap designed to promote ecologically and economically sustainable policies in New Brunswick that will lead the province towards a low carbon economy. The policies recommended in the roadmap focused on reducing greenhouse gases (GHGs) in the province while ensuring the economic development of local communities. New Brunswick's per capita emissions are among the highest in Canada. Many buildings are heated with electricity generated by fossil fuels, and the economy is dominated by electricity exports and refined petroleum products. The province's climate action plan aims to reduce the demand for electricity through energy efficiency and by reducing reliance on electricity for water and space heating. However, provincial regulations will not limit emissions from power plants or the industrial sector. Reserves of energy in the province include wood, organic wastes, wind power, and solar energy. The province also has access to low carbon natural gas for use in hydrogen production. The use of combined heat and power systems in district heating for New Brunswick was discussed. tabs., figs

  13. A solar house self-sufficient of energy. Experiences on the way to energy autarky

    International Nuclear Information System (INIS)

    Voss, K.; Dohlen, K. v.; Lehmberg, H.; Stahl, W.; Wittwer, C.; Goetzberger, A.

    1994-01-01

    The solar house Freiburg which is self-sufficient of energy was completed in October 1992. After a long and complex planning phase now measuring and monitoring tasks as well as the realization fo improvement measures are to the fore. This article presents exemplary results of the first year of operation and compare them with the expectations. Self-sufficient operation of the building could be attained between April and October 1993. Here among others hydrogen was successfully produced by photovoltaic supplied electrolysis and was to a large degree used for thermal applications (cooking, heating). The fact that the supply of energy was not self-sufficient all the year round was due to the failure of the fuel cell used to produce electric power again with hydrogen. (orig./BWI) [de

  14. How, When, and Where? Assessing Renewable Energy Self-Sufficiency at the Neighborhood Level.

    Science.gov (United States)

    Grosspietsch, David; Thömmes, Philippe; Girod, Bastien; Hoffmann, Volker H

    2018-02-20

    Self-sufficient decentralized systems challenge the centralized energy paradigm. Although scholars have assessed specific locations and technological aspects, it remains unclear how, when, and where energy self-sufficiency could become competitive. To address this gap, we develop a techno-economic model for energy self-sufficient neighborhoods that integrates solar photovoltaics (PV), conversion, and storage technologies. We assess the cost of 100% self-sufficiency for both electricity and heat, comparing different technical configurations for a stylized neighborhood in Switzerland and juxtaposing these findings with projections on market and technology development. We then broaden the scope and vary the neighborhood's composition (residential share) and geographic position (along different latitudes). Regarding how to design self-sufficient neighborhoods, we find two promising technical configurations. The "PV-battery-hydrogen" configuration is projected to outperform a fossil-fueled and grid-connected reference configuration when energy prices increase by 2.5% annually and cost reductions in hydrogen-related technologies by a factor of 2 are achieved. The "PV-battery" configuration would allow achieving parity with the reference configuration sooner, at 21% cost reduction. Additionally, more cost-efficient deployment is found in neighborhoods where the end-use is small commercial or mixed and in regions where seasonal fluctuations are low and thus allow for reducing storage requirements.

  15. The feasibility and challenges of energy self-sufficient wastewater treatment plants

    International Nuclear Information System (INIS)

    Gu, Yifan; Li, Yue; Li, Xuyao; Luo, Pengzhou; Wang, Hongtao; Robinson, Zoe P.; Wang, Xin; Wu, Jiang; Li, Fengting

    2017-01-01

    Highlights: •Various influencing factors of energy use in WWTPs are characterized. •Benchmark energy consumption in WWTPs in different countries are highlighted. •Energy recovery or saving technologies in WWTPs are summarized. •Recent advances in optimization of energy recovery technologies are highlighted. •Feasibility and challenges of energy self-sufficient WWTPs are explored. -- Abstract: Energy efficiency optimization is crucial for wastewater treatment plants (WWTPs) because of increasing energy costs and concerns about global climate change. Energy efficiency optimization can be achieved through a combination of energy recovery from the wastewater treatment process and energy saving-related technologies. Through these two approaches energy self-sufficiency of WWTPs is achievable, and research is underway to reduce operation costs and energy consumption and to achieve carbon neutrality. In this paper, we analyze energy consumption and recovery in WWTPs and characterize the factors that influence energy use in WWTPs, including treatment techniques, treatment capacities, and regional differences. Recent advances in the optimization of energy recovery technologies and theoretical analysis models for the analysis of different technological solutions are presented. Despite some challenges in implementation, such as technological barriers and high investment costs, particularly in developing countries, this paper highlights the potential for more energy self-sufficient WWTPs to be established in the future.

  16. The autonomous house: a bio-hydrogen based energy self-sufficient approach.

    Science.gov (United States)

    Chen, Shang-Yuan; Chu, Chen-Yeon; Cheng, Ming-Jen; Lin, Chiu-Yue

    2009-04-01

    In the wake of the greenhouse effect and global energy crisis, finding sources of clean, alternative energy and developing everyday life applications have become urgent tasks. This study proposes the development of an "autonomous house" emphasizing the use of modern green energy technology to reduce environmental load, achieve energy autonomy and use energy intelligently in order to create a sustainable, comfortable living environment. The houses' two attributes are: (1) a self-sufficient energy cycle and (2) autonomous energy control to maintain environmental comfort. The autonomous house thus combines energy-conserving, carbon emission-reducing passive design with active elements needed to maintain a comfortable environment.

  17. The Autonomous House: A Bio-Hydrogen Based Energy Self-Sufficient Approach

    Science.gov (United States)

    Chen, Shang-Yuan; Chu, Chen-Yeon; Cheng, Ming-jen; Lin, Chiu-Yue

    2009-01-01

    In the wake of the greenhouse effect and global energy crisis, finding sources of clean, alternative energy and developing everyday life applications have become urgent tasks. This study proposes the development of an “autonomous house” emphasizing the use of modern green energy technology to reduce environmental load, achieve energy autonomy and use energy intelligently in order to create a sustainable, comfortable living environment. The houses’ two attributes are: (1) a self-sufficient energy cycle and (2) autonomous energy control to maintain environmental comfort. The autonomous house thus combines energy-conserving, carbon emission-reducing passive design with active elements needed to maintain a comfortable environment. PMID:19440531

  18. A blueprint for complete energy self-sufficiency in British Columbia

    International Nuclear Information System (INIS)

    2007-01-01

    The Endless Energy Project is a partnership between the Globe Foundation, BC Hydro, Day 4 Energy, the Power Technology Alliance, the National Research Council of Canada, and Western Economic Diversification. The purpose of the project is to examine British Columbia's potential to be energy self-sufficient from renewable sources by 2025. Background information on the Endless Energy Project was presented with reference to energy use in all sectors of the economy and energy supply from all sources indigenous to the province. The report discussed global drivers and scenarios as well as energy use trends specific to British Columbia. These trends were related to energy use for residential buildings; commercial sector; domestic transportation; gateway transportation; and industrial sources. The report also provided an outlook for each of these sectors. A large-scale supply outlook was also described for solar; geothermal; wind; hydro; biomass; forest waste to energy potential; ocean wave energy potential; and tidal current systems. The report concluded with a discussion of matching renewable energy supplies to demand. It was concluded that based on a combination of renewable energy supply, cleaner burning fuels, such as hydrogen and ethanol, and energy use reduction in homes, businesses, and public sector operations, British Columbia could reasonably achieve energy self-sufficiency by 2025. tabs., figs

  19. CaFe2O4 as a self-sufficient solar energy converter

    Science.gov (United States)

    Tablero, C.

    2017-10-01

    An ideal solar energy to electricity or fuel converter should work without the use of any external bias potential. An analysis of self-sufficiency when CaFe2O4 is used to absorb the sunlight is carried out based on the CaFe2O4 absorption coefficient. We started to obtain this coefficient theoretically within the experimental bandgap range in order to fix the interval of possible values of photocurrents, maximum absorption efficiencies, and photovoltages and thus that of self-sufficiency considering only the radiative processes. Also for single-gap CaFe2O4, we evaluate an alternative for increasing the photocurrent and maximum absorption efficiency based on inserting an intermediate band using high doping or alloying.

  20. Energy self-sufficient sensory ball screw drive; Energieautarker sensorischer Kugelgewindetrieb

    Energy Technology Data Exchange (ETDEWEB)

    Bertram, Oliver

    2012-07-01

    Nowadays the availability of machine tools plays a decisive role in competition to increase in productivity. From state of the art it arises, that ball screw drives are the most abusive component in feed drives because of abrasive wear. Furthermore condition monitoring enables avoiding unplanned machine failure and increasing the availability of the deployed production facility. Thereby the application of additional sensors allows the direct acquisition of wear correlative measurements. To reduce the required effort for integration and increase the robustness, reliability and clarity in industrial environment energy self-sufficient sensor systems can be applied. In this thesis the development and investigation of an energy self-sufficient sensory ball screw drive with direct measurement of wear correlative pretension for condition monitoring application is described. The prototype measures the pretension with force sensors based on strain gauges. The sensor system includes microcontroller-based electronics for signal processing as well as wireless data transmission with ZigBee-standard. A hybrid system assures the energy supply of the sensor system. On the one hand a stepper motor generator produces electrical energy from the motion energy of the ball screw drive. On the other hand an energy buffer based on super caps is reloaded in stationary position by wireless energy transmission. For verification a prototype system is build up. In measurements the sensory and energetic characteristics of the energy self-sufficient sensor systems are analyzed. Moreover, the functionality of the ball screw drive as well as the signal characteristics of the force sensors are examined for different pretensions. In addition, pretension losses due to wear are established in realized endurance trials, which means that timely maintenance can be planned.

  1. Optimization of stand-alone photovoltaic systems with hydrogen storage for total energy self-sufficiency

    Energy Technology Data Exchange (ETDEWEB)

    Lund, P D [Helsinki Univ. of Technology, Espoo (Finland). Dept. of Technical Physics

    1991-01-01

    A new method for optimization of stand-alone photovoltaic-hydrogen energy systems is presented. The methodology gives the optimum values for the solar array and hydrogen storage size for any given system configuration and geographical site. Sensitivity analyses have been performed to study the effect of subsystem efficiencies on the total system performance and sizing, and also to identify possibilities for further improvements. Optimum system configurations have also been derived. The results indicate that a solar-hydrogen energy system is a very promising potential alternative for low power applications requiring a total electricity self-sufficiency. (Author).

  2. Energy self-sufficient sewage wastewater treatment plants: is optimized anaerobic sludge digestion the key?

    Science.gov (United States)

    Jenicek, P; Kutil, J; Benes, O; Todt, V; Zabranska, J; Dohanyos, M

    2013-01-01

    The anaerobic digestion of primary and waste activated sludge generates biogas that can be converted into energy to power the operation of a sewage wastewater treatment plant (WWTP). But can the biogas generated by anaerobic sludge digestion ever completely satisfy the electricity requirements of a WWTP with 'standard' energy consumption (i.e. industrial pollution not treated, no external organic substrate added)? With this question in mind, we optimized biogas production at Prague's Central Wastewater Treatment Plant in the following ways: enhanced primary sludge separation; thickened waste activated sludge; implemented a lysate centrifuge; increased operational temperature; improved digester mixing. With these optimizations, biogas production increased significantly to 12.5 m(3) per population equivalent per year. In turn, this led to an equally significant increase in specific energy production from approximately 15 to 23.5 kWh per population equivalent per year. We compared these full-scale results with those obtained from WWTPs that are already energy self-sufficient, but have exceptionally low energy consumption. Both our results and our analysis suggest that, with the correct optimization of anaerobic digestion technology, even WWTPs with 'standard' energy consumption can either attain or come close to attaining energy self-sufficiency.

  3. An energy self-sufficient public building using integrated renewable sources and hydrogen storage

    International Nuclear Information System (INIS)

    Marino, C.; Nucara, A.; Pietrafesa, M.; Pudano, A.

    2013-01-01

    The control of the use of fossil fuels, major cause of greenhouse gas emissions and climate changes, in present days represents one of Governments' main challenges; particularly, a significant energy consumption is observed in buildings and might be significantly reduced through sustainable design, increased energy efficiency and use of renewable sources. At the moment, the widespread use of renewable energy in buildings is limited by its intrinsic discontinuity: consequently integration of plants with energy storage systems could represent an efficient solution to the problem. Within this frame, hydrogen has shown to be particularly fit in order to be used as an energetic carrier. In this aim, in the paper an energetic, economic and environmental analysis of two different configurations of a self-sufficient system for energy production from renewable sources in buildings is presented. In particular, in the first configuration energy production is carried out by means of photovoltaic systems, whereas in the second one a combination of photovoltaic panels and wind generators is used. In both configurations, hydrogen is used as an energy carrier, in order to store energy, and fuel cells guarantee its energetic reconversion. The analysis carried out shows that, although dimensioned as a stand-alone configuration, the system can today be realized only taking advantage from the incentivizing fares applied to grid-connected systems, that are likely to be suspended in the next future. In such case, it represents an interesting investment, with capital returns in about 15 years. As concerns economic sustainability, in fact, the analysis shows that the cost of the energy unit stored in hydrogen volumes, due to the not very high efficiency of the process, presently results greater than that of directly used one. Moreover, also the starting fund of the system proves to be very high, showing an additional cost with respect to systems lacking of energy storage equal to about 50

  4. Towards energy self sufficiency in the North: Energy conservation and forest biomass

    Energy Technology Data Exchange (ETDEWEB)

    1985-01-01

    A symposium was held to address the issues of controlling energy demand through conservation, and increasing the range of energy supply using forest products (biomass) as a renewable alternative to fossil fuels in Canada's northern climates. Sections on retrofitting of thermal insulation, production of wood fuels, and unconventional energy analyses of these technologies are included. Separate abstracts have been prepared for 23 papers.

  5. Energy Self-sufficiency from an Emergy Perspective Exemplified by a Model System of a Danish Farm Cooperative

    DEFF Research Database (Denmark)

    Østergård, Hanne; Markussen, Mads Ville

    2010-01-01

    flow for labor in different ways. The five farms produce bioenergy (biodiesel from oil seed rape and electricity and hot water from anaerobic fermentation of grass-clover), food and fodder (cereals and legumes) and green manure (effluent from biogas production). All green manure, about half......Contemporary food production is highly dependent on fossil fuel for production of fertilizer and as diesel for field operations. One way to enhance agricultural resilience is to increase self-sufficiency at the farm level with necessities such as energy, food, fodder, nutrients and seed. It is even...

  6. Energy harvesting with self-sufficient frequency-tunable piezoelectric devices

    Energy Technology Data Exchange (ETDEWEB)

    Eichhorn, Christoph

    2011-07-01

    In this dissertation, a piezoelectric energy harvester is presented, which is able to extract electric energy from weak ambient vibrations. This can be useful e.g. to run a wireless sensor node in order to make such a sensor independent of batteries. Without the requirement of batteries, the maintenance costs of large sensor networks could be lowered and the environmental pollution due to batteries can be reduced. Mechanical vibrations represent one out of different ambient energy sources for energy harvesting. To exploit vibrations with small amplitudes, it is essential to use the resonance amplification of a harmonic oscillator with a high quality factor. The mechanical energy of such a resonant oscillator can then be transformed into electrical energy. The advantage of the resonance amplification is however lost if this natural frequency does not match exactly the frequency of the ambient vibration. This constraint represents one of the most serious obstacles in vibration energy harvesting applications. What makes the generator presented in this work special is its ability to dynamically readjust its natural frequency in an energy-autonomous way. With this feature, it can prevent frequency mismatches and can therefore generate electrical power in an efficient way, even in environments which provide vibrations with non-constant frequencies. This can be the case e.g. on machines that contain rotors with a variable number of revolutions per minute. An example for such an environment is an automobile, where the generated vibrations are usually correlated to the cruising speed. Adaptive systems are however not only useful to face variable vibration frequencies. Many environments offer constant but very specific vibration frequencies. Adaptive energy harvesters allow vibrations with individual properties to be exploited without expensive customized solutions. Due to their adaptability, such generators can be driven within a certain frequency range, which allows to

  7. Biogas in organic agriculture-effects on productivity, energy self-sufficiency and greenhouse gas emissions

    DEFF Research Database (Denmark)

    Pugesgaard, Siri; Olesen, Jørgen E; Jørgensen, Uffe

    2014-01-01

    was obtained for all biogas scenarios, showing that biomass production for biogas on 10% of the farm area results in an energy surplus, provided that the heat from the electricity production is utilized. The energy surplus implies a displacement of fossil fuels and thereby reduced CO2 emission from the farm...... of anaerobic digestion and biogas production were analyzed on a 1000 ha model farm with combined dairy and cash crop production, representing organic agriculture in Denmark. The effects on crop rotation, nitrogen flows and losses, yield, energy balance and greenhouse gas (GHG) emissions were evaluated for four...... scenarios of biogas production on the farm. Animal manure was digested for biogas production in all scenarios and was supplemented with: (1) 100 ha grass–clover for biogas, (2) 100 ha maize for biogas, (3) 200 ha grass–clover for biogas and reduced number of livestock, and (4) 200 ha grass–clover for biogas...

  8. Energy conservation and self-sufficiency in rural property; Geracao e auto-suficiencia de energias em imovel rural familiar

    Energy Technology Data Exchange (ETDEWEB)

    Schuch, Sergio Luis [Instituto Paranaense de Assistencia Tecnica e Extensao Rural (EMATER), Toledo, PR (Brazil)], e-mail: slschuch@hotmail.com; Lawder, Jose Henrique [Evolucao Engenharia Eletrica, Toledo, PR (Brazil)], e-mail: jose_lawder@uol.com.br; Feiden, Armin; Nogueira, Carlos Eduardo Camargo; Siqueira, Jair Antonio Cruz [Universidade Estadual do Oeste do Parana (UNIOESTE), Cascavel, PR (Brazil)], e-mails: armin_feiden@yahoo.com.br, cecn1@yahoo.com.br, jairsiqueira@unioeste.br

    2011-07-01

    This paper aims to highlight an innovative system designed to generate bioenergy in Toledo - PR, applied in a rural residential property. This system is composed by a simple digester model, because it eliminates masonry and hood storage. Cattle slurry and water from barn's floor cleaning are conducted to an anaerobic biodigester chamber. Biogas production is stored in a polypropylene canvas balloon. After compression, the biogas is used to replace liquefied petroleum gas in central water heating and cooking foods. The wood used in sugar cane molasses has been replaced with higher efficiency by biogas. Also was installed Otto engine providing thermal and electrical power generation at the same time. The electrical power output is biphasic and about 70 Amperes. This system deployed in rural property provides energy self-sufficiency and contribute to the reduction of operational costs of the property. (author)

  9. Energy conservation and self-sufficiency in rural property; Geracao e auto-suficiencia de energias em imovel rural familiar

    Energy Technology Data Exchange (ETDEWEB)

    Schuch, Sergio Luis [Instituto Paranaense de Assistencia Tecnica e Extensao Rural (EMATER), Toledo, PR (Brazil)], e-mail: slschuch@hotmail.com; Lawder, Jose Henrique [Evolucao Engenharia Eletrica, Toledo, PR (Brazil)], e-mail: jose_lawder@uol.com.br; Feiden, Armin; Nogueira, Carlos Eduardo Camargo; Siqueira, Jair Antonio Cruz [Universidade Estadual do Oeste do Parana (UNIOESTE), Cascavel, PR (Brazil)], e-mails: armin_feiden@yahoo.com.br, cecn1@yahoo.com.br, jairsiqueira@unioeste.br

    2011-07-01

    This paper aims to highlight an innovative system designed to generate bioenergy in Toledo - PR, applied in a rural residential property. This system is composed by a simple digester model, because it eliminates masonry and hood storage. Cattle slurry and water from barn's floor cleaning are conducted to an anaerobic biodigester chamber. Biogas production is stored in a polypropylene canvas balloon. After compression, the biogas is used to replace liquefied petroleum gas in central water heating and cooking foods. The wood used in sugar cane molasses has been replaced with higher efficiency by biogas. Also was installed Otto engine providing thermal and electrical power generation at the same time. The electrical power output is biphasic and about 70 Amperes. This system deployed in rural property provides energy self-sufficiency and contribute to the reduction of operational costs of the property. (author)

  10. Energy self-sufficiency

    International Nuclear Information System (INIS)

    Dickeman, R.L.

    1975-01-01

    The reasons why there has been a stronger commitment of capital, technical, and managerial resources to the nuclear fuel supply business, on the part of U.S. industry, are examined. First a number of observations are made on the economic risks involved, capital investment requirements and fuel growth projects. Considering the nuclear fuel industry as a whole, the need for industry, government, electric utilities, and the public, to respond to its challenge is stressed. Sources of bottlenecks to expanding production are then considered for the various sectors of the fuel cycle. The most essential ingredients for the industry are described as: the recognition that provision of nuclear fuels falls within the private sector; predictable industry requirements for the fuel; timely regulatory and licensing requirements, criteria and actions. (U.K.)

  11. The Solar Jobs Book: How to Take Part in the New Movement Toward Energy Self-Sufficiency.

    Science.gov (United States)

    Ericson, Katharine

    Solutions to this country's energy problems can be found through a combination of conservation measures and solar technology. Accordingly, this book provides an overview of employment in the solar energy and energy conservation fields, an analysis of related life styles and working situations, a listing of solar energy programs and agencies, and a…

  12. Environmental and self-sufficiency assessment of the energy metabolism of tourist hubs on Mediterranean Islands: The case of Menorca (Spain)

    International Nuclear Information System (INIS)

    Sanyé-Mengual, Esther; Romanos, Héctor; Molina, Catalina; Oliver, M. Antònia; Ruiz, Núria; Pérez, Marta; Carreras, David; Boada, Martí; Garcia-Orellana, Jordi; Duch, Jordi; Rieradevall, Joan

    2014-01-01

    Energy performance of island tourism has been analyzed in the literature. However, tourist services tend to concentrate in tourist hubs, especially where mass tourism predominates (e.g., Mediterranean), and the energy metabolism of these systems has not yet been assessed. The present paper models and estimates the energy metabolism of tourist hubs in the Menorca Island (Spain) by integrating social, geographical and environmental methods. Mobility (both external and internal) and consumption of lodging services were characterized through surveys to users (tourists) and business managers. An environmental assessment evaluated CO 2 emissions, and energy self-sufficiency potential was estimated via GIS data. The results indicate that, on average, a tourist consumes 4756 MJ with associated emissions of 277 kg of CO 2 per stay (20 days on average). Of all the energy flows, external mobility contributes the most to total emissions (77%). For every day spent in a tourist hub, a tourist consumes between 29 MJ and 93 MJ in lodging services, consumption that could be 100% satisfied by photovoltaic systems, and these systems would result in positive effects for the island. Sustainable tourism management might focus on promoting environmentally friendly transportation, energy efficient practices, and environmental communication through ecolabeling. - Highlights: • We modeled the entire energy metabolism of tourist hubs in islands. • Results showed that a tourist in Menorca consumes from 4000 to 6000 MJ per trip. • External mobility (trip to the island) accounts for 77% of the total CO 2 emissions. • Photovoltaic systems could provide enough power to achieve self-sufficiency. • Tourists at hotel hubs have higher energy consumption than other types of hubs

  13. The GRETA project: the contribution of near-surface geothermal energy for the energetic self-sufficiency of Alpine regions

    Directory of Open Access Journals (Sweden)

    Alessandro Casasso

    2017-03-01

    Full Text Available The Alpine regions are deeply involved in the challenge set by climate change, which is a threat for their environment and for important economic activities such as tourism. The heating and cooling of buildings account for a major share of the total primary energy consumption in Europe, and hence the energy policies should focus on this sector to achieve the greenhouse gas reduction targets set by international agreements. Geothermal heat pump is one of the least carbon-intensive technologies for the heating and cooling of buildings. It exploits the heat stored within the ground, a local renewable energy source which is widely available across the Alpine territory. Nevertheless, it has been little considered by European policies and cooperation projects. GRETA (near-surface Geothermal REsources in the Territory of the Alpine space is a cooperation project funded by the EU INTERREG-Alpine Space program, aiming at demonstrating the potential of shallow geothermal energy and to foster its integration into energy planning instruments. It started in December 2015 and will last three years, involving 12 partners from Italy, France, Switzerland, Germany, Austria, and Slovenia. In this paper, the project is presented, along with the results of the first year of work.

  14. Net-Energy Analysis of Integrated Food and Bioenergy Systems Exemplified by a Model of a Self-Sufficient System of Dairy Farms

    International Nuclear Information System (INIS)

    Markussen, Mads Ville; Pugesgaard, Siri; Oleskowicz-Popiel, Piotr; Schmidt, Jens Ejbye; Østergård, Hanne

    2015-01-01

    Agriculture is expected to contribute in substituting of fossil fuels in the future. This constitutes a paradox as agriculture depends heavily on fossil energy for providing fuel, fodder, nutrients, and machinery. The aim of this paper is to investigate whether organic agriculture is capable of providing both food and surplus energy to the society as evaluated from a model study. We evaluated bioenergy technologies in a Danish dairy-farming context in four different scenarios: (1) vegetable oil based on oilseed rape, (2) biogas based on cattle manure and grass-clover lays, (3) bioethanol from rye grain and whey, and (4) a combination of (1) and (2). When assessing the energetic net-contribution to society from bioenergy systems, two types of problems arise: how to aggregate non-equivalent types of energy services and how to account for non-equivalent types of inputs and coproducts from the farming? To avoid the first type, the net output of liquid fuels, electricity, useful heat, and food were calculated separately. Furthermore, to avoid the second type, all scenarios were designed to provide self-sufficiency with fodder and fertilizer and to utilize coproducts within the system. This approach resulted in a transparent assessment of the net-contribution to society, which is easy to interpret. We conclude that if 20% of land is used for energy crops, farm-gate energy self-sufficiency can be achieved at the cost of 17% reduction in amount of food produced. These results demonstrate the strong limitations for (organic) agriculture in providing both food and surplus energy.

  15. Net-Energy Analysis of Integrated Food and Bioenergy Systems Exemplified by a Model of a Self-Sufficient System of Dairy Farms

    Energy Technology Data Exchange (ETDEWEB)

    Markussen, Mads Ville [Department of Chemical and Biochemical Engineering, Technical University of Denmark, Kgs Lyngby (Denmark); Pugesgaard, Siri [Department of Agroecology, Aarhus University, Tjele (Denmark); Oleskowicz-Popiel, Piotr; Schmidt, Jens Ejbye; Østergård, Hanne, E-mail: haqs@kt.dtu.dk [Department of Chemical and Biochemical Engineering, Technical University of Denmark, Kgs Lyngby (Denmark)

    2015-11-25

    Agriculture is expected to contribute in substituting of fossil fuels in the future. This constitutes a paradox as agriculture depends heavily on fossil energy for providing fuel, fodder, nutrients, and machinery. The aim of this paper is to investigate whether organic agriculture is capable of providing both food and surplus energy to the society as evaluated from a model study. We evaluated bioenergy technologies in a Danish dairy-farming context in four different scenarios: (1) vegetable oil based on oilseed rape, (2) biogas based on cattle manure and grass-clover lays, (3) bioethanol from rye grain and whey, and (4) a combination of (1) and (2). When assessing the energetic net-contribution to society from bioenergy systems, two types of problems arise: how to aggregate non-equivalent types of energy services and how to account for non-equivalent types of inputs and coproducts from the farming? To avoid the first type, the net output of liquid fuels, electricity, useful heat, and food were calculated separately. Furthermore, to avoid the second type, all scenarios were designed to provide self-sufficiency with fodder and fertilizer and to utilize coproducts within the system. This approach resulted in a transparent assessment of the net-contribution to society, which is easy to interpret. We conclude that if 20% of land is used for energy crops, farm-gate energy self-sufficiency can be achieved at the cost of 17% reduction in amount of food produced. These results demonstrate the strong limitations for (organic) agriculture in providing both food and surplus energy.

  16. Investigation of the prospect of energy self-sufficiency and technical performance of an integrated PEMFC (proton exchange membrane fuel cell), dairy farm and biogas plant system

    International Nuclear Information System (INIS)

    Guan, Tingting; Alvfors, Per; Lindbergh, Göran

    2014-01-01

    Highlights: • A PEMFC stack with a 40% of electrical efficiency will make the integrated PEMFC-CHP, biogas plant and dairy farm self-sufficient. • The quality of the reformate gas is good enough to support normal operation of the PEMFC-CHP. • The methane conversion rate and the content of the CH 4 in the biogas need to be balanced in order to obtain the best system performance. • Compared with a coal-fired CHP plant, the integrated system can avoid coal consumption and CO 2 emissions. - Abstract: A PEMFC fuelled with hydrogen is known for its high efficiency and low local emissions. However, the generation of hydrogen is always a controversial issue for the application of the PEMFC due to the use of fossil fuel and the possible carbon dioxide emissions. Presently, the PEMFC-CHP fed with renewable fuels, such as biogas, appears to be the most attractive energy converter–fuel combination. In this paper, an integrated PEMFC-CHP, a dairy farm and a biogas plant are studied. A PEMFC-CHP fed with reformate gas from the biogas plant generates electricity and heat to a dairy farm and a biogas plant, while the dairy farm delivers wet manure to the biogas plant as the feedstock for biogas production. This integrated system has been modelled for steady-state conditions by using Aspen Plus®. The results indicate that the wet manure production of a dairy farm with 300 milked cows can support a biogas plant to give 1280 MW h of biogas annually. Based on the biogas production, a PEMFC-CHP with a stack having an electrical efficiency of 40% generates 360 MW h electricity and 680 MW h heat per year, which is enough to cover the energy demand of the whole system while the total efficiency of the PEMFC-CHP system is 82%. The integrated PEMFC-CHP, dairy farm and biogas plant could make the dairy farm and the biogas plant self-sufficient in a sustainable way provided the PEMFC-CHP has the electrical efficiency stated above. The effect of the methane conversion rate and the

  17. Energy self-sufficient micro systems using photovoltaics in buildings as an example; Energieautarke Mikrosysteme am Beispiel von Photovoltaik in Gebaeuden

    Energy Technology Data Exchange (ETDEWEB)

    Mueller, Monika

    2010-07-01

    The development of energy-optimized electronics with an average power consumption in the range of microwatts enabled the use of ambient energy to power these systems. This energy supply concept is also known as Micro Energy Harvesting. The main characteristics of these energy self-sufficient microsystems are low ambient power densities (microwatts per square centimeter) and an increased importance of higher-order terms in modeling the miniaturized energy converters. Furthermore, possible fields of application are heterogeneous. The range of the energy in the environment is several orders in magnitude. Thus, feasibility studies of regenerative microenergy sytems are bound to the surroundings of specific applications. This individuality raises the planning expenditure and complicates a systematical optimization and commercialization. This research study examines the general characteristic features of regenerative microsystems. The objective is to find modular and general descriptions of rising complexity instead of modeling single components for specialized applications. Thus, regenerative microsystems are treated comprising three main components, i.e. electric power consumption, ambient energy and energy converter. The types of power consumption are reduced into three main groups and the physical minima of required energies are discussed. Energy converters are analyzed in general. Radiant energy in buildings and photovoltaic energy conversion is analyzed analytically, numerically, and experimentally. Firstly, typical optic intensities in buildings are evaluated with radiometric methods. The use of raytracing programs for this application and the influence of user behaviour are examined. The study contains two rooms as well as different weather conditions and geographic positions. Measurements, simulations, and calculations are then carried out to investigate stationary electric light and dynamic solar radiation. A minimum radiation level of about 1-50 Wm{sup -2} is

  18. Increasing urban water self-sufficiency: New era, new challenges

    DEFF Research Database (Denmark)

    Rygaard, Martin; Binning, Philip John; Albrechtsen, Hans-Jørgen

    2011-01-01

    and 15 in-depth case studies, solutions used to increase water self-sufficiency in urban areas are analyzed. The main drivers for increased self-sufficiency were identified to be direct and indirect lack of water, constrained infrastructure, high quality water demands and commercial and institutional...... pressures. Case studies demonstrate increases in self-sufficiency ratios to as much as 80% with contributions from recycled water, seawater desalination and rainwater collection. The introduction of alternative water resources raises several challenges: energy requirements vary by more than a factor of ten...... amongst the alternative techniques, wastewater reclamation can lead to the appearance of trace contaminants in drinking water, and changes to the drinking water system can meet tough resistance from the public. Public water-supply managers aim to achieve a high level of reliability and stability. We...

  19. Is there a role for biofuels in promoting energy self sufficiency and security? A CGE analysis of biofuel policy in Thailand

    International Nuclear Information System (INIS)

    Wianwiwat, Suthin; Asafu-Adjaye, John

    2013-01-01

    Given the rising price of crude oil, some developing countries including Thailand are looking towards developing their domestic renewable energy resources, in particular biofuels. However, there are concerns about the possible adverse effects such a policy strategy would have on key variables such as sectoral output, land allocation and the effects of prices, particularly food prices. This study develops a computable general equilibrium (CGE) model of the Thailand economy that features enhancements of the energy sector and uses it to analyze the government’s recent renewable energy development plan. This plan aims to increase domestic energy use from renewable sources to replace fossil fuel imports. The study simulated specific policies contained in the plan. Among other things, we found that promoting biofuel use causes a rapid increase in the price of biofuel and biofuel feedstock in the short-run, whereas these prices only increase slightly in the long-run due to more elastic supplies. The prices of food and other products marginally increase, implying that food security is not undermined by the policy. On the basis of the findings, the study recommends a review of some of the targets because they were found to be rather high, and a phasing in of others. - Highlights: ► This study evaluates Thailand’s 10-year alternative energy development plan. ► Promoting biofuel use causes a rapid increase in the price of biofuel. ► Food prices marginally increase, implying that food security is not undermined. ► We recommend a review of some of the targets because they are too high

  20. Self-sufficiency, free trade and safety.

    Science.gov (United States)

    Rautonen, Jukka

    2010-01-01

    The relationship between free trade, self-sufficiency and safety of blood and blood components has been a perennial discussion topic in the blood service community. Traditionally, national self-sufficiency has been perceived as the ultimate goal that would also maximize safety. However, very few countries are, or can be, truly self-sufficient when self-sufficiency is understood correctly to encompass the whole value chain from the blood donor to the finished product. This is most striking when plasma derived medicines are considered. Free trade of blood products, or competition, as such can have a negative or positive effect on blood safety. Further, free trade of equipment and reagents and several plasma medicines is actually necessary to meet the domestic demand for blood and blood derivatives in most countries. Opposing free trade due to dogmatic reasons is not in the best interest of any country and will be especially harmful for the developing world. Competition between blood services in the USA has been present for decades. The more than threefold differences in blood product prices between European blood services indicate that competition is long overdue in Europe, too. This competition should be welcomed but carefully and proactively regulated to avoid putting safe and secure blood supply at risk. Copyright 2009 The International Association for Biologicals. Published by Elsevier Ltd. All rights reserved.

  1. Denmark. Self-sufficiency and reserves management

    International Nuclear Information System (INIS)

    Erceville, H. d'.

    1997-01-01

    Since 1991, Denmark is a self-sufficient and a net petroleum and natural gas exporting country. Like all neighboring countries of the North sea, this country enjoys many advantages. However, Denmark exports and imports about a third of its hydrocarbons. This policy is a way to control its reserves for the future. (J.S.)

  2. Energy vulnerability relationships

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  3. Europe's vulnerability to energy crises

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-01-15

    The growing dependency of Europe as a whole on energy imports and anticipated further increases in energy prices reinforce the concerns about meeting the energy demand in the future. The objective of the Study is to identify the threats leading to potential energy crises and suggest solutions for facing, in an appropriate way, the related key challenges. In addition, the Study intends to develop a number of indicators effective enough to assess the level of different types of vulnerability, as well the overall vulnerability of a country or region, including threats to physical disruption, higher energy prices etc. The use of vulnerability indicators is highly recommended for all WEC-European countries, as well as to policy makers and market players.

  4. Self-sufficiency of an autonomous reconfigurable modular robotic organism

    CERN Document Server

    Qadir, Raja Humza

    2015-01-01

    This book describes how the principle of self-sufficiency can be applied to a reconfigurable modular robotic organism. It shows the design considerations for a novel REPLICATOR robotic platform, both hardware and software, featuring the behavioral characteristics of social insect colonies. Following a comprehensive overview of some of the bio-inspired techniques already available, and of the state-of-the-art in re-configurable modular robotic systems, the book presents a novel power management system with fault-tolerant energy sharing, as well as its implementation in the REPLICATOR robotic modules. In addition, the book discusses, for the first time, the concept of “artificial energy homeostasis” in the context of a modular robotic organism, and shows its verification on a custom-designed simulation framework in different dynamic power distribution and fault tolerance scenarios. This book offers an ideal reference guide for both hardware engineers and software developers involved in the design and implem...

  5. Improving the Perception of Self-Sufficiency towards Creative Drama

    Science.gov (United States)

    Pekdogan, Serpil; Korkmaz, Halil Ibrahim

    2016-01-01

    The purpose of this study is to investigate the effects of a Creative Drama Based Perception of Self-sufficiency Skills Training Program on 2nd grade bachelor degree students' (who are attending a preschool teacher training program) perception of self-sufficiency. This is a quasi-experimental study. Totally 50 students were equally divided into…

  6. Defining energy vulnerability in mobility. Measuring energy vulnerability in mobility. Acting against energy vulnerability in mobility. Discussing energy vulnerability in mobility. Task no. 4

    International Nuclear Information System (INIS)

    Jouffe, Yves; Massot, Marie-Helene; Noble, Cyprien

    2015-01-01

    Extensive expansion of urban areas generates transportation needs and energy expenses for mobility. Households already impacted by fuel poverty also suffer from energy vulnerability in their mobility. This report was prepared in the framework of the study of fuel poverty in France in the light of several indicators from existing inquiries, databases and modeling tools. The report is organised in 4 parts dealing with: the definition of energy vulnerability in mobility, its measurement, the possible remedial actions, and the discussions about energy vulnerability in mobility through working group meetings, respectively

  7. Can British Columbia Achieve Electricity Self-Sufficiency and Meet its Renewable Portfolio Standard?

    NARCIS (Netherlands)

    Sopinka, A.; Kooten, van G.C.; Wong, L.

    2012-01-01

    British Columbia’s energy policy is at a crossroads; the province has set a goal of electricity self-sufficiency, a 93% renewable portfolio standard and provincial natural gas strategy that could increase electricity consumption by 2,500-3,800 MW. To ascertain the reality of BC’s supply position, we

  8. Lead–acid batteries coupled with photovoltaics for increased electricity self-sufficiency in households

    International Nuclear Information System (INIS)

    Oliveira e Silva de, Guilherme; Hendrick, Patrick

    2016-01-01

    Highlights: • Grid parity is reached for PV installations up to nearly 40% self-sufficiency. • Reaching beyond 40% self-sufficiency requires storage and support policies. • Peak consumption remains constant but load variability rises with self-sufficiency. • Changes in power plants portfolio and wholesale electricity prices are expected. • Limiting feed-in power is a promising solution for reducing load variability. - Abstract: With distributed generation of electricity growing in importance (especially with photovoltaics) and buildings being one of the main consumers of energy in modern societies, distributed storage of energy in buildings is expected to become increasingly present. This paper analyses the use of residential lead–acid energy storage coupled with photovoltaics and its possible interaction with the grid for different limits of feed-in power without any support policies. In the literature, these subjects are often treated independently and for very specific, non-optimised cases, thus motivating further research. Results show that reaching self-sufficiency values up to 40% is possible, close to grid parity values, and only with photovoltaics. Beyond 40%, energy storage must be used, strongly raising the cost of the electricity consumed and therefore the need for support policies for widespread adoption. Also, peak power consumption from the grid remains constant and load variability rises, suggesting that an increase in self-sufficiency would be accompanied by lower utilisation factors of power plants and, consequently, higher wholesale electricity prices during no sunshine hours. Limiting feed-in power attenuates the increased load variability and only slightly affects the economic viability of such installations. These results present a novel optimisation tool for developers and should be considered in future studies of distributed photovoltaics and energy storage as well as in energy policy.

  9. Symbiosis of ecology, economy and architecture. Self-sufficiently working energy centre for the 'Bonner Bogen'; Symbiose von Oekologie, Oekonomie und Architektur. Autark arbeitende Energiezentrale fuer den 'Bonner Bogen'

    Energy Technology Data Exchange (ETDEWEB)

    Windmeisser, Peter [KGAL GmbH und Co. KG, Gruenwald (Germany)

    2011-07-01

    Vivid urban development, high-quality architecture, resource-saving technology and the utmost comfort for the user - that was the credo of the investors, architects and engineers for the integrated planning and implementation of the ''Bonn-Bogen'' from the beginning. After four years of development and completion of the pilot phase, a further component is visible: the self-sustaining energy center on the basis of a groundwater geothermal energy aquifer storage.

  10. Economic efficiency or self-sufficiency: alternative strategies for oil consumers?

    International Nuclear Information System (INIS)

    Heal, D.W.

    1992-01-01

    The ideal energy source is low cost (efficient) and reliable (secure). The high price and perceived political unreliability of Middle East oil supplies prompted a nearly worldwide trend towards energy self-sufficiency. Gains in energy efficiency, which have been most marked in the OECD, are permanent and, prompted by environmental concern, probably progressive. But the opportunity that is still available to low cost oil suppliers to regain lost markets will only be realized if those supplies are demonstrably reliable. (author)

  11. Entrepreneurship by any other name: self-sufficiency versus innovation.

    Science.gov (United States)

    Parker Harris, Sarah; Caldwell, Kate; Renko, Maija

    2014-01-01

    Entrepreneurship has been promoted as an innovative strategy to address the employment of people with disabilities. Research has predominantly focused on the self-sufficiency aspect without fully integrating entrepreneurship literature in the areas of theory, systems change, and demonstration projects. Subsequently there are gaps in services, policies, and research in this field that, in turn, have limited our understanding of the support needs and barriers or facilitators of entrepreneurs with disabilities. A thorough analysis of the literature in these areas led to the development of two core concepts that need to be addressed in integrating entrepreneurship into disability employment research and policy: clarity in operational definitions and better disability statistics and outcome measures. This article interrogates existing research and policy efforts in this regard to argue for a necessary shift in the field from focusing on entrepreneurship as self-sufficiency to understanding entrepreneurship as innovation.

  12. Pricing and crude oil self-sufficiency. [Canada

    Energy Technology Data Exchange (ETDEWEB)

    1979-11-01

    How Canada should go about achieving crude oil self-sufficiency and who should develop Canada's petroleum resources are discussed. The degree of urgency and the level of commitment required by government, industry, and consumers are evaluated. What the price should be of Canadian crude oil and who should establish this price are also discussed. The economic aspects of investment, return, and taxation are also included. (DC)

  13. POLITICAL ECONOMIC ANALYSIS OF RICE SELF-SUFFICIENCY IN INDONESIA

    Directory of Open Access Journals (Sweden)

    Sri Nuryanti

    2018-01-01

    Full Text Available Rice self-sufficiency is an important programme in Indonesia. The programme has four major targets, i.e. increasing production, stabilizing prices and reserve stocks, and minimizing import. For that purpose, the government gave a mandate to a parastatal, namely National Logistic Agency (Bulog in implementing the rice policies. Some studies found that involvement of such a parastatal could lead to government failure in budget allocation. The study aimed to estimate social cost of rice self-sufficiency programme based on the implementation of rice instrument policies by Bulog. The study used the national annual data of 2002–2014 period. The method used was the political preference function model to estimate economic rent and dead-weight loss using rice price elasticity of demand and supply. The result showed that in terms of percentage of food security budget, the average of economic rent reached IDR 6.37 trillion per annum (18.54%, while the average of dead-weight loss amounted at IDR 0.90 trillion per annum (2.34%. It proved that rice self-sufficiency programme along with the involvement of Bulog was economically inefficient. The government should provide better agricultural infrastructure, review governmental procurement prices, and stop rice import policy to remedy market failure.

  14. Monitoring the Vulnerability of Energy Supply System

    International Nuclear Information System (INIS)

    Gnansonounou, E.

    2006-01-01

    Due to the increasing complexity of the world evolution, the public decision makers, the energy supply industry and the consumers in industrialised countries are more and more sensitive to the vulnerability of energy supply. The emergence of new big consumer countries and the perspective of oil and gas depletion at the end of the current century raise the concerns about how to share fairly the remaining resources for the common and sustainable development of the mankind. Erratic energy prices discourage investment and delay the energy transition. Voluntary measures are needed mainly in industrialised countries in order to develop alternative and sustainable energy sources and to avoid world struggle for energy procurement. In this contribution a synthetic energy vulnerability index is defined for monitoring energy supply vulnerability. The proposed index is based on energy intensity, oil and gas import dependency, CO 2 content of primary energy supply, electricity supply vulnerability and non-diversity in transport fuels. The preliminary assessment of this synthetic index for selected industrialised countries provides promising results that need however further refinement.(author)

  15. FOOD SELF-SUFFICIENCY OF THE EUROPEAN UNION COUNTRIES – ENERGETIC APPROACH

    Directory of Open Access Journals (Sweden)

    Arkadiusz Sadowski

    2016-06-01

    Full Text Available The paper covers the issues of a basic social need, namely alimentation. The aim of the research is to evaluate the energetic food self-sufficiency and its changes in the European Union countries. The research has been conducted using the author’s methodology basing on the amount of energy produced and consumed in 1990-2009. The analyses proved that within the considered period, the European Union became an importer of net energy comprised in agricultural products. The excess in produced energy was mainly observed by the countries of European lowland. Moreover in most of the countries, a decrease in the analyzed factor was observed when compared with the 1990-1999 period. On the other hand, in relation to the new member states the increase in food energetic self-sufficiency was observed. The conclusion has been drawn that, while the general food self-sufficiency is mainly determined by environmental factors, its dynamics is primarily influenced by the factors connected with agricultural policy.

  16. Vaccine procurement and self-sufficiency in developing countries.

    Science.gov (United States)

    Woodle, D

    2000-06-01

    This paper discusses the movement toward self-sufficiency in vaccine supply in developing countries (and countries in transition to new economic and political systems) and explains special supply concerns about vaccine as a product class. It traces some history of donor support and programmes aimed at self-financing, then continues with a discussion about self-sufficiency in terms of institutional capacity building. A number of deficiencies commonly found in vaccine procurement and supply in low- and middle-income countries are characterized, and institutional strengthening with procurement technical assistance is described. The paper also provides information about a vaccine procurement manual being developed by the United States Agency for International Development (USAID) and the World Health Organization (WHO) for use in this environment. Two brief case studies are included to illustrate the spectrum of existing capabilities and different approaches to technical assistance aimed at developing or improving vaccine procurement capability. In conclusion, the paper discusses the special nature of vaccine and issues surrounding potential integration and decentralization of vaccine supply systems as part of health sector reform.

  17. Deuterium-tritium fuel self-sufficiency in fusion reactors

    International Nuclear Information System (INIS)

    Abdou, M.A.; Vold, E.L.; Gung, C.Y.; Youssef, M.Z.; Shin, K.

    1986-01-01

    Conditions necessary to achieve deuterium-tritium fuel self-sufficiency in fusion reactors are derived through extensive modeling and calculations of the required and achievable tritium breeding ratios as functions of the many reactor parameters and candidate design concepts. It is found that the excess margin in the breeding potential is not sufficient to cover all present uncertainties. Thus, the goal of attaining fuel self-sufficiency significantly restricts the allowable parameter space and design concepts. For example, the required breeding ratio can be reduced by (A) attaining high tritium fractional burnup, >5%, in the plasma, (B) achieving very high reliability, >99%, and very short times, <1 day, to fix failures in the tritium processing system, and (C) ensuring that nonradioactive decay losses from all subsystems are extremely low, e.g., <0.1% for the plasma exhaust processing system. The uncertainties due to nuclear data and calculational methods are found to be significant, but they are substantially smaller than those due to uncertainties in system definition

  18. Artificial Self-Sufficient P450 in Reversed Micelles

    Directory of Open Access Journals (Sweden)

    Teruyuki Nagamune

    2010-04-01

    Full Text Available Cytochrome P450s are heme-containing monooxygenases that require electron transfer proteins for their catalytic activities. They prefer hydrophobic compounds as substrates and it is, therefore, desirable to perform their reactions in non-aqueous media. Reversed micelles can stably encapsulate proteins in nano-scaled water pools in organic solvents. However, in the reversed micellar system, when multiple proteins are involved in a reaction they can be separated into different micelles and it is then difficult to transfer electrons between proteins. We show here that an artificial self-sufficient cytochrome P450, which is an enzymatically crosslinked fusion protein composed of P450 and electron transfer proteins, showed micelle-size dependent catalytic activity in a reversed micellar system. Furthermore, the presence of thermostable alcohol dehydrogenase promoted the P450-catalyzed reaction due to cofactor regeneration.

  19. Energy Vulnerability and EU-Russia Energy Relations

    Directory of Open Access Journals (Sweden)

    Edward Hunter Christie

    2009-08-01

    Full Text Available The concept of energy vulnerability is reviewed and discussed with a focus on Russia’s foreign energy relations, in particular those with European countries. A definition and a conceptual framework for quantifying energy vulnerability are proposed in the context of a review of recent research on energy vulnerability indices. In particular it is suggested that source country diversification should be reflected using the expected shortfall measure used in financial economics, rather than the Herfindahl-Hirschman or Shannon-Wiener indices, and that the former should then enter a calibrated function in order to yield expected economic loss. The issues of asymmetric failure probabilities and accidental versus intentional supply disruptions are then discussed with examples of recent Russian actions. Energy vulnerability measurement and modelling should ultimately inform policy. In particular, member states should legislate that no energy infrastructure project by one or more member states may increase the energy vulnerability of another member state. Additionally, European environmental policies, notably the EU ETS, should be amended so as to account for induced changes in energy vulnerability. Finally, member states should increase the level of transparency and disclosure with respect to gas import statistics and gas supply contracts.

  20. Complete self-sufficiency planning: designing and building disaster-ready hospitals.

    Science.gov (United States)

    Brands, Chad K; Hernandez, Raquel G; Stenberg, Arnold; Carnes, Gary; Ellen, Jonathan; Epstein, Michael; Strouse, Timothy

    2013-01-01

    The need for healthcare systems and academic medical centers to be optimally prepared in the event of a disaster is well documented. Events such as Hurricane Katrina demonstrate a major gap in disaster preparedness for at-risk medical institutions. To address this gap, we outline the components of complete self-sufficiency planning in designing and building hospitals that will function at full operational capacity in the event of a disaster. We review the processes used and outcomes achieved in building a new critical access, freestanding children's hospital in Florida. Given that hurricanes are the most frequently occurring natural disaster in Florida, the executive leadership of our hospital determined that we should be prepared for worst-case scenarios in the design and construction of a new hospital. A comprehensive vulnerability assessment was performed. A building planning process that engaged all of the stakeholders was used during the planning and design phases. Subsequent executive-level review and discussions determined that a disaster would require the services of a fully functional hospital. Lessons learned from our own institution's previous experiences and those of medical centers involved in the Hurricane Katrina disaster were informative and incorporated into an innovative set of hospital design elements used for construction of a new hospital with full operational capacity in a disaster. A freestanding children's hospital was constructed using a new framework for disaster planning and preparedness that we have termed complete self-sufficiency planning. We propose the use of complete self-sufficiency planning as a best practice for disaster preparedness in the design and construction of new hospital facilities.

  1. Fuel self-sufficient and low proliferation risk multi-recycling of spent fuel

    International Nuclear Information System (INIS)

    Cho, N. Z.; Hong, S. G.; Kim, T. H.; Greenspan, E.; Kastenberg, W. E.

    1998-01-01

    A preliminary feasibility study has been performed in search of promising nuclear energy systems which could make efficient use of the spent fuel from LWRs and be proliferation resistant. The energy considered consist of a dry process and a fuel-self-sufficient reactor which are synergistic. D 2 O, H 2 O and Pb (or Pb-Bi) are considered for the coolant. The most promising identified consists of Pb-cooled reactors with either an AIROX or an IFR-like reprocessing. H 2 O- (possibly mixed with D 2 O) cooled reactors can be designed to be fuel-self-sufficient and multi-recycle LWR spent fuel, provided they are accelerator driven. Moderator-free, D 2 O-cooled critical reactors can multi-recycle Th- 233 U fuel using IFR-type reprocessing; they are significantly more attractive than their thermal counterparts. H 2 O- (possibly mixed with D 2 O) cooled, accelerator-driven reactors appear attractive for converting Th into denatured 233 U using LWR spent fuel and the IFR process. The CANDU reactor technology appears highly synergistic with accelerator-driven systems. (author). 25 refs., 3 tabs., 6 figs

  2. Influence of Hydrogen-Based Storage Systems on Self-Consumption and Self-Sufficiency of Residential Photovoltaic Systems

    Directory of Open Access Journals (Sweden)

    Christian Pötzinger

    2015-08-01

    Full Text Available This paper analyzes the behavior of residential solar-powered electrical energy storage systems. For this purpose, a simulation model based on MATLAB/Simulink is developed. Investigating both short-time and seasonal hydrogen-based storage systems, simulations on the basis of real weather data are processed on a timescale of 15 min for a consideration period of 3 years. A sensitivity analysis is conducted in order to identify the most important system parameters concerning the proportion of consumption and the degree of self-sufficiency. Therefore, the influences of storage capacity and of storage efficiencies are discussed. A short-time storage system can increase the proportion of consumption by up to 35 percentage points compared to a self-consumption system without storage. However, the seasonal storing system uses almost the entire energy produced by the photovoltaic (PV system (nearly 100% self-consumption. Thereby, the energy drawn from the grid can be reduced and a degree of self-sufficiency of about 90% is achieved. Based on these findings, some scenarios to reach self-sufficiency are analyzed. The results show that full self-sufficiency will be possible with a seasonal hydrogen-based storage system if PV area and initial storage level are appropriate.

  3. The Relationship between Organizational Support Perceptions and Self-Sufficiencies of Logistics Sector Employees

    Directory of Open Access Journals (Sweden)

    Sefer Gumus

    2016-01-01

    Full Text Available This study was performed in order to examine the relationship between organizational support perceptions and self-sufficiency levels of logistics sector employees and to determine whether organizational support perceptions and self-sufficiency levels of employees differ according to some specification. The questionnaire form consisting of perceived organizational support scale in accordance with the purpose, general self-sufficiency scale and personal information form, was applied to 124 employees of 3 separate logistics firms operating in Istanbul. The data obtained from the questionnaire were analyzed using SPSS17.0 statistical software package on computer. In the assessment of data, descriptive characteristics of employees were determined by frequency and percentage statistics and the self-sufficiency and perceived organizational support levels by the mean and standard deviation statistics. The t test, Tukey test and one-way Anova tests were utilized in determining employees' self-sufficiency and perceived organizational support levels differentiation according to descriptive characteristics, and correlation analysis was utilized in determining the relationship between self-sufficiency and perceived organizational support levels of employees. In conclusion, it was determined that there was statistical relationship between organizational support and self-sufficiency levels perceived by logistics sector employees. Accordingly, when employees' perceived organizational support levels increase then self-sufficiency levels also increase, and when perceived organizational support levels decrease then self-sufficiency levels also decrease.

  4. Security of Energy Supply - Indicators for Measuring Vulnerability and Risk

    International Nuclear Information System (INIS)

    Heinrich, C.

    2010-01-01

    In an era of increasing globalization, secure and affordable energy supplies are an essential requirement for economies to work, much less develop and grow in the long term. The present study, Energy security of supply - indicators for measuring vulnerability and risk, develops a broad methodical assessment concept to raise awareness among policy makers and the public regarding the vulnerability of energy supplies to potential energy crises. It explores the different aspects of vulnerability, from the primary energy level to energy infrastructure (storage, networks, power plant parks) to the efficiency and cost of energy consumption for end users. The individual characteristics of the formal concept were quantitatively evaluated for several OECD regions (Germany, UK, Sweden, Poland, Italy, France and the US) using a comprehensive empirical database and reduced to a single indicator for assessing energy supply vulnerability. Part of the database comprises historical observations for the period between 1978 and 2007.(author).

  5. Countrywide Evaluation of the Long-Term Family Self-Sufficiency Plan. Establishing the Baselines

    National Research Council Canada - National Science Library

    Schoeni, Robert

    2002-01-01

    ...) Plan on November 16,1999. The LTFSS Plan consists of 46 projects whose goal is to promote self-sufficiency among families that are participating in the California Work Opportunity and Responsibility to Kids (CalWORKs...

  6. 76 FR 39115 - Notice of Proposed Information Collection: Transformation Initiative Family Self-Sufficiency...

    Science.gov (United States)

    2011-07-05

    ... Information Collection: Transformation Initiative Family Self-Sufficiency Demonstration Small Grants AGENCY... information: Title of Proposal: Notice of Funding Availability for the Transformation Initiative Family Self..., think tanks, consortia, Institutions of higher education accredited by a national or regional...

  7. Early nutritional support and physiotherapy improved long-term self-sufficiency in acutely ill older patients.

    Science.gov (United States)

    Hegerová, Petra; Dědková, Zuzana; Sobotka, Luboš

    2015-01-01

    An acute disease is regularly associated with inflammation, decreased food intake, and low physical activity; the consequence is loss of muscle mass. However, the restoration of muscle tissue is problematic, especially in older patients. Loss of muscle mass leads to further decrease of physical activity which leads, together with recurring disease, to the progressive muscle mass loss accompanied by loss of self-sufficiency. Early nutrition support and physical activity could reverse this situation. Therefore, the aim of this study was to determine whether an active approach based on early nutritional therapy and exercise would influence the development of sarcopenia and impaired self-sufficiency during acute illness. Two hundred patients >78 y were admitted to a hospital internal medicine department and participated in a prospective, randomized controlled study. The patients were randomized to a control group receiving standard treatment (n = 100) or to an intervention group (n = 100). The intervention consisted of nutritional supplements (600 kcal, 20 g/d protein) added to a standard diet and a simultaneous intensive rehabilitation program. The tolerance of supplements and their influence on spontaneous food intake, self-sufficiency, muscle strength, and body composition were evaluated during the study period. The patients were then regularly monitored for 1 y post-discharge. The provision of nutritional supplements together with early rehabilitation led to increased total energy and protein intake while the intake of standard hospital food was not reduced. The loss of lean body mass and a decrease in self-sufficiency were apparent at discharge from the hospital and 3 mo thereafter in the control group. Nutritional supplementation and the rehabilitation program in the study group prevented these alterations. A positive effect of nutritional intervention and exercise during the hospital stay was apparent at 6 mo post-discharge. The early nutritional intervention

  8. Profitability analysis of grid-connected photovoltaic facilities for household electricity self-sufficiency

    International Nuclear Information System (INIS)

    Colmenar-Santos, Antonio; Campíñez-Romero, Severo; Pérez-Molina, Clara; Castro-Gil, Manuel

    2012-01-01

    Spain exhibits a high level of energy dependence and has significant solar energy resources. These two facts have given rise to the prominence that renewable energy, particularly solar photovoltaic technology, has enjoyed in recent years, supported by a favorable regulatory framework. Currently, the Spanish Government is providing new ways in energy policy to enhance and accelerate the development of low-power photovoltaic generation facilities for self-consumption by introducing energy policies for feed-in payments of surplus electricity. Such facilities are an example of distributed electrical generation with important benefits for the environment and the rest of the electrical system because, when properly managed, they can help improve the system’s stability and reduce overall losses. By analyzing household demand and solar photovoltaic energy resources, the profitability of such facilities is considered in this article, taking into account the technical and economic impact of storage systems and proposing models for feed-in payments of surplus electricity, in an attempt to assess whether this method of electricity generation versus the method of conventionally supplied power from a grid at a regulated tariff can rival each other economically, in terms of parity. - Highlight: ► The use of grid-connected photovoltaic facilities for household electricity self-sufficiency is presented. ► The need for legal frameworks that include retributive mechanisms for the surplus energy is pointed out. ► Two models are proposed for the remuneration of surplus energy generated. ► Models show economic profitability without feed-in-tariff or compensations. ► Facilities described offer ancillary services for grid stability and smart-grid integration.

  9. Vulnerability

    Science.gov (United States)

    Taback, I.

    1979-01-01

    The discussion of vulnerability begins with a description of some of the electrical characteristics of fibers before definiting how vulnerability calculations are done. The vulnerability results secured to date are presented. The discussion touches on post exposure vulnerability. After a description of some shock hazard work now underway, the discussion leads into a description of the planned effort and some preliminary conclusions are presented.

  10. Role of L-alanine for redox self-sufficient amination of alcohols.

    Science.gov (United States)

    Klatte, Stephanie; Wendisch, Volker F

    2015-01-23

    responsible for pyruvate catabolism during redox self-sufficient amination of alcohols using this whole cell biocatalyst. The replacement of the transaminase TaVf by TaCv, which showed higher activity at 42°C, in the artificial operon ald-adh-ta improved amination of alcohols in whole cell biotransformation. The addition of L-alanine, which was consumed by E. coli via pyruvate catabolism, was required for 100% product formation possibly by providing maintenance energy. Metabolic engineering revealed that pyruvate catabolism occurred primarily via oxidative decarboxylation to acetate by PoxB under the chosen biotranformation conditions.

  11. Self-Sufficiency versus Security: How Trade Protectionism Challenges the Sustainability of the Food Supply in Russia

    Directory of Open Access Journals (Sweden)

    Vasilii Erokhin

    2017-10-01

    Full Text Available Food security is increasingly influenced by multilateral trade systems and foreign trade policies implemented by national governments. Many of them are now concerned about the sustainability of food supply and the vulnerability of domestic food markets to price volatility, and seek to support domestic producers and protect themselves from increasing food imports. Such restrictions improve food self-sufficiency, but decrease food security. It is important to understand any changes that may have occurred in the food consumption pattern due to trade protectionism and to observe any nutritional implications of these changes. This paper employs the rational food security (RFS assessment approach, which differentiates sources of food supply on the domestic market, assesses the influence of agricultural and trade frameworks on food consumption patterns, and complies consumption with the appropriate food intake threshold. In the case of Russia, the study demonstrates that the conventional consumption approach to self-sufficiency (FSCA underestimates the food insecurity level by not accounting for nutrition factors. In addition, the gap between the FSCA and the RFS increases in times of protectionist trade policy and decreases when the agricultural and trade policy framework turns to liberalization. The paper concludes that trade protectionism challenges the sustainability of food supply by decreasing food availability and quality of food products, causes dietary changes, and threatens the food security of the country.

  12. Europe's vulnerability to energy crises

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-01-15

    The growing dependency of Europe as a whole on energy imports and anticipated further increases in energy prices reinforce the concerns about meeting the energy demand in the future. The objective of the Study is to identify the threats leading to potential energy crises and suggest solutions for facing, in an appropriate way, the related key challenges. In addition, the Study intends to develop a number of indicators effective enough to assess the level of different types of vulnerability, as well the overall vulnerability of a country or region, including threats to physical disruption, higher energy prices etc. The use of vulnerability indicators is highly recommended for all WEC-European countries, as well as to policy makers and market players.

  13. EVALUATION OF FOOD SELF-SUFFICIENCY OF THE REPUBLIC OF TATARSTAN DISTRICTS

    Directory of Open Access Journals (Sweden)

    R. E. Mansurov

    2017-01-01

    Full Text Available The article presents the author's method for estimation of the level of food self-sufficiency for the main types of food products in the regions of Republic of Tatarstan. The proposed method is based on the use of analytical methods and mathematical comparative analysis to compose a final rating. The proposed method can be used in the system of regional management of agro-industrial complex on the federal and local level. Relevance. The relevance of this work is caused by on the one hand a hardening of foreign policy that may negatively impact on national food security, and on the other hand the state crisis of the domestic agricultural sector. All this requires the development of new approaches to regional agribusiness management. Goal. To develop a methodology is used to assess the level of food self-sufficiency. To rate the level of self-sufficiency in main types of foodstuff in regions of Republic of Tatarstan. Materials and Methods. Statistical data of the results of the AIC of the Republic of Tatarstan for 2016 was used for the study. Analytical methods, including mathematical analysis and comparison were used. Results. Based on the analysis of the present situation for ensuring of food security in Russia it was shown that now it is necessary to develop effective indicators identifying the level of self-sufficiency in basic food regions. It was also revealed that there are no such indicators in system of regional agrarian and industrial complex at present time. As a result of analysis existing approaches the author's method of rating the level of self-sufficiency of regions was offered. This method was adopted on the example of the Republic of Tatarstan. Conclusions. The proposed method of rating estimation of self-sufficiency for basic foodstuffs can be used in the regional agroindustrial complex management system at the federal and local level. It can be used to rank areas in terms of their self-sufficiency for basic foodstuffs. This

  14. Operation of CANDU power reactor in thorium self-sufficient fuel cycle

    Indian Academy of Sciences (India)

    These disadvantages of thorium fuel cycle were seemingly the reasons why that ... According to the data of figure 2, maximum (equilibrium) content of 233U in ..... Self-sufficient mode is related with rather big effort in the extraction of isotopes of.

  15. An immobilized and highly stabilized self-sufficient monooxygenase as biocatalyst for oxidative biotransformations

    NARCIS (Netherlands)

    Valencia, Daniela; Guillén, Marina; Fürst, Maximilian; Josep, López-Santín; Álvaro, Gregorio

    BACKGROUND The requirement of expensive cofactors that must be efficiently recycled is one of the major factors hindering the wide implementation of industrial biocatalytic oxidation processes. In this research, a sustainable approach based on immobilized self-sufficient Baeyer-Villiger

  16. Operation of CANDU power reactor in thorium self-sufficient fuel cycle

    Indian Academy of Sciences (India)

    This paper presents the results of calculations for CANDU reactor operation in thorium fuel cycle. Calculations are performed to estimate the feasibility of operation of heavy-water thermal neutron power reactor in self-sufficient thorium cycle. Parameters of active core and scheme of fuel reloading were considered to be the ...

  17. Vulnerability

    NARCIS (Netherlands)

    Issa, Sahar; van der Molen, Irna; Stel, Nora

    2015-01-01

    This chapter reviews the literature on vulnerability. Together with Chapter 3, that offers a literature review specifically focused on resilience, it lays the conceptual foundations for the empirical chapters in this edited volume. Vulnerability symbolizes the susceptibility of a certain system to

  18. Vulnerability, impacts and adaptation : climate information needs for energy managers

    Energy Technology Data Exchange (ETDEWEB)

    Mirza, M. [Environment Canada, Fredericton, NB (Canada). Adaptation and Impacts Research Division

    2007-07-01

    The future potential of hydropower and the vulnerability of the energy sector in Canada and North America was discussed with particular reference to climate information needs for managers regarding vulnerability, impacts and adaptation. The presentation discussed power line climate design criteria as well as a case study of the 1998 ice storm. Power output at Niagara Falls and on the St. Lawrence River were presented. Fossil fuels, electricity, renewable energy, transmission and transportation, and extreme climate and energy were discussed. Charts were provided to depict the 2001 heat wave and power demand; a summary of climate scenario requirements; the mean electricity demand and mean temperature during 1994 to 2000 in Ontario; runoff sensitivity; and accumulated freezing rain and transmission lines during the January ice storm of 1998. A chart on sources of uncertainty was also provided with reference to measurement error; variability; model structure; and scaling and aggregation. tabs., figs.

  19. Vulnerability, impacts and adaptation : climate information needs for energy managers

    International Nuclear Information System (INIS)

    Mirza, M.

    2007-01-01

    The future potential of hydropower and the vulnerability of the energy sector in Canada and North America was discussed with particular reference to climate information needs for managers regarding vulnerability, impacts and adaptation. The presentation discussed power line climate design criteria as well as a case study of the 1998 ice storm. Power output at Niagara Falls and on the St. Lawrence River were presented. Fossil fuels, electricity, renewable energy, transmission and transportation, and extreme climate and energy were discussed. Charts were provided to depict the 2001 heat wave and power demand; a summary of climate scenario requirements; the mean electricity demand and mean temperature during 1994 to 2000 in Ontario; runoff sensitivity; and accumulated freezing rain and transmission lines during the January ice storm of 1998. A chart on sources of uncertainty was also provided with reference to measurement error; variability; model structure; and scaling and aggregation. tabs., figs

  20. Can New Zealand achieve self-sufficiency in its nursing workforce?

    Science.gov (United States)

    North, Nicola

    2011-01-01

    This paper reviews impacts on the nursing workforce of health policy and reforms of the past two decades and suggests reasons for both current difficulties in retaining nurses in the workforce and measures to achieve short-term improvements. Difficulties in retaining nurses in the New Zealand workforce have contributed to nursing shortages, leading to a dependence on overseas recruitment. In a context of global shortages and having to compete in a global nursing labour market, an alternative to dependence on overseas nurses is self-sufficiency. Discursive paper. Analysis of nursing workforce data highlighted threats to self-sufficiency, including age structure, high rates of emigration of New Zealand nurses with reliance on overseas nurses and an annual output of nurses that is insufficient to replace both expected retiring nurses and emigrating nurses. A review of recent policy and other documents indicates that two decades of health reform and lack of a strategic focus on nursing has contributed to shortages. Recent strategic approaches to the nursing workforce have included workforce stocktakes, integrated health workforce development and nursing workforce projections, with a single authority now responsible for planning, education, training and development for all health professions and sectors. Current health and nursing workforce development strategies offer wide-ranging and ambitious approaches. An alternative approach is advocated: based on workforce data analysis, pressing threats to self-sufficiency and measures available are identified to achieve, in the short term, the maximum impact on retaining nurses. A human resources in health approach is recommended that focuses on employment conditions and professional nursing as well as recruitment and retention strategies. Nursing is identified as 'crucial' to meeting demands for health care. A shortage of nurses threatens delivery of health services and supports the case for self-sufficiency in the nursing

  1. Staple Food Self-Sufficiency of Farmers Household Level in The Great Solo

    Science.gov (United States)

    Darsono

    2017-04-01

    Analysis of food security level of household is a novelty of measurement standards which usually includes regional and national levels. With household approach is expected to provide the basis of sharp food policy formulation. The purpose of this study are to identify the condition of self-sufficiency in staple foods, and to find the main factors affecting the dynamics of self-sufficiency in staple foods on farm household level in Great Solo. Using primary data from 50 farmers in the sample and secondary data in Great Solo (Surakarta city, Boyolali, Sukoharjo, Karanganyar, Wonogiri, Sragen and Klaten). Compiled panel data were analyzed with linear probability regression models to produce a good model. The results showed that farm households in Great Solo has a surplus of staple food (rice) with an average consumption rate of 96.8 kg/capita/year. This number is lower than the national rate of 136.7 kg/capita/year. The main factors affecting the level of food self-sufficiency in the farmer household level are: rice production, rice consumption, land tenure, and number of family members. Key recommendations from this study are; improvement scale of the land cultivation for rice farming and non-rice diversification consumption.

  2. Financial Consumer Protection in the EU : Towards a Self-Sufficient European Contract Law for Consumer Financial Services?

    NARCIS (Netherlands)

    Cherednychenko, O.O.

    2014-01-01

    The rapid expansion of European contract law in the field of consumer financial services gives rise to the question to what extent it is self-sufficient. A self-sufficient European contract law presupposes the existence of an EU-made and EU-enforced contract-related legal order which is largely

  3. Virtual water and water self-sufficiency in agricultural and livestock products in Brazil.

    Science.gov (United States)

    da Silva, Vicente de Paulo R; de Oliveira, Sonaly D; Braga, Célia C; Brito, José Ivaldo B; de Sousa, Francisco de Assis S; de Holanda, Romildo M; Campos, João Hugo B C; de Souza, Enio P; Braga, Armando César R; Rodrigues Almeida, Rafaela S; de Araújo, Lincoln E

    2016-12-15

    Virtual water trade is often considered a solution for restricted water availability in many regions of the world. Brazil is the world leader in the production and export of various agricultural and livestock products. The country is either a strong net importer or a strong net exporter of these products. The objective of this study is to determine the volume of virtual water contained in agricultural and livestock products imported/exported by Brazil from 1997 to 2012, and to define the water self-sufficiency index of agricultural and livestock products in Brazil. The indexes of water scarcity (WSI), water dependency (WDI) and water self-sufficiency (WSSI) were calculated for each Brazilian state. These indexes and the virtual water balance were calculated following the methodology developed by Chapagain and Hoekstra (2008) and Hoekstra and Hung (2005). The total water exports and imports embedded in agricultural and livestock products were 5.28 × 10 10 and 1.22 × 10 10  Gm 3  yr -1 , respectively, which results in positive virtual water balance of 4.05 × 10 10  Gm 3  yr -1 . Brazil is either a strong net importer or a strong net exporter of agricultural and livestock products among the Mercosur countries. Brazil has a positive virtual water balance of 1.85 × 10 10  Gm 3  yr -1 . The indexes used in this study reveal that Brazil is self-sufficient in food production, except for a few products such as wheat and rice. Horticultural products (tomato, onion, potato, cassava and garlic) make up a unique product group with negative virtual water balance in Brazil. Copyright © 2016 Elsevier Ltd. All rights reserved.

  4. INDONESIAN FOOD POLICY: THE PROGRAMS FOR STRENGTHENING FOOD SELF-SUFFICIENCY IN REFORMATION ERA

    Directory of Open Access Journals (Sweden)

    Kamrussamad

    2018-04-01

    Full Text Available The 2012 decree #18, the policy on food states that objective of food implementation is to meet basic human needs and provide fair, equitable, and sustainable benefits based on food sovereignty, food self-sufficiency, and national food security. Food sovereignty, independence and security are fundamental and supports implementation of policies related to food implementation in Indonesia. The 2012 decree #18 stated that food implementation aims to improve ability to produce food independently, provide a variety of food and meet the requirements of security, quality, and nutrition for public consumption.

  5. A self-sufficient and general method for self-absorption correction in gamma-ray spectrometry using GEANT4

    International Nuclear Information System (INIS)

    Hurtado, S.; Villa, M.; Manjon, G.; Garcia-Tenorio, R.

    2007-01-01

    This paper presents a self-sufficient and general method for measurement of the activity of low-level gamma-emitters in voluminous samples by gamma-ray spectrometry with a coaxial germanium detector. Due to self-absorption within the sample, the full-energy peak efficiency of low-energy emitters in semiconductor gamma-spectrometers depends strongly on a number of factors including sample composition, density, sample size and gamma-ray energy. As long as those commented factors are well characterized, the influence of self-absorption in the full-energy peak efficiency of low-energy emitters can be calculated using Monte Carlo method based on GEANT4 code for each individual sample. However this task is quite tedious and time consuming. In this paper, we propose an alternative method to determine this influence for voluminous samples of unknown composition. Our method combines both transmission measurements and Monte Carlo simulations, avoiding the application of Monte Carlo full-energy peak efficiency determinations for each individual sample. To test the accuracy and precision of the proposed method, we have calculated 210 Pb activity in sediments samples from an estuary located in the vicinity of several phosphates factories with the proposed method, comparing the obtained results with the ones determined in the same samples using two alternative radiometric techniques

  6. Assessing the energy vulnerability: Case of industrialised countries

    International Nuclear Information System (INIS)

    Gnansounou, Edgard

    2008-01-01

    The emergence of new big consumer countries on the energy markets and the perspective of oil and gas depletion at the end of the current century raise the concerns about fair distribution of the remaining resources for the common and sustainable well-being of the mankind. High volatility of energy prices discourages the investment and delays the energy technology transition. Voluntary measures are needed mainly in industrialised countries in order to develop alternative and sustainable energy sources, to enable technology transfer towards emerging and developing countries and to avoid struggle for energy procurement. In this paper, a composite index of energy demand/supply weaknesses is defined as a proxy of energy vulnerability. The proposed index is based on several indicators such as energy intensity, oil and gas import dependency, CO 2 content of primary energy supply, electricity supply weaknesses and non-diversity in transport fuels. The assessment of this composite index for selected industrialised countries is discussed as well as the sensitivity to various factors

  7. AN ALTERNATIVE APPROACH TO MEET BEEF SELF-SUFFICIENCY IN WEST PAPUA

    Directory of Open Access Journals (Sweden)

    S. Hartono

    2011-09-01

    Full Text Available The main objective of this research is to present an alternative approach to meet beef self-sufficiency in West Papua, Indonesia. It mainly focuses on calculating the needed number of productive cows to enhance beef production in the province. Out of the total farmer households in Manokwari, Indonesia, 189 farmer-respondents were selected as samples of the study. Selection of the sample was based on the number of cattle kept in every age group (less than one (2 years old and the number of productive cows. Secondary data came from the time series data of the number of slaughtered cattle vis-à-vis the population of all districts in West Papua Province from 1980-2008. Data were analyzed using the Partial Adjustment Model (PAM and Ordinary Least Square (OLS method. Results of the study showed that beef self-sufficiency in West Papua depend on the availability of the number of productive cows to produce ready-slaughtered-bull in the previous year. Particularly for West Papua, to produce one unit of bull in the tth –year, with the assumption that cattle mortality is 4.92%, a number of 2.38 animal units AU of productive cows must be provided in the previous two (2 years.

  8. Engineering human cytochrome P450 enzymes into catalytically self-sufficient chimeras using molecular Lego.

    Science.gov (United States)

    Dodhia, Vikash Rajnikant; Fantuzzi, Andrea; Gilardi, Gianfranco

    2006-10-01

    The membrane-bound human cytochrome P450s have essential roles in the metabolism of endogenous compounds and drugs. Presented here are the results on the construction and characterization of three fusion proteins containing the N-terminally modified human cytochrome P450s CYP2C9, CY2C19 and CYP3A4 fused to the soluble NADPH-dependent oxidoreductase domain of CYP102A1 from Bacillus megaterium. The constructs, CYP2C9/BMR, CYP2C19/BMR and CYP3A4/BMR are well expressed in Escherichia coli as holo proteins. The chimeras can be purified in the absence of detergent and the purified enzymes are both active and correctly folded in the absence of detergent, as demonstrated by circular dichroism and functional studies. Additionally, in comparison with the parent P450 enzyme, these chimeras have greatly improved solubility properties. The chimeras are catalytically self-sufficient and present turnover rates similar to those reported for the native enzymes in reconstituted systems, unlike previously reported mammalian cytochrome P450 fusion proteins. Furthermore the specific activities of these chimeras are not dependent on the enzyme concentration present in the reaction buffer and they do not require the addition of accessory proteins, detergents or phospholipids to be fully active. The solubility, catalytic self-sufficiency and wild-type like activities of these chimeras would greatly simplify the studies of cytochrome P450 mediated drug metabolism in solution.

  9. Redox self-sufficient whole cell biotransformation for amination of alcohols.

    Science.gov (United States)

    Klatte, Stephanie; Wendisch, Volker F

    2014-10-15

    Whole cell biotransformation is an upcoming tool to replace common chemical routes for functionalization and modification of desired molecules. In the approach presented here the production of various non-natural (di)amines was realized using the designed whole cell biocatalyst Escherichia coli W3110/pTrc99A-ald-adh-ta with plasmid-borne overexpression of genes for an l-alanine dehydrogenase, an alcohol dehydrogenase and a transaminase. Cascading alcohol oxidation with l-alanine dependent transamination and l-alanine dehydrogenase allowed for redox self-sufficient conversion of alcohols to the corresponding amines. The supplementation of the corresponding (di)alcohol precursors as well as amino group donor l-alanine and ammonium chloride were sufficient for amination and redox cofactor recycling in a resting buffer system. The addition of the transaminase cofactor pyridoxal-phosphate and the alcohol dehydrogenase cofactor NAD(+) was not necessary to obtain complete conversion. Secondary and cyclic alcohols, for example, 2-hexanol and cyclohexanol were not aminated. However, efficient redox self-sufficient amination of aliphatic and aromatic (di)alcohols in vivo was achieved with 1-hexanol, 1,10-decanediol and benzylalcohol being aminated best. Copyright © 2014 Elsevier Ltd. All rights reserved.

  10. Food Self-Sufficiency across scales: How local can we go?

    Science.gov (United States)

    Pradhan, Prajal; Lüdeke, Matthias K. B.; Reusser, Dominik E.; Kropp, Jürgen P.

    2013-04-01

    "Think global, act local" is a phrase often used in sustainability debates. Here, we explore the potential of regions to go for local supply in context of sustainable food consumption considering both the present state and the plausible future scenarios. We analyze data on the gridded crop calories production, the gridded livestock calories production, the gridded feed calories use and the gridded food calories consumption in 5' resolution. We derived these gridded data from various sources: Global Agro-ecological Zone (GAEZ v3.0), Gridded Livestock of the World (GLW), FAOSTAT, and Global Rural-Urban Mapping Project (GRUMP). For scenarios analysis, we considered changes in population, dietary patterns and possibility of obtaining the maximum potential yield. We investigate the food self-sufficiency multiple spatial scales. We start from the 5' resolution (i.e. around 10 km x 10 km in the equator) and look at 8 levels of aggregation ranging from the plausible lowest administrative level to the continental level. Results for the different spatial scales show that about 1.9 billion people live in the area of 5' resolution where enough calories can be produced to sustain their food consumption and the feed used. On the country level, about 4.4 billion population can be sustained without international food trade. For about 1 billion population from Asia and Africa, there is a need for cross-continental food trade. However, if we were able to achieve the maximum potential crop yield, about 2.6 billion population can be sustained within their living area of 5' resolution. Furthermore, Africa and Asia could be food self-sufficient by achieving their maximum potential crop yield and only round 630 million populations would be dependent on the international food trade. However, the food self-sufficiency status might differ under consideration of the future change in population, dietary patterns and climatic conditions. We provide an initial approach for investigating the

  11. The effect of formal training of cardiopulmonary resuscitation (CPR skills on medical students perceived self-sufficiency

    Directory of Open Access Journals (Sweden)

    Shaghaghi A

    2004-07-01

    Full Text Available Background: Experience of cardiopulmonary resuscitation (CPR in real clinical setting is not easily possible for all medical students. Purpose: To assess medical student perceived self-sufficiency on three procedural skill on internship courses after they had taken a training course in clerkship period. Methods: Forty three medical students who had attended a workshop on CPR, tracheal intubations and venopuncture answered the questionnaires on their perceived self-sufficiency in performing these procedures after serving a few months as interns. Results: The mean score for perceived self-sufficiency (PSS was 75.84 (±18.63.Thre were a high correlation between the score given for the applicability of training in real life situation and the stress reduction scores on first time performing the procedure. Conclusion: The high degree of correlation between PSS scores and applicability scores, may warrant the consideration of new methods in procedural skills. Keywords: SKILL TRAINING, CPR TRAINING, PERCEIVED SELF-SUFFICIENCY

  12. The Long Road from the Kidney Bazaar: A Commentary on Pakistan’s Progress Towards Self-sufficiency in Organ Transplantation

    Directory of Open Access Journals (Sweden)

    Dominique E. Martin

    2011-09-01

    Full Text Available The dark history of transplant tourism in Pakistan demonstrates the hazards of unregulated cross-border markets in human organs. Trading on existing national and international social inequities, ‘transplant tourism’ offers dubious benefits for transplant recipients and attractive profits to those facilitating the industry at the expense of the world’s poor. The impact of Pakistan’s 2007 Transplantation of Human Organs and Tissue Ordinance and the sustained efforts of transplant professionals and societal groups led by the Sindh Institute of Urology and Transplantation, show that organ trading can be effectively discouraged and equitable programs of organ procurement and transplantation pursued despite multiple challenges. In this paper, the factors that have contributed to Pakistan’s progress towards self-sufficiency in organ transplantation are identified and discussed. The case of Pakistan highlights the need for countries to protect their own organ and tissue providers who may be vulnerable in the global healthcare market. Pakistan provides an excellent example for other countries in the region and throughout the world to consider when regulating their own transplantation programs and considering the pursuit of national self-sufficiency.

  13. [The concept of nutritional self-sufficiency and the demographic equilibrium of Rwanda].

    Science.gov (United States)

    Habimana Nyirasafari, G

    1987-12-01

    Achieving food self-sufficiency is the basic strategy of Rwanda's 4th 5-year plan covering 1987-91. The population growth rate has increased from 3% in 1970 to 3.7% in 1983, with the population doubling between 1964 and 1985. Food production grew by about 4%/year between 1966-83, creating a slight increase in per capita food availability, but the 2171 calories available per capita is dangerously close to the theoretical minimum requirement of 2100 per day. The theoretical protein requirement is almost covered, but there is a serious shortage of oils. The increase in production since 1966 has been due almost exclusively to the extension of cultivated land. But the land supply is limited, and future production increases will need to be based on increased yields per unit cultivated. The National Office of Population has developed a simulation model that analyzes the parallel evolution of population and production so as to identify demographic and development policies that will assure food self-sufficiency and an improvement in living conditions. The population subsystem subjects the population divided by age and sex to the effects of fertility, migration, and mortality. Births are the result of 36 different fertility rates applied to the population of women aged 14-49 years. The agricultural subsystem is tied to the population subsystem by comparison of the volume of population to that of production, by estimation of the proportion of the population living exclusively by subsistence agriculture, by calculation of the potential emigration resulting from overpopulation of the countryside, and by estimation of the links between nutritional level, mortality, and duration of breastfeeding. 5 annexes contain subsystems showing effects of demographic growth on education, employment, and health. The model has various limitations including those of the reliability of its data, but it is sufficiently precise for its main function of clarifying the choices facing policymakers. 6

  14. [Association between breakfast intake and quality of life among self-sufficient Chilean elderly].

    Science.gov (United States)

    García Milla, Paula; Candia Johns, Priscila; Durán Agüero, Samuel

    2014-10-01

    Elderly people are becoming more prevalent in our country, which studies in this group are relevant. Moreover, the health impact of breakfast consumption is demonstrated in school groups. To determine whether breakfast consumption is associated with better quality of life in self-sufficient Chilean elderly. We interviewed 1,285 elderly (> 60 years) of both sexes. We applied two surveys (food and healthy lifestyles surveys), then an anthropometric evaluation was conducted. 5.6% of older adults does not consume breakfast. Those who consume breakfast had a better quality of life (p = 0.004), specifically in men breakfast intake is associated with lower body mass index (BMI) (p=0.002). Moreover, the results indicate that the proportion of elderly who smokes and does not take breakfast is higher, as well as, greater responsibility in health, nutrition, stress management are greater in those that take breakfast. Finally there was an association between breakfast consumption and better nutrition (p = 0.01) and self-realization (p = 0.005). Consumption of breakfast in older adults is associated with better quality of life. Copyright AULA MEDICA EDICIONES 2014. Published by AULA MEDICA. All rights reserved.

  15. Collaborative technologies, higher order thinking and self-sufficient learning: A case study of adult learners

    Directory of Open Access Journals (Sweden)

    Clare S. Johnson

    2017-07-01

    Full Text Available The inclusion of online elements in learning environments is becoming commonplace in Post Compulsory Education. A variety of research into the value of such elements is available, and this study aims to add further evidence by looking specifically at the use of collaborative technologies such as online discussion forums and wikis to encourage higher order thinking and self-sufficient learning. In particular, the research examines existing pedagogical models including Salmon’s five-stage model, along with other relevant literature. A case study of adult learners in community-based learning centres forms the basis of the research, and as a result of the findings, an arrow model is suggested as a framework for online collaboration that emphasises the learner, mentions pre-course preparation and then includes three main phases of activity: post, interact and critique. This builds on Salmon’s five-stage model and has the benefit of being flexible and responsive, as well as allowing for further development beyond the model, particularly in a blended learning environment.

  16. Construction and engineering of a thermostable self-sufficient cytochrome P450

    Energy Technology Data Exchange (ETDEWEB)

    Mandai, Takao; Fujiwara, Shinsuke [Nanobiotechnology Research Center and Department of Bioscience, School of Science and Technology, Kwansei Gakuin University, 2-1 Gakuen, Sanda 669-1337 (Japan); Imaoka, Susumu, E-mail: imaoka@kwansei.ac.jp [Nanobiotechnology Research Center and Department of Bioscience, School of Science and Technology, Kwansei Gakuin University, 2-1 Gakuen, Sanda 669-1337 (Japan)

    2009-06-19

    CYP175A1 is a thermophilic cytochrome P450 and hydroxylates {beta}-carotene. We previously identified a native electron transport system for CYP175A1. In this report, we constructed two fusion proteins consisting of CYP175A1, ferredoxin (Fdx), and ferredoxin-NADP{sup +} reductase (FNR): H{sub 2}N-CYP175A1-Fdx-FNR-COOH (175FR) and H{sub 2}N-CYP175A1-FNR-Fdx-COOH (175RF). Both 175FR and 175RF were expressed in Escherichia coli and purified. The V{sub max} value for {beta}-carotene hydroxylation was 25 times higher with 175RF than 175FR and 9 times higher with 175RF than CYP175A1 (non-fused protein), although the k{sub m} values of these enzymes were similar. 175RF retained 50% residual activity even at 80 {sup o}C. Furthermore, several mutants of the CYP175A1 domain of 175RF were prepared and one mutant (Q67G/Y68I) catalyzed the hydroxylation of an unnatural substrate, testosterone. Thus, this is the first report of a thermostable self-sufficient cytochrome P450 and the engineering of a thermophilic cytochrome P450 for the oxidation of an unnatural substrate.

  17. Construction and engineering of a thermostable self-sufficient cytochrome P450

    International Nuclear Information System (INIS)

    Mandai, Takao; Fujiwara, Shinsuke; Imaoka, Susumu

    2009-01-01

    CYP175A1 is a thermophilic cytochrome P450 and hydroxylates β-carotene. We previously identified a native electron transport system for CYP175A1. In this report, we constructed two fusion proteins consisting of CYP175A1, ferredoxin (Fdx), and ferredoxin-NADP + reductase (FNR): H 2 N-CYP175A1-Fdx-FNR-COOH (175FR) and H 2 N-CYP175A1-FNR-Fdx-COOH (175RF). Both 175FR and 175RF were expressed in Escherichia coli and purified. The V max value for β-carotene hydroxylation was 25 times higher with 175RF than 175FR and 9 times higher with 175RF than CYP175A1 (non-fused protein), although the k m values of these enzymes were similar. 175RF retained 50% residual activity even at 80 o C. Furthermore, several mutants of the CYP175A1 domain of 175RF were prepared and one mutant (Q67G/Y68I) catalyzed the hydroxylation of an unnatural substrate, testosterone. Thus, this is the first report of a thermostable self-sufficient cytochrome P450 and the engineering of a thermophilic cytochrome P450 for the oxidation of an unnatural substrate.

  18. MARKET SUPPLY RESPONSE AND DEMAND FOR LOCAL RICE IN NIGERIA: IMPLICATIONS FOR SELF-SUFFICIENCY POLICY

    Directory of Open Access Journals (Sweden)

    M RAHJI

    2009-03-01

    Full Text Available This study examined the supply response and demand for local rice in Nigeria between 1960 and 2004. A system of equations using secondary data was estimated by OLS and 2SLS techniques. Area planted with local rice is mainly affected by expected price of output, agriculture wage rate and by the partial adjustment coefficient. The short-run response elasticity is 0.077. The implied long-run response elasticity is 1.578. The partial adjustment measure is 0.049. This, points to the difficulty of supply response to changing economic conditions. The price elasticity of demand obtained is 0.841. The demand for local rice is thus price inelastic. Rice income elasticity is 0.3378. It is also inelastic. The ban on rice importation in Nigeria could be said to be a step in the right direction. This policy should be continued and policed. However, price, output and non-price incentives that can exert significant influence on rice supply response and demand are required if the self-sufficiency goal is to be achieved.

  19. Spirituality, hope, and self-sufficiency among low-income job seekers.

    Science.gov (United States)

    2015-04-01

    Self-sufficiency (SS) is an important social welfare policy goal in the United States, yet little is known about the process that leads to SS. To address this gap in the literature, this study examined the relationship between spirituality, hope, and SS among a sample of low-income job seekers (N = 116). It was hypothesized that spirituality would be related to hope, and that hope, in turn, would be related to SS. Using survey data from two workforce development agencies, this hypothesis was confirmed-hope fully mediated the relationship between spirituality and SS. Of the two factors through which hope is commonly operationalized-agency and pathways-supplemental analysis suggested that spirituality only affects SS through the agency channel. To help foster hope in direct practice settings, it is suggested that social workers might employ spiritually modified cognitive-behavioral therapy protocols. Macrostructural interventions that block the pathway component of hope are also suggested to help reverse exclusion from labor market entry. As such, hope needs to be addressed comprehensively-intrapsychically and macrostructurally-to effect bottom-up change for SS. Engendering hope may assist clients overcome some of the many challenges they encounter on the journey to SS.

  20. Prospect of Cattle Development to Support Self Sufficiency of Meat in North Sumatera Province

    Directory of Open Access Journals (Sweden)

    Akhmad Rifai Lubis

    2010-06-01

    Full Text Available Shortage of beef supply to meet national needs is also found locally in North Sumatera Province. The trend for beef in this area was triggered by the increasing of population, economic improvement and desire for better nutrient comsumption. Level of beef consumption is increased 17% from year 2004 to 2008, so in the same period the number of cattle entered into the North Sumatera Province also increased. Some efforts had been conducted to develop beef cattle program in North Sumatera Self Sufficiency Program in Beef through technical and policy approaches. Several programs have been developed to accelerate the development of productivity and the population in North Sumatra, among others, 1 Agribusiness Development Program, 2 Food Security Improvement Program, 3 Farmer's Welfare Program; which are financed by both central and local budgets. Institutional aspects that have been developed to support the PSDS-2014 is the Regional Artificial Insemination Center to serve the needs of semen for districts and municipalities in the Province of North Sumatera. In the year 2008, it has been distributed as many as 44 000 doses of semen for frozen semen to meet the demands of 11 Districts. The amount of land resources for development indicated the availability of pastural land area of 1,311,159 ha from oil palm and rubber plantation, area of 1,192,172 ha for crops and livestock integration system. It is estimated that biomass production of rice straw, bean straw and sugarcane straw reaches 7,062,227; 68 145 and 14 664 tons per year, respectively. Also available as many as 689,478 tons of rice bran and palm oil industry waste as much as 4,159,203 tons per year. Some challenges in the North Sumatera PSDS programs in accordance with a predetermined time include: 1 Not all of the stakeholders get a complete information about the program, 2 the difficulties to prevent productive cows being slaughtered, 3 limited capital in an effort to pick up and redistribute

  1. Resource use and food self-sufficiency at farm scale within two agro-ecological zones of Rwanda

    NARCIS (Netherlands)

    Bucagu, C.; Vanlauwe, B.; Wijk, van M.T.; Giller, K.E.

    2014-01-01

    Resource use and management are major determinants of the food self-sufficiency of smallholder farmers in sub-Saharan Africa. A study was conducted in Rwanda in two contrasting agro-ecological zones (Central plateau and Buberuka) to characterise farms, quantify their resource flows, and evaluate the

  2. Modelling cereal crops to assess future climate risk for family food self-sufficiency in southern Mali

    NARCIS (Netherlands)

    Traore, Bouba; Descheemaeker, Katrien; Wijk, van Mark T.; Corbeels, Marc; Supit, Iwan; Giller, Ken E.

    2017-01-01

    Future climate change will have far reaching consequences for smallholder farmers in sub-Saharan Africa, the majority of whom depend on agriculture for their livelihoods. Here we assessed the farm-level impact of climate change on family food self-sufficiency and evaluated potential adaptation

  3. Does SSP Plus Increase Employment? The Effect of Adding Services to the Self-Sufficiency Project's Financial Incentives.

    Science.gov (United States)

    Quets, Gail; Robins, Philip K.; Pan, Elsie C.; Michalopoulos, Charles; Card, David

    In 1992, Human Resources Development Canada launched the Self-Sufficiency Project (SSP), which was a research and demonstration effort involving long-term, single-parent Income Assistance (IA) recipients in New Brunswick and British Columbia. Under SSP, IA recipients who left IA and worked at least 30 hours per week were offered a generous but…

  4. Post-Disaster Food and Nutrition from Urban Agriculture: A Self-Sufficiency Analysis of Nerima Ward, Tokyo.

    Science.gov (United States)

    Sioen, Giles Bruno; Sekiyama, Makiko; Terada, Toru; Yokohari, Makoto

    2017-07-10

    Background : Post-earthquake studies from around the world have reported that survivors relying on emergency food for prolonged periods of time experienced several dietary related health problems. The present study aimed to quantify the potential nutrient production of urban agricultural vegetables and the resulting nutritional self-sufficiency throughout the year for mitigating post-disaster situations. Methods : We estimated the vegetable production of urban agriculture throughout the year. Two methods were developed to capture the production from professional and hobby farms: Method I utilized secondary governmental data on agricultural production from professional farms, and Method II was based on a supplementary spatial analysis to estimate the production from hobby farms. Next, the weight of produced vegetables [t] was converted into nutrients [kg]. Furthermore, the self-sufficiency by nutrient and time of year was estimated by incorporating the reference consumption of vegetables [kg], recommended dietary allowance of nutrients per capita [mg], and population statistics. The research was conducted in Nerima, the second most populous ward of Tokyo's 23 special wards. Self-sufficiency rates were calculated with the registered residents. Results : The estimated total vegetable production of 5660 tons was equivalent to a weight-based self-sufficiency rate of 6.18%. The average nutritional self-sufficiencies of Methods I and II were 2.48% and 0.38%, respectively, resulting in an aggregated average of 2.86%. Fluctuations throughout the year were observed according to the harvest seasons of the available crops. Vitamin K (6.15%) had the highest self-sufficiency of selected nutrients, while calcium had the lowest (0.96%). Conclusions : This study suggests that depending on the time of year, urban agriculture has the potential to contribute nutrients to diets during post-disaster situations as disaster preparedness food. Emergency responses should be targeted

  5. Post-Disaster Food and Nutrition from Urban Agriculture: A Self-Sufficiency Analysis of Nerima Ward, Tokyo

    Directory of Open Access Journals (Sweden)

    Giles Bruno Sioen

    2017-07-01

    Full Text Available Background: Post-earthquake studies from around the world have reported that survivors relying on emergency food for prolonged periods of time experienced several dietary related health problems. The present study aimed to quantify the potential nutrient production of urban agricultural vegetables and the resulting nutritional self-sufficiency throughout the year for mitigating post-disaster situations. Methods: We estimated the vegetable production of urban agriculture throughout the year. Two methods were developed to capture the production from professional and hobby farms: Method I utilized secondary governmental data on agricultural production from professional farms, and Method II was based on a supplementary spatial analysis to estimate the production from hobby farms. Next, the weight of produced vegetables [t] was converted into nutrients [kg]. Furthermore, the self-sufficiency by nutrient and time of year was estimated by incorporating the reference consumption of vegetables [kg], recommended dietary allowance of nutrients per capita [mg], and population statistics. The research was conducted in Nerima, the second most populous ward of Tokyo’s 23 special wards. Self-sufficiency rates were calculated with the registered residents. Results: The estimated total vegetable production of 5660 tons was equivalent to a weight-based self-sufficiency rate of 6.18%. The average nutritional self-sufficiencies of Methods I and II were 2.48% and 0.38%, respectively, resulting in an aggregated average of 2.86%. Fluctuations throughout the year were observed according to the harvest seasons of the available crops. Vitamin K (6.15% had the highest self-sufficiency of selected nutrients, while calcium had the lowest (0.96%. Conclusions: This study suggests that depending on the time of year, urban agriculture has the potential to contribute nutrients to diets during post-disaster situations as disaster preparedness food. Emergency responses should be

  6. Managing energy vulnerability and resilience for rural communities in Northern Denmark by means of energy atlases

    DEFF Research Database (Denmark)

    Möller, Bernd

    Denmark has targets of developing a 100% renewable energy supply within the next 4 decades, while the country is facing polarization between urban areas and the rural countryside. Energy vulnerability develops as low income groups move to areas with poor building stock and no access to collective...... heat supply. With little room for extending mortgage, investments in added insulation or efficient heating technology become less affordable. About a quarter of the Danish population lives in rural areas where energy efficient heat supply and low-energy buildings are outside reach. Typical current...... problems are high energy costs, which contribute to the unattractiveness of rural areas, driven by centralization and the dismantling of public infrastructure. On the other hand, most renewable energy sources like wind and biomass are located in rural areas, where they could create resilience: income, jobs...

  7. Vulnerability of solar energy infrastructure and output to extreme events: Climate change implications (Conference paper)

    OpenAIRE

    Patt, A.; Pfenninger, S.; Lilliestam, J.

    2010-01-01

    This paper explores the potential vulnerability of solar energy systems to future extreme event risks as a consequence of climate change. We describe the three main technologies likely to be used to harness sunlight -- thermal heating, photovoltaic (PV), and concentrating solar power (CSP) -- and identify critical extreme event vulnerabilities for each one. We then compare these vulnerabilities with assessments of future changes in extreme event risk levels. We do not identify any vulnerabili...

  8. Vulnerability of Europe and Its Economy to Energy Crises (Preliminary Executive Summary)

    International Nuclear Information System (INIS)

    World Energy Council

    2007-01-01

    The rapid change of the economic environment requires the energy sector to develop new concepts and policies to respond better to security requirements and energy supply. Energy security is defined as an uninterruptible supply of energy, in terms of quantities required to meet demand at affordable process. Energy security means: reduced vulnerability to transient or longer term physical disruptions to import supplies, and availability of local and imported resources to meet the growing demand for energy over a period of time and at affordable prices. The vulnerability of an energy system can be measured by its ability to cope with adverse events. This is defined in the context of the increasing energy imported to Europe and the increase of energy prices over recent years. The study tries to enhance the understanding of the conceptual viewpoint of vulnerability that the European energy markets mights face in an unpredictable future, characterised by uncertainty, difficulties, danger or anxiety

  9. Using Paraffin PCM to Make Optical Communication Type of Payloads Thermally Self-Sufficient for Operation in Orion Crew Module

    Science.gov (United States)

    Choi, Michael K.

    2016-01-01

    An innovative concept of using paraffin phase change material with a melting point of 28 C to make Optical Communication type of payload thermally self-sufficient for operation in the Orion Crew Module is presented. It stores the waste heat of the payload and permits it to operate for about one hour by maintaining its temperature within the maximum operating limit. It overcomes the problem of relying on the availability of cold plate heat sink in the Orion Crew Module.

  10. SUSTAINING PADDY SELF-SUFFICIENCY AND LAND DEMANDS IN SABAH, MALAYSIA: A STRUCTURAL PADDY AND RICE ECONOMETRIC MODEL ANALYSIS

    Directory of Open Access Journals (Sweden)

    Wong Kelly_Kai_Seng

    2017-01-01

    Full Text Available The objective of this study is to construct an econometric commodity model in order to forecast the long term rice production performance of the state of Sabah, Malaysia. The baseline projection shows that the Sabah rice self-sufficiency is estimated to achieve approximately38% in the next 10 years due to the scarcity of the suitable land bank allocate for paddy cultivation. In order to achieve 60% of targeted rice self-sufficiency level (SSL, the size of land for paddy cultivation must be increased in Sabah. Based on the scenario simulation projection result, the expansion of paddy cultivation area will contribute a positively to the industrial rice production and consequently achieving the expected 60% of SSL by the end of 2024. In a nutshell, the state government of Sabah possess state autonomy on the land management, thus the state government plays a significant key role on promoting the local rice self-sufficiency level in the long-term period

  11. Analyzing the impact of price subsidy on rice self-sufficiency level in Malaysia: A preliminary finding

    Science.gov (United States)

    Rahim, Farah Hanim Abdul; Abidin, Norhaslinda Zainal; Hawari, Nurul Nazihah

    2017-11-01

    The Malaysian government had targeted for the rice industry in the country to achieve 100% rice self-sufficiency where Malaysia's rice self-sufficiency level (SSL) is currently at 65% to 75%. Thus, the government had implemented few policies to increase the rice production in Malaysia in order to meet the growing demand of rice. In this paper, the effect of price support on the rice production system in Malaysia is investigated. This study utilizes the system dynamics approach of the rice production system in Malaysia where the complexity of the factor is interrelated and changed dynamically through time. Scenario analysis was conducted using system dynamics model by making changes on the price subsidy to see its effect on the rice production and rice SSL. The system dynamics model provides a framework for understanding the effect of price subsidy on the rice self-sufficiency level. The scenario analysis of the model shows that a 50% increase in the price subsidy leads to a substantial increase in demand as the rice price drops. Accordingly, the local production increases by 15%. However, the SSL slightly decreases as the local production is insufficient to meet the large demand.

  12. Impact of Market Reforms on the Agricultural Sector Development and Food Self-Sufficiency in the Northern Region

    Directory of Open Access Journals (Sweden)

    Valentin Aleksandrovich Ivanov

    2016-03-01

    Full Text Available The successful development of Northern and Arctic areas depends on sustainable functioning of the agricultural sector. Agriculture and fishing agriculture is a way of life of the indigenous population. The article discusses the state of agriculture and food self-sufficiency in the Komi Republic in the years of relatively stable development (1960–1980 and in the conditions of market reforms. It analyzes production and consumption of food and shows a positive effect of modernization processes on the agricultural sector in the pre-reform period. It studies market transformation of the agrarian economy, accompanied in the 1990s by the sharp decline in agricultural production, degradation of productive capacity, rural demography, rural infrastructure, decrease in living standard of farmers, and disparity of prices on agricultural and industrial products. The paper discloses trends in food self-sufficiency of the northern region in 1980–2013 and reveals reasons for the decrease in its level in the period of market reforms. It considers possible scenarios to develop the agrarian sector and food self-sufficiency. To predict the agriculture development the author identifies strong and weak sides, opportunities and threats by means of SWOT-analysis. The article proposes 3 scenarios: inertial (pessimistic, baseline and optimistic. It finds out the most reasonable optimistic development scenario based on innovative modernization for the Komi Republic. The study results can be used to adjust the current State program of agricultural development and elaborate the strategy of the agro-food sector of the region

  13. The Relationship of Dairy Farm Eco-Efficiency with Intensification and Self-Sufficiency. Evidence from the French Dairy Sector Using Life Cycle Analysis, Data Envelopment Analysis and Partial Least Squares Structural Equation Modelling.

    Directory of Open Access Journals (Sweden)

    Andreas Diomedes Soteriades

    Full Text Available We aimed at quantifying the extent to which agricultural management practices linked to animal production and land use affect environmental outcomes at a larger scale. Two practices closely linked to farm environmental performance at a larger scale are farming intensity, often resulting in greater off-farm environmental impacts (land, non-renewable energy use etc. associated with the production of imported inputs (e.g. concentrates, fertilizer; and the degree of self-sufficiency, i.e. the farm's capacity to produce goods from its own resources, with higher control over nutrient recycling and thus minimization of losses to the environment, often resulting in greater on-farm impacts (eutrophication, acidification etc.. We explored the relationship of these practices with farm environmental performance for 185 French specialized dairy farms. We used Partial Least Squares Structural Equation Modelling to build, and relate, latent variables of environmental performance, intensification and self-sufficiency. Proxy indicators reflected the latent variables for intensification (milk yield/cow, use of maize silage etc. and self-sufficiency (home-grown feed/total feed use, on-farm energy/total energy use etc.. Environmental performance was represented by an aggregate 'eco-efficiency' score per farm derived from a Data Envelopment Analysis model fed with LCA and farm output data. The dataset was split into two spatially heterogeneous (bio-physical conditions, production patterns regions. For both regions, eco-efficiency was significantly negatively related with milk yield/cow and the use of maize silage and imported concentrates. However, these results might not necessarily hold for intensive yet more self-sufficient farms. This requires further investigation with latent variables for intensification and self-sufficiency that do not largely overlap- a modelling challenge that occurred here. We conclude that the environmental 'sustainability' of intensive

  14. The Relationship of Dairy Farm Eco-Efficiency with Intensification and Self-Sufficiency. Evidence from the French Dairy Sector Using Life Cycle Analysis, Data Envelopment Analysis and Partial Least Squares Structural Equation Modelling.

    Science.gov (United States)

    Soteriades, Andreas Diomedes; Stott, Alistair William; Moreau, Sindy; Charroin, Thierry; Blanchard, Melanie; Liu, Jiayi; Faverdin, Philippe

    2016-01-01

    We aimed at quantifying the extent to which agricultural management practices linked to animal production and land use affect environmental outcomes at a larger scale. Two practices closely linked to farm environmental performance at a larger scale are farming intensity, often resulting in greater off-farm environmental impacts (land, non-renewable energy use etc.) associated with the production of imported inputs (e.g. concentrates, fertilizer); and the degree of self-sufficiency, i.e. the farm's capacity to produce goods from its own resources, with higher control over nutrient recycling and thus minimization of losses to the environment, often resulting in greater on-farm impacts (eutrophication, acidification etc.). We explored the relationship of these practices with farm environmental performance for 185 French specialized dairy farms. We used Partial Least Squares Structural Equation Modelling to build, and relate, latent variables of environmental performance, intensification and self-sufficiency. Proxy indicators reflected the latent variables for intensification (milk yield/cow, use of maize silage etc.) and self-sufficiency (home-grown feed/total feed use, on-farm energy/total energy use etc.). Environmental performance was represented by an aggregate 'eco-efficiency' score per farm derived from a Data Envelopment Analysis model fed with LCA and farm output data. The dataset was split into two spatially heterogeneous (bio-physical conditions, production patterns) regions. For both regions, eco-efficiency was significantly negatively related with milk yield/cow and the use of maize silage and imported concentrates. However, these results might not necessarily hold for intensive yet more self-sufficient farms. This requires further investigation with latent variables for intensification and self-sufficiency that do not largely overlap- a modelling challenge that occurred here. We conclude that the environmental 'sustainability' of intensive dairy farming

  15. How to address the ethics of reproductive travel to developing countries: a comparison of national self-sufficiency and regulated market approaches.

    Science.gov (United States)

    Crozier, G K D; Martin, Dominique

    2012-04-01

    One of the areas of concern raised by cross-border reproductive travel regards the treatment of women who are solicited to provide their ova or surrogacy services to foreign consumers. This is particularly troublesome in the context of developing countries where endemic poverty and low standards for both medical care and informed consent may place these women at risk of exploitation and harm. We explore two contrasting proposals for policy development regarding the industry, both of which seek to promote ethical outcomes and social justice: While one proposal advocates efforts to minimize cross-border demand for female reproductive resources through the pursuit of national self-sufficiency, the other defends cross-border trade as a means for meeting the needs of vulnerable groups. Despite the conflicting objectives of the proposed strategies, the paper identifies common values and points of agreement between the two, including the importance of regulations to safeguard those providing ova or surrogacy services. © 2012 Blackwell Publishing Ltd.

  16. Diesel oil: self sufficiency is possible for Brazil; Oleo diesel: auto-suficiencia e possivel para o Brasil

    Energy Technology Data Exchange (ETDEWEB)

    Pascalicchio, Agostinho Celso [AES Eletropaulo Metropolitana - Eletricidade de Sao Paulo, SP (Brazil); Universidade Presbiteriana Mackenzie, Sao Paulo, SP (Brazil)]. E-mail: agostinho.pascalicch@AES.com; Franco, Armando Cesar [Universidade Presbiteriana Mackenzie, Sao Paulo, SP (Brazil)]. E-mail: armandofranco@mackenzie.com.br; Bermann, Celio [Universidade de Sao Paulo (USP), SP (Brazil). Inst. de Eletrotecnica e Energia]. E-mail: cbermann@iee.usp.br

    2006-07-01

    This paper addresses to analyze the Brazil possibility to be a self - sufficient diesel oil producer. Diesel increase production as result to modernization effort and technological development implemented by PETROBRAS in its refinery and this increase is greater than internal demand for the product. Furthermore, new alternatives as bio-diesel that is adding to diesel oil up to 2% and vehicular natural gas in urban buses are in implementation process that will allow a decrease in diesel oil demand. With that in the short run Brazil could cease is international condition of oil diesel importer. (author)

  17. Play It, Learn It, Make It Last: Developing an Online Game to Create Self-Sufficient Library Information Users.

    Science.gov (United States)

    Boyce, Lindsay M

    2016-01-01

    Library orientation at an academic health sciences library consisted of a five-minute overview within new student orientation. Past experience indicated this brief presentation was insufficient for students to learn about library resources. In 2014, an effort was made to supplement orientation by developing an online game aimed at enabling students to become self-sufficient through hands-on learning. A gaming model was chosen with expectations that competition and rewards would motivate students. Although the pilots suffered from low participation rates, the experience merits further research into the potential of a broader model of online library instruction in the health sciences environment.

  18. Self-sufficiency in power generation for a hamlet in the Allgaeu region

    Energy Technology Data Exchange (ETDEWEB)

    Naumann, L.; Kusche, K.

    A secluded farmhouse in the Allgaeu region was to be rebuilt into a residential house and had to be equipped with its own power supply and generating system. A combination of solar collectors and solar generators and a cogeneration plant with under 5 kW power output and an additionally installed tiled stove make up the energy concept for the house. Only a small amount of non-renewable energy in the form of liquid gas is required for a the family of five. The electricity is supplied by a gas motor cogeneration plant and 20 solar modules. On sunny days the gas-fuelled power generator is switched off and the house is supplied by the solar installations only. 12 batteries store the power. Space heating consists of a combination of a gas-fired low temperature heating system and a hot-air tiled stove. Service water heating is taken care of by ten flat collectors connected with one storage unit which can be supplied with extra heat from the gas heater, if requested.

  19. Operational Energy Metrics: Increasing Flexibility While Reducing Vulnerability

    Science.gov (United States)

    2010-03-01

    procurement decisions with a greater level of fidelity concerning the cost- benefit analysis for systems lifetime cost of energy. Furthermore, it...or we have to RTB, we’re BINGO -fuel48”? As General Ronald Keys, USAF (RET.) stated when discussing energy efficiency and mission effectiveness...of Defense change to fully value the delivered cost of fuel, the sooner joint force commanders will reap the “strategic benefits of reallocating

  20. The dynamic simulation model of soybean in Central Java to support food self sufficiency: A supply chain perspective

    Science.gov (United States)

    Oktyajati, Nancy; Hisjam, Muh.; Sutopo, Wahyudi

    2018-02-01

    Consider food become one of the basic human needs in order to survive so food sufficiency become very important. Food sufficiency of soybean commodity in Central Java still depends on imported soybean. Insufficiency of soybean because of there is much gap between local soybean productions and its demand. In the year 2016 the shortage of supply soybean commodity as much 68.79%. Soybean is an important and strategic commodity after rice and corn. The increasing consumption of soybean is related to increasing population, increasing incomes, changing of healthy life style. The aims of this study are to determine the soybean dynamic model based on supply chain perspective, define the proper price of local soybean to trigger increasing of local production, and to define the alternative solution to support food self sufficiency. This study will capture the real condition into dynamics model, then simulate a series of scenario into a computer program to obtain the best results. This study will be conducted the following first scenario with government intervention policy and second without government intervention policy. The best solution of the alternative can be used as government consideration for governmental policy. The results of the propose scenarios showed that self sufficiency on soybean can be achieved after the next 20 years by increasing planting area 4% and land productivity 1% per year.

  1. The vulnerabilities of the power-grid system: renewable microgrids as an alternative source of energy.

    Science.gov (United States)

    Meyer, Victor; Myres, Charles; Bakshi, Nitin

    2010-03-01

    The objective of this paper is to analyse the vulnerabilities of current power-grid systems and to propose alternatives to using fossil fuel power generation and infrastructure solutions in the form of microgrids, particularly those from renewable energy sources. One of the key potential benefits of microgrids, apart from their inherent sustainability and ecological advantages, is increased resilience. The analysis is targeted towards the context of business process outsourcing in India. However, much of the research on vulnerabilities has been derived from the USA and as such many of the examples cite vulnerabilities in the USA and other developed economies. Nevertheless, the vulnerabilities noted are to a degree common to all grid systems, and so the analysis may be more broadly applicable.

  2. What Characterises Women Vulnerable to Chronic Energy Deficiency?

    Science.gov (United States)

    Kavi Kumar, K. S.; Ramachandran, Maithili; Viswanathan, Brinda

    2009-01-01

    Weight-for-squared height or body mass index (BMI) is often considered as an effective predictor of morbidity and mortality rates. This study uses BMI data from a sample of ever-married women in the age group of 15-49 years in the North Indian state of Uttar Pradesh for the year 1998-1999, to analyse the determinants of chronic energy deficiency…

  3. Assessment of Political Vulnerabilities on Security of Energy Supply in the Baltic States

    Directory of Open Access Journals (Sweden)

    Česnakas Giedrius

    2016-06-01

    Full Text Available The article argues that despite the evident link between political environment and security of energy supply, political elements are not sufficiently represented in contemporary scientific literature, namely in indexes that are designed for the assessment of security of energy supply. In an attempt to fill this gap, the article presents an innovative methodology for quantitative assessment of the political vulnerabilities on security of energy supply and applies it to the analysis of the Baltic States.

  4. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

    Energy Technology Data Exchange (ETDEWEB)

    Fesharaki, F.; Rizer, J.P.; Greer, L.S.

    1994-05-01

    The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

  5. Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2

    International Nuclear Information System (INIS)

    Fesharaki, F.; Rizer, J.P.; Greer, L.S.

    1994-05-01

    The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term

  6. Bridging Expectations: Extension Agents’ Perception of a Gap between Expectations and Experience when Implementing the Indonesian Beef Self-Sufficiency Programme

    DEFF Research Database (Denmark)

    Gayatri, Siwi; Vaarst, Mette

    2016-01-01

    Beef self-sufficiency programme (BSSP) was launched in Indonesia in 2004 in response to the massive import of beef from other countries. The objective of the present article is to explore and discuss how Indonesian extension agents perceived the practical implementation of the programme, including...... of the programme, the future of self-sufficiency regarding beef production in the country, and how this learning could be captured and used for the future....

  7. The impact of high penetration of wind energy on the vulnerability of power systems

    Energy Technology Data Exchange (ETDEWEB)

    EL-Arroudi, K.; Joos, G.; McGillis, D. [McGill Univ., Montreal, PQ (Canada). Dept. of Electrical and Computer Engineering

    2006-07-01

    This paper examined the impact of higher penetrations of wind energy installations on the vulnerability of power systems. Vulnerability was defined in terms of migration of system states based on the contingencies that might occur. It was noted that both the penetration levels and physical locations of wind energy installations in power systems have a strong influence on system vulnerability. A methodology was proposed to analyze the impacts of wind energy on power system vulnerability through the construction of a decision-tree classification model at the point of common coupling (PCC) bus. The aim of the model was to determine planning criteria for wind power interconnection and to ensure that design concepts are adequate and secure. The model was built by simulating a pre-specified range of system contingencies to generate patterns at the PCC bus. Actual measurements were then compared against known patterns, from which the stress levels of disturbances were estimated. Stress levels were defined in terms of the performance level measures delineated by National Electricity Reliability Council (NERC) planning standards. The methodology is a non-parametric learning technique able to produce classifiers about given problems in order to deduce information from new, unobserved cases. A case study consisting of a 4-machine system with a total generation of 2295 MW was presented where wind-based generation accounted for 450 MW. The decision-tree classifier was constructed by simulating 120 events generated by combinations of contingencies; seasonal wind patterns and different wind production levels per season. Results showed that with a knowledge of the total penetration level and location of wind power installations, it is possible to estimate the effect of wind energy on the vulnerability of a power system. 12 refs., 6 figs.

  8. A mobile and self-sufficient lab for high frequency measurements of stable water isotopes and chemistry of multiple water sources

    Science.gov (United States)

    Windhorst, David; Kraft, Philipp; Holly, Hartmut; Sahraei, Amir; Breuer, Lutz

    2017-04-01

    Technical advances over the last years have made instruments for stable water isotope and water chemistry measurements smaller, more durable and energy efficient. It is nowadays feasible to deploy such instruments in situ during field campaigns. Coupled to an automated sample delivery system, high temporal resolution online measurements of various sources are within the bounds of economic and technical possibility. However, the day to day operation of such equipment still requires either a lot of man power and infrastructure or the implementation of a quasi-self-sufficient system. The challenge remains on how to facilitate and remotely operate such a system. We present the design and implementation of the Water Analysis Trailer for Environmental Research (WATER), an autonomous platform consisting of instruments for stable water isotope and water chemistry analysis. The system takes and measures samples in high temporal resolution (operation of up to one week several issues need to be addressed. The essential topics are: - self-sufficient power supply, - automated sample delivery and preparation, and - autonomous measurements and management interfacing all instruments. In addition to the basic requirements we implemented: - communication of all system states, alarm messages and measurement results to an internal as well as an external database via cellular telemetry, - automated storage of up to 300 frozen reference samples (100 mL, stored at -18°C), - climate control for temperature sensitive equipment (±1°C), - a local and remote (up to 20 km using radio telemetry) sensor network (i.e. to record states of the hydrological system and climate and soil conditions), also suitable to trigger specific measurements - automatic fire suppression and security system. The initial instrumentation includes a UV spectrometer (ProPs, Trios GmBH, Germany) to measure NO3-, COD, TOC and total suspended sediments, multiparameter water quality probe (YSI600R, YSI, USA) to measure

  9. Towards an energy self-sufficiency of territories. methanization and biogas, a sector with a bright future

    International Nuclear Information System (INIS)

    Ceron, Pascale; Gorges, Pascale; Cazas, Judith; Dolivet, Sophie; Guy, Lionel; Jacob, Antoine; Schlienger, Marc; Eberhardt, Mathieu

    2012-10-01

    These both publications present and describe methanization, the different models of projects or installations, and the valorisation of products, propose a focus on heat network and co-generation, and on bio-methane and injection, and outline the benefits of methanization. They also propose a set of questions and answers related to technical, social or environmental issues raised by methanization and methanization projects, and present various projects located in different places in France while indicating some key figures for them

  10. Development of a comprehensive plan for utilization of digester gas moves towards energy self-sufficiency in Chicago, USA.

    Science.gov (United States)

    Kunetz, Thomas E; Fink-Finowicki, Jarek; McGowan, Steve; Auerbach, Eric

    2012-01-01

    The Metropolitan Water Reclamation District (MWRD) of Greater Chicago's Stickney Water Reclamation Plant (SWRP) anaerobically digests approximately 430 dry tons per day (dtpd) (390 dry metric tons per day) of solids and produces 3.4 million ft(3)/day (96 thousand m(3)/day) of biogas from the anaerobic digesters, making it one of the largest municipal digester gas complexes in the world. Installation of new treatment processes, as well as future increases in flows and loads to the plant, are expected to significantly increase production of biologically degradable sludge and biogas. This paper presents a comprehensive planning study that was completed to identify and evaluate alternatives for utilization of this biogas. The best, sustainable approach was identified, taking into consideration economics, social impacts, and environmental impacts. The model results indicate that the most economically favorable scenario involves installing a cogeneration facility to produce electricity on-site, and operating it in conjunction with the plant's existing boilers to satisfy the heating needs of the plant. This scenario also provides the greatest reduction in GHG offsets at the power plants.

  11. The Basic Social Process in the Culture of the Self-Sufficient Organization. An Application of Grounded Theory

    Directory of Open Access Journals (Sweden)

    Sofia CHIRICĂ

    2010-06-01

    Full Text Available The hereby research encompasses the results of an analysis conducted based on the grounded theory methodology over the qualitative data that were gathered through a national project regarding the organizational development of the mental health institutions. After the finalization of the project, the interest for the grounded theory methodology and the reconsideration of the organizational development notion and of the role of the consultant in this process have all lead to a re-analysis of the qualitative data procured in one of the hospitals included in the project. Our approach resulted in an explanatory model of how the organization works and the factors that can affect various changes during its development. This explanatory model holds at its center a basic psychological and social process that represents the perception of the organizational system as closed on certain coordinates, although structurally open. This very perception and the behavior of maintaining the system within closed coordinates allow only for a dual functioning and so the natural result is the emergence of a self-sufficient culture. The central feature of this particular culture is the replacement of the formal organization and its goal of caring for the mentally challenged with an organization reduced to its sole goal of survival.

  12. The use of Jatropha curcas to achieve a self sufficient water distribution system: A case study in rural Senegal

    Science.gov (United States)

    Archer, Alexandra

    The use of Jatropha curcas as a source of oil for fueling water pumps holds promise for rural communities struggling to achieve water security in arid climates. The potential for use in developing communities as an affordable, sustainable fuel source has been highly recommended for many reasons: it is easily propagated, drought resistant, grows rapidly, and has high-oil-content seeds, as well as medicinal and economic potential. This study uses a rural community in Senegal, West Africa, and calculates at what level of Jatropha curcas production the village is able to be self-sufficient in fueling their water system to meet drinking, sanitation and irrigation requirements. The current water distribution system was modelled to represent irrigation requirements for nine different Jatropha curcas cultivation and processing schemes. It was found that a combination of using recycled greywater for irrigation and a mechanical press to maximize oil recovered from the seeds of mature Jatropha curcas trees, would be able to operate the water system with no diesel required.

  13. An artificial self-sufficient cytochrome P450 directly nitrates fluorinated tryptophan analogs with a different regio-selectivity.

    Science.gov (United States)

    Zuo, Ran; Zhang, Yi; Huguet-Tapia, Jose C; Mehta, Mishal; Dedic, Evelina; Bruner, Steven D; Loria, Rosemary; Ding, Yousong

    2016-05-01

    Aromatic nitration is an immensely important industrial process to produce chemicals for a variety of applications, but it often suffers from multiple unsolved challenges. Enzymes as biocatalysts have been increasingly used for organic chemistry synthesis due to their high selectivity and environmental friendliness, but nitration has benefited minimally from the development of biocatalysis. In this work, we aimed to develop TxtE as practical biocatalysts for aromatic nitration. TxtE is a unique class I cytochrome P450 enzyme that nitrates the indole of l-tryptophan. To develop cost-efficient nitration processes, we fused TxtE with the reductase domains of CYP102A1 (P450BM3) and of P450RhF to create class III self-sufficient biocatalysts. The best engineered fusion protein was comparable with wild type TxtE in terms of nitration performance and other key biochemical properties. To demonstrate the application potential of the fusion enzyme, we nitrated 4-F-dl-tryptophan and 5-F-l-tryptophan in large scale enzymatic reactions. Tandem MS/MS and NMR analyses of isolated products revealed altered nitration sites. To our knowledge, these studies represent the first practice in developing biological nitration approaches and lay a solid basis to the use of TxtE-based biocatalysts for the production of valuable nitroaromatics. Copyright © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  14. Web-based information system design of agricultural management towards self-sufficiency local food in North Aceh

    Science.gov (United States)

    Salahuddin; Husaini; Anwar

    2018-01-01

    The agricultural sector, especially food crops and horticulture, is one of the sectors driving regional economic pillars in Aceh Utara Regency of Aceh Province. Some agricultural products and food crops that become excellent products in North Aceh regency are: rice, corn, peanuts, long beans, cassava and soybeans. The Local Government of North Aceh Regency has not been optimal in empowering and maximizing the potential of agriculture resources. One of the obstacles is caused by the North Aceh Regency Government does not have an adequate database and web information system/GIS (Geographic Information System) for data management of agricultural centre in North Aceh Regency. This research is expected to assist local government of North Aceh Regency in managing agriculture sector to realize local food independence the region in supporting national food security program. The method in this research is using waterfall method for designing and making information system by conducting sequential process starting from data collection stage, requirement analysis, design, coding, testing and implementation system. The result of this research is a web-based information system for the management of agriculture superior agricultural product centre in North Aceh. This application provides information mapping the location of agricultural superior product producers and mapping of potential locations for the development of certain commodities in North Aceh Regency region in realizing food self-sufficiency in the region.

  15. MAPPING AND DEVELOPMENT PATTERNS OF AGRICULTURAL PRODUCTION TO ACTUALIZE SELF-SUFFICIENCY OF FOOD IN YOGYAKARTA CITY

    Directory of Open Access Journals (Sweden)

    Kadarso

    2017-07-01

    Full Text Available This study aims to identify potential urban farming commodities and develop urban agricultural production in order to realize food self-sufficiency in Yogyakarta City. The study used a qualitative and quantitative approach with Location Quotient analysis instrument, Dynamic Location Quotient, SWOT Analysis. Results: base area is Mergangsan, Ngampilan, Tegalrejo, Kotagede, Mantrijeron, Gondokusuman, Wirobrajan, Pakualaman, Umbulharjo, and Kraton. Non-base areas are sub-district Gedongtengen, Gondomanan, Danurejan, and Jetis. Areas that have the potential to develop faster are Mergangsan, Ngampilan, Kotagede, Danurejan, Gondokusuman and Jetis. Areas with slower development potential are Gedong Tengen, Gondomanan, Tegalrejo, Pakualaman, Mantrijeron, Wirobrajan, Umbulharjo, and Kraton. S-O Strategy is there are several sub-districts in the city of Yogyakarta have the strength of the economic base, so the potential to develop crops; optimizing the role of Field Agricultural Instructor. The W-O strategy is the promotion of farming and improvement of farm management. S-T strategy is to improve the quality of infrastructure and improve marketing efficiency. The W-T strategy is the expansion of market share; there are other nonagricultural businesses that are more promising.

  16. Analyzing driving forces behind changes in energy vulnerability of Spanish electricity generation through a Divisia index-based method

    International Nuclear Information System (INIS)

    Fernández González, P.; Moreno, B.

    2015-01-01

    Highlights: • We propose and develop the LMDI approach to factorize changes in electricity bill vulnerability. • Spanish vulnerability (1995–2011) markedly grew mainly by increasing gas dependence. • Fuel price increase and growing importance of electricity damage energy security. • Energy intensity advances & fuel diversification: insufficient to drive vulnerability. • Main recommendation: enhance internal energy market and common external EU strategy. - Abstract: High energy dependence on fossil raises vulnerability concerns about security of supply and energy cost. This research examines the impact of high dependence of imported fuels for power generation in Spain through the quantification and analysis of the driving forces behind the change in its electricity bill. Following logarithmic mean Divisia indexes approach, we present and perform a new method that enables a complete decomposition of changes in electricity vulnerability into contributions from several drivers. In fact, we identify five predefined factors behind the variations in vulnerability in Spain during the 1998–2011 period: fuel price, average heat rate, fuel dependence, degree of electricity importance and energy intensity. The application of this approach reveals a significant increase in Spanish vulnerability in the last two decades, promoted by increments in fuel price and importance of electricity over the primary energy consumption, but especially by increasing fuel dependence (particularly gas dependence). Therefore, findings mainly advocate for those strategies aimed at reducing Spanish energy dependence. Also those improving thermal efficiency and energy intensity are indicated

  17. Insular Area energy vulnerability, Puerto Rico, US Virgin Islands. Technical Appendix 1

    International Nuclear Information System (INIS)

    Stern, M.; Willard, E.E.; Efferding, S.

    1994-05-01

    This report was prepared in response to Section 1406 of the Energy Policy Act of 1992 (P.L. 192-486). The Act directed the Department of Energy (DOE) to ''conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption,'' and to ''outline how the insular areas shall gain access to vital oil supplies during times of national emergency.'' The Act defines the insular areas to be the US Virgin Islands and Puerto Rico in the Caribbean, and Guam, American Samoa, the Commonwealth of the Northern Mariana Islands (CNMI), and Palau in the Pacific. This report is the analysis of Puerto Rico and the US Virgin Islands. In the study, ''unique vulnerabilities'' were defined as susceptibility to: (1) more frequent or more likely interruptions of oil supplies compared to the mainland, and/or (2) disproportionately larger or more likely economic losses in the event of an oil supply disruption. In order to asses unique vulnerabilities, the study examined in the insular areas' experience during past global disruptions of oil supplies and during local emergencies caused by natural disasters. The effects of several possible future global disruptions and local emergencies were also analyzed. Analyses were based on historical data, simulations using energy and economic models, and interviews with officials in the insular governments and the energy industry

  18. Insular Area energy vulnerability, Puerto Rico, US Virgin Islands. Technical Appendix 1

    Energy Technology Data Exchange (ETDEWEB)

    Stern, M.; Willard, E.E.; Efferding, S. [Ensys Energy & Systems, Inc., Flemington, NJ (United States)

    1994-05-01

    This report was prepared in response to Section 1406 of the Energy Policy Act of 1992 (P.L. 192-486). The Act directed the Department of Energy (DOE) to ``conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption,`` and to ``outline how the insular areas shall gain access to vital oil supplies during times of national emergency.`` The Act defines the insular areas to be the US Virgin Islands and Puerto Rico in the Caribbean, and Guam, American Samoa, the Commonwealth of the Northern Mariana Islands (CNMI), and Palau in the Pacific. This report is the analysis of Puerto Rico and the US Virgin Islands. In the study, ``unique vulnerabilities`` were defined as susceptibility to: (1) more frequent or more likely interruptions of oil supplies compared to the mainland, and/or (2) disproportionately larger or more likely economic losses in the event of an oil supply disruption. In order to asses unique vulnerabilities, the study examined in the insular areas` experience during past global disruptions of oil supplies and during local emergencies caused by natural disasters. The effects of several possible future global disruptions and local emergencies were also analyzed. Analyses were based on historical data, simulations using energy and economic models, and interviews with officials in the insular governments and the energy industry.

  19. Countywide Evaluation of the Long-Term Family Self-Sufficiency Plan. Assessing the Utility of the LTFSS Plan Service Delivery and Planning Framework

    National Research Council Canada - National Science Library

    Davis, Lois

    2002-01-01

    ...) Plan on November 16,1999. The LTFSS Plan consists of 46 projects whose goal is to promote self-sufficiency among families that are participating in the California Work Opportunity and Responsibility to Kids Act of 1997 (CalWORKS...

  20. Collision and displacement vulnerability among marine birds of the California Current System associated with offshore wind energy infrastructure

    Science.gov (United States)

    Adams, Josh; Kelsey, Emily C.; Felis, Jonathan J.; Pereksta, David M.

    2016-10-27

    With growing climate change concerns and energy constraints, there is an increasing need for renewable energy sources within the United States and globally. Looking forward, offshore wind-energy infrastructure (OWEI) has the potential to produce a significant proportion of the power needed to reach our Nation’s renewable energy goal. Offshore wind-energy sites can capitalize open areas within Federal waters that have persistent, high winds with large energy production potential. Although there are few locations in the California Current System (CCS) where it would be acceptable to build pile-mounted wind turbines in waters less than 50 m deep, the development of technology able to support deep-water OWEI (>200 m depth) could enable wind-energy production in the CCS. As with all human-use of the marine environment, understanding the potential impacts of wind-energy infrastructure on the marine ecosystem is an integral part of offshore wind-energy research and planning. Herein, we present a comprehensive database to quantify marine bird vulnerability to potential OWEI in the CCS (see https://doi.org/10.5066/F79C6VJ0). These data were used to quantify marine bird vulnerabilities at the population level. For 81 marine bird species present in the CCS, we created three vulnerability indices: Population Vulnerability, Collision Vulnerability, and Displacement Vulnerability. Population Vulnerability was used as a scaling factor to generate two comprehensive indicies: Population Collision Vulnerability (PCV) and Population Displacement Vulnerability (PDV). Within the CCS, pelicans, terns (Forster’s [Sterna forsteri], Caspian [Hydroprogne caspia], Elegant [Thalasseus elegans], and Least Tern [Sternula antillarum]), gulls (Western [Larus occidentalis] and Bonaparte’s Gull [Chroicocephalus philadelphia]), South Polar Skua (Stercorarius maccormicki), and Brandt’s Cormorant (Phalacrocorax penicillatus) had the greatest PCV scores. Brown Pelican (Pelicanus occidentalis

  1. A Climate Change Vulnerability Assessment Report for the National Renewable Energy Laboratory: May 23, 2014 -- June 5, 2015

    Energy Technology Data Exchange (ETDEWEB)

    Vogel, J. [Abt Environmental Research, Boulder, CO (United States); O' Grady, M. [Abt Environmental Research, Boulder, CO (United States); Renfrow, S. [Abt Environmental Research, Boulder, CO (United States)

    2015-09-03

    The U.S. Department of Energy's (DOE's) National Renewable Energy Laboratory (NREL), in Golden, Colorado, focuses on renewable energy and energy efficiency research. Its portfolio includes advancing renewable energy technologies that can help meet the nation's energy and environmental goals. NREL seeks to better understand the potential effects of climate change on the laboratory--and therefore on its mission--to ensure its ongoing success. Planning today for a changing climate can reduce NREL's risks and improve its resiliency to climate-related vulnerabilities. This report presents a vulnerability assessment for NREL. The assessment was conducted in fall 2014 to identify NREL's climate change vulnerabilities and the aspects of NREL's mission or operations that may be affected by a changing climate.

  2. Department of Energy, highly enriched uranium ES ampersand H vulnerability assessment, Idaho National Engineering Laboratory site assessment team report

    International Nuclear Information System (INIS)

    1996-01-01

    In accordance with the February 22, 1996 directive issued by Secretary of Energy O'Leary on the Vulnerability Assessment of Highly Enriched Uranium (HEU) Storage, the Idaho National Engineering Laboratory conducted an assessment of the site's HEU holdings and any associated vulnerabilities. The assessment was conducted between April 25 and May 24, 1996. The scope of this assessment, as defined in the Assessment Plan, included all HEU, and any spent fuel not evaluated in the Spent Fuel Vulnerability Assessment. Addressed in this assessment were all of the holdings at the Idaho National Engineering Laboratory (INEL) except any located at Argonne National Laboratory-West (ANL-W) and the Naval Reactors Facility. Excluded from the assessment were those HEU holdings previously assessed in the Idaho National Engineering Laboratory Spent Nuclear Fuel Inventory and Vulnerability Site Assessment Report and any HEU holdings evaluated in the Plutonium Vulnerability Assessment Report

  3. Energy vulnerability. Far from urban centres, space heating and fuel costs weigh heavily on the household budget

    International Nuclear Information System (INIS)

    Cochez, Nicolas; Durieux, Eric; Levy, David; Moreau, Sylvain; Baudu-Baret, Claude

    2015-01-01

    For 15% of resident households in metropolitan France, the proportion of income going on home and water heating is high, in the sense that it is twice the median housing-expense to income ratio. With this same criterion, the cost of the most mandatory car journeys is high for 10% of households, in relation to their budgets. In all, 22% of households (i.e. 5.9 million) are experiencing energy vulnerability for one or other of the items of consumption, and 3% of households (i.e. 700 000) are vulnerable for both items. The risk of vulnerability varies over national territory, with differences depending on the items of expenditure considered: climate is the primary factor where disparity in housing-related vulnerability is concerned, whereas the predominant factor for travel is distance from urban centres

  4. The Paris-Nairobi climate initiative. Access to clean energy for all in Africa and countries vulnerable to climate change. Access to energy, sustainable development and climate change

    International Nuclear Information System (INIS)

    2011-01-01

    The first part of this report highlights the importance of a universal access to energy, the role of public policies and renewable energies, the need to implement sustainable economic models for energy services, and indicates the major objectives and essential actions for these purposes. The second part outlines the weakness of electricity production in Africa, the degradation of the energy mix balance, the vulnerability to climate change, and the fact that Africa, like other countries vulnerable to climate change, possess huge and unexploited renewable energy resources (biomass, hydroelectricity, geothermal, solar, wind). The third part proposes an approach to energy services by developing sustainable cooking, supplying energy to support rural development and to poles of economic growth, by developing sustainable cities (notably in transports and buildings), and by developing national and regional electricity grids. The last part addresses the issue of energy financing in developing countries

  5. Risk management and the vulnerability assessment process of the United States Department of Energy

    International Nuclear Information System (INIS)

    Rivers, J.D.; Johnson, O.B.; Callahan, S.N.

    2001-01-01

    Full text: Risk management is an essential element in influencing how the United States Department of Energy's safeguards and security mission is executed. Risk management exists as a function of a target's attractiveness, along with the potential consequences associated with the unauthorized use of that target. The goal of risk management encompasses the fielding and operating of appropriate, cost-effective protection systems generating sufficient deterrence to protect sensitive programs and facilities. Risk mitigation and risk prevention are accomplished through the vulnerability assessment process. The implementation and continued validation of measures to prevent or mitigate risk to acceptable levels constitute the fundamental approach of the Department's risk management program. Due to the incomplete knowledge inherent in any threat definition, it is impossible to precisely tailor a protective system to defend against all threats. The challenge presented to safeguards and security program managers lies in developing systems sufficiently effective to defend against an array of threats slightly greater than can be hypothetically postulated (the design basis threat amended for local conditions). These systems are then balanced against technological, resource, and fiscal constraints. A key element in the risk assessment process is analyzing the security systems against the Design Basis Threat (DBT). The DBT is used to define the level and capability of the threat against the DOE facilities and their assets. In particular it defines motivation, numbers of adversaries, capabilities, and their objectives. Site Safeguards and Security Plans (SSSPs) provide the basis and justification for safeguards and security program development, budget, and staffing requirements. The SSSP process examines, describes, and documents safeguards and security programs, site-wide and by facility; establishes safeguards and security program improvement priorities; describes site and

  6. Update on the Department of Energy's 1994 plutonium vulnerability assessment for the plutonium finishing plant

    International Nuclear Information System (INIS)

    HERZOG, K.R.

    1999-01-01

    A review of the environmental, safety, and health vulnerabilities associated with the continued storage of PFP's inventory of plutonium bearing materials and other SNM. This report re-evaluates the five vulnerabilities identified in 1994 at the PFP that are associated with SNM storage. This new evaluation took a more detailed look and applied a risk ranking process to help focus remediation efforts

  7. The vulnerability of the European agriculture and food system for calamities and geopolitics : a stress test

    NARCIS (Netherlands)

    Weijden, van der W.; Burger, C.P.J.; Jansen, D.M.; Rougoor, C.; Hees, E.

    2011-01-01

    During the 1960s and 1970s, the EU succeeded in becoming largely self-sufficient in food production, thus assuring its food security for the most part. However, it is unclear which areas of food security are still vulnerable and/or whether there are there new vulnerabilities. In this report we have

  8. Assessing local population vulnerability to wind energy development with branching process models: an application to wind energy development

    Science.gov (United States)

    Erickson, Richard A.; Eager, Eric A.; Stanton, Jessica C.; Beston, Julie A.; Diffendorfer, James E.; Thogmartin, Wayne E.

    2015-01-01

    Quantifying the impact of anthropogenic development on local populations is important for conservation biology and wildlife management. However, these local populations are often subject to demographic stochasticity because of their small population size. Traditional modeling efforts such as population projection matrices do not consider this source of variation whereas individual-based models, which include demographic stochasticity, are computationally intense and lack analytical tractability. One compromise between approaches is branching process models because they accommodate demographic stochasticity and are easily calculated. These models are known within some sub-fields of probability and mathematical ecology but are not often applied in conservation biology and applied ecology. We applied branching process models to quantitatively compare and prioritize species locally vulnerable to the development of wind energy facilities. Specifically, we examined species vulnerability using branching process models for four representative species: A cave bat (a long-lived, low fecundity species), a tree bat (short-lived, moderate fecundity species), a grassland songbird (a short-lived, high fecundity species), and an eagle (a long-lived, slow maturation species). Wind turbine-induced mortality has been observed for all of these species types, raising conservation concerns. We simulated different mortality rates from wind farms while calculating local extinction probabilities. The longer-lived species types (e.g., cave bats and eagles) had much more pronounced transitions from low extinction risk to high extinction risk than short-lived species types (e.g., tree bats and grassland songbirds). High-offspring-producing species types had a much greater variability in baseline risk of extinction than the lower-offspring-producing species types. Long-lived species types may appear stable until a critical level of incidental mortality occurs. After this threshold, the risk of

  9. Possible consequences of climate change on the Swedish energy sector - impacts, vulnerability and adaptation

    International Nuclear Information System (INIS)

    Gode, Jenny; Axelsson, Johan; Eriksson, Sara; Holmgren, Kristina; Hovsenius, Gunnar; Kjellstroem, Erik; Larsson, Per; Lundstroem, Love; Persson, Gunn

    2007-06-01

    The events of recent years clearly demonstrate the far-reaching consequences of extreme weather situations on the energy system, particularly in the case of severe damage to transmission lines in connection with violent storms. Many climate researchers predict an increase in extreme weather events. Against this background, in 2005 Elforsk initiated this project where the aim has been to examine how climate change can affect plant operation, production conditions and energy usage patterns, how undesirable consequences can be predicted and what long-term measures may be necessary. Another central objective has been to bring about a dialogue between climate researchers, energy consultants/engineers and buyers for the energy industry. The inclusion of both positive and negative consequences has been an important ambition of the project. One key aspect of the project has been to develop climate scenarios for the next 20-25 years that describe possible changes in climate variables with relevance for the energy system. Based on these and literature studies, contact with experts and internal assessments, an analysis has been made of the possible impacts on hydropower, wind power, biofuel supply, natural gas supply, the power transmission network and energy usage. The project findings, which have also been discussed at a workshop with representatives from the energy industry, did not reveal any acute need for adaptation aside from those measures already being taken, for example to make the transmission system less vulnerable to weather conditions. Furthermore, the results indicate increased production potential for both hydropower and wind power. The production potential for hydropower stations from the Dalaelven River northwards would appear to increase by 2-10%. Estimates for the southern watercourses are less certain, but the production potential may decrease. Since around 80% of the country's hydropower is produced in the northern watercourses, this indicates an

  10. Tackling fuel poverty through facilitating energy tariff switching: a participatory action research study in vulnerable groups.

    Science.gov (United States)

    Lorenc, A; Pedro, L; Badesha, B; Dize, C; Fernow, I; Dias, L

    2013-10-01

    A fifth of UK households live in fuel poverty, with significant health risks. Recent government strategy integrates public health with local government. This study examined barriers to switching energy tariffs and the impact of an energy tariff switching 'intervention' on vulnerable peoples' likelihood to, success in, switching tariffs. Participatory Action Research (PAR), conducted in West London. Community researchers from three voluntary/community organisations (VCOs) collaborated in recruitment, study design, data collection and analysis. VCOs recruited 151 participants from existing service users in three groups: Black and Minority Ethnic (BME) communities, older people (>75 yrs) and families with young children. Researchers conducted two semi-structured interviews with each participant, a week apart. The first interview asked about demographics, current energy supplier, financial situation, previous experience of tariff-switching and barriers to switching. Researchers then provided the 'intervention' - advice on tariff-switching, printed materials, access to websites. The second interview explored usefulness of the 'intervention', other information used, remaining barriers and information needs. Researchers kept case notes and a reflective log. Data was analysed thematically and collaboratively between the research coordinator and researchers. Quantitative data was analysed using SPSS, with descriptive statistics and Chi-squared tests. A total of 151 people were interviewed: 47 older people over 75 years, 51 families with young children, 51 BME (two were missing demographics). The majority were not White British or UK-born. Average household weekly income was £230. Around half described 'difficult' financial situations, 94% were receiving state benefits and 62% were in debt. Less than a third had tried to find a better energy deal; knowledge was the main barrier. After the intervention 19 people tried to switch, 13 did. Young families were most likely to

  11. Vulnerable Genders, Vulnerable Loves

    DEFF Research Database (Denmark)

    Schleicher, Marianne

    2015-01-01

    This chapter analyses religious reflections on vulnerable genders and vulnerable loves from the Hebrew Bible to early Rabbinic literature. It is based on theories by inter alia Donna Haraway on complex identities, Turner and Maryanski on love as a prerequisite for survival, Michel Foucault...... on gathering knowledge and its often unpremeditated effect of recognition and inclusion, and Judith Butler on cultural intelligibility and subversion from within. With these theories as a departing point for the analysis, the chapter links the vulnerability of complex identities with the vulnerability...... of cultures which leads to the overall understanding that culture can accommodate complex identities associated with individual and cultural vulnerability as long as the overall survival of the culture is not threatened. This understanding questions the feasibility of the ethical position of thinkers...

  12. Vulnerability of U.S. Agriculture and Energy Sectors to Changes in Climate and Socioeconomics

    Science.gov (United States)

    Hejazi, M. I.; Voisin, N.; Liu, L.; Bramer, L.; Fortin, D.; Huang, M.; Hathaway, J.; Kyle, P.; Leung, L. R.; Li, H. Y.; Liu, Y.; Patel, P.; Pulsipher, T.; Rice, J.; Tesfa, T. K.; Vernon, C. R.; Zhou, Y.

    2014-12-01

    A prominent integrated assessment model (IAM), the Global Change Assessment Model (GCAM), has been coupled with the Community Land Model (CLM) of the Community Earth system model (CESM) to assess the vulnerability of the US agriculture and energy sectors to future water shortages under changing climate and socioeconomics. This study utilizes the regionalized version of GCAM for the U.S. with 50-state. GCAM-USA includes a detailed representation of water demands and tracks them at multiple spatial scales and annual scale. A spatial and temporal disaggregation approach is developed to project the annual regional water demand simulations into a daily time step and 1/8o spatial resolution for input to CLM, which has been coupled to a river routing model and generic water management model applicable globally at 1/2o resolution and regionally at 1/8o resolution. The coupled modeling framework demonstrated reasonable ability to simulate the historical flow regulation and water supply over the continental U.S. The coupled modeling framework has been used to investigate: 1) Which water use sector (agriculture or energy) and subbasins in the conterminous U.S. will experience water deficits in future decades; 2) What are the drivers for the deficit (i.e., water availability, water demands, or both); 3) Will climate mitigation policies alleviate or exacerbate the situation; and lastly 4) How will the frequency , severity, and spatial extent of water deficits (hot spots) evolve under a non-mitigation scenario (RCP8.5) in which conventional fossil-fueled technologies prevail versus a mitigation scenario (RCP4.5) in which the carbon price causes a shift toward renewables and expansion of bioenergy productions. Results show that irrigation will face greater water deficit overall except in the northeastern U.S. Water deficit is greatest in the western U.S. except the Pacific Northwest. Human footprints on the regulated flows are most pronounced over the Rio Grande, Colorado, Great

  13. Department of Energy Plutonium ES ampersand H Vulnerability Assessment Savannah River Site interim compensatory measures

    International Nuclear Information System (INIS)

    Bickford, W.E.

    1994-01-01

    The Savannah River Site (SRS) has recently completed a self-assessment of potential vulnerabilities associated with plutonium and other transuranic materials stored at the site. An independent Working Group Assessment Team (WGAT) appointed by DOE/ES ampersand H also performed an independent assessment, and reviewed and validated the site self-assessment. The purpose of this report is to provide a status of interim compensatory measures at SRS to address hazards in advance of any corrective actions. ES ampersand H has requested this status for all vulnerabilities ranked medium or higher with respect to potential consequences to workers, environment, and the public

  14. Technological contribution of production engineering for national self-sufficiency in petroleum; Contribuicao tecnologica da engenharia de producao para a auto-suficiencia nacional

    Energy Technology Data Exchange (ETDEWEB)

    Lara, Anelise Quintao [PETROBRAS, Rio de Janeiro, RJ (Brazil). E e P Engenharia de Producao. Gerencia de Engenharia de Reservatorios], e-mail: alara@petrobras.com.br; Pinto, Antonio Carlos Capeleiro [PETROBRAS, Rio de Janeiro, RJ (Brazil). E e P Engenharia de Producao. Gerencia de Pre-Projetos de Desenvolvimento da Producao], e-mail: acc@petrobras.com.br; Lage, Antonio Carlos Vieira Martins [PETROBRAS S.A., Rio de Janeiro, RJ (Brazil). Centro de Pesquisas (CENPES). Gerencia de Tecnologia e Engenharia de Poco], e-mail: antoniolage@petrobas.com.br; Del Vecchio, Cesar Jose Moraes [PETROBRAS S.A., Rio de Janeiro, RJ (Brazil). Centro de Pesquisas (CENPES). Programa Tecnologico de Transporte (PROTRAN)], e-mail: cdv@petrobras.com.br; Masetti, Isaias Quaresma [PETROBRAS S.A., Rio de Janeiro, RJ (Brazil). Centro de Pesquisas (CENPES). Gerencia de Metodos Cientificos], e-mail: masetti@petrobras.com.br; Formigli Filho, Jose Miranda [PETROBRAS, Rio de Janeiro, RJ (Brazil). E e P Engenharia de Producao. Gerencia Executiva de Engenharia de Producao; Fagundes Netto, Jose Roberto [PETROBRAS S.A., Rio de Janeiro, RJ (Brazil). Centro de Pesquisas (CENPES). Gerencia de Tecnologia de Elevacao, Escoamento e Processamento], e-mail: rfagundes@petrobras.com.br; Beltrao, Ricardo Luis Carneiro [PETROBRAS S.A., Rio de Janeiro, RJ (Brazil). Centro de Pesquisas (CENPES). Gerencia Geral de Producao], e-mail: rbeltrao@petrobras.com.br

    2006-06-15

    This paper presents a retrospective of some of PETROBRAS' main technological advances that contributed for Brazil to reach petroleum production self-sufficiency. The impact of the corporate strategy to invest in training and qualifying human resources in the development of critical technologies for the Company's business is discussed. From the mid-seventies, there has been a significant increase in the effort directed to research and development (R and D) in the Exploration and Production (E and P) segment. Motivated by challenges imposed by ever increasing water depths (WD) and the early production of discovered fields, technological developments accelerated. A few of the topics discussed herein include the competition between wet subsea systems and atmospheric systems, the first floating production units based on semi-submersible drilling platforms and on adapted tankers, the development of wellhead systems, risers and production lines. Beginning in the mid-eighties, PETROBRAS successively broke world records in terms of water depth with its wells and production and off loading facilities. In order to support this leadership, new technologies were developed and adapted, in partnership with vendors and scientific and technological institutions, in the country and abroad. This paper discusses the technologies developed for maintaining the production of mature fields, increasing the production capacity and managing the integrity of installed units, managing great volumes of produced water as a function of mechanisms adopted for the maintenance of reservoir pressure and managing production projects. In conclusion, the main solutions currently in development are described. (author)

  15. “Al-Musaqah” and Sharia Agribusiness System: An Alternative Way to Meet Staple Food Self-Sufficiency in Contemporary Indonesia

    Directory of Open Access Journals (Sweden)

    Ujang Maman Maman

    2017-12-01

    Full Text Available The concept of al-musaqah appears in Islamic history when Prophet Muhammad conquered the fertile farmland surrounding Khaibar, abandoned by Jews as the original owner of the land. The concept of al-musaqoh also appears in fiqh deliberations, in which it is a partnership between tenants and land owners. By deepening literature, the concept of al-musaqah is part of sharia agribusiness system that could be an alternative partnerships and farmer institution in meeting staple food needs. The alternative concept is very necessary since Indonesia has been facing the issue of agricultural land conversion and difficulty to form sustainable food agriculture area (SFAA. For the implementation of al-musaqoh, the Government should systematically form the SFAA on the state owned land, and estabilish its institution to manage SFAA in the central and regional level. Then, the SFAA management implement al-musaqoh partnership with farmer groups. By the concept, the Government would be able to control staple food procurement and distribution  to achieve food self-sufficiency which is profitable for farmers and non-farmers. However, the implementation is based on the view that the provision of basic needs should not be left to market mechanism.

  16. Department of Energy HEU ES and H vulnerability assessment, Savannah River Site, Site Assessment Team report. Revision 2

    International Nuclear Information System (INIS)

    Geddes, R.L.; Barone, A.; Shook, H.E. Varner, C.E.; Rollins, R.

    1996-01-01

    This report fulfills the directive issued by the Secretary of Energy on February 22, 1996 to complete a comprehensive assessment of potential vulnerabilities associated with the management of highly enriched uranium (HEU) throughout the DOE complex. In a subsequent letter instruction, the DOE-SR Field Office formally directed WSRC to conduct an assessment of the HEU materials at SRS. The term ''ES and H vulnerabilities'' is defined for the purpose of this assessment to mean conditions or weaknesses that could lead to unnecessary or increased exposure of workers or the public to radiation or to HEU-associated chemical hazards, or to the release of radioactive materials to the environment. The assessment will identify and prioritize ES and H vulnerabilities, and will serve as an information base for identifying corrective actions for the safe management of HEU. Primary facilities that hold HEU at SRS are H-Canyon, K-Reactor assembly area, K, L, and P-Reactor disassembly basins, and the Receiving Basin for Offsite Fuels (RBOF)

  17. Using experiments and demographic models to assess rare plant vulnerability to utlity-scale solar energy development

    Science.gov (United States)

    Moore, K. A.

    2015-12-01

    Pressing challenges for the implementation of solar energy are the effects of construction and operation on protected animal and plant species. Siting and mitigation of solar energy often requires understanding of basic biology and distributions of rare species that are unknown. How can we rapidly collect the information necessary on species- and site-specific population dynamics to effectively design mitigation and conservation measures? We have developed an integrated approach to assessing the vulnerability of a suite of representative rare plant species in the region. We implemented a prioritized series of demographic and experimental studies over the past four years to identify the types of species, populations, and life stages most vulnerable to impact or prone to conservation efforts. We have found substantial variation in vegetative and sexual reproduction between study populations for several rare plants, including between populations that vary in putative impact by development and/or effects of experimental solar arrays. For a subset of species, we designed population viability analysis and applied them to identify sensitive vital rates and compare quasi-extinction probabilities under different climate and impact scenarios. By utilizing practical experiments to test for the effects of real or simulated impacts, we found differences in vital rates between natural and disturbed populations adjacent to and within solar installations. We draw conclusions from our work to guide the analysis of benefits, permitting, and design of utility-scale solar energy facilities.

  18. Improved stoves and wood benches: one alternative energy self-sufficiency at the farm level for dependents of the oak forests of the Eastern Cordillera

    International Nuclear Information System (INIS)

    Aristizabal Hernandez, Javier Dario

    2010-01-01

    In order to improve thermal efficiency of typical cook stoves used in rural area of Encino, Santander, three improved cook stoves prototypes were built, by means of a modification carried out at combustion chamber. The improved cook stoves were tested by using Controlled Cooking Test (CCT) and compared against a typical cook stove. Scores displayed a mean performance of 14.66% among improved cook stoves and typical cook stove, which implies a saving in fuelwood consume of 0.86 ton/year. Likewise, farm fuelwood lots design is proposed by comparing four tree species used for cooking purposes in that place. Finally, impact in terms of avoided deforestation and carbon dioxide emissions is assessed, under a focus that it could integrate both improved cook stoves and farm fuel wood lots.

  19. Independency of Japan's Agriculture through Food and Energy Self-sufficiency : Hokkaido Model Toward the Sustainability of Food and Biomass Production

    OpenAIRE

    Osaki, Mitsuru

    2009-01-01

    Sustainability Weeks 2009 Opening Symposium "International Symposium on Sustainable Development -Recommendations for Tackling the 5 Challenges of Global Sustainability-". Session 5, Toward the Sustainability of Food and Biomass Production. 2 November 2009. Sapporo, Japan.

  20. Environment, oil and political vulnerability in the Ecuadorian Amazon: Towards new forms of energy governance?

    Directory of Open Access Journals (Sweden)

    Guilhem JUTEAU-MARTINEAU

    2014-08-01

    Full Text Available This study proposes a historical analysis of oil exploitation governance in the Ecuadorian Amazon Region (rae, regarding its strong social and environmental impacts from the 1960’s until today. We identify three steps in the evolution of governance, leading up to the recent institutionalization of the regulation of impacts caused by oil-related activities, through centralized public policies. The relevance, feasibility and efficiency of these policies, as well as the role of decentralized governments regarding this regulation, are key factors in the evolution of social vulnerability to the impacts of oil-related activities.

  1. Integrated Vulnerability and Impacts Assessment for Natural and Engineered Water-Energy Systems in the Southwest and Southern Rocky Mountain Region

    Energy Technology Data Exchange (ETDEWEB)

    Tidwell, Vincent C. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Wolfsberg, Andrew [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Macknick, Jordan [National Renewable Energy Lab. (NREL), Golden, CO (United States); Middleton, Richard [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-01-01

    In the Southwest and Southern Rocky Mountains (SWSRM), energy production, energy resource extraction, and other high volume uses depend on water supply from systems that are highly vulnerable to extreme, coupled hydro-ecosystem-climate events including prolonged drought, flooding, degrading snow cover, forest die off, and wildfire. These vulnerabilities, which increase under climate change, present a challenge for energy and resource planners in the region with the highest population growth rate in the nation. Currently, analytical tools are designed to address individual aspects of these regional energy and water vulnerabilities. Further, these tools are not linked, severely limiting the effectiveness of each individual tool. Linking established tools, which have varying degrees of spatial and temporal resolution as well as modeling objectives, and developing next-generation capabilities where needed would provide a unique and replicable platform for regional analyses of climate-water-ecosystem-energy interactions, while leveraging prior investments and current expertise (both within DOE and across other Federal agencies).

  2. Health, Climate Change and Energy Vulnerability: A Retrospective Assessment of Strategic Health Authority Policy and Practice in England

    Directory of Open Access Journals (Sweden)

    J. Richardson B.Sc., Ph.D., RN., DipDN., CPsychol., PGCE.

    2008-01-01

    Full Text Available Background A number of policy documents suggest that health services should be taking climate change and sustainability seriously and recommendations have been made to mitigate and adapt to the challenges health care providers will face. Actions include, for example, moving towards locally sourced food supplies, reducing waste, energy consumption and travel, and including sustainability in policies and strategies. A Strategic Health Authority (SHA is part of the National Health Service (NHS in England. They are responsible for developing strategies for the local health services and ensuring high-quality performance. They manage the NHS locally and are a key link between the U.K. Department of Health and the NHS. They also ensure that national priorities are integrated into local plans. Thus they are in a key position to influence policies and practices to mitigate and adapt to the impact of climate change and promote sustainability. Aim The aim of this study was to review publicly available documents produced by Strategic Health Authorities (SHA to assess the extent to which current activity and planning locally takes into consideration climate change and energy vulnerability. Methods A retrospective thematic content analysis of publicly available materials was undertaken by two researchers over a six month period in 2008. These materials were obtained from the websites of the 10 SHAs in England. Materials included annual reports, plans, policies and strategy documents. Results Of the 10 SHAs searched, 4 were found to have an absence of content related to climate change and sustainability. Of the remaining 6 SHAs that did include content related to climate change and energy vulnerability on their websites consistent themes were seen to emerge. These included commitment to a regional sustainability framework in collaboration with other agencies in the pursuit and promotion of sustainable development. Results indicate that many SHAs in England

  3. A New Strategy for Utilizing Rice Forage Production Using a No-Tillage System to Enhance the Self-Sufficient Feed Ratio of Small Scale Dairy Farming in Japan

    Directory of Open Access Journals (Sweden)

    Windi Al Zahra

    2014-08-01

    Full Text Available Rice forage systems can increase the land use efficiency in paddy fields, improve the self-sufficient feed ratio, and provide environmental benefits for agro-ecosystems. This system often decreased economic benefits compared with those through imported commercial forage feed, particularly in Japan. We observed the productivities of winter forage after rice harvest between conventional tillage (CT and no-tillage (NT in a field experiment. An on-farm evaluation was performed to determine the self-sufficient ratio of feed and forage production costs based on farm evaluation of the dairy farmer and the rice grower, who adopted a rice forage system. The field experiment detected no significant difference in forage production and quality between CT and NT after rice harvest. However, the production cost was dramatically decreased by 28.1% in NT compared with CT. The self-sufficient ratio was 5.4% higher when dairy farmers adopted the rice forage system compared with those using the current management system. Therefore, this study demonstrated the positive benefits for dairy farmers and rice growers in Japan when adopting a rice forage system with NT, which could improve the self-sufficient feed ratio and reduce production costs.

  4. Energy vulnerability. Away from urban centers, space heating and fuels weight heavily in the budget. Insee Premiere no. 1530 - January 2015

    International Nuclear Information System (INIS)

    Cochez, Nicolas; Durieux, Eric; Levy, David

    2015-01-01

    For 15% of resident households in metropolitan France, the proportion of income going on home and water heating is high, in the sense that it is twice the median housing-expense to income ratio. With this same criterion, the cost of the most mandatory car journeys is high for 10% of households, in relation to their budgets. In all, 22% of households (i.e. 5.9 million) are experiencing energy vulnerability for one or other of the items of consumption, and 3% of households (i.e. 700 000) are vulnerable for both items. The risk of vulnerability varies over national territory, with differences depending on the items of expenditure considered: climate is the primary factor where disparity in housing-related vulnerability is concerned, whereas the predominant factor for travel is distance from urban centres

  5. Dispersed, Decentralized and Renewable Energy Sources: Alternatives to National Vulnerability and War.

    Science.gov (United States)

    1980-12-01

    U.S. imports a major portion from the Middle East, including Iraq, Saudi Arabia. the Arab Emirates, Kuwait, Qatar . Oman, Bahrain, Turkey and Yemen... aquifers , or fully depleted oil and gas wells. The average capacity of underground storage pools is about nineteen billion cubic feet. In 1978, there...heating demands. 4 3 Aquifers are being considered for thermal energy storage. The ground water stored in aquifers is subject to geothermal radiation

  6. Climate and Water Vulnerability of the US Electricity Grid Under High Penetrations of Renewable Energy

    Science.gov (United States)

    Macknick, J.; Miara, A.; O'Connell, M.; Vorosmarty, C. J.; Newmark, R. L.

    2017-12-01

    The US power sector is highly dependent upon water resources for reliable operations, primarily for thermoelectric cooling and hydropower technologies. Changes in the availability and temperature of water resources can limit electricity generation and cause outages at power plants, which substantially affect grid-level operational decisions. While the effects of water variability and climate changes on individual power plants are well documented, prior studies have not identified the significance of these impacts at the regional systems-level at which the grid operates, including whether there are risks for large-scale blackouts, brownouts, or increases in production costs. Adequately assessing electric grid system-level impacts requires detailed power sector modeling tools that can incorporate electric transmission infrastructure, capacity reserves, and other grid characteristics. Here, we present for the first time, a study of how climate and water variability affect operations of the power sector, considering different electricity sector configurations (low vs. high renewable) and environmental regulations. We use a case study of the US Eastern Interconnection, building off the Eastern Renewable Generation Integration Study (ERGIS) that explored operational challenges of high penetrations of renewable energy on the grid. We evaluate climate-water constraints on individual power plants, using the Thermoelectric Power and Thermal Pollution (TP2M) model coupled with the PLEXOS electricity production cost model, in the context of broader electricity grid operations. Using a five minute time step for future years, we analyze scenarios of 10% to 30% renewable energy penetration along with considerations of river temperature regulations to compare the cost, performance, and reliability tradeoffs of water-dependent thermoelectric generation and variable renewable energy technologies under climate stresses. This work provides novel insights into the resilience and

  7. Vulnerability Assessment and Resiliency Planning: The National Renewable Energy Laboratory's Process and Best Practices; May 23, 2014 - June 5, 2015

    Energy Technology Data Exchange (ETDEWEB)

    Vogel, J. [Abt Environmental Research, Boulder, CO (United States); Renfrow, S. [Abt Environmental Research, Boulder, CO (United States)

    2016-02-19

    The National Renewable Energy Laboratory (NREL) is a U.S. Department of Energy (DOE) research laboratory that employs more than 2,500 people. The laboratory focuses on renewable energy and energy-efficiency research and has two campuses along the Front Range of Colorado. In 2014, NREL worked with Abt Environmental Research (then called Stratus Consulting Inc.) to develop a vulnerability assessment and resiliency action plan as part of NREL's Climate Change Resiliency and Preparedness (CCRP) project. This guide describes the process that NREL undertook during this project. NREL used a participatory approach to vulnerability assessment and resiliency planning that emphasized organizational context, building internal capacity, and the application of climate science in a practical and actionable manner.

  8. High-resolution integration of water, energy, and climate models to assess electricity grid vulnerabilities to climate change

    Science.gov (United States)

    Meng, M.; Macknick, J.; Tidwell, V. C.; Zagona, E. A.; Magee, T. M.; Bennett, K.; Middleton, R. S.

    2017-12-01

    The U.S. electricity sector depends on large amounts of water for hydropower generation and cooling thermoelectric power plants. Variability in water quantity and temperature due to climate change could reduce the performance and reliability of individual power plants and of the electric grid as a system. While studies have modeled water usage in power systems planning, few have linked grid operations with physical water constraints or with climate-induced changes in water resources to capture the role of the energy-water nexus in power systems flexibility and adequacy. In addition, many hydrologic and hydropower models have a limited representation of power sector water demands and grid interaction opportunities of demand response and ancillary services. A multi-model framework was developed to integrate and harmonize electricity, water, and climate models, allowing for high-resolution simulation of the spatial, temporal, and physical dynamics of these interacting systems. The San Juan River basin in the Southwestern U.S., which contains thermoelectric power plants, hydropower facilities, and multiple non-energy water demands, was chosen as a case study. Downscaled data from three global climate models and predicted regional water demand changes were implemented in the simulations. The Variable Infiltration Capacity hydrologic model was used to project inflows, ambient air temperature, and humidity in the San Juan River Basin. Resulting river operations, water deliveries, water shortage sharing agreements, new water demands, and hydroelectricity generation at the basin-scale were estimated with RiverWare. The impacts of water availability and temperature on electric grid dispatch, curtailment, cooling water usage, and electricity generation cost were modeled in PLEXOS. Lack of water availability resulting from climate, new water demands, and shortage sharing agreements will require thermoelectric generators to drastically decrease power production, as much as 50

  9. Vulnerability of the economy to the potential disturbances of energy supply: A logic-based model with application to the case of China

    International Nuclear Information System (INIS)

    Gnansounou, Edgard; Dong Jun

    2010-01-01

    The disturbances of energy supply that may result from both external and domestic events create a significant threat for national economy due to potential impacts on the productivity, employment and overall economic growth. Building scenarios of the economy's vulnerability to these disturbances is delicate because of the significant number of interrelated factors that should be taken into consideration. In this paper, a logic-based model (LBM) is developed, which allows for defining, exploring and assessing the determinants and the indicators of the economy's vulnerability related to the energy supply disturbances within a coherent scenarios assessment framework. The proposed model is illustrated with the case of China. After developing the general framework, three particular scenarios are investigated. Based on the case study, the performance and limitations of the model are analyzed, and its ability to evaluate national energy policies is discussed. Finally, some recommendations for further improvements are made.

  10. Vulnerability of the economy to the potential disturbances of energy supply. A logic-based model with application to the case of China

    Energy Technology Data Exchange (ETDEWEB)

    Gnansounou, Edgard [Ecole Polytechnique Federale de Lausanne (EPFL), Station 18, CH-1015, Lausanne (Switzerland); Dong, Jun [North China Electric Power University, 102206 Beijing (China)

    2010-06-15

    The disturbances of energy supply that may result from both external and domestic events create a significant threat for national economy due to potential impacts on the productivity, employment and overall economic growth. Building scenarios of the economy's vulnerability to these disturbances is delicate because of the significant number of interrelated factors that should be taken into consideration. In this paper, a logic-based model (LBM) is developed, which allows for defining, exploring and assessing the determinants and the indicators of the economy's vulnerability related to the energy supply disturbances within a coherent scenarios assessment framework. The proposed model is illustrated with the case of China. After developing the general framework, three particular scenarios are investigated. Based on the case study, the performance and limitations of the model are analyzed, and its ability to evaluate national energy policies is discussed. Finally, some recommendations for further improvements are made. (author)

  11. Vulnerability of the economy to the potential disturbances of energy supply: A logic-based model with application to the case of China

    Energy Technology Data Exchange (ETDEWEB)

    Gnansounou, Edgard, E-mail: edgard.gnansounou@epfl.c [Ecole Polytechnique Federale de Lausanne (EPFL), Station 18, CH-1015, Lausanne (Switzerland); Dong Jun [North China Electric Power University, 102206 Beijing (China)

    2010-06-15

    The disturbances of energy supply that may result from both external and domestic events create a significant threat for national economy due to potential impacts on the productivity, employment and overall economic growth. Building scenarios of the economy's vulnerability to these disturbances is delicate because of the significant number of interrelated factors that should be taken into consideration. In this paper, a logic-based model (LBM) is developed, which allows for defining, exploring and assessing the determinants and the indicators of the economy's vulnerability related to the energy supply disturbances within a coherent scenarios assessment framework. The proposed model is illustrated with the case of China. After developing the general framework, three particular scenarios are investigated. Based on the case study, the performance and limitations of the model are analyzed, and its ability to evaluate national energy policies is discussed. Finally, some recommendations for further improvements are made.

  12. Energy climate study. Energy assessment, Greenhouse gas emission assessment, Analysis of vulnerability to climate change, Courses of mitigation and adaptation actions. Full report + Appendices + Restitution of the Energy-Climate Study, September 17, 2012

    International Nuclear Information System (INIS)

    2012-01-01

    After a brief presentation of Le Mans region, a presentation of the study (context, scope, methodology), and a recall of challenges related to energy and to climate, this study reports a situational analysis and a discussion of development perspectives for energy production on the concerned territory, an assessment of energy consumptions and of greenhouse gas emissions by the different sectors, and a study of territory vulnerability to climate change (methodology, territory characteristics, climate scenarios, vulnerability assessment). It discusses lessons learned from energy and greenhouse gas emission assessments (social-economic stakes, territory strengths and weaknesses, perspectives for action). It discusses the implementation of these issues within a territorial planning document, and the perspective of elaboration of a territorial climate energy plan. An appendix reports an assessment of the potential of development of the different renewable energies (hydroelectric, solar photovoltaic and thermal, wind, wood, methanization, and other processes like waste valorisation, geothermal, and heat networks). Another appendix reports the precise assessment of greenhouse gas emissions on the territory. The next appendix proposes detailed descriptions of scenarios for the implementation of the issue of greenhouse gas emissions within the territorial planning document. The last appendix contains Power Point presentations of the study

  13. Cloning, expression and characterisation of P450-Hal1 (CYP116B62) from Halomonas sp. NCIMB 172: A self-sufficient P450 with high expression and diverse substrate scope.

    Science.gov (United States)

    Porter, Joanne L; Sabatini, Selina; Manning, Jack; Tavanti, Michele; Galman, James L; Turner, Nicholas J; Flitsch, Sabine L

    2018-06-01

    Cytochrome P450 monooxygenases are able to catalyse a range of synthetically challenging reactions ranging from hydroxylation and demethylation to sulfoxidation and epoxidation. As such they have great potential for biocatalytic applications but are underutilised due to often-poor expression, stability and solubility in recombinant bacterial hosts. The use of self-sufficient P450 s with fused haem and reductase domains has already contributed heavily to improving catalytic efficiency and simplifying an otherwise more complex multi-component system of P450 and redox partners. Herein, we present a new addition to the class VII family with the cloning, sequencing and characterisation of the self-sufficient CYP116B62 Hal1 from Halomonas sp. NCIMB 172, the genome of which has not yet been sequenced. Hal1 exhibits high levels of expression in a recombinant E. coli host and can be utilised from cell lysate or used in purified form. Hal1 favours NADPH as electron donor and displays a diverse range of activities including hydroxylation, demethylation and sulfoxidation. These properties make Hal1 suitable for future biocatalytic applications or as a template for optimisation through engineering. Copyright © 2018 Elsevier Inc. All rights reserved.

  14. Italian energy economics in an integrated Europe

    International Nuclear Information System (INIS)

    Zorzoli, G.B.

    1992-01-01

    Whereas the comparison of 1973-1990 statistical data representing national dependency on foreign energy supplies reflects the overall successful effort by the major Common Market countries to reduce their dependencies, it also evidences that Italy has in fact increased its dependency on foreign energy supplies by 1% to a worrisome 83% European high. Further analysis of the Italian energy situation reveals that, although in recent years energy strategies have been implemented to diversify the mix of energy sources and suppliers, the only diversification Italy has made is the substitution of a portion of its petroleum imports, used predominantly to meet rapidly rising power demand, with natural gas imports. Thus, the degree of vulnerability of this nation's energy supply base has not been altered significantly. It is now hoped that greater cooperation between Italy and its more energy self-sufficient European neighbours, as called for in the new European free trade marketing strategies, as well as, attempts to create and enforce new European environmental standards, will help and induce Italy to lessen its energy supply vulnerability

  15. Energy intensities and the impact of high energy prices on producing and consuming sectors in Malaysia

    OpenAIRE

    Klinge Jacobsen, Henrik

    2007-01-01

    The increase in oil prices has put pressure on the global economy. Even economies that have a high degree of self-sufficiency concerning oil products are experiencing rising production costs and price increases for households energy use. Therefore, changes in energy policies are under consideration for countries highly dependent on imported energy as well as countries with a high degree of self-sufficiency. Examination of dependence on cheap energy sources for economic growth in different...

  16. Energy intensities and the impact of high energy prices on producing and consuming sectors in Malaysia

    OpenAIRE

    Klinge Jacobsen, Henrik

    2007-01-01

    The increase in oil prices has put pressure on the global economy. Even economies that have a high degree of self-sufficiency concerning oil products are experiencing rising production costs and price increases for households energy use. Therefore, changes in energy policies are under consideration for countries highly dependent on imported energy as well as countries with a high degree of self-sufficiency. Examination of dependence on cheap energy sources for economic growth in different eco...

  17. Redistributing vulnerabilities

    DEFF Research Database (Denmark)

    Seeberg, Jens; Padmawati, Retna Siwi

    2015-01-01

    It is widely accepted that the social distribution of vulnerability in a given society may turn hazardous events into disasters. This distributional approach draws attention to continuities that explain catastrophes by virtue of the workings of society prior to the event. In this paper, we draw...... attention to the social processes whereby vulnerability is modified and renegotiated during the post-disaster period where resources for disaster alleviation and reconstruction enter local communities. Specifically, we explore the social dynamics of house damage classification in the wake of the 2006...... Central Java earthquake, and we explore relations between citizens and the state during post-disaster house reconstruction. We argue that disastrous outcomes of catastrophic events do not follow pre-existing fault lines of vulnerability in a simple or predictable manner, and that the social process...

  18. Assessing vulnerability

    NARCIS (Netherlands)

    Hellmuth, M.; Kabat, P.

    2003-01-01

    It is in the shantytowns and rural villages of the Third World that floods and droughts strike hardest and deepest. Vulnerability to the vagaries of climate depends not only on location, but, crucially, on the capacity of the victims to cope with the impacts of extreme weather. So, where are the

  19. Plutonium Vulnerability Management Plan

    International Nuclear Information System (INIS)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy's response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department's Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B

  20. Vulnerable Hunter

    OpenAIRE

    Md.Asha Begum; Y.VishnuPriya; V.ManoranjanBabu; ,O.Srinivasu

    2016-01-01

    This project "VULNERABLE HUNTER" application main aim is to detect risk in our mobile applications. This application contains modules like Fetch Application, Generate Score, Uninstall and Display Graph. Through this application it detects risk so that this application is very useful to smart phone users Now-a-days so many people are using smart phones and people are crazy about new apps. But by installing all the applications into our mobile may reduce its performance. Some apps c...

  1. Advancing an energy justice perspective of fuel poverty: Household vulnerability and domestic retrofit policy in the United Kingdom

    OpenAIRE

    Gillard, Ross; Snell, Carolyn Jane; Bevan, Mark Alistair

    2017-01-01

    The concept of energy justice is increasingly relevant in industrialised countries, where policymakers face significant challenges to establishing affordable, low-carbon and secure energy systems. This emerging field has brought philosophies of ethics and principles of social justice to bear on a range of contemporary energy issues. More inter-disciplinary and applied endeavours are now needed to take this field forward. One such application is to the issue of fuel poverty and the challenge o...

  2. Transforming vulnerability.

    Science.gov (United States)

    Jones, Patricia S; Zhang, Xinwei Esther; Meleis, Afaf I

    2003-11-01

    Asian American immigrant women engaged in filial caregiving are at special risk for health problems due to complex contextual factors related to immigration, cultural traditions, and role transition. This study examines the experience of two groups of immigrant Asian American women who are caring for older parents. A total of 41 women (22 Chinese American and 19 Filipino American) were interviewed in a study based on Strauss and Corbin's grounded theory methodology. The women were determined to be loyal to their traditional culture, which included strong filial values, while adapting to a new culture. Through the struggle of meeting role expectations and coping with paradox, the women mobilized personal and family resources to transform vulnerability into strength and well-being.

  3. Applicability of vulnerability maps

    International Nuclear Information System (INIS)

    Andersen, L.J.; Gosk, E.

    1989-01-01

    A number of aspects to vulnerability maps are discussed: the vulnerability concept, mapping purposes, possible users, and applicability of vulnerability maps. Problems associated with general-type vulnerability mapping, including large-scale maps, universal pollutant, and universal pollution scenario are also discussed. An alternative approach to vulnerability assessment - specific vulnerability mapping for limited areas, specific pollutant, and predefined pollution scenario - is suggested. A simplification of the vulnerability concept is proposed in order to make vulnerability mapping more objective and by this means more comparable. An extension of the vulnerability concept to the rest of the hydrogeological cycle (lakes, rivers, and the sea) is proposed. Some recommendations regarding future activities are given

  4. Linking top-down and bottom-up approaches for assessing the vulnerability of a 100 % renewable energy system in Northern-Italy

    Science.gov (United States)

    Borga, Marco; Francois, Baptiste; Hingray, Benoit; Zoccatelli, Davide; Creutin, Jean-Dominique; brown, Casey

    2016-04-01

    Due to their variable and un-controllable features, integration of Variable Renewable Energies (e.g. solar-power, wind-power and hydropower, denoted as VRE) into the electricity network implies higher production variability and increased risk of not meeting demand. Two approaches are commonly used for assessing this risk and especially its evolution in a global change context (i.e. climate and societal changes); top-down and bottom-up approaches. The general idea of a top-down approach is to drive analysis of global change or of some key aspects of global change on their systems (e.g., the effects of the COP 21, of the deployment of Smart Grids, or of climate change) with chains of loosely linked simulation models within a predictive framework. The bottom-up approach aims to improve understanding of the dependencies between the vulnerability of regional systems and large-scale phenomenon from knowledge gained through detailed exploration of the response to change of the system of interest, which may reveal vulnerability thresholds, tipping points as well as potential opportunities. Brown et al. (2012) defined an analytical framework to merge these two approaches. The objective is to build, a set of Climate Response Functions (CRFs) putting in perspective i) indicators of desired states ("success") and undesired states ("failure") of a system as defined in collaboration with stakeholders 2) exhaustive exploration of the effects of uncertain forcings and imperfect system understanding on the response of the system itself to a plausible set of possible changes, implemented a with multi-dimensionally consistent "stress test" algorithm, and 3) a set "ex post" hydroclimatic and socioeconomic scenarios that provide insight into the differential effectiveness of alternative policies and serve as entry points for the provision of climate information to inform policy evaluation and choice. We adapted this approach for analyzing a 100 % renewable energy system within a region

  5. Modeling the intersections of Food, Energy, and Water in climate-vulnerable Ethiopia with an application to small-scale irrigation

    Science.gov (United States)

    Zhang, Y.; Sankaranarayanan, S.; Zaitchik, B. F.; Siddiqui, S.

    2017-12-01

    Africa is home to some of the most climate vulnerable populations in the world. Energy and agricultural development have diverse impacts on the region's food security and economic well-being from the household to the national level, particularly considering climate variability and change. Our ultimate goal is to understand coupled Food-Energy-Water (FEW) dynamics across spatial scales in order to quantify the sensitivity of critical human outcomes to FEW development strategies in Ethiopia. We are developing bottom-up and top-down multi-scale models, spanning local, sub-national and national scales to capture the FEW linkages across communities and climatic adaptation zones. The focus of this presentation is the sub-national scale multi-player micro-economic (MME) partial-equilibrium model with coupled food and energy sector for Ethiopia. With fixed large-scale economic, demographic, and resource factors from the national scale computable general equilibrium (CGE) model and inferences of behavior parameters from the local scale agent-based model (ABM), the MME studies how shocks such as drought (crop failure) and development of resilience technologies would influence FEW system at a sub-national scale. The MME model is based on aggregating individual optimization problems for relevant players. It includes production, storage, and consumption of food and energy at spatially disaggregated zones, and transportation in between with endogenously modeled infrastructure. The aggregated players for each zone have different roles such as crop producers, storage managers, and distributors, who make decisions according to their own but interdependent objective functions. The food and energy supply chain across zones is therefore captured. Ethiopia is dominated by rain-fed agriculture with only 2% irrigated farmland. Small-scale irrigation has been promoted as a resilience technology that could potentially play a critical role in food security and economic well-being in

  6. Classification of vulnerability information

    International Nuclear Information System (INIS)

    Gibson, W.G.

    1984-01-01

    The current upgrading of security measures at sensitive Department of Energy (DOE) facilities reflects the continuing concern over possible terrorist and other criminal acts against these facilities. Security reviews are periodically conducted at DOE facilities, deficiencies are identified, and corrective actions are recommended. While security upgrades are initiated as soon as possible, the process of securing funding and the construction or other activities necessary to complete upgrades can cause delays in correcting security vulnerabilities. Details of security weaknesses at important DOE facilities are classified in order to deny valuable information to terrorists and other malefactors

  7. Information and communication technologies for promoting and sustaining quality of life, health and self-sufficiency in ageing societies--outcomes of the Lower Saxony Research Network Design of Environments for Ageing (GAL).

    Science.gov (United States)

    Haux, Reinhold; Hein, Andreas; Kolb, Gerald; Künemund, Harald; Eichelberg, Marco; Appell, Jens-E; Appelrath, H-Jürgen; Bartsch, Christian; Bauer, Jürgen M; Becker, Marcus; Bente, Petra; Bitzer, Jörg; Boll, Susanne; Büsching, Felix; Dasenbrock, Lena; Deparade, Riana; Depner, Dominic; Elbers, Katharina; Fachinger, Uwe; Felber, Juliane; Feldwieser, Florian; Forberg, Anne; Gietzelt, Matthias; Goetze, Stefan; Gövercin, Mehmet; Helmer, Axel; Herzke, Tobias; Hesselmann, Tobias; Heuten, Wilko; Huber, Rainer; Hülsken-Giesler, Manfred; Jacobs, Gerold; Kalbe, Elke; Kerling, Arno; Klingeberg, Timo; Költzsch, Yvonne; Lammel-Polchau, Christopher; Ludwig, Wolfram; Marschollek, Michael; Martens, Birger; Meis, Markus; Meyer, Eike Michael; Meyer, Jochen; Meyer Zu Schwabedissen, Hubertus; Moritz, Niko; Müller, Heiko; Nebel, Wolfgang; Neyer, Franz J; Okken, Petra-Karin; Rahe, Julia; Remmers, Hartmut; Rölker-Denker, Lars; Schilling, Meinhard; Schöpke, Birte; Schröder, Jens; Schulze, Gisela C; Schulze, Mareike; Siltmann, Sina; Song, Bianying; Spehr, Jens; Steen, Enno-Edzard; Steinhagen-Thiessen, Elisabeth; Tanschus, Nele-Marie; Tegtbur, Uwe; Thiel, Andreas; Thoben, Wilfried; van Hengel, Peter; Wabnik, Stefan; Wegel, Sandra; Wilken, Olaf; Winkelbach, Simon; Wist, Thorben; Wolf, Klaus-Hendrik; Wolf, Lars; Zokoll-van der Laan, Melanie

    2014-01-01

    Many societies across the world are confronted with demographic changes, usually related to increased life expectancy and, often, relatively low birth rates. Information and communication technologies (ICT) may contribute to adequately support senior citizens in aging societies with respect to quality of life and quality and efficiency of health care processes. For investigating and for providing answers on whether new information and communication technologies can contribute to keeping, or even improving quality of life, health and self-sufficiency in ageing societies through new ways of living and new forms of care, the Lower Saxony Research Network Design of Environments for Ageing (GAL) had been established as a five years research project, running from 2008 to 2013. Ambient-assisted living (AAL) technologies in personal and home environments were especially important. In this article we report on the GAL project, and present some of its major outcomes after five years of research. We report on major challenges and lessons learned in running and organizing such a large, inter- and multidisciplinary project and discuss GAL in the context of related research projects. With respect to research outcomes, we have, for example, learned new knowledge about multimodal and speech-based human-machine-interaction mechanisms for persons with functional restrictions, and identified new methods and developed new algorithms for identifying activities of daily life and detecting acute events, particularly falls. A total of 79 apartments of senior citizens had been equipped with specific "GAL technology", providing new insights into the use of sensor data for smart homes. Major challenges we had to face were to deal constructively with GAL's highly inter- and multidisciplinary aspects, with respect to research into GAL's application scenarios, shifting from theory and lab experimentation to field tests, and the complexity of organizing and, in our view, successfully managing

  8. Response of Living Shorelines to Wave Energy and Sea Level rise: Short-term Resilience and Long-term Vulnerability in North Carolina

    Science.gov (United States)

    Currin, C.; Davis, J.

    2017-12-01

    A decade of research and monitoring of Living Shoreline sites in North Carolina identifies both resilient and vulnerable features of this approach to estuarine shoreline stabilization. We used a wave energy model to calculate representative wave energy along 1500 miles of estuarine shoreline, and observed a linear, negative relationship between wind-wave energy and the width of fringing salt marshes. Proximity to navigation channels (boat wakes) further reduced fringing marsh width. These results provide guidance for Living Shoreline design alternatives. Surface elevation tables (SETs) deployed at the lower edge of both natural fringing marshes and `Living Shoreline' marsh-sill sites demonstrated that while natural marshes were losing surface elevation at an average rate of 6 mm y-1, marsh surface elevation at Living Shoreline sites increased at an average of 3 mm y-1. Marsh vegetation at the lower edge of natural sites exhibited a decline in biomass, while Living Shoreline sites exhibited an increase in upper marsh species and an extension of lower marsh into previous mudflat habitat. These changes provide Living Shoreline (marsh-sill) sites with added resilience to sea level rise, though decreased inundation alters the delivery of other ecosystem services (fish habitat, nutrient cycling). North Carolina lagoonal estuaries have low suspended sediment supply and low topography, and modeling predicts that landward transgression is the primary means by which salt marsh acreage can be maintained under moderate to high sea level rise scenarios. In this region, bank erosion can be important source of sediment to wetland habitats. Further, the association of built infrastructure with Living Shoreline sites portends a future scenario of coastal squeeze, as marsh migration landward will be inhibited.

  9. Energy challenges in Asia

    International Nuclear Information System (INIS)

    Niquet, V.

    2007-01-01

    Energy challenges represent one of the most important security paradigms in the Asia Pacific region where you have a mixture of growing energy dependency, fuelled by high economic growth, the emergence of new major players like China and India, and a quasi-complete absence of regional regulatory mechanisms to tackle the challenges in a multilateral way. These challenges mostly concern Japan and China, where crucial energy issues are aggravated by power rivalry, historical and ideological issues, and a lack of both economic and political harmony between them. Neither countries are self sufficient in terms of energy needs. This can lead to a shared analysis and common approaches regarding Japan and China concerning this issue. Their cases are. however very different and the solutions applied are related to different world views that are not easily reconcilable. Both countries share common objectives: both want security and stable supply. But there are also big divergences and these divergences could be new sources of conflict and misunderstanding between Tokyo and Beijing. One of the main differences is history related. Both China and Japan are uneasy regarding outside energy dependency. In Japan, memories of the pre-war oil embargo have not disappeared. The oil shocks of the 70's renewed this uneasiness. However, Japan's outside dependency is not new. Tokyo has learned to live with it, finding a system to alleviate this vulnerability in cooperation with its partners, multilateral institutions like the International Energy Agency (IEA). China's outside dependency is new. The country's dependency on oil, which began in 1993, is particularly challenging since the principles of independence, non interference and military autonomy, principles at the core of Maoist foreign strategy, did not completely disappear in spite of China's new policy of reform and opening up. China's leadership, even the fourth generation, did not forget its isolation during the 60's and 70's

  10. a survey of security vulnerabilities in wireless sensor networks

    African Journals Online (AJOL)

    user

    which primarily are their stringent energy constraints to which sensing nodes typify and security vulnerabilities. Security concerns ... Keywords: Sensors, Wireless, Network, Vulnerabilities, Security. 1. .... If the node detects a transmission.

  11. Possible consequences of climate change on the Swedish energy sector - impacts, vulnerability and adaptation; Taenkbara konsekvenser foer energisektorn av klimatfoeraendringar. Effekter, saarbarhet och anpassning

    Energy Technology Data Exchange (ETDEWEB)

    Gode, Jenny; Axelsson, Johan; Eriksson, Sara; Holmgren, Kristina; Hovsenius, Gunnar; Kjellstroem, Erik; Larsson, Per; Lundstroem, Love; Persson, Gunn

    2007-06-15

    The events of recent years clearly demonstrate the far-reaching consequences of extreme weather situations on the energy system, particularly in the case of severe damage to transmission lines in connection with violent storms. Many climate researchers predict an increase in extreme weather events. Against this background, in 2005 Elforsk initiated this project where the aim has been to examine how climate change can affect plant operation, production conditions and energy usage patterns, how undesirable consequences can be predicted and what long-term measures may be necessary. Another central objective has been to bring about a dialogue between climate researchers, energy consultants/engineers and buyers for the energy industry. The inclusion of both positive and negative consequences has been an important ambition of the project. One key aspect of the project has been to develop climate scenarios for the next 20-25 years that describe possible changes in climate variables with relevance for the energy system. Based on these and literature studies, contact with experts and internal assessments, an analysis has been made of the possible impacts on hydropower, wind power, biofuel supply, natural gas supply, the power transmission network and energy usage. The project findings, which have also been discussed at a workshop with representatives from the energy industry, did not reveal any acute need for adaptation aside from those measures already being taken, for example to make the transmission system less vulnerable to weather conditions. Furthermore, the results indicate increased production potential for both hydropower and wind power. The production potential for hydropower stations from the Dalaelven River northwards would appear to increase by 2-10%. Estimates for the southern watercourses are less certain, but the production potential may decrease. Since around 80% of the country's hydropower is produced in the northern watercourses, this indicates an

  12. spatially identifying vulnerable areas

    African Journals Online (AJOL)

    The model structure is aimed at understanding the critical vulnerable factors that ... This paper incorporates multiple criteria and rank risk factors. ..... In terms of quantifying vulnerable areas within the country, the analysis is done based on 9 ...

  13. Fuzzing and Vulnerabilities Search

    OpenAIRE

    Stanislav Evgenyevich Kirillov; Nikolai Petrovich Lavrentiev

    2013-01-01

    Fuzzing for vulnerabilities can be very effective if we know the input data format. This work contains description of network message format recovery algorithm and the usage of restored data model in fuzzing and vulnerabilities search.

  14. Fuzzing and Vulnerabilities Search

    Directory of Open Access Journals (Sweden)

    Stanislav Evgenyevich Kirillov

    2013-02-01

    Full Text Available Fuzzing for vulnerabilities can be very effective if we know the input data format. This work contains description of network message format recovery algorithm and the usage of restored data model in fuzzing and vulnerabilities search.

  15. New approach to analyzing vulnerability

    International Nuclear Information System (INIS)

    O'Callaghan, P.B.; Carlson, R.L.; Riedeman, G.W.

    1986-01-01

    The Westinghouse Hanford Company (WHC) has recently completed construction of the Fuel Cycle Plant (FCP) at Richland, Washington. At start-up the facility will fabricate driver fuel for the Fast Flux Test Facility in the Secure Automated Fabrication line. After construction completion, but before facility certification, the Department of Energy (DOE) Richland Operation Office requested that a vulnerability analysis be performed which assumed multiple insiders as a threat to the security system. A unique method of analyzing facility vulnerabilities was developed at the Security Applications Center (SAC), which is managed by WHC for DOE. The method that was developed verifies a previous vulnerability assessment, as well as introducing a modeling technique which analyzes security alarms in relation to delaying factors and possible insider activities. With this information it is possible to assess the relative strength or weakness of various possible routes to and from a target within a facility

  16. What Does Vulnerability Mean?

    Science.gov (United States)

    Parley, Fiona F

    2011-01-01

    Protection of those deemed vulnerable has received increasing attention since 2000. This article reports on care staff views of vulnerability using original data from a research study (Parley. "Vulnerability and abuse: an exploration of views of care staff working with people who have learning disabilities," PhD Thesis, 2007) in which care staff…

  17. Distributed Generation to Counter Grid Vulnerability

    National Research Council Canada - National Science Library

    Nerad, Anton H

    2007-01-01

    In this paper I examine how the United States can best defend against the interruption of critical electrical energy by hostile acts, identify and examine some of the vulnerabilities to our nation's...

  18. Leave no hour of sunshine unexploited. Free of energy costs and crisis proofed - energy sulf-sufficient buildings; Keine Sonnenstunde ungenutzt lassen. Energiekostenfrei und krisensicher - energieautarke Haeuser

    Energy Technology Data Exchange (ETDEWEB)

    Leukefeld, Timo [Helma Eigenheimbau AG, Lehrte (Germany). Projektgruppe ' das EnergieAutarke Haus' ; Firma Timo Leukefeld - Energie verbindet, Freiberg in Sachsen (Germany).; Prutti, Corina [das komm.buero, Muenchen (Germany)

    2013-06-01

    Living, heating and mobility provide the biggest expenses in the budget for the most people. Furthermore, the salaries from pension funds and retirement funds decrease. The purchasing power of older people decreases. Houses that largely are energetically self-sufficient as for example the energy self-sufficient house are a solution of this problem. The biggest costs just fall away for residents of these houses. These residents are independent from costs for fuel oil, gas and electricity.

  19. Cities ready for energy crisis : Building urban energy resilience

    NARCIS (Netherlands)

    Van den Dobbelsteen, A.A.J.F.; Keeffe, G.; Tillie, N.M.J.D.

    2013-01-01

    Various sources indicate that threats to modern cities lie in the availability of essential streams, among which energy. Most cities are strongly reliant on fossil fuels; not one case of a fully self-sufficient city is known. Engineering resilience is the rate at which a system returns to a single

  20. VULNERABILITY OF COMPANIES

    Directory of Open Access Journals (Sweden)

    ARMEAN ANDREEA

    2013-06-01

    Full Text Available In present, the study of vulnerability of companies is increasing in every field due to the unstable economic environment influences. The object of this research is to define and identify vulnerabilities of companies and the establishment of evaluation methods at their level. This article emphasizes the importance and usefulness of one of the best known model in this way, from our point of view, namely Băileşteanu, Negrila Pattern. This pattern covers both external factors and internal ones, that increase vulnerabilities of companies, and fit the companies in which the state of vulnerability are (vitality, viability, vulnerability, high vulnerability, difficulty and high difficulty, with a matrix. The result of the research is that any company belonging to any field, can be analyzed using this model, and assigned to one of the conditions defined within.

  1. Automated Software Vulnerability Analysis

    Science.gov (United States)

    Sezer, Emre C.; Kil, Chongkyung; Ning, Peng

    Despite decades of research, software continues to have vulnerabilities. Successful exploitations of these vulnerabilities by attackers cost millions of dollars to businesses and individuals. Unfortunately, most effective defensive measures, such as patching and intrusion prevention systems, require an intimate knowledge of the vulnerabilities. Many systems for detecting attacks have been proposed. However, the analysis of the exploited vulnerabilities is left to security experts and programmers. Both the human effortinvolved and the slow analysis process are unfavorable for timely defensive measure to be deployed. The problem is exacerbated by zero-day attacks.

  2. Vulnerability of complex networks

    Science.gov (United States)

    Mishkovski, Igor; Biey, Mario; Kocarev, Ljupco

    2011-01-01

    We consider normalized average edge betweenness of a network as a metric of network vulnerability. We suggest that normalized average edge betweenness together with is relative difference when certain number of nodes and/or edges are removed from the network is a measure of network vulnerability, called vulnerability index. Vulnerability index is calculated for four synthetic networks: Erdős-Rényi (ER) random networks, Barabási-Albert (BA) model of scale-free networks, Watts-Strogatz (WS) model of small-world networks, and geometric random networks. Real-world networks for which vulnerability index is calculated include: two human brain networks, three urban networks, one collaboration network, and two power grid networks. We find that WS model of small-world networks and biological networks (human brain networks) are the most robust networks among all networks studied in the paper.

  3. DOE contractor vulnerability analysis: DPA or MAIT

    International Nuclear Information System (INIS)

    Six, D.E.; Nichols, D.H.

    1980-01-01

    Two vulnerability analysis techniques, Diversion Path Analysis (DPA) and Matrix Analysis of the Insider Threat (MAIT), were applied by EG and G Idaho, Inc. Safeguards and Security to the same item accountable SNM storage area at INEL. Technical and cost data for each methodology were collected and compared. A recommendation that MAIT be utilized for future vulnerability analyses of item accountable SNM storage and use areas operated by EG and G Idaho for DOE-ID resulted. Unclassified results of the two techniques and MAIT/DPA technical and cost comparisons will be presented which show that MAIT can be used for vulnerability analyses to comply with Department of Energy (DOE) requirements

  4. Yerington Paiute Tribe Energy Plan Version 1

    Energy Technology Data Exchange (ETDEWEB)

    Consulting, BB9 [BB9 Consulting; Director, Environmental

    2014-04-01

    The Yerington Paiute Tribe has made energy management and planning a priority. The Tribal Council has recognized that energy is an important component of their goal of self-sufficiency. Recognizing energy development as a component of the Tribe’s natural resources provides for needed economic development.A number of priorities have been identified for energy development. These range from immediate housing needs such as weatherization and solar to interest in energy as economic development.

  5. County Population Vulnerability

    Data.gov (United States)

    City and County of Durham, North Carolina — This layer summarizes the social vulnerability index for populations within each county in the United States at scales 1:3m and below. It answers the question...

  6. Web Application Vulnerabilities

    OpenAIRE

    Yadav, Bhanu

    2014-01-01

    Web application security has been a major issue in information technology since the evolvement of dynamic web application. The main objective of this project was to carry out a detailed study on the top three web application vulnerabilities such as injection, cross site scripting, broken authentication and session management, present the situation where an application can be vulnerable to these web threats and finally provide preventative measures against them. ...

  7. Selective vulnerability in brain hypoxia

    DEFF Research Database (Denmark)

    Cervos-Navarro, J.; Diemer, Nils Henrik

    1991-01-01

    Neuropathology, selective vulnerability, brain hypoxia, vascular factors, excitotoxicity, ion homeostasis......Neuropathology, selective vulnerability, brain hypoxia, vascular factors, excitotoxicity, ion homeostasis...

  8. Quantitative analysis of Indonesia’s reserves and energy security as an evaluation by the nation in facing global competition

    International Nuclear Information System (INIS)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede

    2015-01-01

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy

  9. Quantitative analysis of Indonesia’s reserves and energy security as an evaluation by the nation in facing global competition

    Energy Technology Data Exchange (ETDEWEB)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede, E-mail: gwibawa@chem-eng.its.ac.id [Department of Chemical Engineering, Faculty of Industrial Technology, Sepuluh Nopember Institute of Technology (ITS), Kampus ITS Sukolilo, Surabaya 60111 (Indonesia)

    2015-12-29

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy

  10. Quantitative analysis of Indonesia's reserves and energy security as an evaluation by the nation in facing global competition

    Science.gov (United States)

    Wiratama, Hadi; Yerido, Hezron; Tetrisyanda, Rizki; Ginting, Rizqy R.; Wibawa, Gede

    2015-12-01

    Energy security has become a serious concern for all countries in the world and each country has its own definiton for measuring its energy security. The objective of this study was to measure energy security of Indonesia quantitatively by comparing it with other countries and provide some recommendations for enhancing the energy security. In this study, the database was developed from various sources and was cross-checked to confirm validity of the data. Then the parameters of energy security were defined, where all of data will be processed towards the selected parameters. These parameters (e.g. Primary Energy mix, TPES/capita, FEC/capita, Self Sufficiency, Refining capacity, Overseas Energy Resources, Resources diversification) are the standards used to produce an analysis or evaluation of national energy management. Energy balances for Indonesia and 10 selected countries (USA, Germany, Russia, England, Japan, China, South Korea, Singapore, Thailand and India) were presented from 2009 to 2013. With a base index of 1.0 for Indonesia, calculated energy security index capable of representing Indonesia energy security compared relatively to other countries were also presented and discussed in detail. In 2012, Indonesia security index is ranked 11 from 11 countries, while USA and South Korea are the highest with security index of 3.36 and 2.89, respectively. According to prediction for 2025, Indonesia energy security is ranked 10 from 11 countries with only Thailand has lower security index (0.98). This result shows that Indonesia energy security was vulnerable to crisis and must be improved. Therefore this study proposed some recommendations to improve Indonesia energy security. Indonesia need to increase oil production by constructing new refinery plants, developing infrastructure for energy distribution to reduce the potential of energy shortage and accelerating the utilization of renewable energy to reduce the excessive use of primary energy. From energy policy

  11. The RWE combine - notes on its reorganization and Energy-Department-to-RWE-Energie-AG re-formation

    International Nuclear Information System (INIS)

    1990-01-01

    As the holding in charge of the combine, RWE AG soon will be managing legally self-sufficient controlling companies at its own responsibility. While the Energy Department (electric power, gas, heat, water) will be re-formed to become RWE Energie AG, the newly established RWE Entsorgung AG will be responsible for waste disposal and waste management. (DG) [de

  12. Indonesia's family planning program works toward self-sufficiency.

    Science.gov (United States)

    Kunii, C

    1989-07-01

    Started in 1970, the Indonesian Family Planning Program is doing very well. It is coordinated by the National Family Planning Coordinating Board (BKKBN). Many new acceptors are being enrolled daily. Its aim is to reduce to 1971 fertility rate of 50% in 1990. Strategy factors are listed. The following paper, "BKKBN and the Expanding Role of Private Sector Family Planning Services and Commercial Contraceptive Sales in Indonesia," by Dr. Haryono Suyono is introduced. Another article, "A breakthrough in Family Planning Promotional Strategy," by Mr. Sumarsono is also introduced. This article deals with the marketing aspect of Indonesia's family planning program.

  13. Pathways to Self-Sufficiency: Successful Entrepreneurship for Refugees

    Science.gov (United States)

    Fong, Rowena; Busch, Noel Bridget; Armour, Marilyn; Heffron, Laurie Cook; Chanmugam, Amy

    2007-01-01

    This study examined the successes and challenges of refugee entrepreneurs by interviewing 50 refugees, service providers, and technical assistance providers. Qualitative data analyses revealed that successes and challenges occurred both at the individual and family levels as well as at the community and agency levels. The findings underscore the…

  14. Empowering people. Alleviating poverty through self-sufficiency.

    Science.gov (United States)

    Nahariya, R

    1993-03-01

    Highlights from an interview with Benjamin D. de Leon, who was appointed Presidential Assistant for Social Development in the Philippines in September 1992, are presented. Mr. de Leon's concern for the marginal sectors of society in health, employment, housing, social welfare, and manpower training as well as his goals of poverty alleviation and people empowerment account for this appointment. Duties include formulating a social development agenda; assisting the Social Development Committee of the Cabinet and the National Economic Development Authority (NEDA) in program implementation; and providing weekly information packages about family planning (FP), health, children, women, and the environment. The social development agenda of the Philippine Medium-term Plan (1992-1998) includes employment, income, wages; population, health and nutrition, and family planning; and housing, education, manpower development, social welfare, and community development. The Plan recognizes that poverty is aggravated by rapid population growth, and it strives to ensure that adolescents, military males, high-risk women, and young unmarried couples receive FP information and services from government agencies and nongovernmental organizations. Adequate resources for population and FP as well as recognizing the relationship among population, resources, and the environment are essential to meet the goals of the plan. The present population and FP policy is based on the 1987 Constitution, which spells out responsible parenthood but also rejects abortion as a method of contraception. The official FP program calls for child survival and safe motherhood and accessible, available, and affordable FP services. The Roman Catholic Church opposes the program, since the Church promotes only the rhythm method, but the other religions approve of the program. Some priests and nuns did not object to the promotion of FP. Sufficient financial support from the international community for the Philippine Population and Family Planning Program would also help realize the aspiration that all Filipino children be wanted by their parents and grow up with a sense of discipline and love of country.

  15. Detecting C Program Vulnerabilities

    OpenAIRE

    Anton, Ermakov; Natalia, Kushik

    2011-01-01

    C/C++ language is widely used for developing tools in various applications, in particular, software tools for critical systems are often written in C language. Therefore, the security of such software should be thoroughly tested, i.e., the absence of vulnerabilities has to be confirmed. When detecting C program vulnerabilities static source code analysis can be used. In this paper, we present a short survey of existing software tools for such analysis and show that for some kinds of C code vu...

  16. Rockfall vulnerability assessment for reinforced concrete buildings

    Science.gov (United States)

    Mavrouli, O.; Corominas, J.

    2010-10-01

    The vulnerability of buildings to the impact of rockfalls is a topic that has recently attracted increasing attention in the scientific literature. The quantification of the vulnerability, when based on empirical or heuristic approaches requires data recorded from historical rockfalls, which are not always available. This is the reason why appropriate alternatives are required. The use of analytical and numerical models can be one of them. In this paper, a methodology is proposed for the analytical evaluation of the vulnerability of reinforced concrete buildings. The vulnerability is included in the risk equation by incorporating the uncertainty of the impact location of the rock block and the subsequent damage level. The output is a weighted vulnerability that ranges from 0 to 1 and expresses the potential damage that a rock block causes to a building in function of its velocity and size. The vulnerability is calculated by the sum of the products of the probability of block impact on each element of the building and its associated damage state, the latter expressed in relative recovery cost terms. The probability of exceeding a specific damage state such as non-structural, local, partial, extensive or total collapse is also important for the quantification of risk and to this purpose, several sets of fragility curves for various rock diameters and increasing velocities have been prepared. An example is shown for the case of a simple reinforced concrete building and impact energies from 0 to 4075 kJ.

  17. The dense plasma focus and nuclear energy. A possible path towards fuel-selfsufficiency

    International Nuclear Information System (INIS)

    Heindler, M.; Harms, A.A.

    1983-01-01

    This chapter examines the concept of incorporating a dense plasma focus device which supplies neutrons to breed fissile fuel for fission reactions in a nuclear energy system. Discusses the dense plasma focus in a fusion-fission symbiont concept; a parametric description of a DPF-based nuclear energy system; fissile fuel and energy balance in a DPF based symbiont; a fusion-fission symbiont with a DPF device of current design; and DPF facility requirements for a self-sufficient fusion-fission symbiont. The primary objective of this study was to establish a systems concept which is essentially self-sufficient with respect to nuclear fuel. Concludes that while existing dense plasma focus devices are insufficient and inadequate for such purpose, the improvement of some critical performance parameters (e.g., the pulse repetition rate and the neutron yield per pulse) could render a self-sufficient nuclear energy concept a nearterm technological objective

  18. Maintaining dignity in vulnerability

    DEFF Research Database (Denmark)

    Høy, Bente

    2016-01-01

    to understand the meaning of the narrated text. Results. The meaning of maintaining dignity was constituted in a sense of vulnerability to the self, and elucidated in three major interrelated themes: Being involved as a human being, being involved as the person one is and strives to become, and being involved...

  19. Anaphylaxis vulnerable groups

    African Journals Online (AJOL)

    Ehab

    Age groups vulnerable to serious attacks of anaphylaxis include infants, teenagers, pregnant women, and the elderly. Concomitant diseases, such as severe or uncontrolled asthma, cardiovascular disease, mastocytosis or clonal mast cell disorders and the concurrent use of some medications such as beta adrenergic ...

  20. Mangrove vulnerability index using GIS

    Science.gov (United States)

    Yunus, Mohd Zulkifli Mohd; Ahmad, Fatimah Shafinaz; Ibrahim, Nuremira

    2018-02-01

    Climate change, particularly its associated sea level rise, is major threat to mangrove coastal areas, and it is essential to develop ways to reduce vulnerability through strategic management planning. Environmental vulnerability can be understood as a function of exposure to impacts and the sensitivity and adaptive capacity of ecological systems towards environmental tensors. Mangrove vulnerability ranking using up to 14 parameters found in study area, which is in Pulau Kukup and Sg Pulai, where 1 is low vulnerability and 5 is very high vulnerability. Mangrove Vulnerability Index (MVI) is divided into 3 main categories Physical Mangrove Index (PMI), Biological Mangrove Index (BMI) and Hazard Mangrove Index (HMI).

  1. Assessment of Chemical and Radiological Vulnerabilities

    International Nuclear Information System (INIS)

    SETH, S.S.

    2000-01-01

    Following the May 14, 1997 chemical explosion at Hanford's Plutonium Reclamation Facility, the Department of Energy Richland Operations Office and its prime contractor, Fluor Hanford, Inc., completed an extensive assessment to identify and address chemical and radiological safety vulnerabilities at all facilities under the Project Hanford Management Contract. This was a challenging undertaking because of the immense size of the problem, unique technical issues, and competing priorities. This paper focuses on the assessment process, including the criteria and methodology for data collection, evaluation, and risk-based scoring. It does not provide details on the facility-specific results and corrective actions, but discusses the approach taken to address the identified vulnerabilities

  2. The space of vulnerability

    Directory of Open Access Journals (Sweden)

    Claudio Sgarbi

    2015-11-01

    Full Text Available Archi-tecture has lost the reference to its prop “Archi” to develop mostly its “Tecture”: a deceitful form of nihilism, which has given full credit to a hurricane of instruments for which we know no purpose. Any distinction between city and architecture is purely contingent. Contingency is relevant but only in so far as it makes one lose any sense of scale. Many of our cities do not work because our style of life eradicates the sense of hospitality. The city becomes the place where we un-learn how to live together. Hospitality is vulnerability – the construction of vulnerability is the true beauty, the only deterrent against stupidity. Learn to live with the others, to approximate the alterity and its unpredictability. The basic tools of conviviality are the common goods of inter-disciplinarity. Learn to cultivate and educate yourself to phenomenal incompleteness.

  3. Fuzzy vulnerability matrix

    International Nuclear Information System (INIS)

    Baron, Jorge H.; Rivera, S.S.

    2000-01-01

    The so-called vulnerability matrix is used in the evaluation part of the probabilistic safety assessment for a nuclear power plant, during the containment event trees calculations. This matrix is established from what is knows as Numerical Categories for Engineering Judgement. This matrix is usually established with numerical values obtained with traditional arithmetic using the set theory. The representation of this matrix with fuzzy numbers is much more adequate, due to the fact that the Numerical Categories for Engineering Judgement are better represented with linguistic variables, such as 'highly probable', 'probable', 'impossible', etc. In the present paper a methodology to obtain a Fuzzy Vulnerability Matrix is presented, starting from the recommendations on the Numerical Categories for Engineering Judgement. (author)

  4. VT - Vermont Social Vulnerability Index

    Data.gov (United States)

    Vermont Center for Geographic Information — Social vulnerability refers to the resilience of communities when responding to or recovering from threats to public health. The Vermont Social Vulnerability Index...

  5. Brazilian energy model

    Science.gov (United States)

    1981-05-01

    A summary of the energy situation in Brazil is presented. Energy consumption rates, reserves of primary energy, and the basic needs and strategies for meeting energy self sufficiency are discussed. Conserving energy, increasing petroleum production, and utilizing other domestic energy products and petroleum by-products are discussed. Specific programs are described for the development and use of alcohol fuels, wood and charcoal, coal, schist, solar and geothermal energy, power from the sea, fresh biomass, special batteries, hydrogen, vegetable oil, and electric energy from water power, nuclear, and coal. Details of the energy model for 1985 are given. Attention is also given to the energy demands and the structure of global energy from 1975 to 1985.

  6. A new approach to analyzing vulnerability

    International Nuclear Information System (INIS)

    O'Callaghan, P.B.; Carlson, R.L.; Riedeman, G.W.

    1986-01-01

    The Westinghouse Hanford Company (WHC) has recently completed construction of the Fuel Cycle Plant (FCP) at Richland, Washington. At start-up the facility will fabricate driver fuel for the Fast Flux Test Facility in the Secure Automated Fabrication line. After construction completion, but before facility certification, the Department of Energy (DOE) Richland Operation Office requested that a vulnerability analysis be performed which assumed multiple insiders as a threat to the security system. A unique method of analyzing facility vulnerabilities was developed at the Security Applications Center (SAC), which is managed by WHC for DOE. The method that was developed verifies a previous vulnerability assessment, as well as introducing a modeling technique which analyzes security alarms in relation to delaying factors and possible insider activities. With this information it is possible to assess the relative strength or weakness of various possible routes to and from a target within a facility,

  7. Vulnerability and Risk Analysis Program: Overview of Assessment Methodology

    National Research Council Canada - National Science Library

    2001-01-01

    .... Over the last three years, a team of national laboratory experts, working in partnership with the energy industry, has successfully applied the methodology as part of OCIP's Vulnerability and Risk Analysis Program (VRAP...

  8. 岩体滑坡冲击能计算及受灾体易损性定量评估%IMPACT ENERGY CALCULATION FOR ROCK SLOPE AND QUANTITATIVE ASSESSMENT OF VULNERABILITY FOR ELEMENT AT RISK

    Institute of Scientific and Technical Information of China (English)

    吴越; 刘东升; 李明军

    2011-01-01

    In the processes of landslide mass sliding and impacting on element at risk, the internal collapse of landslide mass will dissipate part of kinetic energy. But in practice, this part of energy is not taken usually into account. The discrete element method(DEM) is adopted to get impact force-time curves; and the impact energy conversion equation is also deduced based on impulse law and energy conservation law. With the analysis of the energy dissipation principle in the sliding and impacting processes of a practical rock slope, a comparison is made between the calculation method which takes both internal and external energy dissipations into account and the method which only takes external energy dissipation into account. The result shows that there is a significant difference between the two methods; and the internal energy dissipation can not be ignored. Moreover, the influence factors of impact energy and vulnerability for element at risk are both analyzed. The analysis result shows that impact energy is most sensitive to internal friction angle of landslide debris; second sensitive to distance between element at risk and landslide mass, gap length between joint segments, density of landslide mass and width of impact surface; last sensitive to the cohesion of landslide mass. In addition, the impact direction of landslide debris can simulataneously effect both impact energy and anti-impact energy.%滑体下滑及对受灾体冲击过程中,由于滑体内部的崩解碰撞将会耗散部分动能,而工程中通常采用简化的方法计算滑体冲击能,没有考虑内部耗能的影响.采用离散元法模拟得到滑体对受灾体的冲击力-时间曲线,根据冲量定律和能量守恒定律换算得到滑体冲击能.以实际工程为例,详细分析滑体下滑过程与冲击受灾体过程中的能耗规律.结果表明:同时考虑下滑和冲击过程中滑体内外部耗能的计算方法与只考虑滑体外部摩擦耗能的计算方法相比,

  9. HEPA Filter Vulnerability Assessment

    International Nuclear Information System (INIS)

    GUSTAVSON, R.D.

    2000-01-01

    This assessment of High Efficiency Particulate Air (HEPA) filter vulnerability was requested by the USDOE Office of River Protection (ORP) to satisfy a DOE-HQ directive to evaluate the effect of filter degradation on the facility authorization basis assumptions. Within the scope of this assessment are ventilation system HEPA filters that are classified as Safety-Class (SC) or Safety-Significant (SS) components that perform an accident mitigation function. The objective of the assessment is to verify whether HEPA filters that perform a safety function during an accident are likely to perform as intended to limit release of hazardous or radioactive materials, considering factors that could degrade the filters. Filter degradation factors considered include aging, wetting of filters, exposure to high temperature, exposure to corrosive or reactive chemicals, and exposure to radiation. Screening and evaluation criteria were developed by a site-wide group of HVAC engineers and HEPA filter experts from published empirical data. For River Protection Project (RPP) filters, the only degradation factor that exceeded the screening threshold was for filter aging. Subsequent evaluation of the effect of filter aging on the filter strength was conducted, and the results were compared with required performance to meet the conditions assumed in the RPP Authorization Basis (AB). It was found that the reduction in filter strength due to aging does not affect the filter performance requirements as specified in the AB. A portion of the HEPA filter vulnerability assessment is being conducted by the ORP and is not part of the scope of this study. The ORP is conducting an assessment of the existing policies and programs relating to maintenance, testing, and change-out of HEPA filters used for SC/SS service. This document presents the results of a HEPA filter vulnerability assessment conducted for the River protection project as requested by the DOE Office of River Protection

  10. [Adolescent vulnerabilities and radicalisation].

    Science.gov (United States)

    Lenjalley, Adrien; Radjack, Rahmeth; Ludot, Maude; Touhami, Fatima; Moro, Marie Rose

    2017-10-01

    Radicalisation resonates with the psychological vulnerabilities of adolescents. The ups and downs encountered as they attempt to construct their identity and their need to dominate favour the destructive nature of young people lacking a sense of filiation and belonging. An adolescent's engagement corresponds to a search for limits, with an adherence to religious values and to a group to establish self-esteem. Subjectification, authorising the adolescent to separate themselves from their parents and their values through a period of crisis must be supported. Copyright © 2017. Published by Elsevier Masson SAS.

  11. Cyber security and vulnerability of 'smart' power grids

    OpenAIRE

    Jovanović, Slobodan

    2012-01-01

    Smart power grids deliver electric energy from generation to consumers using two-way Smart Meter technology (smart meters), enabling remote control of consumer energy use. However, smart power grids are increasingly very attractive targets for hackers and terrorists. This paper discusses the key characteristics of cyber security/vulnerability of smart power grids, and their communication architecture, and their vulnerability points. Then, it describes guidelines which are needed to be impleme...

  12. Assessing flash flood vulnerability using a multi-vulnerability approach

    Directory of Open Access Journals (Sweden)

    Karagiorgos Konstantinos

    2016-01-01

    Full Text Available In the framework of flood risk assessment, while the understanding of hazard and exposure has significantly improved over the last years, knowledge on vulnerability remains one of the challenges. Current approaches in vulnerability research are characterised by a division between social scientists and natural scientists. In order to close this gap, we present an approach that combines information on physical and social vulnerability in order to merge information on the susceptibility of elements at risk and society. With respect to physical vulnerability, the study is based on local-scale vulnerability models using nonlinear regression approaches. Modified Weibull distributions were fit to the data in order to represent the relationship between process magnitude and degree of loss. With respect to social vulnerability we conducted a door-to-door survey which resulted in particular insights on flood risk awareness and resilience strategies of exposed communities. In general, both physical and social vulnerability were low in comparison with other European studies, which may result from (a specific building regulations in the four Mediterranean test sites as well as general design principles leading to low structural susceptibility of elements at risk, and (b relatively low social vulnerability of citizens exposed. As a result it is shown that a combination of different perspectives of vulnerability will lead to a better understanding of exposure and capacities in flood risk management.

  13. New energy horizons

    International Nuclear Information System (INIS)

    Berg, Eugene

    2015-01-01

    In a context of high oil price decrease, and based on various publications on energy (journals and books), the author proposes a synthetic overview of evolutions of the energy landscape. He first addresses the emergence of shale gas and oil which raises the issue of energy independence. He sheds a light on the different types of gas and on extraction techniques, comments statistics on the evolution of consumption and the status of reserves. He addresses issues related to the geopolitics of energies: the energy issue for Europe, the situation of historic Middle-East leader countries in front of emerging energy producing countries, the US dream of energy self-sufficiency, and the game between great powers. The last part addresses major energy perspectives in terms of sources, of fossil share in electric power production

  14. Open Source Vulnerability Database Project

    Directory of Open Access Journals (Sweden)

    Jake Kouns

    2008-06-01

    Full Text Available This article introduces the Open Source Vulnerability Database (OSVDB project which manages a global collection of computer security vulnerabilities, available for free use by the information security community. This collection contains information on known security weaknesses in operating systems, software products, protocols, hardware devices, and other infrastructure elements of information technology. The OSVDB project is intended to be the centralized global open source vulnerability collection on the Internet.

  15. Motherhood, Marketization, and Consumer Vulnerability

    DEFF Research Database (Denmark)

    Davies, Andrea; Prothero, Andrea; Sørensen, Elin

    2010-01-01

    This article explores consumer vulnerability and the role of public policy by focusing on new mothers. Developing the consumer vulnerability model of Baker, Gentry, and Rittenburg, the authors consider how medical contexts, political and legal factors, economic resources, societal prescriptions...... a time of physical and psychological changes in mothers-to-be. This article illustrates that the extended market logic dominating contemporary mothering environments both contributes to and has the potential to exacerbate new mothers’ vulnerability, raising important challenges for public policy, both...

  16. Network Vulnerability and Risk Assessment

    National Research Council Canada - National Science Library

    Alward, Randy G; Carley, Kathleen M; Madsen, Fredrik; Taylor, Vincent K; Vandenberghe, Grant

    2006-01-01

    .... The break out group discussed vulnerability presentation needs common across various application domains, particularly in support of network discovery and network analysis tasks in those domains...

  17. Oil vulnerability index of oil-importing countries

    International Nuclear Information System (INIS)

    Gupta, Eshita

    2008-01-01

    This paper assesses the relative oil vulnerability of 26 net oil-importing countries for the year 2004 on the basis of various indicators - the ratio of value of oil imports to gross domestic product (GDP), oil consumption per unit of GDP, GDP per capita and oil share in total energy supply, ratio of domestic reserves to oil consumption, exposure to geopolitical oil market concentration risks as measured by net oil import dependence, diversification of supply sources, political risk in oil-supplying countries, and market liquidity. The approach using the principal component technique has been adopted to combine these individual indicators into a composite index of oil vulnerability. Such an index captures the relative sensitivity of various economies towards developments of the international oil market, with a higher index indicating higher vulnerability. The results show that there are considerable differences in the values of individual indicators of oil vulnerability and overall oil vulnerability index among the countries (both inter and intraregional). (author)

  18. Oil vulnerability index of oil-importing countries

    Energy Technology Data Exchange (ETDEWEB)

    Gupta, Eshita [The Energy and Resources Institute, Darbari Seth Block, Habitat Place, New Delhi 110 003 (India)

    2008-03-15

    This paper assesses the relative oil vulnerability of 26 net oil-importing countries for the year 2004 on the basis of various indicators - the ratio of value of oil imports to gross domestic product (GDP), oil consumption per unit of GDP, GDP per capita and oil share in total energy supply, ratio of domestic reserves to oil consumption, exposure to geopolitical oil market concentration risks as measured by net oil import dependence, diversification of supply sources, political risk in oil-supplying countries, and market liquidity. The approach using the principal component technique has been adopted to combine these individual indicators into a composite index of oil vulnerability. Such an index captures the relative sensitivity of various economies towards developments of the international oil market, with a higher index indicating higher vulnerability. The results show that there are considerable differences in the values of individual indicators of oil vulnerability and overall oil vulnerability index among the countries (both inter and intraregional). (author)

  19. Climate Vulnerability Assessments : An Assessment of Climate Change Vulnerability, Risk, and Adaptation in Albania’s Power Sector

    OpenAIRE

    World Bank

    2009-01-01

    Energy security is a key concern in Albania, which relies on hydropower for about 90 percent of its electricity production. While renewable energy resources like hydropower play a fundamental role in moving the world towards a low-carbon economy, they are also vulnerable to climatic conditions. Climate variability already affects Albania's energy production to a considerable extent, and cl...

  20. Drivers behind the development of forest energy in Sweden

    International Nuclear Information System (INIS)

    Bjoerheden, Rolf

    2006-01-01

    The use of forest fuels has more than doubled in Sweden over the last 25-30 years. Almost a fifth of the utilized energy is now based on forest biomass. Concurrently, real prices of bioenergy have decreased to less than a third of what they were 25 years ago. Some principal driving forces behind this development are identified and discussed in this paper. The origin of this development was equally the result of a foreseen shortage of fibre and a reaction to this vulnerable position, made obvious through the 'oil crises'. Although Sweden has a long tradition of large-scale use of forest energy, 35 years ago she was almost totally dependent on imported oil. Forest mechanisation provided rational solutions to handling small diameter wood and stumps in conventional industrial processes, but also enabled the economical use of such wood for energy. During 3 decades of development, drivers and obstacles have shifted. What started to reduce dependence on fossil fuels was later driven by increased general environmental awareness. An emerging 'green' lobby blocked the development of nuclear power and expanded harnessing of hydropower which were alternative means of self-sufficiency. In the last 10-15 years, focus has changed again. Global concern for climatic change due to emissions of greenhouse gases is a powerful driver, endorsing increased use of CO 2 -neutral energy sources. Sustainability, resource cycling and the welfare of future generations are seen as goals for continued development. Ideals and policies do not, however, automatically induce change in regular operations. A set of drivers is identified, that has played the decisive role in practice. These include the direct technical-operational drivers, as well as indirect drivers through market development, taxation and other legislation

  1. Virtual water trade and country vulnerability: A network perspective

    Science.gov (United States)

    Sartori, Martina; Schiavo, Stefano

    2015-04-01

    the other side, supporting a national policy of self-sufficiency in food production while progressively reducing the participation in international agricultural trade does not necessarily protect a country from economic instability. Moreover, it is well established in the literature that, over time, international food trade has favored more efficient use of water resources, at the global level. This fact, together with our conclusions, highlights the important role of international trade in driving the efficient allocation of water resources. To sum up, our evidence reveals that the increased globalization witnessed in the last 30 years is not associated with an increased frequency of adverse shocks (in either precipitation or food production). Furthermore, building on recent advances in network analysis that connect the stability of a complex system to the interaction between the distribution of shocks and the network topology, we find that the world is more interconnected, but not necessarily less stable.

  2. Fiscal 1996 research report. Basic research on energy consumption efficiency improvement for developing countries (Industry related survey for energy analysis); 1996 nendo hatten tojokoku energy shohi koritsuka kiso chosa jigyo hokokusho. Energy bunsekiyo sangyo renkan chosa

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-05-01

    Inter-industry relations tables and energy statistics are combined for Asian countries for the preparation of energy analysis oriented inter-industry relations tables, which are used to metrically analyze Aisan nations' industrial structures and energy consumption structures for the ultimate purpose of grasping the magnitude of each industry's demand for energy. The tables prepared this year cover Korea, Indonesia, Thailand, and the Philippines. In Korea, the self-sufficiency rate of mineral fuels is low at 23.1%, which is due to its import of crude oil from abroad. It consumes 177.92-million tons (in terms of oil) of energy for its economic activities, with energy saving measures expected to work effectively here. Indonesia's mineral fuel self-sufficiency rate is high at 84.3% because it is an oil producing country. The energy it consumes for its economic activities is 179.37-million tons (in terms of oil), and energy saving measures will work effectively here. Thailand is a crude oil importing country. Its mineral fuel self-sufficiency rate is 33.4% and the energy its economic activities consume is 53.08-million tons (in terms of oil), and energy saving measures will work effectively in this country. The Philippines is a crude oil importing country and its mineral fuel self-sufficiency rate is as low as 4.8%. It consumes 22.71-million tons of energy (in terms of oil) for its economic activities, and energy-saving measures are expected to take effect here. (NEDO)

  3. Working together for our energy independence

    International Nuclear Information System (INIS)

    McQuain, R.K.

    1990-01-01

    Nowhere else in the world has a geothermal/deep water electric power cable project of such a magnitude as that being proposed in the Hawaiian Islands ever been attempted. The attainment of energy self-sufficiency therefore requires the input and cooperation of many groups and people, working as one, to fulfill this state goal. This paper describes how the combined efforts of the private sector and government have worked together to move this goal a set closer to reality

  4. Promoting renewable energy technologies

    International Nuclear Information System (INIS)

    Grenaa Jensen, S.

    2004-06-01

    Technologies using renewable energy sources are receiving increasing interest from both public authorities and power producing companies, mainly because of the environmental advantages they procure in comparison with conventional energy sources. These technologies can be substitution for conventional energy sources and limit damage to the environment. Furthermore, several of the renewable energy technologies satisfy an increasing political goal of self-sufficiency within energy production. The subject of this thesis is promotion of renewable technologies. The primary goal is to increase understanding on how technological development takes place, and establish a theoretical framework that can assist in the construction of policy strategies including instruments for promotion of renewable energy technologies. Technological development is analysed by through quantitative and qualitative methods. (BA)

  5. Safeguard Vulnerability Analysis Program (SVAP)

    International Nuclear Information System (INIS)

    Gilman, F.M.; Dittmore, M.H.; Orvis, W.J.; Wahler, P.S.

    1980-01-01

    This report gives an overview of the Safeguard Vulnerability Analysis Program (SVAP) developed at Lawrence Livermore National Laboratory. SVAP was designed as an automated method of analyzing the safeguard systems at nuclear facilities for vulnerabilities relating to the theft or diversion of nuclear materials. SVAP addresses one class of safeguard threat: theft or diversion of nuclear materials by nonviolent insiders, acting individually or in collusion. SVAP is a user-oriented tool which uses an interactive input medium for preprocessing the large amounts of safeguards data. Its output includes concise summary data as well as detailed vulnerability information

  6. Hydrogen based energy storage for solar energy systems

    Energy Technology Data Exchange (ETDEWEB)

    Vanhanen, J.P.; Hagstroem, M.T.; Lund, P.H. [Helsinki Univ. of Technology, Otaniemi (Finland). Dept. of Engineering Physics and Mathematics; Leppaenen, J.R.; Nieminen, J.P. [Neste Oy (Finland)

    1998-12-31

    Hydrogen based energy storage options for solar energy systems was studied in order to improve their overall performance. A 1 kW photovoltaic hydrogen (PV-H2) pilot-plant and commercial prototype were constructed and a numerical simulation program H2PHOTO for system design and optimisation was developed. Furthermore, a comprehensive understanding of conversion (electrolysers and fuel cells) and storage (metal hydrides) technologies was acquired by the project partners. The PV-H{sub 2} power system provides a self-sufficient solution for applications in remote locations far from electric grids and maintenance services. (orig.)

  7. Vulnerability Identification Errors in Security Risk Assessments

    OpenAIRE

    Taubenberger, Stefan

    2014-01-01

    At present, companies rely on information technology systems to achieve their business objectives, making them vulnerable to cybersecurity threats. Information security risk assessments help organisations to identify their risks and vulnerabilities. An accurate identification of risks and vulnerabilities is a challenge, because the input data is uncertain. So-called ’vulnerability identification errors‘ can occur if false positive vulnerabilities are identified, or if vulnerabilities remain u...

  8. Poverty and Vulnerability - An Interdisciplinary Approach

    OpenAIRE

    Makoka, Donald; Kaplan, Marcus

    2005-01-01

    This paper describes the concepts of poverty and vulnerability as well as the interconnections and differences between them using an interdisciplinary approach. While poverty is a static concept, vulnerability has a forward-looking dimension. We, therefore, review the methodologies that different disciplines use to measure poverty and vulnerability. In particular, the differences between vulnerability to natural disasters, vulnerability to climate change, as well as vulnerability to poverty a...

  9. CDC's Social Vulnerability Index (SVI)

    Data.gov (United States)

    U.S. Department of Health & Human Services — Social vulnerability refers to the resilience of communities when confronted by external stresses on human health, stresses such as natural or human-caused...

  10. Southern African Coastal vulnerability assessment

    CSIR Research Space (South Africa)

    Rautenbach, C

    2015-10-01

    Full Text Available or business. The CSIR coastal systems group uses specialist skills in coastal engineering, geographic engineering systems and numerical modelling to assess and map vulnerable coastal ecosystems to develop specific adaptation measures and coastal protection...

  11. CALTRANS CLIMATE CHANGE VULNERABILITY ASSESSMENTS

    Science.gov (United States)

    2018-01-01

    The following report was developed for the California Department of Transportation (Caltrans) to summarize a vulnerability assessment conducted for assets in Caltrans District 4. The assessment was developed to specifically identify the potential eff...

  12. Network Vulnerability and Risk Assessment

    National Research Council Canada - National Science Library

    Alward, Randy G; Carley, Kathleen M; Madsen, Fredrik; Taylor, Vincent K; Vandenberghe, Grant

    2006-01-01

    To help understand a network and its ability to continue operating when under attack, the break out group discussed issues that need to be considered when presenting network vulnerability information...

  13. Vulnerability Assessments in Ethical Hacking

    OpenAIRE

    Ashiqur Rahman ,; Md. SarwarAlam Rasel; Asaduzzaman Noman; Shakh Md. Alimuzjaman Alim

    2016-01-01

    Ethical hackers use the same methods and techniques to test and bypass a system's defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found, they document them and provide actionable advice on how to fix them so the organization can improve its overall security. The purpose of ethical hacking is to evaluate the security of a network or system's infrastructure. It entails finding and attempting to exploit any vulnerabilities to de...

  14. Software Design Level Security Vulnerabilities

    OpenAIRE

    S. Rehman; K. Mustafa

    2011-01-01

    Several thousand software design vulnerabilities have been reported through established databases. But they need to be structured and classified to be optimally usable in the pursuit of minimal and effective mitigation mechanism. In order we developed a criterion set for a communicative description of the same to serve the purpose as a taxonomic description of security vulnerabilities, arising in the design phase of Software development lifecycle. This description is a part of an effort to id...

  15. Vulnerability of intertropical littoral areas

    Science.gov (United States)

    Manighetti, Isabelle; De Wit, Rutger; Duvail, Stéphanie; Seyler, Patrick

    2017-10-01

    The coastal zone is of very high importance for human development and human wellbeing. Half of the global urban population lives in the coastal zone, where it has access to both continental and marine ecosystem services and to maritime transport. These urban populations coexist with rural and traditional coastal populations, some of which still possess good traditional ecological knowledge of the coastal ecosystems. Marine biodiversity and favourable environmental conditions sustain fisheries and aquaculture, represent a source of inspiration for humankind and provide numerous opportunities for recreation and tourism. In addition, coastal areas provide nursery functions for juvenile fish and invertebrates, which is important for the fish and crayfish stocks exploited offshore. Located at the interface between marine energy and continental processes, the coastal landscapes are dynamic environments. Nevertheless, the destruction of habitats and the increasing exploitation of the coastal zone represent serious threats to the ecosystems. Moreover, human land use and modifications in the watersheds have strong impacts on the coastal zone primarily by contributing to their pollution and nutrient over-enrichment. Damming and creation of reservoirs upstream also heavily modify the hydrology of the watersheds and often dramatically reduce the delivery of sediments to the coastal zone. In addition to these regional and local anthropogenic impacts, the coastal zone is vulnerable to global change among which sea level rise and climate change are particularly important drivers. Many coastal zones extend along giant faults and subduction zones, which makes them particularly exposed to earthquakes and tsunami hazards. Other forms of natural hazards are caused by hurricanes and cyclones that develop at sea and whose trajectories often hit the coastlines.

  16. Renewable Energy Opportunities Saginaw Chippewa Indian Tribe

    Energy Technology Data Exchange (ETDEWEB)

    Saginaw Chippewa Indian Tribe Planning Department; Smiley, Steve; Bennett, Keith, DOE Project Officer

    2008-10-22

    The Saginaw Chippewa Indian Tribe has a vision to become self-sufficient in its energy needs and to maintain its culture and protect Mother Earth with respect and honor for the next seven generations. To achieve this vision, green energy sources such as solar, wind and biomass energy are the best energy paths to travel. In this feasibility study the Tribe has analyzed and provided data on the nature of the renewable resources available to the Tribe and the costs of implementing these technologies.

  17. The energy cost of water independence: the case of Singapore.

    Science.gov (United States)

    Vincent, Lenouvel; Michel, Lafforgue; Catherine, Chevauché; Pauline, Rhétoré

    2014-01-01

    Finding alternative resources to secure or increase water availability is a key issue in most urban areas. This makes the research of alternative and local water resources of increasing importance. In the context of political tension with its main water provider (Malaysia), Singapore has been implementing a comprehensive water policy for some decades, which relies on water demand management and local water resource mobilisation in order to reach water self-sufficiency by 2060. The production of water from alternative resources through seawater desalination or water reclamation implies energy consumptive technologies such as reverse osmosis. In the context of increasing energy costs and high primary energy dependency, this water self-sufficiency objective is likely to be an important challenge for Singapore. The aim of this paper is to quantify the long-term impact of Singapore's water policy on the national electricity bill and to investigate the impact of Singapore's projects to reduce its water energy footprint. We estimate that 2.0% of the Singaporean electricity demand is already dedicated to water and wastewater treatment processes. If its water-energy footprint dramatically increases in the coming decades, ambitious research projects may buffer the energy cost of water self-sufficiency.

  18. Nuclear energy: a reassessment

    International Nuclear Information System (INIS)

    McClure, J.A.; Nader, R.; Udall, M.K.; Walske, C.

    1980-01-01

    This edited transcript of a televised American Enterprise Institute Public Poicy Forum explores the role of nuclear technology in energy production in the US today. A panel made up of Senator James A. McClure, Ralph Nader, Representative Morris K. Udall, and Dr. Carl Walske and moderated by John Charles Daly examines the lessons learned from the accident at the Three Mile Island Nuclear Plant and the public attitudes toward nuclear energy, particularly in light of this accident. The experts discuss alternative energy sources, such as coal, gas, biomass, and solar power as well as conservation and more efficient use of present facilities. The issues of nuclear waste disposal and transport and US commitments to countries not self-sufficient in their energy needs are also explored

  19. To renew local energy policies

    International Nuclear Information System (INIS)

    Bailleul, Esther; Alfano, Patrick; Ballan, Etienne; Bosboeuf, Pascale; Braun, Nicolas; Budin, Jacques-Olivier; Caron, Jean-Francois; Couturier, Christian; Dantec, Ronan; Ducolombier, Alexandre; Durand, Lucas; Haeringer, Nicolas; Izard, Charlotte; Jadot, Yannick; Joos, Marine; Landel, Pierre-Antoine; Le Du, Mathieu; Lucas, Guillaume; Maya, Michel; Moisan, Marie; Peullemeulle, Justine; Pin, Pascaline; Poize, Noemie; Regnier, Yannick; Rudinger, Andreas; Saultier, Patrick; Serne, Pierre; Zeroual, Bouchr; Arevalo, Henri; Bregeon, Anne; Vauquois, Victor; Aussavy, Gregoire

    2016-08-01

    Presented as a guide, this book proposes an operational and transverse approach to local action in the field of energy. It is illustrated by many field examples which show how actors have been able to (re)gain control of the energy issue. In the first part in which they present the main issues, the authors outline that local authorities are in front line for a European energy transition, recall the French legal framework for local energy transition, describe how to address local energy self-sufficiency, and comment stakes and levers for energy transition financing. The second part deals with action. The authors there describe how to manage a local energy transition, how to act transversally, how to get citizen involved, and how to relate energy transition and local development

  20. Department of Energy (DOE) transportation system for nuclear materials and the role of state law enforcement agencies

    International Nuclear Information System (INIS)

    Jones, J.M.; Hoover, T.W.

    1978-01-01

    The Department of Energy has been assigned the responsibility for the safe and secure movement of strategic quantities of government-owned special nuclear material as well as classified material. To accomplish this mission, a transportation system has been developed which takes advantage of advanced technology and other features to reduce vulnerability to terrorists. The system consists of a careful balance of specially-trained personnel, procedures and sophisticated equipment. These, in combination, generally allow the system to be self-sufficient. However, should the need arise, DOE will request assistance from state law enforcement agencies. The primary contact for assistance is the state police or highway patrol. DOE, with the assistance of Sandia Laboratories, has surveyed state police agencies throughout the nation. A data base has been created which includes the results of these surveys and a numerical description of DOE transportation routes. This data base, along with a ''Response'' model developed by Sandia Laboratories, allows projections of officer availability to be made for all of DOE's routes. This paper will describe the DOE Transportation System, the role of state law enforcement agencies in support of the system, the nationwide state policy survey, and the operation of the response computer model

  1. The SAVI vulnerability assessment model

    International Nuclear Information System (INIS)

    Winblad, A.E.

    1987-01-01

    The assessment model ''Systematic Analysis of Vulnerability to Intrusion'' (SAVI) presented in this report is a PC-based path analysis model. It can provide estimates of protection system effectiveness (or vulnerability) against a spectrum of outsider threats including collusion with an insider adversary. It calculates one measure of system effectiveness, the probability of interruption P(I), for all potential adversary paths. SAVI can perform both theft and sabotage vulnerability analyses. For theft, the analysis is based on the assumption that adversaries should be interrupted either before they can accomplish removal of the target material from its normal location or removal from the site boundary. For sabotage, the analysis is based on the assumption that adversaries should be interrupted before completion of their sabotage task

  2. China's energy security: The perspective of energy users

    International Nuclear Information System (INIS)

    Bambawale, Malavika Jain; Sovacool, Benjamin K.

    2011-01-01

    The article explores the energy security concerns faced by China from the point of view of energy users working in government, university, civil society and business sectors. The authors first derive a set of seven hypotheses related to Chinese energy security drawn from a review of the recent academic literature. We then explain each of these seven hypotheses, relating to (1) security of energy supply, (2) geopolitics, (3) climate change, (4) decentralization, (5) energy efficiency, (6) research and innovation of new energy technologies, and (7) self sufficiency and trade. Lastly, the article tests these hypotheses through a survey distributed in English and Mandarin completed by 312 Chinese participants. The conclusion presents insights for policymakers and energy scholars.

  3. Vulnerability in north- central Vietnam

    DEFF Research Database (Denmark)

    Casse, Thorkil; Milhøj, Anders; Nguyen, Thao Phuong

    2015-01-01

    This article examines changes in livelihood strategies in response to flooding. It does so on the basis of a household survey which was undertaken in three provinces in north central Vietnam. All households in the survey were regularly affected by flooding, but only poor households experience a l...... the impact of flooding in the provinces. The article ends by looking at the vulnerability-resilience debate concluding that the poorer households could enter a vulnerability loop, unless new strategies to cope with natural hazards are suggested....

  4. Managing a network vulnerability assessment

    CERN Document Server

    Peltier, Thomas R; Blackley, John A

    2003-01-01

    Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.

  5. Energy baseline for monitoring vulnerability of the energy sector to ...

    African Journals Online (AJOL)

    Electricity generation capacity from Ntaruka and Mukungwa hydropower plants in Rwanda, a tiny country in the Central Africa has been declining due to the fall in water levels of lake Burera and Ruhondo. Climate change is thought to be one of the factors causing the decline in water levels in the lakes. A study to establish ...

  6. Energy

    International Nuclear Information System (INIS)

    Meister, F.; Ott, F.

    2002-01-01

    This chapter gives an overview of the current energy economy in Austria. The Austrian political aims of sustainable development and climate protection imply a reorientation of the Austrian energy policy as a whole. Energy consumption trends (1993-1998), final energy consumption by energy carrier (indexed data 1993-1999), comparative analysis of useful energy demand (1993 and 1999) and final energy consumption of renewable energy sources by sector (1996-1999) in Austria are given. The necessary measures to be taken in order to reduce the energy demand and increased the use of renewable energy are briefly mentioned. Figs. 5. (nevyjel)

  7. Energy

    International Nuclear Information System (INIS)

    Meister, F.

    2001-01-01

    This chapter of the environmental control report deals with the environmental impact of energy production, energy conversion, atomic energy and renewable energy. The development of the energy consumption in Austria for the years 1993 to 1999 is given for the different energy types. The development of the use of renewable energy sources in Austria is given, different domestic heat-systems are compared, life cycles and environmental balance are outlined. (a.n.)

  8. Municipal vulnerability to climate change

    CSIR Research Space (South Africa)

    Mambo, Julia

    2017-12-01

    Full Text Available South Africa, like the rest of Africa, is considered highly vulnerable to climate change and variability as well as to global change. Climate change is and will continue to be an issue of concern in the development of the country. South Africa faces...

  9. Autonomy, Vulnerability, Recognition, and Justice

    NARCIS (Netherlands)

    Anderson, J.H.; Honneth, A.

    2005-01-01

    One of liberalism’s core commitments is to safeguarding individuals’ autonomy. And a central aspect of liberal social justice is the commitment to protecting the vulnerable. Taken together, and combined with an understanding of autonomy as an acquired set of capacities to lead one’s own life,

  10. Decision Vulnerability Analysis (DVA) Program

    Science.gov (United States)

    2014-05-01

    31 14 Graphical Representation of the Summary Judgments of the Effectiveness, Vulnerability, and Understanding of the Subsystems’ as Judged by...posed several challenges. Numerous organizational typologies have been suggested over the years ( Robbins , 1994), and these typologies are often based...structure and functioning from a typology perspective ( Robbins , 1994), excerpts from a task analysis that described how the analysts currently performed

  11. 1C software vulnerabilities description

    Directory of Open Access Journals (Sweden)

    Ivanov Oleg

    2017-01-01

    Full Text Available This article is devoted to the vulnerability of the application solution based on the “1C: Enterprise 8” platform, which can be used by only built-in tools of the platform. Possible threats and attack algorithm are described.

  12. Underground Economics for Vulnerability Risk

    NARCIS (Netherlands)

    Allodi, L.

    The estimation of vulnerability risk is at the core of any IT security management strategy. Among technical and infrastructural metrics of risk, attacker economics represent an emerging new aspect that several risk assessment methodologies propose to consider (e.g., based on game theory). Yet the

  13. Trust, Endangerment and Divine Vulnerability

    DEFF Research Database (Denmark)

    Christoffersen, Mikkel Gabriel

    2017-01-01

    Faith is trusting God in the midst of endangerment. Yet, human experience of excessive suffering has challenged any spontaneous trust in God. In this article, I reconsider the idea of faith as trust in God, adding an emphasis on the divine vulnerability in the incarnation, and I develop a more...

  14. Vulnerability of damage-accumulating systems

    International Nuclear Information System (INIS)

    Lind, Niels C.

    1996-01-01

    Disastrous failures have shown that systems can be highly vulnerable. Quantified vulnerability can help designers and regulators to decide how much vulnerability is tolerable. Vulnerability of a system to a specified disturbance is defined as the ratio of the probability of failure of the disturbed system to the probability of failure of the undisturbed system. This vulnerability can be specialized to particular system types. It is adapted here to systems that are expected to deteriorate while in service due to processes such as fatigue, creep, corrosion, aging, neglect or insufficient maintenance. Application is illustrated by vulnerability to fatigue under constant and variable stress

  15. Samsoe. Renevable energy island. 10 years' development and evaluation; Denmark; Samsoe - vedvarende energi-oe. 10 aars udvikling og evaluering

    Energy Technology Data Exchange (ETDEWEB)

    Joergensen, P.J. (PlanEnergi, Skoerping (DK)); Hermansen, S.; Johnsen, Aa.; Nielsen, J.P. (Samsoe Energiakademi, Samsoe (DK))

    2007-10-15

    In 1997 the Danish Ministry of Energy arranged a competition on the most realistic and feasible plan for a complete switch-over of a local region or an island to become self-sufficient as regards renewable energy over a number of years. Samsoe won the competition, but what has become of the project and all the ideas? This report evaluates the project on the basis of statistical data from 2005. (BA)

  16. Rice Production Vulnerability to Climate Change in Indonesia: An Overview on Community-based Adaptation

    Science.gov (United States)

    Komaladara, A. A. S. P.; Budiasa, I. W.; Ambarawati, I. G. A. A.

    2015-12-01

    Rice remains to be a major crop and staple food in Indonesia. The task to ensure that rice production meets the demand of a growing population continues to engage the attention of national planners and policy makers. However, the adverse effects of climate change on agriculture production have presented Indonesia with yet another significant challenge. The exposure of rice crops to climate-related hazards such as temperature stress, floods, and drought, may lead to lower yield and self-sufficiency rate. This study explores the vulnerability of rice production to the effects of climate change in Indonesia. Considering the vast geographical span of the country and varying exposure, sensitivity, and adaptive capacity to climate change at regional level, this study emphasize the importance of community-based adaptation. Results from a simulation based on production and climate data from 1984 to 2014 indicates that rice production is sensitive to variation in growing season temperature and precipitation. A projection of these climate factors in 2050 has a significant impact on the major rice crop. To manage the impact of climate change, this study turns to the potential roles of farmer organizations, such as Subak, in adaptation strategies. The Subak in Bali is recognized for its cultural and organizational framework that highlights the sharing of knowledge and local wisdom in rice production. This is demonstrated by its efficient community-based irrigation management system, leading to sustainable rice production. Keywords: rice production, climate change, community-based adaptation, Indonesia

  17. Assessing European wild fire vulnerability

    Science.gov (United States)

    Oehler, F.; Oliveira, S.; Barredo, J. I.; Camia, A.; Ayanz, J. San Miguel; Pettenella, D.; Mavsar, R.

    2012-04-01

    Wild fire vulnerability is a measure of potential socio-economic damage caused by a fire in a specific area. As such it is an important component of long-term fire risk management, helping policy-makers take informed decisions about adequate expenditures for fire prevention and suppression, and to target those regions at highest risk. This paper presents a first approach to assess wild fire vulnerability at the European level. A conservative approach was chosen that assesses the cost of restoring the previous land cover after a potential fire. Based on the CORINE Land Cover, a restoration cost was established for each land cover class at country level, and an average restoration time was assigned according to the recovery capacity of the land cover. The damage caused by fire was then assessed by discounting the cost of restoring the previous land cover over the restoration period. Three different vulnerability scenarios were considered assuming low, medium and high fire severity causing different levels of damage. Over Europe, the potential damage of wild land fires ranges from 10 - 13, 732 Euro*ha-1*yr-1 for low fire severity, 32 - 45,772 Euro*ha-1*yr-1 for medium fire severity and 54 - 77,812 Euro*ha-1*yr-1 for high fire severity. The least vulnerable are natural grasslands, moors and heathland and sclerophyllous vegetation, while the highest cost occurs for restoring broad-leaved forest. Preliminary validation comparing these estimates with official damage assessments for past fires shows reasonable results. The restoration cost approach allows for a straightforward, data extensive assessment of fire vulnerability at European level. A disadvantage is the inherent simplification of the evaluation procedure with the underestimation of non-markets goods and services. Thus, a second approach has been developed, valuing individual wild land goods and services and assessing their annual flow which is lost for a certain period of time in case of a fire event. However

  18. Vulnerabilities

    Science.gov (United States)

    2009-05-04

    May 1, 2006)”, http://www.mod.go.jp/e/d_policy/dp13.html (accessed 1 April 2009). 6 ibid 7 Hongo , Jun. “Japan, U.S. sign accord on forces,” The...Jacobs, G. Keith. "Guam Becoming US Pacific Linchpin." Asia-Pacific Defence Reporter 29 (2003): 38-39. Jun, Hongo . "Japan, U.S. sign accord on forces

  19. Vulnerable participants in health research

    DEFF Research Database (Denmark)

    Nordentoft, Helle Merete; Nanna, Kappel

    2011-01-01

    Ethical guidelines for conducting research are embedded in the Helsinki declaration of 1964. We contend that these abstract and intentionally universal guidelines need to be appropriated for social and health care research in which purpose and methods often deviate from medical research. The guid......Ethical guidelines for conducting research are embedded in the Helsinki declaration of 1964. We contend that these abstract and intentionally universal guidelines need to be appropriated for social and health care research in which purpose and methods often deviate from medical research...... and problems of vulnerable patients and - at the same time - respect their integrity without exposing them unnecessarily? The article illuminates the interactional construction of roles and relationships and how they affect the contextual construction of vulnerability. In this respect we demonstrate...

  20. VULNERABILITY OF PART TIME EMPLOYEES

    Directory of Open Access Journals (Sweden)

    Raluca Dimitriu

    2015-11-01

    Full Text Available The employee who concluded a part-time contract is the employee whose normal working hours, calculated weekly or as monthly average, is lower than the number of normal working hours of a comparable full-time employee. Part-time workers generally have the same legal status as full time workers. In fact, the vulnerability of this category of workers is not necessarily legal but rather economic: income - in proportion to the work performed, may be insufficient to cover the needs of living. However, such vulnerability may also have a certain cultural component: in some societies, professional identity is determined by the length of working hours. Also, part time work may hide many types of indirect discrimination.As a result, the part-time contract requires more than a protective legislation: it requires a strategy. This paper proposes a number of milestones of such a strategy, as well as some concrete de lege ferenda proposals.

  1. Energy

    International Nuclear Information System (INIS)

    Bobin, J.L.

    1996-01-01

    Object of sciences and technologies, energy plays a major part in economics and relations between nations. Jean-Louis Bobin, physicist, analyses the relations between man and energy and wonders about fears that delivers nowadays technologies bound to nuclear energy and about the fear of a possible shortage of energy resources. (N.C.). 17 refs., 14 figs., 2 tabs

  2. Groundwater vulnerability map for South Africa

    African Journals Online (AJOL)

    Chiedza Musekiwa

    Coastal vulnerability is the degree to which a coastal system is susceptible to, ... methods, indicator-based approaches, GIS-based decision support systems and ..... E 2005, 'Coastal Vulnerability and Risk Parameters', European Water, vol.

  3. Climate change & extreme weather vulnerability assessment framework.

    Science.gov (United States)

    2012-12-01

    The Federal Highway Administrations (FHWAs) Climate Change and Extreme Weather Vulnerability : Assessment Framework is a guide for transportation agencies interested in assessing their vulnerability : to climate change and extreme weather event...

  4. Aircraft vulnerability analysis by modelling and simulation

    CSIR Research Space (South Africa)

    Willers, CJ

    2014-09-01

    Full Text Available attributable to misuse of the weapon or to missile performance restrictions. This paper analyses some of the factors affecting aircraft vulnerability and demonstrates a structured analysis of the risk and aircraft vulnerability problem. The aircraft...

  5. Helping air quality managers identify vulnerable communities

    CSIR Research Space (South Africa)

    Wright, C

    2008-10-01

    Full Text Available population exposure and vulnerability risk prioritisation model is proposed for potential use by air quality managers in conjunction with their air quality management plans. The model includes factors such as vulnerability caused by poverty, respiratory...

  6. Spatial differences in drought vulnerability

    Science.gov (United States)

    Perčec Tadić, M.; Cindić, K.; Gajić-Čapka, M.; Zaninović, K.

    2012-04-01

    Drought causes the highest economic losses among all hydro-meteorological events in Croatia. It is the most frequent hazard, which produces the highest damages in the agricultural sector. The climate assessment in Croatia according to the aridity index (defined as the ratio of precipitation and potential evapotranspiration) shows that the susceptibility to desertification is present in the warm part of the year and it is mostly pronounced in the Adriatic region and the eastern Croatia lowland. The evidence of more frequent extreme drought events in the last decade is apparent. These facts were motivation to study the drought risk assessment in Croatia. One step in this issue is the construction of the vulnerability map. This map is a complex combination of the geomorphologic and climatological inputs (maps) that are presumed to be natural factors which modify the amount of moisture in the soil. In this study, the first version of the vulnerability map is followed by the updated one that additionally includes the soil types and the land use classes. The first input considered is the geomorphologic slope angle calculated from the digital elevation model (DEM). The SRTM DEM of 100 m resolution is used. The steeper slopes are more likely to lose water and to become dryer. The second climatological parameter, the solar irradiation map, gives for the territory of Croatia the maximum irradiation on the coast. The next meteorological parameter that influences the drought vulnerability is precipitation which is in this assessment included through the precipitation variability expressed by the coefficient of variation. Larger precipitation variability is related with the higher drought vulnerability. The preliminary results for Croatia, according to the recommended procedure in the framework of Drought Management Centre for Southeastern Europe (DMCSEE project), show the most sensitive areas to drought in the southern Adriatic coast and eastern continental lowland.

  7. Virtuous aging and existential vulnerability.

    Science.gov (United States)

    Laceulle, Hanne

    2017-12-01

    In its efforts to overcome problematic views that associate aging with inevitable decline, contemporary gerontology shows a tendency to focus predominantly on age-related vulnerabilities that science may try to remedy and control. However, gerontology should also offer languages to address vulnerabilities that cannot be remedied because they intrinsically belong to the human condition. After all, these are increasingly radically encountered in later life and should therefore be reflected upon in the study of aging. Humanistic gerontology seems to be the most promising field to look for languages capable of contemplating such existential vulnerabilities. The potential contribution of philosophy in this field remains underdeveloped so far, however. This article therefore aims to introduce insights from the philosophical tradition to (humanistic) gerontology. More specifically, it focuses on the tradition of virtue ethics, arguing that virtue is a particularly relevant notion to explore in dealing with existential vulnerability in later life. The notion of virtue is clarified by discussing a selection of philosophical perspectives on this topic, by Aristotle, MacIntyre and Swanton. Next a brief overview will be given of some of the ways the notion of virtue has found its way into gerontological discourse so far. The article ends with an analysis of the merits of virtue-ethical discourse for the study of aging and later life, and pleads for more inclusion of philosophical ideas such as virtue in gerontology, as these can enrich our conceptual frameworks and help us relate to deep existential questions regarding the experience of aging. Copyright © 2017 Elsevier Inc. All rights reserved.

  8. Savannah River Site management response plan for chemical safety vulnerability field assessment. Revision 1

    International Nuclear Information System (INIS)

    Kahal, E.J.; Murphy, S.L.; Salaymeh, S.R.

    1994-09-01

    As part of the U.S. Department of Energy's (DOE) initiative to identify potential chemical safety vulnerabilities in the DOE complex, the Chemical Safety Vulnerability Core Working Group issued a field verification assessment report. While the report concluded that Savannah River Site (SRS) is moving in a positive direction, the report also identified five chemical safety vulnerabilities with broad programmatic impact that are not easily nor quickly remedied. The May 1994 SRS Management Response Plan addressed the five SRS vulnerabilities identified in the field assessment report. The SRS response plan listed observations supporting the vulnerabilities and any actions taken or planned toward resolution. Many of the observations were resolved by simple explanations, such as the existence of implementation plans for Safety Analysis Report updates. Recognizing that correcting individual observations does not suffice in remedying the vulnerabilities, a task team was assembled to address the broader programmatic issues and to recommend corrective actions

  9. Biophysical, Socioeconomic, and Geopolitical Vulnerabilities to Hydropower Development on the Nu River, China

    Directory of Open Access Journals (Sweden)

    Desiree D. Tullos

    2013-09-01

    Full Text Available Rapid hydropower development is occurring in China's Yunnan province in response to increasing clean energy demands, exposing potential vulnerabilities of the area's ecosystems, communities, and geopolitical systems. Here, we present original data on the cultures, economics, hydro-politics, and environments of the Nu River basin, based on household surveys, analysis of geopolitical events, and hydrological, hydraulic, and landscape modeling. We identify sources of vulnerability and investigate relationships among biophysical, socioeconomic, and geopolitical elements that contribute to vulnerability. Our results illustrate the role of geographic isolation in intensifying vulnerability to hydropower development and how access to information, data uncertainty, and geopolitics influence the vulnerability of people and the environment. We emphasize specific needs for developing support mechanisms for social, ecological, and political groups that are vulnerable to hydropower development.

  10. Energy

    CERN Document Server

    Foland, Andrew Dean

    2007-01-01

    Energy is the central concept of physics. Unable to be created or destroyed but transformable from one form to another, energy ultimately determines what is and isn''t possible in our universe. This book gives readers an appreciation for the limits of energy and the quantities of energy in the world around them. This fascinating book explores the major forms of energy: kinetic, potential, electrical, chemical, thermal, and nuclear.

  11. Urban Vulnerability Assessment Using AHP

    Directory of Open Access Journals (Sweden)

    Alireza Rezaei

    2018-01-01

    Full Text Available Purpose. Physical expansion of urban areas and cities is of great importance nowadays. Irreparable damages will thus be caused by lack of proper planning against natural disasters. Crisis management will therefore guide through prevention, preparedness, disaster relief, and recovery by planning an appropriate program. Methodology. Principal processes of crisis management against earthquake in Iran were evaluated and discussed. Multicriteria earthquake crisis management was then proposed by means of Analytic Hierarchy Process (AHP. Vulnerability of 19 urban areas in Qazvin city was studied and analyzed as a case study. Three main criteria were considered as “physical dimensions and physical vulnerability texture,” “the amount of urban texture responsibility to aid after crisis,” and “possibility of city reversibility after the crisis.” These criteria were divided into 20 subcriteria which were prioritized by a questionnaire survey. Findings. “High population density,” “urban texture of old and repairable buildings,” “lack of relief and medical services,” “a few organic texture areas,” “sidewalks with less than 6 meters width in the region,” and “lack of open spaces in the area” were concluded to be the most important reasons causing high vulnerability of urban texture in Qazvin city.

  12. Enhancing protection for vulnerable waters

    Science.gov (United States)

    Creed, Irena F.; Lane, Charles R.; Serran, Jacqueline N.; Alexander, Laurie C.; Basu, Nandita B.; Calhoun, Aram J. K.; Christensen, Jay R.; Cohen, Matthew J.; Craft, Christopher; D'Amico, Ellen; Dekeyser, Edward; Fowler, Laurie; Golden, Heather E.; Jawitz, James W.; Kalla, Peter; Kirkman, L. Katherine; Lang, Megan; Leibowitz, Scott G.; Lewis, David B.; Marton, John; McLaughlin, Daniel L.; Raanan-Kiperwas, Hadas; Rains, Mark C.; Rains, Kai C.; Smith, Lora

    2017-11-01

    Governments worldwide do not adequately protect their limited freshwater systems and therefore place freshwater functions and attendant ecosystem services at risk. The best available scientific evidence compels enhanced protections for freshwater systems, especially for impermanent streams and wetlands outside of floodplains that are particularly vulnerable to alteration or destruction. New approaches to freshwater sustainability -- implemented through scientifically informed adaptive management -- are required to protect freshwater systems through periods of changing societal needs. One such approach introduced in the US in 2015 is the Clean Water Rule, which clarified the jurisdictional scope for federally protected waters. However, within hours of its implementation litigants convinced the US Court of Appeals for the Sixth Circuit to stay the rule, and the subsequently elected administration has now placed it under review for potential revision or rescission. Regardless of its outcome at the federal level, policy and management discussions initiated by the propagation of this rare rulemaking event have potential far-reaching implications at all levels of government across the US and worldwide. At this timely juncture, we provide a scientific rationale and three policy options for all levels of government to meaningfully enhance protection of these vulnerable waters. A fourth option, a 'do-nothing' approach, is wholly inconsistent with the well-established scientific evidence of the importance of these vulnerable waters.

  13. Legislative vulnerability of minority groups.

    Science.gov (United States)

    Paula, Carlos Eduardo Artiaga; Silva, Ana Paula da; Bittar, Cléria Maria Lôbo

    2017-12-01

    Minorities are in an inferior position in society and therefore vulnerable in many aspects. This study analyzes legislative vulnerability and aims to categorize as "weak" or "strong" the protection conferred by law to the following minorities: elderly, disabled, LGBT, Indians, women, children/ adolescents and black people. In order to do so, it was developed a documental research in 30 federal laws in which legal provisions were searched to protect minorities. Next, the articles were organized in the following categories: civil, criminal, administrative, labor and procedural, to be analyzed afterwards. Legal protection was considered "strong" when there were legal provisions that observed the five categories and "weak" when it did not meet this criterion. It was noted that six groups have "strong" legislative protection, which elides the assertion that minorities are outside the law. The exception is the LGBT group, whose legislative protection is weak. In addition, consecrating rights through laws strengthens the institutional channels for minorities to demand their rights. Finally, it was observed that the legislative protection granted tominorities is not homogeneous but rather discriminatory, and there is an interference by the majority group in the rights regulation of vulnerable groups.

  14. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  15. Improving tag/seal technologies: the vulnerability assessment component

    International Nuclear Information System (INIS)

    Jones, J.L.

    1996-01-01

    The Department of Energy (DOE), specifically the Office of Nonproliferation and National Security, has sponsored the development of numerous tag and seal technologies for high-security/high-valued applications. One important component in this technology development effort has been the continuous integration of vulnerability assessments. The Idaho National Engineering Laboratory (INEL) has been the lead laboratory for vulnerability assessments of fiber-optic-based tag/seal technologies. This paper presents a brief historical overview and the current status of the DOE high-security tag/seal development program and discusses INEL's adversarial role and assessment philosophy. Verification testing criteria used to define ''successful'' tampering attempts/attacks are discussed. Finally, the advantages of integrating a vulnerability assessment into the development of commercial security tag/seals are presented

  16. Cotton genetic resources and crop vulnerability

    Science.gov (United States)

    A report on the genetic vulnerability of cotton was provided to the National Genetic Resources Advisory Council. The report discussed crop vulnerabilities associated with emerging diseases, emerging pests, and a narrowing genetic base. To address these crop vulnerabilities, the report discussed the ...

  17. Animal models to study plaque vulnerability

    NARCIS (Netherlands)

    Schapira, K.; Heeneman, S.; Daemen, M. J. A. P.

    2007-01-01

    The need to identify and characterize vulnerable atherosclerotic lesions in humans has lead to the development of various animal models of plaque vulnerability. In this review, current concepts of the vulnerable plaque as it leads to an acute coronary event are described, such as plaque rupture,

  18. Principles of Security Vulnerability Analysis of stationary industrial installations

    International Nuclear Information System (INIS)

    Borysiewicz, M.

    2006-01-01

    Security and safety have been key priorities at facilities that manufacture, store, use, or handle hazardous chemicals, after the terrorist attacks on the United States of September 11, 2001. Security improvements may be needed, especially at sites that pose a more attractive target to terrorists due to their economic importance, perceived level of consequences, and other factors. The first step in the process of managing security risks is to identify and analyze the threats and the vulnerabilities facing a facility by conducting a Security Vulnerability Analysis (SVA). The SVA is a systematic process that evaluates the likelihood that a threat against a facility will be successful. It considers the potential severity of consequences to the facility itself, to the surrounding community and on the energy supply chain. The objective of conducting a SVA is to identify security hazards, threats, and vulnerabilities facing a facility, and to evaluate the countermeasures to provide for the protection of the public, workers, national interests, the environment, and the company. With this information security risks can be assessed and strategies can be formed to reduce vulnerabilities as required. SVA is a tool to assist management in making decisions on the need for countermeasures to address the threats and vulnerabilities. The paper provides an overview of fundamental steps of SVA for stationary industrial installations. (author)

  19. Defining Resilience and Vulnerability Based on Ontology Engineering Approach

    Science.gov (United States)

    Kumazawa, T.; Matsui, T.; Endo, A.

    2014-12-01

    It is necessary to reflect the concepts of resilience and vulnerability into the assessment framework of "Human-Environmental Security", but it is also in difficulty to identify the linkage between both concepts because of the difference of the academic community which has discussed each concept. The authors have been developing the ontology which deals with the sustainability of the social-ecological systems (SESs). Resilience and vulnerability are also the concepts in the target world which this ontology covers. Based on this point, this paper aims at explicating the semantic relationship between the concepts of resilience and vulnerability based on ontology engineering approach. For this purpose, we first examine the definitions of resilience and vulnerability which the existing literatures proposed. Second, we incorporate the definitions in the ontology dealing with sustainability of SESs. Finally, we focus on the "Water-Energy-Food Nexus Index" to assess Human-Environmental Security, and clarify how the concepts of resilience and vulnerability are linked semantically through the concepts included in these index items.

  20. Renewable Energy Feasibility Study Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Rooney, Tim [Antares Group Inc.

    2013-10-30

    The Gila River Indian Community (GRIC or the Community) contracted the ANTARES Group, Inc. (“ANTARES”) to assess the feasibility of solar photovoltaic (PV) installations. A solar energy project could provide a number of benefits to the Community in terms of potential future energy savings, increased employment, environmental benefits from renewable energy generation and usage, and increased energy self-sufficiency. The study addresses a number of facets of a solar project’s overall feasibility, including: Technical appropriateness; Solar resource characteristics and expected system performance; Levelized cost of electricity (LCOE) economic assessment. The Gila River Indian Community (GRIC or the Community) contracted the ANTARES Group, Inc. (“ANTARES”) to prepare a biomass resource assessment study and evaluate the feasibility of a bioenergy project on Community land. A biomass project could provide a number of benefits to the Community in terms of increased employment, environmental benefits from renewable energy generation and usage, and increased energy self-sufficiency. The study addresses a number of facets of a biomass project’s overall feasibility, including: Resource analysis and costs; Identification of potential bioenergy projects; Technical and economic (levelized cost of energy) modeling for selected project configuration.

  1. Measuring vulnerability to disaster displacement

    Science.gov (United States)

    Brink, Susan A.; Khazai, Bijan; Power, Christopher; Wenzel, Friedemann

    2015-04-01

    Large scale disasters can cause devastating impacts in terms of population displacement. Between 2008 and 2013, on average 27 million people were displaced annually by disasters (Yonetani 2014). After large events such as hurricane Katrina or the Port-au-Prince earthquake, images of inadequate public shelter and concerns about large scale and often inequitable migration have been broadcast around the world. Population displacement can often be one of the most devastating and visible impacts of a natural disaster. Despite the importance of population displacement in disaster events, measures to understand the socio-economic vulnerability of a community often use broad metrics to estimate the total socio-economic risk of an event rather than focusing on the specific impacts that a community faces in a disaster. Population displacement is complex and multi-causal with the physical impact of a disaster interacting with vulnerability arising from the response, environmental issues (e.g., weather), cultural concerns (e.g., expectations of adequate shelter), and many individual factors (e.g., mobility, risk perception). In addition to the complexity of the causes, population displacement is difficult to measure because of the wide variety of different terms and definitions and its multi-dimensional nature. When we speak of severe population displacement, we may refer to a large number of displaced people, an extended length of displacement or associated difficulties such as poor shelter quality, risk of violence and crime in shelter communities, discrimination in aid, a lack of access to employment or other difficulties that can be associated with large scale population displacement. We have completed a thorough review of the literature on disaster population displacement. Research has been conducted on historic events to understand the types of negative impacts associated with population displacement and also the vulnerability of different groups to these impacts. We

  2. Energy market barometer report - Winter 2016

    International Nuclear Information System (INIS)

    Schleich, Joachim; Cartel, Melodie; Shao, Evan; Vernay, Anne-Lorene

    2017-01-01

    This Winter 2016 edition of the Grenoble Ecole de Management (GEM) Energy Market Barometer explores the opinion of French energy experts about the decentralization of the electricity sector in France. French experts were also asked where the focus of French energy policy should be in the next five years. Key findings: - French energy experts sense a clear trend toward the decentralization of the French electricity system; - Technology innovation and self-sufficiency for corporations and municipalities are the two major promises of decentralization; - The major barriers to faster decentralization in France are the high price of energy storage systems and the lack of political will; - 74% of experts believe that energy efficiency should be a top priority for French energy policy in the next five years; - Reducing greenhouse gas emissions and facilitating the decentralization of the electricity sector should also be a top priority for French energy policy in the next five years; - Experts are divided over the future of nuclear energy

  3. Memory Vulnerability Diagnosis for Binary Program

    Directory of Open Access Journals (Sweden)

    Tang Feng-Yi

    2016-01-01

    Full Text Available Vulnerability diagnosis is important for program security analysis. It is a further step to understand the vulnerability after it is detected, as well as a preparatory step for vulnerability repair or exploitation. This paper mainly analyses the inner theories of major memory vulnerabilities and the threats of them. And then suggests some methods to diagnose several types of memory vulnerabilities for the binary programs, which is a difficult task due to the lack of source code. The diagnosis methods target at buffer overflow, use after free (UAF and format string vulnerabilities. We carried out some tests on the Linux platform to validate the effectiveness of the diagnosis methods. It is proved that the methods can judge the type of the vulnerability given a binary program.

  4. Energy

    CERN Document Server

    Robertson, William C

    2002-01-01

    Confounded by kinetic energy? Suspect that teaching about simple machines isn t really so simple? Exasperated by electricity? If you fear the study of energy is beyond you, this entertaining book will do more than introduce you to the topic. It will help you actually understand it. At the book s heart are easy-to-grasp explanations of energy basics work, kinetic energy, potential energy, and the transformation of energy and energy as it relates to simple machines, heat energy, temperature, and heat transfer. Irreverent author Bill Robertson suggests activities that bring the basic concepts of energy to life with common household objects. Each chapter ends with a summary and an applications section that uses practical examples such as roller coasters and home heating systems to explain energy transformations and convection cells. The final chapter brings together key concepts in an easy-to-grasp explanation of how electricity is generated. Energy is the second book in the Stop Faking It! series published by NS...

  5. Wind energy in Europe

    International Nuclear Information System (INIS)

    Sesto, E.

    1992-02-01

    Interest in wind energy as a supplementary source for the production of electricity has recently gained renewed momentum due to widespread concern about environmental impacts from the large scale use of fossil fuels and nuclear energy. In addition, political unrest in the Middle East has drawn attention to the importance of national energy self-sufficiency. European government administrations, however, have not yet fully appreciated the real worth of the 'clean energy' afforded by wind energy. In this regard, the European Wind Energy Association (EWEA) is acting as a strong voice to inform the public and energy planners by stimulating international wind energy R ampersand D cooperation, and organizing conferences to explain the advantages of wind energy. In October 1991, EWEA published a strategy document giving a picture of the real possibilities offered by wind energy within the geographical, social, and European economic context. This paper provides an overview of the more significant features to emerge from this document which represents a useful guideline for wind power plant technical/economic feasibility studies in that it contains brief notes on resource availability, land requirements, visual and acoustic impacts, turbine sizing, performance, interconnection to utility grids, maintenance and operating costs, safety, as well as, on marketing aspects

  6. Energy-Water Modeling and Analysis | Energy Analysis | NREL

    Science.gov (United States)

    Generation (ReEDS Model Analysis) U.S. Energy Sector Vulnerabilities to Climate Change and Extreme Weather Modeling and Analysis Energy-Water Modeling and Analysis NREL's energy-water modeling and analysis vulnerabilities from various factors, including water. Example Projects Renewable Electricity Futures Study

  7. Dynamics of immune system vulnerabilities

    Science.gov (United States)

    Stromberg, Sean P.

    The adaptive immune system can be viewed as a complex system, which adapts, over time, to reflect the history of infections experienced by the organism. Understanding its operation requires viewing it in terms of tradeoffs under constraints and evolutionary history. It typically displays "robust, yet fragile" behavior, meaning common tasks are robust to small changes but novel threats or changes in environment can have dire consequences. In this dissertation we use mechanistic models to study several biological processes: the immune response, the homeostasis of cells in the lymphatic system, and the process that normally prevents autoreactive cells from entering the lymphatic system. Using these models we then study the effects of these processes interacting. We show that the mechanisms that regulate the numbers of cells in the immune system, in conjunction with the immune response, can act to suppress autoreactive cells from proliferating, thus showing quantitatively how pathogenic infections can suppress autoimmune disease. We also show that over long periods of time this same effect can thin the repertoire of cells that defend against novel threats, leading to an age correlated vulnerability. This vulnerability is shown to be a consequence of system dynamics, not due to degradation of immune system components with age. Finally, modeling a specific tolerance mechanism that normally prevents autoimmune disease, in conjunction with models of the immune response and homeostasis we look at the consequences of the immune system mistakenly incorporating pathogenic molecules into its tolerizing mechanisms. The signature of this dynamic matches closely that of the dengue virus system.

  8. Vulnerable to HIV / AIDS. Migration.

    Science.gov (United States)

    Fernandez, I

    1998-01-01

    This special report discusses the impact of globalization, patterns of migration in Southeast Asia, gender issues in migration, the links between migration and HIV/AIDS, and spatial mobility and social networks. Migrants are particularly marginalized in countries that blame migrants for transmission of infectious and communicable diseases and other social ills. Effective control of HIV/AIDS among migrant and native populations requires a multisectoral approach. Programs should critically review the privatization of health care services and challenge economic models that polarize the rich and the poor, men and women, North and South, and migrant and native. Programs should recognize the equality between locals and migrants in receipt of health services. Countermeasures should have input from migrants in order to reduce the conditions that increase vulnerability to HIV/AIDS. Gender-oriented research is needed to understand women's role in migration. Rapid assessment has obscured the human dimension of migrants' vulnerability to HIV. Condom promotion is not enough. Migration is a major consequence of globalization, which holds the promise, real or imagined, of prosperity for all. Mass migration can be fueled by explosive regional developments. In Southeast Asia, migration has been part of the process of economic development. The potential to emigrate increases with greater per capita income. "Tiger" economies have been labor importers. Safe sex is not practiced in many Asian countries because risk is not taken seriously. Migrants tend to be used as economic tools, without consideration of social adjustment and sex behavior among singles.

  9. Vulnerability of network of networks

    Science.gov (United States)

    Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.

    2014-10-01

    Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.

  10. Developing new methodology for nuclear power plants vulnerability assessment

    International Nuclear Information System (INIS)

    Kostadinov, Venceslav

    2011-01-01

    Research highlights: → Paper presents new methodology for vulnerability assessment of nuclear power plants. → First universal quantitative risks assessment model for terrorist attack on a NPPs. → New model enhance security, reliability and safe operation of all energy infrastructure. → Significant research benefits: increased NPPs security, reliability and availability. → Useful new tool for PRA application to evaluation of terrorist threats on NPPs. - Abstract: The fundamental aim of an efficient regulatory emergency preparedness and response system is to provide sustained emergency readiness and to prevent emergency situations and accidents. But when an event occurs, the regulatory mission is to mitigate consequences and to protect people and the environment against nuclear and radiological damage. The regulatory emergency response system, which would be activated in the case of a nuclear and/or radiological emergency and release of radioactivity to the environment, is an important element of a comprehensive national regulatory system of nuclear and radiation safety. In the past, national emergency systems explicitly did not include vulnerability assessments of the critical nuclear infrastructure as an important part of a comprehensive preparedness framework. But after the huge terrorist attack on 11/09/2001, decision-makers became aware that critical nuclear infrastructure could also be an attractive target to terrorism, with the purpose of using the physical and radioactive properties of the nuclear material to cause mass casualties, property damage, and detrimental economic and/or environmental impacts. The necessity to evaluate critical nuclear infrastructure vulnerability to threats like human errors, terrorist attacks and natural disasters, as well as preparation of emergency response plans with estimation of optimized costs, are of vital importance for assurance of safe nuclear facilities operation and national security. In this paper presented

  11. Energy

    International Nuclear Information System (INIS)

    1975-10-01

    On the occasion of the World Environment Day the Norwegian Ministry for the Environment held a conference on growth problems in energy consumption. The themes which were treated were energy conservation, hydroelectric power, the role of nuclear power, radioactive waste disposal, fossil fuel resources, ecological limits, pollution and international aspects. Nuclear energy forms the main theme of one lecture and an aspect of several others. (JIW)

  12. Energy

    OpenAIRE

    Torriti, Jacopo

    2016-01-01

    The impact of energy policy measures has been assessed with various appraisal and evaluation tools since the 1960s. Decision analysis, environmental impact assessment and strategic environmental assessment are all notable examples of progenitors of Regulatory Impact Assessment (RIA) in the assessment of energy policies, programmes and projects. This chapter provides overview of policy tools which have been historically applied to assess the impacts of energy policies, programmes and projects....

  13. Energies

    International Nuclear Information System (INIS)

    2003-01-01

    In the framework of the National Debate on the energies in a context of a sustainable development some associations for the environment organized a debate on the nuclear interest facing the renewable energies. The first part presents the nuclear energy as a possible solution to fight against the greenhouse effect and the associated problem of the wastes management. The second part gives information on the solar energy and the possibilities of heat and electric power production. A presentation of the FEE (French wind power association) on the situation and the development of the wind power in France, is also provided. (A.L.B.)

  14. Ringkøbing-Skjern Energy Atlas for municipal energy planning

    DEFF Research Database (Denmark)

    Petrovic, Stefan; Karlsson, Kenneth Bernard

    2015-01-01

    Ringkøbing-Skjern is Denmark's largest municipality, located in the west part of Central Denmark Region. Its medium-term goal is to achieve 100 % self-sufficiency in renewable energy supply by 2020. To achieve this ambitious goal, future courses of action have been outlined in the municipality......'s energy strategy "Energy2020" and divided into five groups: increasing production from wind, bioenergy and other renewable energy sources, reducing heat demand in buildings and converting transportation sector to renewable energy. The analysis of technical, economic and environmental impacts...... of such a variety of technologies on the municipality's energy system requires highly detailed decision support system. For that purpose, GIS-based energy atlas has been developed for Ringkøbing-Skjern municipality. The data about energy supply and demand, transmission and distribution infrastructure, energy...

  15. An holistic view on aquifer vulnerability based on a distinction of different types of vulnerability

    Science.gov (United States)

    De Luca, Domenico Antonio; Lasagna, Manuela; Franchino, Elisa

    2016-04-01

    AN HOLISTIC VIEW ON AQUIFER VULNERABILITY BASED ON A DISTINCTION OF DIFFERENT TYPES OF VULNERABILITY D.A. De Luca1 , M. Lasagna1, E. Franchino1 1Department of Earth Sciences, University of Turin The concept of vulnerability is certainly useful in the field of groundwater protection. Nevertheless, within the scientific community, the definition of groundwater vulnerability is still debatable and not clear and conclusive. This is probably due to the fact that researchers often have very different experiences and education. A positive effect of it is a constant exchange of ideas, but there are also negative consequences and difficulties in deepening the issue. The different approaches are very important but they are usable only if the concept of vulnerability is standardized: thus, for the sake of clarity, a number of definitions should be laid down, based on the different types of vulnerability. These definitions can then provide the necessary holistic view for the aquifer vulnerability assessment. Nowadays vulnerability methods focus on the degree of vulnerability and the parameters needed for its evaluation, often neglecting to clarify what is the type of vulnerability the proposed methods are referred. The type of vulnerability, indeed, is both logically and hierarchically superior to the degree of vulnerability. More specifically the type of vulnerability represents the evaluation of the hydrogeological conditions considered in the vulnerability assessment and able to influence the way in which the contamination can take place. Currently the only distinction, based on of the type of vulnerability, is referred to intrinsic and specific vulnerability. Intrinsic vulnerability assesses the susceptibility of the receptor based on the natural properties of the land and subsurface; specific vulnerability also includes properties of the analyzed contaminant. This distinction is useful but not exhaustive. In addition to this, e.g., a distinction of vertical vulnerability

  16. Assessing the Security Vulnerabilities of Correctional Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Morrison, G.S.; Spencer, D.S.

    1998-10-27

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  17. Drug abuse: vulnerability and transition to addiction.

    Science.gov (United States)

    Le Moal, M

    2009-05-01

    Intrinsic vulnerability is central to the transition of recreational drug use to misuse. Several factors contribute to vulnerability, inherent or acquired, and they account for the huge individual differences observed concerning the propensity to enter in the addiction process. Some of the multifactional causes for a vulnerable phenotype will be examined: genetic factors, age and gender influences, various comorbidities and epidemiological observations. Stress-induced vulnerability will be particularly reviewed because it provides a good model for a pathophysiological research and for relating environmental events to biological consequences of drug vulnerability, namely through the striato-cortical dopamine system. Experimental studies are generally blind concerning these historical factors that contribute vulnerability and a critical evaluation of current animal models is needed. The transition of the last stage of the process, addiction, is conceptualized as a progression from homeostasis to allostasis and then, to pathology.

  18. Vulnerability and resilience: a critical nexus.

    Science.gov (United States)

    Lotz, Mianna

    2016-02-01

    Not all forms of human fragility or vulnerability are unavoidable. Sometimes we knowingly and intentionally impose conditions of vulnerability on others; and sometimes we knowingly and intentionally enter into and assume conditions of vulnerability for ourselves (for example, when we decide to trust or forgive, enter into intimate relationships with others, become a parent, become a subject of medical or psychotherapeutic treatment, and the like). In this article, I propose a presently overlooked basis on which one might evaluate whether the imposition or assumption of vulnerability is acceptable, and on which one might ground a significant class of vulnerability-related obligations. Distinct from existing accounts of the importance of promoting autonomy in conditions of vulnerability, this article offers a preliminary exploration of the nature, role, and importance of resilience promotion, its relationship to autonomy promotion, and its prospects for improving human wellbeing in autonomy inhibiting conditions.

  19. Storifying Samsøs Renewable Energy Transition

    DEFF Research Database (Denmark)

    Papazu, Irina

    2018-01-01

    Through a joint community effort Denmark’s Renewable Energy Island Samsø became self-sufficient with renewable energy over a period of 10 years from 1997 to 2007. Today, the story about Samsø’s successful energy transition has become a global export and a widely known model of community building...... the effects of such well-crafted transition narratives. This tendency toward the ‘storification’ of transition processes is not restricted to Samsø; it is employed as a tactics by environmental organizations operating globally....

  20. Complex processing of rubber waste through energy recovery

    Directory of Open Access Journals (Sweden)

    Roman Smelík

    2015-12-01

    Full Text Available This article deals with the applied energy recovery solutions for complex processing of rubber waste for energy recovery. It deals specifically with the solution that could maximize possible use of all rubber waste and does not create no additional waste that disposal would be expensive and dangerous for the environment. The project is economically viable and energy self-sufficient. The outputs of the process could replace natural gas and crude oil products. The other part of the process is also the separation of metals, which can be returned to the metallurgical secondary production.

  1. Country Stakes in Climate Change Negotiations. Two Dimensions of Vulnerability

    International Nuclear Information System (INIS)

    Buys, P.; Deichmann, U.; Meisner, C.; That, Thao Ton; Wheeler, D.

    2007-01-01

    Using a comprehensive geo-referenced database of indicators relating to global change and energy, the paper assesses countries' likely attitudes with respect to international treaties that regulate carbon emissions. The authors distinguish between source and impact vulnerability and classify countries according to these dimensions. The findings show clear differences in the factors that determine likely negotiating positions. This analysis and the resulting detailed, country level information help to explain the incentives required to make the establishment of such agreements more likely.

  2. Methods to Secure Databases Against Vulnerabilities

    Science.gov (United States)

    2015-12-01

    for several languages such as C, C++, PHP, Java and Python [16]. MySQL will work well with very large databases. The documentation references...using Eclipse and connected to each database management system using Python and Java drivers provided by MySQL , MongoDB, and Datastax (for Cassandra...tiers in Python and Java . Problem MySQL MongoDB Cassandra 1. Injection a. Tautologies Vulnerable Vulnerable Not Vulnerable b. Illegal query

  3. Ransomware - Threats Vulnerabilities And Recommendations

    Directory of Open Access Journals (Sweden)

    Nadeem Shah

    2017-06-01

    Full Text Available Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes imperative that individuals and organization implement the highest levels of security within their devices and infrastructure for optimal protection against these rapidly evolving attacks. Ransomware is one such attack that never fails to surprise in terms of its ability to identify vulnerabilities and loopholes in technology. This paper discusses the categories of ransomware its common attack vectors and provides a threat landscape with the aim to highlight the true potential and destructive nature of such malware based attacks. In this paper we also present the most current ransomware attack that is still a potential threat and also provide recommendations and strategies for prevention and protection against these attacks. A novel solution is also discussed that could be further worked upon in the future by other researchers and vendors of security devices.

  4. Proliferation Vulnerability Red Team report

    Energy Technology Data Exchange (ETDEWEB)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

    1996-10-01

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  5. ICMPv6 RA Flooding Vulnerability Research

    Directory of Open Access Journals (Sweden)

    Linas Jočys

    2016-06-01

    Full Text Available ICMPv6 is the newest version of internet control message protocol, whose main purpose is to send error message indicating packet processing failure. It is know that ICMPv6 is technologically vulnerable. One of those vulnerabilities is the ICMPv6 RA flooding vulnerability, which can lead to systems in Local Area Network slow down or full stop. This paper will discuss Windows (XP, 7, 8.1 and Linux Ubuntu 14 operating systems resistance to RA flooding attack research and countermeasures to minimize this vulnerability.

  6. Vulnerability maps for Druzba crude oil pipeline

    International Nuclear Information System (INIS)

    Hladik, P.; Hosnedl, P.; Buresova, H.; Corbet, J.

    2012-01-01

    Maps of risk for individual environmental aspects within the protection zone of the Czech part of the Druzba crude oil pipeline (505.7 km) were developed based on a modified 'H and V index' method. Risk data were added into a GIS of the Druzba pipeline so that the system could be used as conceptual material in the field of environmental protection (a base for the new SCADA system). Considered environmental aspects were assessed in terms of their vulnerability. The criteria were defined as the vulnerability of the aquatic environment (surface waters and ground waters), the vulnerability of soil environment and the vulnerability of biotic components of the environment. (authors)

  7. Assessing vulnerability of urban African communities

    DEFF Research Database (Denmark)

    Karlsson Nyed, Patrik; Jean-Baptiste, Nathalie; Herslund, Lise Byskov

    2014-01-01

    East African cities are in the process of assessing their vulnerabilities to climate change, but face difficulties in capturing the complexity of the various facets of vulnerability. This holistic approach, captures four different dimensions of vulnerability to flooding - Assets, Institutions......, Attitudes and the Physical environment, with Dar es Salaam, Tanzania, as a case city. The methodology is actively involving the expertise of the stakeholders, and uses GIS to analyze and compile the data. The final output is presented as a comprehensible map, delineating the varying vulnerability...

  8. Commercial Air Carrier Vulnerabilities to Information Operations

    National Research Council Canada - National Science Library

    Shelburn, Bryan H

    2002-01-01

    .... The increasing dependence of government and industry on information technology has created critical vulnerabilities that can be exploited by degrading or destroying the use of information systems...

  9. Mining Bug Databases for Unidentified Software Vulnerabilities

    Energy Technology Data Exchange (ETDEWEB)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  10. A vulnerability-centric requirements engineering framework : Analyzing security attacks, countermeasures, and requirements based on vulnerabilities

    NARCIS (Netherlands)

    Elahi, G.; Yu, E.; Zannone, N.

    2010-01-01

    Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a methodological framework for security requirements

  11. Modeling Coastal Vulnerability through Space and Time.

    Science.gov (United States)

    Hopper, Thomas; Meixler, Marcia S

    2016-01-01

    Coastal ecosystems experience a wide range of stressors including wave forces, storm surge, sea-level rise, and anthropogenic modification and are thus vulnerable to erosion. Urban coastal ecosystems are especially important due to the large populations these limited ecosystems serve. However, few studies have addressed the issue of urban coastal vulnerability at the landscape scale with spatial data that are finely resolved. The purpose of this study was to model and map coastal vulnerability and the role of natural habitats in reducing vulnerability in Jamaica Bay, New York, in terms of nine coastal vulnerability metrics (relief, wave exposure, geomorphology, natural habitats, exposure, exposure with no habitat, habitat role, erodible shoreline, and surge) under past (1609), current (2015), and future (2080) scenarios using InVEST 3.2.0. We analyzed vulnerability results both spatially and across all time periods, by stakeholder (ownership) and by distance to damage from Hurricane Sandy. We found significant differences in vulnerability metrics between past, current and future scenarios for all nine metrics except relief and wave exposure. The marsh islands in the center of the bay are currently vulnerable. In the future, these islands will likely be inundated, placing additional areas of the shoreline increasingly at risk. Significant differences in vulnerability exist between stakeholders; the Breezy Point Cooperative and Gateway National Recreation Area had the largest erodible shoreline segments. Significant correlations exist for all vulnerability (exposure/surge) and storm damage combinations except for exposure and distance to artificial debris. Coastal protective features, ranging from storm surge barriers and levees to natural features (e.g. wetlands), have been promoted to decrease future flood risk to communities in coastal areas around the world. Our methods of combining coastal vulnerability results with additional data and across multiple time

  12. Community energy planning in Canada. The role of renewable energy

    International Nuclear Information System (INIS)

    St Denis, Genevieve; Parker, Paul

    2009-01-01

    An emerging trend in Canada is the creation of community energy plans, where decisions that used to be left to regional level energy agencies or private individuals are now being considered at the community level. A desire to reduce greenhouse gas emissions and to become more energy self-sufficient is driving this change. Theoretically, local level management is desirable because it achieves these goals through improvements in the three areas of energy efficiency, energy conservation and switching to renewable energy sources. The analysis of 10 of the first community energy plans in Canadian communities, ranging in population size from 500 to one million, finds that communities are choosing policies and programs centred on increasing energy efficiency and conservation while renewable energy receives much less attention. Municipal operations were called upon to set higher targets than the general community. Communities that recognized the substantial potential of renewable energy often focused on technologies that the municipal sector could implement, such as bio-fuels for their transportation fleet. Wind, passive solar design, solar photovoltaics and solar thermal options were only recommended in a few cases. Overall, only one of the five larger communities (Calgary) recommended implementing multiple renewable energy technologies while three of the five smaller communities proposed multiple renewable energy sources. The implication is that smaller and more remote communities may be the most willing to lead in the planned introduction of renewable energy systems. (author)

  13. Vulnerability of hydropower generation to climate change in China: Results based on Grey forecasting model

    International Nuclear Information System (INIS)

    Wang, Bing; Liang, Xiao-Jie; Zhang, Hao; Wang, Lu; Wei, Yi-Ming

    2014-01-01

    This paper analyzes the long-term relationships between hydropower generation and climate factors (precipitation), hydropower generation capacity (installed capacity of hydropower station) to quantify the vulnerability of renewable energy production in China for the case of hydropower generation. Furthermore, this study applies Grey forecasting model to forecast precipitation in different provinces, and then sets up different scenarios for precipitation based on the IPCC Special Report on Emission Scenarios and results from PRECIS (Providing Regional Climate projections for Impacts Studies) model. The most important result found in this research is the increasing hydropower vulnerability of the poorest regions and the main hydropower generation provinces of China to climate change. Other main empirical results reveal that the impacts of climate change on the supply of hydropower generation in China will be noteworthy for the society. Different scenarios have different effects on hydropower generation, of which A2 scenario (pessimistic, high emission) has the largest. Meanwhile, the impacts of climate change on hydropower generation of every province are distinctly different, of which the Southwest part has the higher vulnerability than the average level while the central part lower. - Highlights: • The hydropower vulnerability will be enlarged with the rapid increase of hydropower capacity. • Modeling the vulnerability of hydropower in different scenarios and different provinces. • The increasing hydropower vulnerability of the poorest regions to climate change. • The increasing hydropower vulnerability of the main hydropower generation provinces. • Rainfall pattern caused by climate change would be the reason for the increasing vulnerability

  14. Energy demand and supply in Pakistan and possible role or biotechnologies

    International Nuclear Information System (INIS)

    Mumtaz, A.; Naqvi, F.; Khan, A.M.

    1991-01-01

    In spite of the fact that the traditional fuels meet about one third of the country's energy requirements, Pakistan still remains heavily dependent on imported energy to the extent of one third of its total commercial energy needs. This paper analyses the prospects of energy demand and supply over the next fifteen years and shows that with the expected possible exploitation of indigenous resources of fossil, hydro, nuclear and traditional fuels the country is likely to remain significantly dependent on imported commercial fuels. The possibilities of how bio technologies can help in enhancing the energy self sufficiency of the country by increasing supplies of traditional and commercial fuels, are outlined. (author)

  15. IT Security Vulnerability and Incident Response Management

    NARCIS (Netherlands)

    Hafkamp, W.H.M.; Paulus, S.; Pohlman, N.; Reimer, H.

    2006-01-01

    This paper summarises the results of a Dutch PhD research project on IT security vulnerability and incident response management, which is supervised by the University of Twente in the Netherlands and which is currently in its final stage. Vulnerabilities are ‘failures or weaknesses in computer

  16. Vulnerability, Borderline Personality Disorders. Clinical and ...

    African Journals Online (AJOL)

    Borderline personality disorder and vulnerability are difficult to assess and are rather elusive to define. A case study material is presented from a cognitive analytical model. An attempt of the dominant features of cognitive analytical therapy and discussion of vulnerability in relation to personality disorder is provided.

  17. Managing Risk, Reducing Vulnerability and Enhancing Productivity ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Managing Risk, Reducing Vulnerability and Enhancing Productivity under a Changing Climate. The countries of the Greater Horn of Africa are particularly vulnerable to drought, exacerbated by widespread poverty and dependence on rainfed agriculture. Even with normal rainfall, the region does not produce enough food to ...

  18. Reducing vulnerability among pastoralists in Northern Kenya

    International Development Research Centre (IDRC) Digital Library (Canada)

    CCAA

    vulnerability among pastoralist communities in Mandera and Turkana in Northern Kenya, led by the Kenyan NGO ... to understand how people have experienced droughts and other ... norms and gender roles may make them more or less vulnerable, ... and see direct impacts on the resources they depend on for their.

  19. The politics of vulnerability and resilience

    NARCIS (Netherlands)

    Frerks, G.E.; Warner, J.F.; Weijs, B.

    2011-01-01

    Much conceptual confusion exists over the concepts of vulnerability and (social) resilience, reinforced by the different paradigms (the article identifies four) and disciplinary traditions underlying their use. While since the 1980s the social construction of "vulnerability" as a driver for disaster

  20. Climate change vulnerability assessment in Georgia

    Science.gov (United States)

    Binita KC; J. Marshall Shepherd; Cassandra Johnson Gaither

    2015-01-01

    Climate change is occurring in the Southeastern United States, and one manifestation is changes in frequency and intensity of extreme events. A vulnerability assessment is performed in the state of Georgia (United States) at the county level from 1975 to 2012 in decadal increments. Climate change vulnerability is typically measured as a function of exposure to physical...

  1. Predicting Vulnerability Risks Using Software Characteristics

    Science.gov (United States)

    Roumani, Yaman

    2012-01-01

    Software vulnerabilities have been regarded as one of the key reasons for computer security breaches that have resulted in billions of dollars in losses per year (Telang and Wattal 2005). With the growth of the software industry and the Internet, the number of vulnerability attacks and the ease with which an attack can be made have increased. From…

  2. Vulnerability and Adaptation to Climate Change: Agricultural ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-04-21

    Apr 21, 2016 ... Much of this biodiversity is highly vulnerable to climate change. ... an astonishing range of life forms found nowhere else on the planet. ... As well as improving information on climate change vulnerabilities, ... They also note negative effects on traditional knowledge, which is seen as losing its sacred power.

  3. Method of Pentest Synthesis and Vulnerability Detection

    OpenAIRE

    Hahanova Irina Vitalyevna

    2012-01-01

    The structural method for penetration test generation and vulnerability simulation for infrastructure of telecommunication hardwaresoftware information cybernetic systems (CS), focused to protect against unauthorized access the services defined in the system specification by means of penetrating through legal interfaces of component interaction, which have vulnerabilities, is proposed. A protection service infrastructure is created with cybersystem and maintains it during the life cycle, serv...

  4. Current diagnostic modalities for vulnerable plaque detection

    NARCIS (Netherlands)

    J.A. Schaar (Johannes); F. Mastik (Frits); E.S. Regar (Eveline); C.A. den Uil (Corstiaan); F.J.H. Gijsen (Frank); J.J. Wentzel (Jolanda); P.W.J.C. Serruys (Patrick); A.F.W. van der Steen (Ton)

    2007-01-01

    textabstractRupture of vulnerable plaques is the main cause of acute coronary syndrome and myocardial infarction. Identification of vulnerable plaques is therefore essential to enable the development of treatment modalities to stabilize such plaques. Several diagnostic methods are currently tested

  5. Energy concepts for self-supplying communities based on local and renewable energy sources

    DEFF Research Database (Denmark)

    Petersen, Jens-Phillip

    2016-01-01

    The reduction of GHG emissions in buildings is a focus area of national energy policies, because buildings are responsible for a major share of energy consumption. Policies to increase the share of renewable energies and energy efficiency measures are implemented at local scale. Municipalities...... that virtually allow a heating energy and electricity supply fully based on local, renewable energy resources. The most feasible and cost-efficient variant is the use of local food production waste in a CHP plant feeding a district heating grid. The overall aim is to show that a self-sufficient heat......- and electricity supply of typical urban communities is possible and can be implemented in a cost-efficient way, if the energy planning is done systematically and in coherence with urban planning....

  6. Vulnerabilities Classification for Safe Development on Android

    Directory of Open Access Journals (Sweden)

    Ricardo Luis D. M. Ferreira

    2016-06-01

    Full Text Available The global sales market is currently led by devices with the Android operating system. In 2015, more than 1 billion smartphones were sold, of which 81.5% were operated by the Android platform. In 2017, it is estimated that 267.78 billion applications will be downloaded from Google Play. According to Qian, 90% of applications are vulnerable, despite the recommendations of rules and standards for the safe software development. This study presents a classification of vulnerabilities, indicating the vulnerability, the safety aspect defined by the Brazilian Association of Technical Standards (Associação Brasileira de Normas Técnicas - ABNT norm NBR ISO/IEC 27002 which will be violated, which lines of code generate the vulnerability and what should be done to avoid it, and the threat agent used by each of them. This classification allows the identification of possible points of vulnerability, allowing the developer to correct the identified gaps.

  7. Big Data: Concept, Potentialities and Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Fernando Almeida

    2018-03-01

    Full Text Available The evolution of information systems and the growth in the use of the Internet and social networks has caused an explosion in the amount of available data relevant to the activities of the companies. Therefore, the treatment of these available data is vital to support operational, tactical and strategic decisions. This paper aims to present the concept of big data and the main technologies that support the analysis of large data volumes. The potential of big data is explored considering nine sectors of activity, such as financial, retail, healthcare, transports, agriculture, energy, manufacturing, public, and media and entertainment. In addition, the main current opportunities, vulnerabilities and privacy challenges of big data are discussed. It was possible to conclude that despite the potential for using the big data to grow in the previously identified areas, there are still some challenges that need to be considered and mitigated, namely the privacy of information, the existence of qualified human resources to work with Big Data and the promotion of a data-driven organizational culture.

  8. Changing practices of energy consumption

    DEFF Research Database (Denmark)

    Christensen, Toke Haunstrup; Friis, Freja; Skjølsvold, Tomas Moe

    2017-01-01

    to produce hydrogen for transport use), whereas others emphasise the role of individual consumers. The latter approach is dominant within the smart grid vision. In this paper, we explore implications of smart grid technologies in households for the everyday practices related to electricity consumption...... (microgeneration) influence the everyday practices? What kind of influence does the combination of PVs with other “smart” energy technologies have on everyday practices and electricity consumption patterns? A specific focus is on the time patterns of households’ energy consumption. The analysis is based...... settlement scheme (hourly versus annual net metering) and the trial context play a role. Also, the study finds a broader interest in increasing the level of self-sufficiency through combining PVs with home batteries. Finally, the paper discusses a distinct (male) gendering in relation to who is most actively...

  9. Day-Ahead Anticipation of Complex Network Vulnerability

    Science.gov (United States)

    Stefanov, S. Z.; Wang, Paul P.

    2017-11-01

    In this paper, a day-ahead anticipation of complex network vulnerability for an intentional threat of an attack or a shock is carried out. An ecological observer is introduced for that reason, which is a watch in the intentional multiverse, tiled by cells; dynamics of the intentional threat for a day-ahead is characterized by a space-time cell; spreading of the intentional threat is derived from its energy; duration of the intentional threat is found by the self-assembling of a space-time cell; the lower bound of probability is assessed to anticipate for a day-ahead the intentional threat; it is indicated that this vulnerability anticipation for a day-ahead is right when the intentional threat leads to dimension doubling of the complex network.

  10. Vulnerability Assessments and Resilience Planning at Federal Sites

    Energy Technology Data Exchange (ETDEWEB)

    Moss, Richard H. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Blohm, Andrew [Univ. of Maryland, College Park, MD (United States); Delgado, Alison [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Henriques, Justin J. [James Madison Univ., Harrisonburg, VA (United States); Malone, Elizabeth L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-02-01

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Departments of Energy and Defense. The paper provides a framework of steps for climate vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change.

  11. The South African energy scene

    International Nuclear Information System (INIS)

    Burger, H.T.

    1983-01-01

    The basic objective of any energy policy is to ensure that the energy-economy of the country developes in accordance with the national interest and promotes national well-being. Energy policies are necessarily based on the tenet of adequate energy availability at acceptable cost levels. Energy policy will evolve in each country to suit the particular circumstances applicable to that country. The overriding aspect of the South African energy policy is the striving towards maximum energy self-sufficiency under secure conditions. This implies maximum reduction and replacement of imported crude oil within financial and manpower constraints. In South Africa energy is not only one of the most important production factors in national economy, but also an important catalyst and stimulus for economic growth and development. The controlled export of energy can be utilized to enhance foreign exchange earnings. The various energy carriers and elements of the South African energy economy can consequently be discussed and evaluated as they are affected by the energy policy guidelines and objectives

  12. Mexico's energy dilemmas in an interdependent world

    International Nuclear Information System (INIS)

    Bauer, M.

    2008-01-01

    Mexico's energy system is overwhelmingly dependent on hydrocarbons. Although a significant producer of oil and gas, and a considerable exporter of crude oil, it is increasingly dependent on imports of oil products and natural gas for its internal energy demand. In a World where free trade is increasing the interdependence of the industrialized economies, Mexico's energy policy dilemma is basically between maintaining as much as possible its self sufficiency; or relying on imports, while generating oil revenues through exports to invest in developing a diversified economy. Energy demand projections to 2030 are carried out that exhibit the limitations of present available oil and gas proved reserves under past policies. Alternative energy policy scenarios are then examined. (authors)

  13. Renewable energy technologies and the European industry

    International Nuclear Information System (INIS)

    Whiteley, M.; Bess, M.

    2000-01-01

    The European renewable energy industry has the potential to be a world leader. This has been achieved within the European region for specific technologies, through a set of policy activities at a national and regional level, driven primarily by employment, energy self-sufficiency and industrial competitiveness. Using the experience gained in recent years, European industry has the opportunity to continue to expand its horizons on a worldwide level. Through the use of the SAFIRE rational energy model, an assessment has been made of the future penetration of renewable energy within Europe and the effects on these socio-economic factors. In conjunction with these outputs, assessments of the worldwide markets for wind, photovoltaics, solar thermal plant and biomass have been assessed. A case study of the Danish wind industry is used as a prime example of a success story from which the learning opportunities are replicated to other industries, so that the European renewable energy industry can achieve its potential. (orig.)

  14. Renewable Energy Generation in India: Present Scenario and Future Prospects

    DEFF Research Database (Denmark)

    Singh, Sri Niwas; Singh, Bharat; Østergaard, Jacob

    2009-01-01

    The development of Renewable Energy Sources (RES) is necessary for the sustainable development of any country due to depleting fossil fuel level, climbing fossil fuel prices across the world and more recently pressure for reduction emission level. In India, several schemes and policies are launched...... by the government to support the use of RES to achieve energy security and self-sufficiency. This paper discusses the present scenario and future prospects of RES in India. Various schemes such as financial assistance, tax holiday etc for promoting RESs development and utilization are also discussed. The present...

  15. Stress Tests and Vulnerability Assessment

    International Nuclear Information System (INIS)

    Wallner, A.; Lorenz, P.

    2012-01-01

    After the accident in Fukushima, nuclear safety as topic in anti-nuclear work has gained importance within the Joint Project countries. Therefore, nuclear safety and in particular the activities of the European stress tests were chosen to be the main focus of the Joint Project 2011/2012 as well as the common theme of the national projects. This brochure describes: A) Vulnerability Assessment A critical review of the EU Nuclear Stress Tests in Bulgaria, Hungary, Romania and Ukraine is presented in chapter 1. The review details the main weaknesses identified within the stress tests. Important shortcomings not mentioned in the stress tests reports are also discussed. These evaluations do not claim to be exhaustive, but the findings contribute to a more comprehensive understanding of safety and risk of nuclear power plants in Europe. B) Transparency of the stress tests In chapter 2 the experience of the Joint Project NGOs concerning transparency of the stress tests is presented. The information is not meant to be an evaluation of the transparency of the stress tests in general – such an evaluation is not possible within the scope of this brochure. The evaluation aims to show activities concerning stress tests and how they were conceived by the JP NGOs. Some recommendations for improvement are given. C) Safety focus Within the main topic “nuclear safety” of the Joint Project 2011/2012 the NGOs of each JP country selected a special safety relevant topic, which is/was of particular interest in their country: Bulgaria: The short story of Belene NPP – The victory – Key points of the campaign against the nuclear power plant Romania: Risks of the CANDU reactor design Czech Republic: Results of the conference “Power Plant Load Testing: Safety Inspection or Propaganda?“ Slovakia: Safety deficits of the NPP Mochovce These safety relevant issues are discussed in separate sections within the brochure at hand. (author)

  16. Stress Tests and Vulnerability Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Wallner, A. [Austrian Institute of Ecology, Vienna (Austria); Lorenz, P. [ed.; Becker, O. [eds.; Weber, U. [Austrian Institute of Ecology, Vienna (Austria)

    2012-07-01

    After the accident in Fukushima, nuclear safety as topic in anti-nuclear work has gained importance within the Joint Project countries. Therefore, nuclear safety and in particular the activities of the European stress tests were chosen to be the main focus of the Joint Project 2011/2012 as well as the common theme of the national projects. This brochure describes: A) Vulnerability Assessment A critical review of the EU Nuclear Stress Tests in Bulgaria, Hungary, Romania and Ukraine is presented in chapter 1. The review details the main weaknesses identified within the stress tests. Important shortcomings not mentioned in the stress tests reports are also discussed. These evaluations do not claim to be exhaustive, but the findings contribute to a more comprehensive understanding of safety and risk of nuclear power plants in Europe. B) Transparency of the stress tests In chapter 2 the experience of the Joint Project NGOs concerning transparency of the stress tests is presented. The information is not meant to be an evaluation of the transparency of the stress tests in general – such an evaluation is not possible within the scope of this brochure. The evaluation aims to show activities concerning stress tests and how they were conceived by the JP NGOs. Some recommendations for improvement are given. C) Safety focus Within the main topic “nuclear safety” of the Joint Project 2011/2012 the NGOs of each JP country selected a special safety relevant topic, which is/was of particular interest in their country: Bulgaria: The short story of Belene NPP – The victory – Key points of the campaign against the nuclear power plant Romania: Risks of the CANDU reactor design Czech Republic: Results of the conference “Power Plant Load Testing: Safety Inspection or Propaganda?“ Slovakia: Safety deficits of the NPP Mochovce These safety relevant issues are discussed in separate sections within the brochure at hand. (author)

  17. Groundwater vulnerability mapping of Qatar aquifers

    Science.gov (United States)

    Baalousha, Husam Musa

    2016-12-01

    Qatar is one of the most arid countries in the world with limited water resources. With little rainfall and no surface water, groundwater is the only natural source of fresh water in the country. Whilst the country relies mainly on desalination of seawater to secure water supply, groundwater has extensively been used for irrigation over the last three decades, which caused adverse environmental impact. Vulnerability assessment is a widely used tool for groundwater protection and land-use management. Aquifers in Qatar are carbonate with lots of fractures, depressions and cavities. Karst aquifers are generally more vulnerable to contamination than other aquifers as any anthropogenic-sourced contaminant, especially above a highly fractured zone, can infiltrate quickly into the aquifer and spread over a wide area. The vulnerability assessment method presented in this study is based on two approaches: DRASTIC and EPIK, within the framework of Geographical Information System (GIS). Results of this study show that DRASTIC vulnerability method suits Qatar hydrogeological settings more than EPIK. The produced vulnerability map using DRASTIC shows coastal and karst areas have the highest vulnerability class. The southern part of the country is located in the low vulnerability class due to occurrence of shale formation within aquifer media, which averts downward movement of contaminants.

  18. Vulnerability, Health Agency and Capability to Health.

    Science.gov (United States)

    Straehle, Christine

    2016-01-01

    One of the defining features of the capability approach (CA) to health, as developed in Venkatapuram's book Health Justice, is its aim to enable individual health agency. Furthermore, the CA to health hopes to provide a strong guideline for assessing the health-enabling content of social and political conditions. In this article, I employ the recent literature on the liberal concept of vulnerability to assess the CA. I distinguish two kinds of vulnerability. Considering circumstantial vulnerability, I argue that liberal accounts of vulnerability concerned with individual autonomy, align with the CA to health. Individuals should, as far as possible, be able to make health-enabling decisions about their lives, and their capability to do so should certainly not be hindered by public policy. The CA to health and a vulnerability-based analysis then work alongside to define moral responsibilities and designate those who hold them. Both approaches demand social policy to address circumstances that hinder individuals from taking health-enabling decisions. A background condition of vulnerability, on the other hand, even though it hampers the capability for health, does not warrant the strong moral claim proposed by the CA to health to define health as a meta-capability that should guide social policy. Nothing in our designing social policy could change the challenge to health agency when we deal with background conditions of vulnerability. © 2016 John Wiley & Sons Ltd.

  19. A measure of vulnerability and damage tolerance

    International Nuclear Information System (INIS)

    Lind, Niels C.

    1995-01-01

    The purpose of the paper is to present probabilistic definitions of 'vulnerability' and 'damage tolerance'. A new measure of damage is also proposed. Disastrous failures, such as of the Titanic or the Chernobyl reactor, have revealed that some systems can be highly vulnerable. A seemingly insignificant damage can reduce such a system's resistance severely. Attempts to write design code requirements for damage tolerance or structural integrity have not been successful so far. One reason is that these ideas have not been defined with the necessary precision. The suggested definitions aim to be general, applicable to all engineered systems, and readily specializable to particular system types. Vulnerability is defined as the ratio of the failure probability of the damaged system to the failure probability of the undamaged system. It is argued that 'vulnerability' and 'damage tolerance' are complementary concepts. Damage tolerance is defined as the reciprocal of vulnerability. Vulnerability and damage tolerance both concern hypothetical future damage. A damage factor, applicable for the analysis of an existing structure in an assessed state of damage, is defined analogous to vulnerability. Application is illustrated by examples

  20. The BC energy plan : a vision for clean energy leadership

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2007-02-15

    Global warming is a pertinent environmental issue. This report presented a vision and plan for clean energy leadership in British Columbia (BC). The intent of the plan is make the province energy self-sufficient while taking responsibility for the natural environment and climate. The BC energy plan set out targets as well as a strategy for reducing greenhouse gas emissions. The plan outlines the steps that industry, environmental agencies, communities and citizens must take to reach goals for conservation, energy efficiency and clean energy. This report provided highlights of the BC energy plan and discussed energy conservation and efficiency targets. It also discussed electricity security and public ownership of electricity in addition to strategies and policy options for reducing greenhouse gas emissions from electricity. The report presented several policy options for alternative energy including an innovative clean energy fund; generating electricity from mountain pine beatlewood to turn wood waste into energy; and transportation strategies. The report also discussed electricity options such as bioenergy; coal thermal power; geothermal; hydrogen and fuel cell technology; large hydroelectric dams; natural gas; small hydro; solar; tidal energy; and wind. Other topics that were addressed in the report included skills, training and labour; and, oil and gas policy actions. A summary of policy actions was also presented. tabs., figs.

  1. The BC energy plan : a vision for clean energy leadership

    International Nuclear Information System (INIS)

    2007-02-01

    Global warming is a pertinent environmental issue. This report presented a vision and plan for clean energy leadership in British Columbia (BC). The intent of the plan is make the province energy self-sufficient while taking responsibility for the natural environment and climate. The BC energy plan set out targets as well as a strategy for reducing greenhouse gas emissions. The plan outlines the steps that industry, environmental agencies, communities and citizens must take to reach goals for conservation, energy efficiency and clean energy. This report provided highlights of the BC energy plan and discussed energy conservation and efficiency targets. It also discussed electricity security and public ownership of electricity in addition to strategies and policy options for reducing greenhouse gas emissions from electricity. The report presented several policy options for alternative energy including an innovative clean energy fund; generating electricity from mountain pine beatlewood to turn wood waste into energy; and transportation strategies. The report also discussed electricity options such as bioenergy; coal thermal power; geothermal; hydrogen and fuel cell technology; large hydroelectric dams; natural gas; small hydro; solar; tidal energy; and wind. Other topics that were addressed in the report included skills, training and labour; and, oil and gas policy actions. A summary of policy actions was also presented. tabs., figs

  2. Energy balance from Bahia state 2011 - series: 1994-2010

    International Nuclear Information System (INIS)

    2011-01-01

    The present Energy Balance is constituted of six chapters, as follows: the chapter 1 approaches the profile of the energy system, showing the structure of the Bahia state energy matrix i n the year of 2010, and the modifications occurred during the period of 1994-2010; the chapter 2 analyses the evolution during the period of 1994-2010 of the energy offer with aspects of production, exports, imports and consumption; the chapter 3 comprised the evolution of energy consumption by sources and social-economic sectors; chapter 4 focus the evolution of state energy self-sufficiency, confronting the primary energy production with the energy total demand; the chapter 5 contains the balance of the energy transformation centers of the Bahia state; and the chapter 6 contains the consolidated matrixes expressed in the period of 1980, 1985 and 1990-2010

  3. Determining Vulnerability Importance in Environmental Impact Assessment

    International Nuclear Information System (INIS)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-01

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: ► The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. ► The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. ► A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. ► Results in Colombia highlight the usefulness and objectivity of this method.

  4. New energy development and APEC-related energy technology cooperation programs in New Zealand and Australia (March, 1995)

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-03-01

    This paper explains new energy development in New Zealand and Australia. New Zealand produces only 40% of its liquid fuel requirements but is self sufficient in its electricity produced by hydro power and geothermal power. However, the long term outlook is far from healthy due to increasing demand for electricity, depletion of oil and natural gas, and movement against environmental issues relating to the development of hydro and geothermal resources. The government has recognized the need to promote energy efficiency and conservation, and to develop renewable energy resources. However, the total funds allocated are small. The Australian economy has been maintained primarily by exports of coal, minerals and agricultural products. The government has basically deregulated the economy but still plays an important part in determining the direction and allocating funds for R and D in all sectors including energy. Australia is self sufficient in all energies other than oil; hence, there is little incentive in developing alternative fuels. However, there has been an increased interest in new energy technologies stimulated by such issues as global warming gases and exports of energy technology to Asia. (NEDO)

  5. Vulnerability of networks of interacting Markov chains.

    Science.gov (United States)

    Kocarev, L; Zlatanov, N; Trajanov, D

    2010-05-13

    The concept of vulnerability is introduced for a model of random, dynamical interactions on networks. In this model, known as the influence model, the nodes are arranged in an arbitrary network, while the evolution of the status at a node is according to an internal Markov chain, but with transition probabilities that depend not only on the current status of that node but also on the statuses of the neighbouring nodes. Vulnerability is treated analytically and numerically for several networks with different topological structures, as well as for two real networks--the network of infrastructures and the EU power grid--identifying the most vulnerable nodes of these networks.

  6. Nuclear material production cycle vulnerability analysis

    International Nuclear Information System (INIS)

    Bott, T.F.

    1996-01-01

    This paper discusses a method for rapidly and systematically identifying vulnerable equipment in a nuclear material or similar production process and ranking that equipment according to its attractiveness to a malevolent attacker. A multistep approach was used in the analysis. First, the entire production cycle was modeled as a flow diagram. This flow diagram was analyzed using graph theoretical methods to identify processes in the production cycle and their locations. Models of processes that were judged to be particularly vulnerable based on the cycle analysis then were developed in greater detail to identify equipment in that process that is vulnerable to intentional damage

  7. Transdisciplinary knowledge integration : cases from integrated assessment and vulnerability assessment

    NARCIS (Netherlands)

    Hinkel, J.

    2008-01-01

    Keywords: climate change, integrated assessment, knowledge integration, transdisciplinary research, vulnerability, vulnerability assessment.
    This thesis explores how transdisciplinary knowledge integration can be facilitated in the context of integrated assessments and vulnerability

  8. Are older people a vulnerable group? Philosophical and bioethical perspectives on ageing and vulnerability.

    Science.gov (United States)

    Bozzaro, Claudia; Boldt, Joachim; Schweda, Mark

    2018-05-01

    The elderly are often considered a vulnerable group in public and academic bioethical debates and regulations. In this paper, we examine and challenge this assumption and its ethical implications. We begin by systematically delineating the different concepts of vulnerability commonly used in bioethics, before then examining whether these concepts can be applied to old age. We argue that old age should not, in and of itself, be used as a marker of vulnerability, since ageing is a process that can develop in a variety of different ways and is not always associated with particular experiences of vulnerability. We, therefore, turn to more fundamental phenomenological considerations in order to reconstruct from a first person perspective the intricate interconnections between the experiences of ageing and vulnerability. According to this account, ageing and old age are phenomena in which the basic anthropological vulnerability of human beings can manifest itself in an increased likelihood of harm and exploitation. Thus, we plead for a combined model of vulnerability that helps to avoid problems related to the current concepts of vulnerability. We conclude first that old age as such is not a sufficient criterion for being categorized as vulnerable in applied ethics, and second that reflections on ageing can help to develop a better understanding of the central role of vulnerability in human existence and in applied ethics. © 2018 John Wiley & Sons Ltd.

  9. Consumer financial vulnerability: identifying transmission linkages ...

    African Journals Online (AJOL)

    activates the postulated consumer financial vulnerability index (CFVI) .... words, the relationship between income, consumption, debt and saving as well as .... separation/divorce and bad financial management, as well as exogenous factors.

  10. Focus Cities : Reducing the Vulnerability, Poverty and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Focus Cities : Reducing the Vulnerability, Poverty and Environmental Load in ... 000 lives in closely constructed houses built right up to the edge of the Rimac River. ... and the Lima Metropolitan Urban Plan will be updated in light of the results.

  11. Social protection initiatives for Zimbabwe's vulnerable groups ...

    African Journals Online (AJOL)

    Saharan African region. ... especially for vulnerable groups. At independence in 1980, Zimbabwe pledged to promote a viable social protection system that would be predicated on the principles of social justice and equality of opportunity.

  12. evaluation of models for assessing groundwater vulnerability

    African Journals Online (AJOL)

    DR. AMINU

    applied models for groundwater vulnerability assessment mapping. The appraoches .... The overall 'pollution potential' or DRASTIC index is established by applying the formula: DRASTIC Index: ... affected by the structure of the soil surface.

  13. The vulnerability of Palestinian refugees from Syria

    Directory of Open Access Journals (Sweden)

    Leah Morrison

    2014-09-01

    Full Text Available While Syrian nationals may eventually return to their home country, the future for Palestinians from Syria is increasingly uncertain. Meanwhile they are more vulnerable than, and treated worse than, most other refugees from the Syrian conflict.

  14. A Survey of Satellite Communications System Vulnerabilities

    National Research Council Canada - National Science Library

    Steinberger, Jessica A

    2008-01-01

    The U.S. military's increasing reliance on commercial and military communications satellites to enable widely-dispersed, mobile forces to communicate makes these space assets increasingly vulnerable to attack by adversaries...

  15. Climate Change, Household Vulnerability and Smart Agriculture

    International Development Research Centre (IDRC) Digital Library (Canada)

    Marina

    The cost benefits analysis was the main technique used to evaluate alternative adaptation strategies. .... Figure 7 Different vulnerability levels of households from Lambani and Alice . ...... practices and the maintenance of surface residues.

  16. CDC's Social Vulnerability Index (SVI) Mapping Dashboard

    Data.gov (United States)

    U.S. Department of Health & Human Services — The interactive maps are visual representations of the Social Vulnerability Index (SVI). Data were extracted from the US Census and the American Community Survey.

  17. AGRICULTURAL VULNERABILITY TO CLIMATE CHANGE IN ...

    African Journals Online (AJOL)

    victoria

    to adapt to climate change automatically implies vulnerability [14]. Thus, a .... this pattern is that rainfall may not be witnessed when desired for agricultural production .... climate change since it will enhance their ability to adopt innovations and ...

  18. Violence and vulnerabilities: Afghans in Pakistan

    Directory of Open Access Journals (Sweden)

    Sanaa Alimia

    2014-05-01

    Full Text Available Given that the majority of Afghans who live in Pakistan today are unlikely to return to Afghanistan, more needs to be done to address their vulnerabilities and protect them from harassment and violence.

  19. A Critical Analysis of Vulnerability Taxonomies

    National Research Council Canada - National Science Library

    Bishop, Matt; Bailey, David

    1996-01-01

    Computer vulnerabilities seem to be omnipresent. In every system fielded programming errors configuration errors and operation errors have allowed unauthorized users to enter systems or authorized users to take unauthorized actions...

  20. Commercial Air Carrier Vulnerabilities to Information Operations

    National Research Council Canada - National Science Library

    Shelburn, Bryan H

    2002-01-01

    .... Among those elements susceptible to these vulnerabilities are the operations of commercial air carriers that are essential to the military's ability to wage war and project power wherever needed in the world...

  1. 5. Sexual Behaviours and Vulnerabilities to HIV

    African Journals Online (AJOL)

    Esem

    disability are among the poorest, least educated, and ... services can trap people in a cycle of poverty ... vulnerability, the need for attendant care, life in ... instrument by relying on approaches . ...... Training in learning disability for peers that.

  2. Relative seismic shaking vulnerability microzonation using an ...

    Indian Academy of Sciences (India)

    the relative seismic shaking vulnerability for built structures of different height categories within adjacent ..... monitor for possible changes in the microzonation results over time ..... The vehicle's ... A Garmin GPS 12XL was used to determine the.

  3. [Aged woman's vulnerability related to AIDS].

    Science.gov (United States)

    Silva, Carla Marins; Lopes, Fernanda Maria do Valle Martins; Vargens, Octavio Muniz da Costa

    2010-09-01

    This article is a systhematic literature review including the period from 1994 to 2009, whose objective was to discuss the aged woman's vulnerability in relation to Acquired Imunodeficiency Syndrome (Aids). The search for scientific texts was accomplished in the following databases: Biblioteca Virtual em Saúde, Scientific Eletronic Library Online (SciELO), Literatura Latino-Americana e do Caribe em Ciências da Saúde (LILACS) and Medical Literature Analysis and Retrieval System Online (MEDLINE). The descriptors used were vulnerability, woman and Aids. Eighteen texts were analyzed, including articles in scientific journals, thesis and dissertations. As a conclusion, it was noted that aged women and vulnerability to Aids are directly related, through gender characteristics including submission and that were built historical and socially. We consider as fundamental the development of studies which may generate publications accessible to women, in order to help them see themselves as persons vulnerable to Aids contagion just for being women.

  4. Extinction vulnerability of coral reef fishes.

    Science.gov (United States)

    Graham, Nicholas A J; Chabanet, Pascale; Evans, Richard D; Jennings, Simon; Letourneur, Yves; Aaron Macneil, M; McClanahan, Tim R; Ohman, Marcus C; Polunin, Nicholas V C; Wilson, Shaun K

    2011-04-01

    With rapidly increasing rates of contemporary extinction, predicting extinction vulnerability and identifying how multiple stressors drive non-random species loss have become key challenges in ecology. These assessments are crucial for avoiding the loss of key functional groups that sustain ecosystem processes and services. We developed a novel predictive framework of species extinction vulnerability and applied it to coral reef fishes. Although relatively few coral reef fishes are at risk of global extinction from climate disturbances, a negative convex relationship between fish species locally vulnerable to climate change vs. fisheries exploitation indicates that the entire community is vulnerable on the many reefs where both stressors co-occur. Fishes involved in maintaining key ecosystem functions are more at risk from fishing than climate disturbances. This finding is encouraging as local and regional commitment to fisheries management action can maintain reef ecosystem functions pending progress towards the more complex global problem of stabilizing the climate. © 2011 Blackwell Publishing Ltd/CNRS.

  5. The CERT Guide to Coordinated Vulnerability Disclosure

    Science.gov (United States)

    2017-08-11

    Incident vs. Vulnerability Response 6 1.3 Why Coordinate Vulnerability Disclosures? 6 1.4 Previewing the Remainder of this Document 7 2 Principles of...Accidental Leaks 53 6.5 Independent Discovery 54 6.6 Active Exploitation 55 6.7 Relationships that Go Sideways 55 6.8 Hype, Marketing , and...guide provides an introduction to the key concepts, principles , and roles necessary to establish a successful CVD process. It also provides insights

  6. The Vulnerable Subject of Negligence Law

    OpenAIRE

    Stychin, C.

    2012-01-01

    The approach taken by English courts to the duty of care question in negligence has been subject to harsh criticism in recent years. This article examines this fundamental issue in tort law, drawing upon Canadian and Australian jurisprudence by way of comparison. From this analysis, the concept of vulnerability is developed as a productive means of understanding the duty of care. Vulnerability is of increasing interest in legal and political theory and it is of particular relevance to the law...

  7. Wind energy sector in British Columbia

    International Nuclear Information System (INIS)

    2010-01-01

    British Columbia (BC) possesses significant wind energy resources, and many wind energy projects are currently in the planning phase or are already under construction. Wind power policies in the province have been designed to ensure the secure and orderly development of the wind power industry. Policies in the province include a 10-year exemption from participation rents for new projects as well as a policy that has established the maximum permissible noise levels for wind farms located near residential properties. BC's wind power development plan forms part of the province's aim to become electricity self-sufficient by 2016 while ensuring that clean or renewable energy generation accounts for at least 90 per cent of total generation. This guide provided an outline of the province's wind energy sector, and provided a listing of selected wind power operators. Details of new wind power projects were also presented. 11 fig.

  8. Vulnerability assessment at a national level in Georgia

    Science.gov (United States)

    Tsereteli, N.; Arabidze, V.; Varazanashvili, O.; Gugeshashvili, T.

    2012-04-01

    Vulnerability assessment at a national level in Georgia Nino Tsereteli, Vakhtang Arabidze, Otar Varazanashvili, Tengiz Gugeshashvili The risk always exists when cities are built on. Population growth in cities and urbanization in natural hazard-prone zones leads to infrastructure expansion. The goal of the society is to construct natural hazards resistant infrastructure and minimize the expected losses. This is a complicated task as there is always knowledge deficiency on real seismic hazard and vulnerability. Assessment of vulnerability is vital in risk analysis, as vulnerability is defined in many different ways. Work presented here mostly deals with assessment of infrastructure's and population vulnerability at national level in Georgia. This work was initiated by NATO SFP project "seismic Hazard and Risk Assessment for Southern Caucasus - Eastern Turkey Energy Corridors" and the two work packages WP4 (seismic risk) and WP5 (city scenarios) of risk module of EMME (Earthquake Model of the Middle East Region) project. First step was creation databases (inventory) of elements at risk in GIS. Element at risk were the buildings, population, pipelines. The inventories was studied and Created in GIS for the following categories: Building material, number of stories, number of entrances, condition of building, building period. For pipelines pipe tipe (continous or segmented), material, pipe diameter. Very important is to estimate the initial cost of building for assessment of economic losses. From this purpose the attempt was done and the algorithm of this estimation were prepared taking into account obtained the inventory. Build quality, reliability and durability are of special importance to corresponding state agencies and include different aesthetic, engineering, practical, social, technological and economical aspects. The necessity that all of these aspects satisfy existing normative requirements becomes evident as the building and structures come into exploitation

  9. Development of Walking and Self-sufficiency Ability Related to Nutrition among People with Down Syndrome

    Directory of Open Access Journals (Sweden)

    Brantmüller Éva

    2015-05-01

    Full Text Available Development of the walking ability and self-care of patients with Down syndrome is affected by their body weight determining their lifestyle to a great extent. Objectives: The study aimed at the determination of body mass index for persons living in residential institutions and families, exploration its impact on walking and self-care as two, objective factors of life quality. Method: Data collection of persons aged 3-35 with Down syndrome living in families covered seven counties, while those of living in residential institutions covered thirteen counties in Hungary. In the 183 cases studied 76 people in residential institutions, 107 people lived in families. The cross-sectional study was processed by non-random sample selection. The questionnaires were filled out by health visitors and care takers edited by their own. Results: 50.6% of adults and 26.1% of children belonged to the overweight or obese category. Their residence showed a significant correlation with the body mass index (p< 0.001. Overweight and obese persons in families, while thin ones were more prevalent in institutions. Regarding the walking ability and self-care of the persons living in families a significantly higher level of development was achieved (p< 0.001. Walking ability (p = 0.001 and self-care (p = 0,008 were worsened by less body weight significantly, while overweight or obesity influenced it less negatively. Discussion: The claim is not further acceptable whereas persons with Down syndrome are more prone to obesity than average people. However unfavourable weight gain in adults draws attention to the necessity to a healthy diet and regular exercise. The people living in residential institutions with significantly lower body mass index and the associated low development of walking ability and self-care envisages an urgent reform of residential institutions. Life in the institutions negatively affects the walking ability and self-care, and thus significantly reduces the quality of life of persons with Down's syndrome.

  10. Revolutionary Self-Sufficiency: the Diggers' Digging in the English Civil War, 1648-1650

    OpenAIRE

    Levi, Jane

    2016-01-01

    The Diggers were small groups that appeared after the English Civil War who cultivated common land with carrots, beans and corn. This paper looks at the religiosity of the Diggers and how their ideas about bread, creation and the right use of land underpinned their thinking about every aspect of society.

  11. A Self-Service Approach to Promote Self-Sufficiency, Independence and Inclusion Amongst Disabled Students.

    Science.gov (United States)

    Christensen, Lars Ballieu; Stevns, Tanja

    2017-01-01

    This paper presents how SensusAccess has been adapted and is being used in higher education to create inclusive educational environments. Reflecting on challenges of providing alternate versions of educational material to students with disabilities, it also discusses how the service can benefit mainstream learners.

  12. 77 FR 73493 - Notice of Proposed Information Collection: Comment Request Family Self-Sufficiency Program...

    Science.gov (United States)

    2012-12-10

    .... DATES: Comments Due Date: February 8, 2013. ADDRESSES: Interested persons are invited to submit comments... model is needed because participant self-selection into FSS limits the ability to know whether program.... Tracking survey sample 3,000 1 Maximum of 1 hour over 3,000 hours. the tracking period, mainly to update...

  13. From Thaksin's Social Capitalism to Self-sufficiency Economics in Thailand

    DEFF Research Database (Denmark)

    Schmidt, Johannes Dragsbæk

      The intension of this paper is to scrutinize the evolution of economic policy under Thaksin's reign and asks the question whether it was a genuine response to the aftermath of the financial crisis and also whether it was a pro-active socially oriented policy towards the effects of the IMF's aus...

  14. Paradoxes of Sahrawi Refugees' Educational Migration: Promoting Self-Sufficiency or Renewing Dependency?

    Science.gov (United States)

    Fiddian-Qasmiyeh, Elena

    2011-01-01

    Education is often prioritised by refugee children and families, as well as by their political representatives and international actors alike. This article explores the specificities of the Sahrawi refugee education system, focusing in particular on the nature, motivations and implications of Sahrawi refugee youths' educational migration to Cuba…

  15. 75 FR 21022 - Announcement of Funding Awards for the Housing Choice Voucher Family Self-Sufficiency...

    Science.gov (United States)

    2010-04-22

    ...,434 College Park. Avenue, College Park, GA 30337. Housing Authority of the City of 3056 Norman Berry.......... 1803 Norman Street, 86,492 Saginaw, MI 48605. Traverse City Housing Commission. 10200 East Carter 66... Street, 42,405 Charles County. Bowling Green, MO 63334. Housing Authority of Kansas City, 301 East Armour...

  16. Can a decentralized blood system ensure self-sufficiency and blood safety? The Lebanese experience.

    Science.gov (United States)

    Haddad, Antoine; Bou Assi, Tarek; Garraud, Olivier

    2017-08-01

    Lebanon has adopted a liberal economic system that also applies to healthcare procurement. There is no national Lebanese blood transfusion service and the blood supply is divided between a large number of licensed (45 per cent) and unlicensed (55 per cent) blood banks, many of them issuing a very limited number of blood components. All blood banks are hospital based and operate the entire transfusion chain, from collection to the release of blood units. Blood donation is voluntary and non-remunerated in 20-25 per cent of donations; it relies principally on replacement donations. Recently, Lebanon has faced political instability and war, and now welcomes an enormous number of refugees from neighboring countries at war. This has had an important impact on heath care and on the transfusion supply. We discuss the impact of the blood donation organization on the transfusion safety and ethics, to set the foundation for a more developed and safer transfusion programs.

  17. Educational achievement and economic self-sufficiency in adults after childhood bacterial meningitis

    DEFF Research Database (Denmark)

    Roed-Petersen, Casper; Omland, Lars Haukali; Skinhoj, Peter

    2013-01-01

    To our knowledge, no previous study has examined functioning in adult life among persons who had bacterial meningitis in childhood.......To our knowledge, no previous study has examined functioning in adult life among persons who had bacterial meningitis in childhood....

  18. Building Self-Sufficiency among Welfare-Dependent Teenage Parents: Lessons from the Teenage Parent Demonstration.

    Science.gov (United States)

    Maynard, Rebecca, Ed.

    This report synthesizes first-phase evaluation results of the Teenage Parent Demonstration program. This program, whose cornerstone is case management, responded to three concerns: (1) rising welfare caseloads; (2) persistently high rates of teenage pregnancies and births; and (3) the high probability that teenage parents will go onto welfare and…

  19. National Security Strategy and the Munitions' Paradox: Self-Sufficiency or Maximum Efficiency

    National Research Council Canada - National Science Library

    McChesney, Michael

    1998-01-01

    ... that the United States military strategy may not be credible to likely regional aggressors. Conversely, DoD acquisition leadership believes industry consolidation should continue and the munitions base should be expanded to include US allies...

  20. Analysis of U.S. Public Port Profitability and Self-Sufficiency (1985-1994)

    Science.gov (United States)

    1997-06-01

    This is the fourth report published by the Maritime Administration (MARAD) analyzing various factors related to public port financing in the United States. The first report was published in June 1974, and the second in June 1985. The third report, Pu...

  1. 76 FR 55404 - Announcement of Funding Awards Resident Opportunity and Self-Sufficiency (ROSS)-Service...

    Science.gov (United States)

    2011-09-07

    ... Housing 5446 Jenkins Drive... Juneau AK 99801 240,000 Authority. Opelika Housing Authority......... 1706... Authority of Henry County. 125 North Chestnut Kewanee IL 61443 176,493 Street. Knox County Housing Authority...

  2. Women Farmer’s Participation And Empowerment To Support Family Food Self- Sufficiency

    Directory of Open Access Journals (Sweden)

    Maya Safrina Suraningsih

    2016-12-01

    Full Text Available Agricultural development is currently prioritizing on the technical aspects and pays less attention to human factors which resulting in low empowerment of farmers. The patriarchal system which still prevails in rural areas causing the involvement of women in the decision-making process is still very low, so as the importance of empowering women in rural areas in order to make them more confident about themselves and are able to formulate and convey the problems efficiently. The research objectives are (1 to analyze the level of women farmers’ empowerment, and (2 to analyze factors affecting the level of participation and empowerment of women farmers. Data were processed using quantitative analysis supported by qualitative analysis. The results obtained the level of women farmer’s empowerment in medium category, the activities of Women Farmers Group (KWT categories of low in making decisions, increasing the additional income and distribute production, the medium category, namely access to information and regulate family food consumptions, and high category that aspect of utilizing their yards. Factors that mostly affect the empowerment of women farmers are a long time to cultivate the farm yard, the level of income, cosmopolitan level, motivation level, intensity of interaction within the groups, the development of technical capabilities, the intensity of the assistance, government policy support, social environment conduciveness, interpersonal, group, behavior in using media, planning, income utilization, and monitoring and evaluation activities.

  3. Mexico and the food self-sufficiency (six-year period 2006 -2012

    Directory of Open Access Journals (Sweden)

    Alba Rosa Rivera de la Rosa

    2014-01-01

    Full Text Available Today, Mexico challenges a globalization trend where richer countries export basic products to developing countries, generating a food crisis that negatively affect the medium-small producers. For this reason, it is important to study the behavior of the food market (exports and imports, since the current Mexican development model does not achieve that food security be a national policy guaranteeing the provision of food for the entire population. Specifically, this article analyses the performance of the food situation during the six–year period 2006-2012, studying three basic foods for Mexican population (maize, bean, wheat and others strategic food like sugar, sorghum and soy. In addition, it analyzes the performance of harvesting and sowing surface, exports and imports. Results indicated that the three main foods showed had high import growth rates decreasing national harvest and sowing surface, with a trade balance deficit during the six-year period studied. The conclusion is that the local producers need a change in the production dynamics and play a strategic role in the food production with new sustainable alternatives.

  4. Mexico and the food self-sufficiency (six-year period 2006 -2012)

    OpenAIRE

    Alba Rosa Rivera de la Rosa; Rafael Ortiz Pech; Luis Alberto Araújo Andrade; Jesús Amílcar Heredia

    2014-01-01

    Today, Mexico challenges a globalization trend where richer countries export basic products to developing countries, generating a food crisis that negatively affect the medium-small producers. For this reason, it is important to study the behavior of the food market (exports and imports), since the current Mexican development model does not achieve that food security be a national policy guaranteeing the provision of food for the entire popu...

  5. Vulnerability to closing of Hormuz

    Energy Technology Data Exchange (ETDEWEB)

    1984-03-07

    Tankers carrying roughly 8-million barrels per day (mmb/d) of crude oil, or some 16% of the non-communist world's oil supply, pass through the Strait of Hormuz. Experts agree that just 3-mmb/d of that could be exported through alternate routes. If the war between Iran and Iraq should result in their completely halting each other's production, this relatively limited supply curtailment would reduce world oil production by over 3.4-mmb/d. Since the two have not caused such mutual disaster during four years of war, many observers believe there has been a deliberate avoidance of the jugular squeeze. Nevertheless, the two combatants appear capable not only of cutting off their oil production, but escalating fighting to the point where Gulf traffic would be impeded. Potential results from a prolonged Iran-Iraq crisis are viewed in three scenarios. Also included in this issue are brief summaries of: (1) Mexico's new energy plan, internationalism, and OPEC; (2) update on Argentina's energy resource developments; (3) Venezuela: belt tightening; (4) Western Hemisphere oil production declines; (5) (6) days of oil supply for Canada, USA, Japan, France, Italy, and UK; and (6) US Department of Defense fuel consumption. The Energy Detente fuel price/tax series and principal industrial fuel prices are included for March for countries of the Eastern Hemisphere.

  6. Vulnerability Analysis of Physical Protection System at Hypothetical Facility

    International Nuclear Information System (INIS)

    Jung, Won Moog; Lee, Ho Jin; Yu, Dong Han; Min, Gyung Sik

    2006-01-01

    Since the 9/11 event in the U.S.A, International terror possibilities has been increasing for nuclear facilities including nuclear power plants(NPPs). It is necessary to evaluate the performance of an existing physical protection system(PPS) at nuclear facilities based on such malevolent acts. A PPS is a complex configuration of detection, delay, and response elements. Detection, delay, and response elements are all important to the analysis and evaluation of a PPS and its effectiveness. Methods are available to analyze a PPS and evaluate its effectiveness. Sandia National Laboratory(SNL) in the U.S.A was developed a System Analysis of Vulnerability to Intrusion (SAVI) computer code for evaluating the effectiveness of PPS against outsider threats. This study presents the vulnerability analysis of the PPS at hypothetical facility using SAVI code that the basic input parameters are from PPS of Hanaro Research Reactor at Korea Atomic Energy Research Institution. It is understand that PPS of research reactor and critical assemblies are deficient that that of NPP and nuclear materials of RRCAS are compact to transport For analysis, first, the site-specific Adversary Sequence Diagrams(ASDs) of the PPS is constructed. It helps to understand the functions of the existing PPS composed of physical areas and Protection Elements(PEs). Then, the most vulnerable path of an ASD as a measure of effectiveness is determined. The results in the analysis can used to suggest the possible PPS upgrades to the most vulnerable paths for the system like research reactor

  7. Spectral CT imaging of vulnerable plaque with two independent biomarkers

    International Nuclear Information System (INIS)

    Baturin, Pavlo; Alivov, Yahya; Molloi, Sabee

    2012-01-01

    The purpose of this paper is to investigate the feasibility of a novel four-material decomposition technique for assessing the vulnerability of plaque with two contrast materials spectral computer tomography (CT) using two independent markers: plaque's inflammation and spotty calcification. A simulation study was conducted using an energy-sensitive photon-counting detector for k-edge imaging of the coronary arteries. In addition to detecting the inflammation status, which is known as a biological marker of a plaque's vulnerability, we use spotty calcium concentration as an independent marker to test a plaque's vulnerability. We have introduced a new method for detecting and quantifying calcium concentrations in the presence of two contrast materials (iodine and gold), calcium and soft tissue background. In this method, four-material decomposition was performed on a pixel-by-pixel basis, assuming there was an arbitrary mixture of materials in the voxel. The concentrations of iodine and gold were determined by the k-edge material decomposition based on the maximum likelihood method. The calibration curves of the attenuation coefficients, with respect to the concentrations of different materials, were used to separate the calcium signal from both contrast materials and different soft tissues in the mixtures. Three different materials (muscle, blood and lipid) were independently used as soft tissue. The simulations included both ideal and more realistic energy resolving detectors to measure the polychromatic photon spectrum in single slice parallel beam geometry. The ideal detector was used together with a 3 cm diameter digital phantom to demonstrate the decomposition method while a more realistic detector and a 33 × 24 cm 2 digital chest phantom were simulated to validate the vulnerability assessment technique. A 120 kVp spectrum was generated to produce photon flux sufficient for detecting contrast materials above the k-edges of iodine (33.2 keV) and gold (80.7 ke

  8. Hydropower and sustainability: resilience and vulnerability in China's powersheds.

    Science.gov (United States)

    McNally, Amy; Magee, Darrin; Wolf, Aaron T

    2009-07-01

    Large dams represent a whole complex of social, economic and ecological processes, perhaps more than any other large infrastructure project. Today, countries with rapidly developing economies are constructing new dams to provide energy and flood control to growing populations in riparian and distant urban communities. If the system is lacking institutional capacity to absorb these physical and institutional changes there is potential for conflict, thereby threatening human security. In this paper, we propose analyzing sustainability (political, socioeconomic, and ecological) in terms of resilience versus vulnerability, framed within the spatial abstraction of a powershed. The powershed framework facilitates multi-scalar and transboundary analysis while remaining focused on the questions of resilience and vulnerability relating to hydropower dams. Focusing on examples from China, this paper describes the complex nature of dams using the sustainability and powershed frameworks. We then analyze the roles of institutions in China to understand the relationships between power, human security and the socio-ecological system. To inform the study of conflicts over dams China is a particularly useful case study because we can examine what happens at the international, national and local scales. The powershed perspective allows us to examine resilience and vulnerability across political boundaries from a dynamic, process-defined analytical scale while remaining focused on a host of questions relating to hydro-development that invoke drivers and impacts on national and sub-national scales. The ability to disaggregate the affects of hydropower dam construction from political boundaries allows for a deeper analysis of resilience and vulnerability. From our analysis we find that reforms in China's hydropower sector since 1996 have been motivated by the need to create stability at the national scale rather than resilient solutions to China's growing demand for energy and water

  9. Drought vulnerability assesssment and mapping in Morocco

    Science.gov (United States)

    Imani, Yasmina; Lahlou, Ouiam; Bennasser Alaoui, Si; Naumann, Gustavo; Barbosa, Paulo; Vogt, Juergen

    2014-05-01

    Drought vulnerability assessment and mapping in Morocco Authors: Yasmina Imani 1, Ouiam Lahlou 1, Si Bennasser Alaoui 1 Paulo Barbosa 2, Jurgen Vogt 2, Gustavo Naumann 2 1: Institut Agronomique et Vétérinaire Hassan II (IAV Hassan II), Rabat Morocco. 2: European Commission, Joint Research Centre (JRC), Institute for Environment and Sustainability (IES), Ispra, Italy. In Morocco, nearly 50% of the population lives in rural areas. They are mostly small subsistent farmers whose production depends almost entirely on rainfall. They are therefore very sensitive to drought episodes that may dramatically affect their incomes. Although, as a consequence of the increasing frequency, length and severity of drought episodes in the late 90's, the Moroccan government decided, to move on from a crisis to a risk management approach, drought management remains in practice mainly reactive and often ineffective. The lack of effectiveness of public policy is in part a consequence of the poor understanding of drought vulnerability at the rural community level, which prevents the development of efficient mitigation actions and adaptation strategies, tailored to the needs and specificities of each rural community. Thus, the aim of this study is to assess and map drought vulnerability at the rural commune level in the Oum Er-Rbia basin which is a very heterogeneous basin, showing a big variability of climates, landscapes, cropping systems and social habits. Agricultural data collected from the provincial and local administrations of Agriculture and socio-economic data from the National Department of Statistics were used to compute a composite vulnerability index (DVI) integrating four different components: (i) the renewable natural capacity, (ii) the economic capacity, (iii) human and civic resources, and (iv) infrastructure and technology. The drought vulnerability maps that were derived from the computation of the DVI shows that except very specific areas, most of the Oum er Rbia

  10. Utility reconnection services : a new threat to vulnerable consumers?

    International Nuclear Information System (INIS)

    Lott, S.

    2002-10-01

    The current status of deregulation or restructuring of the energy and telecommunications sector in Canada and the United States was examined along with its impact on low-income consumers. In particular, this report examined the electricity, natural gas and telephone utilities and the extent to which reconnection services have emerged in Canada. With deregulation and utility restructuring, investment and pricing decisions are made according to market forces and competition. The core functions of the utility are unbundled into generation, transmission and distribution functions. The main impact on residential consumers is that their source of supply may change. This report also examined the regulatory responses to utility reconnection services and the impact of market segmentation in the energy sector. It focused on Canada's legislative framework that protects vulnerable consumers. It also examined the federal regulatory role in energy and telecommunications, siting Ontario as an example. It was noted that the experience in the United States with market segmentation and its negative impact on vulnerable consumers should provide some warnings for Canada. 75 refs

  11. A knowledge integration approach to flood vulnerability

    Science.gov (United States)

    Mazzorana, Bruno; Fuchs, Sven

    2014-05-01

    Understanding, qualifying and quantifying vulnerability is an essential need for implementing effective and efficient flood risk mitigation strategies; in particular if possible synergies between different mitigation alternatives, such as active and passive measures, should be achieved. In order to combine different risk management options it is necessary to take an interdisciplinary approach to vulnerability reduction, and as a result the affected society may be willing to accept a certain degree of self-responsibility. However, due to differing mono-disciplinary approaches and regional foci undertaken until now, different aspects of vulnerability to natural hazards in general and to floods in particular remain uncovered and as a result the developed management options remain sub-optimal. Taking an even more fundamental viewpoint, the empirical vulnerability functions used in risk assessment specifically fail to capture physical principles of the damage-generating mechanisms to the build environment. The aim of this paper is to partially close this gap by discussing a balanced knowledge integration approach which can be used to resolve the multidisciplinary disorder in flood vulnerability research. Modelling techniques such as mathematical-physical modelling of the flood hazard impact to and response from the building envelope affected, and formative scenario analyses of possible consequences in terms of damage and loss are used in synergy to provide an enhanced understanding of vulnerability and to render the derived knowledge into interdisciplinary mitigation strategies. The outlined formal procedure allows for a convincing knowledge alignment of quantified, but partial, information about vulnerability as a result of the application of physical and engineering notions and valuable, but often underspecified, qualitative argumentation strings emerging from the adopted socio-economic viewpoint.

  12. The modern trends in energy and nuclear industry of Kazakhstan

    International Nuclear Information System (INIS)

    Kenzhemurat, D.; Sergey, K.; Timur, A.

    2000-01-01

    Kazakhstan has in perspective the potential to be self-sufficient in energy resources and also to export such resources to other countries. This article describes the energy sector of Kazakhstan, the perspectives of the development the energy and nuclear industry and shows the problems and methods of its solutions. The energy sector of Kazakhstan has diversified sources of energy resources. The open market of electricity will generate the investments and direct them to the development for more efficiency use of these resources. Rehabilitation of old power stations and their modernisation will allow to cover the future needs of Kazakhstan. The nuclear industry of Kazakhstan has the infrastructure, high-qualified staff, enterprises, reactors and investments for the development. The energy policy of the Republic of Kazakhstan is directed to find the balance between different sources of energy to decrease the emissions of greenhouse gas. (author)

  13. Evaluations of the Synergy of the Water-Energy-Food Nexus

    Science.gov (United States)

    Taniguchi, M.

    2017-12-01

    Analyses of the synergy and tradeoff of the water-energy-food nexus are keys to a sustainable society under the increasing demand for resources. Analyses of the water-energy-food nexus in Kumamoto, Japan showed that the paddy field for rice production, upstream of the basin with irrigated water from the river, had recharged the groundwater which is used as drinking water downstream in Kumamoto city without energy consumption for the transport of groundwater. National government regulations of "fallow rice fields" and urbanization after the 1970s caused the decrease in the groundwater recharge rate upstream in the paddy field area. This also lead to the decrease in water resources of groundwater downstream in Kumamoto city, which then required additional energy for water pumping. Therefore, the synergy of water-energy-food was lost after government regulations of rice production and urbanization which caused an impermeable layer for groundwater recharge. The nexus model has been established to analyze the synergy of water-energy-food, including cost-benefit analyses, food trade including rice with different scenarios of food self-sufficiency rates, water and energy consumption for food, and others. A decrease in rice consumption and production with the same self-sufficiency rate caused a decrease in water and energy consumption for rice production, and a decrease in carbon emissions. However, the cost of synergy loss in the water-energy-food nexus in Kumamoto did not outweigh the benefit of reductions in water and energy consumption for rice production.

  14. Fluctuation between grandiose and vulnerable narcissism.

    Science.gov (United States)

    Gore, Whitney L; Widiger, Thomas A

    2016-10-01

    Current literature on narcissistic personality disorder has emphasized a distinction between grandiose and vulnerable narcissism. Some researchers have further suggested that narcissistic persons fluctuate between grandiose and vulnerable narcissism. However, this perception has been confined largely to clinical experience with no systematic research testing the hypothesis. Clinicians and clinical psychology professors in the current study identified 143 persons who fit a description of either a grandiose or a vulnerable narcissist and indicated the extent to which these persons ever demonstrated traits of the complementary variant. The results supported the fluctuation hypothesis, particularly for episodes of vulnerable narcissism in persons identified as a grandiose narcissist. Correlations of the grandiose and vulnerable narcissism traits with a brief five-factor model measure corroborated past trait descriptions of the 2 respective variants of narcissism. The results of the current study are compared with existing cross-sectional and longitudinal research, and suggestions for future research are provided. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  15. Comparative studies of groundwater vulnerability assessment

    Science.gov (United States)

    Maria, Rizka

    2018-02-01

    Pollution of groundwater is a primary issue because aquifers are susceptible to contamination from land use and anthropogenic impacts. Groundwater susceptibility is intrinsic and specific. Intrinsic vulnerability refers to an aquifer that is susceptible to pollution and to the geological and hydrogeological features. Vulnerability assessment is an essential step in assessing groundwater contamination. This approach provides a visual analysis for helping planners and decision makers to achieve the sustainable management of water resources. Comparative studies are applying different methodologies to result in the basic evaluation of the groundwater vulnerability. Based on the comparison of methods, there are several advantages and disadvantages. SI can be overlaid on DRASTIC and Pesticide DRASTIC to extract the divergence in sensitivity. DRASTIC identifies low susceptibility and underestimates the pollution risk while Pesticide DRASTIC and SI represents better risk and is recommended for the future. SINTACS method generates very high vulnerability zones with surface waters and aquifer interactions. GOD method could be adequate for vulnerability mapping in karstified carbonate aquifers at small-moderate scales, and EPIK method can be used for large scale. GOD method is suitable for designing large area such as land management while DRASTIC has good accuracy and more real use in geoenvironmental detailed studies.

  16. Vulnerability of multiple-barrier systems

    International Nuclear Information System (INIS)

    Lind, N.C.

    1996-01-01

    'Vulnerability' is defined as the ratio of the probability of failure of a damaged system to the probability of failure of the undamaged system. This definition applies to all engineered systems and can be specialized to particular system types. Some disastrous failures (e.g., Chernobyl) have shown that systems can be highly vulnerable. open-quotes Defense in depthclose quotes is a powerful design principle, reducing vulnerability when the consequences of failure can be catastrophic. In the nuclear industry, defense in depth is widely used in radiation protection, reactor control, and shutdown systems. A multiple-barrier system is a simple example of a system that has defense in depth. The idea is that the system is not vulnerable. It cannot fail if one barrier fails because there is another to take its place. This idea is untenable in waste management, but a quantified vulnerability of a system can help owners, designers, and regulators decide how much defense in depth is desirable or enough. Many multiple-barrier systems can be modeled as systems of components physically in a series, each individually able to prevent failure. Components typically have bimodal distributions of the service time to failure, as illustrated by an example of application to a hypothetical nuclear fuel waste repository

  17. Windows Server 2012 vulnerabilities and security

    Directory of Open Access Journals (Sweden)

    Gabriel R. López

    2015-09-01

    Full Text Available This investigation analyses the history of the vulnerabilities of the base system Windows Server 2012 highlighting the most critic vulnerabilities given every 4 months since its creation until the current date of the research. It was organized by the type of vulnerabilities based on the classification of the NIST. Next, given the official vulnerabilities of the system, the authors show how a critical vulnerability is treated by Microsoft in order to countermeasure the security flaw. Then, the authors present the recommended security approaches for Windows Server 2012, which focus on the baseline software given by Microsoft, update, patch and change management, hardening practices and the application of Active Directory Rights Management Services (AD RMS. AD RMS is considered as an important feature since it is able to protect the system even though it is compromised using access lists at a document level. Finally, the investigation of the state of the art related to the security of Windows Server 2012 shows an analysis of solutions given by third parties vendors, which offer security products to secure the base system objective of this study. The recommended solution given by the authors present the security vendor Symantec with its successful features and also characteristics that the authors considered that may have to be improved in future versions of the security solution.

  18. Vulnerabilities in snakebites in Sao Paulo, Brazil

    Directory of Open Access Journals (Sweden)

    Maria Rita Bertolozzi

    2015-01-01

    Full Text Available ABSTRACTOBJECTIVE To describe elements of vulnerability of victims of snakebite.METHODS This qualitative, descriptive, cross-sectional study had, as theoretical framework, the concept of vulnerability in individual, social, and programmatic dimensions. We interviewed 21 patients admitted into a hospital specialized in the care of accidents caused by venomous animals. The interviews were analyzed according to a discourse analysis technique.RESULTS Patients were mainly young men, living in remote countryside areas, where health services frequently have limited resources. We found social and individual conditions of vulnerability, such as precarious schooling, low professional qualification, housing without access to piped water, no sewage treated, and no regular garbage collection, and lack of knowledge on this health problem. Regarding the programmatic dimension, we found limited accessibility to the health services that could affect the prognosis and the frequency of sequelae and deaths.CONCLUSIONS Considering such vulnerabilities evoke the need to improve the program for control the Accidents by Venomous Animals and the training of health workers, we highlight the potential use of the concept of vulnerability, which may amplify the understanding and the recommendations for the practice and education related to snakebites.

  19. Role of green energy towards India's energy security. Paper no. IGEC-1-054

    International Nuclear Information System (INIS)

    Rawool, A.S.; Mitra, S.K.

    2005-01-01

    India's energy consumption is growing rapidly for last three decades. The per capita energy consumption is increasing at an average rate of 3.6% per annum for last two decades. Also, the population of India is increasing at a rate of 1.5 % per annum. This makes it clear that conventional fossil fuel based system will not be able to fulfill the demand of energy in future period. To achieve and maintain desired economic and industrial growth rates, reliable supply of required amount of energy at reasonable cost is a necessity. Encouraging use of non-conventional energy sources on a commercial basis can be a major step towards self sufficiency in energy sector. India has a very large potential for developing and utilizing green energy sources such as wind energy, solar energy, geothermal energy, etc. These sources can satisfy India's growing energy demand to a large extent. Fuel cells can serve as a major source of energy with their clean energy production, higher efficiencies, modularity and ability to give reliable supply of energy at constant rates. Thus, fuel cells serve for diversification and localization of energy sources, which is important for energy security. This paper reviews current energy status of India and presents fuel cell as a prospective candidate for achieving energy security. (author)

  20. Headings for an EEC common energy policy

    International Nuclear Information System (INIS)

    Bailey, R.

    1976-01-01

    Although self-sufficiency in energy supplies during the 1980s may make a purely national UK energy policy look attractive, the author argues that it is in the long-term interest of all nine community members if policy is coordinated on an EEC scale. Any possible common energy policy would probably consist of separate policies for coal, oil, natural gas and nuclear power. It would follow the same general principles as the Common Agricultural Policy in maximising production of coal, natural gas and nuclear power but oil would be covered by negotiating with OPEC for current supplies and treating indigenous supplies as a strategic reserve, with Community finance available for development of marginal fields. (author)

  1. Raw materials for energy generation in Canada

    Energy Technology Data Exchange (ETDEWEB)

    Robertson, D S

    1976-03-01

    Canada is self-sufficient in energy. The energy demand in Canada up to the end of the century is predicted, and the present and future of the oil, gas, coal and uranium industries are considered. Since it is now Canadian policy to restrict export of energy sources, in the future Canada will probably make more domestic use of its coal reserves. An increase is forecast in the use of coal for electricity generation and as a feedstock for synthetic gas. A long lead time and large capital expenditure will be needed before coal can be transported from western Canada to markets in the east of the country. A relatively small amount of the coal reserves are extractable by surface mining, and new underground mining techniques will be needed to extract the extremely friable coal from the deformed seams in the mountains.

  2. Annual Energy Review 1998

    Energy Technology Data Exchange (ETDEWEB)

    Seiferlein, Katherine E. [USDOE Energy Information Administration (EIA), Washington, DC (United States)

    1999-07-01

    Fifty Years of History. That’s what you will find in this report—energy data from 1949 through 1998. Remarkable change occurred in half a century. The U.S. population grew by 82 percent while consumption of energy increased by 194 percent. At the end of the period, the average amount of energy used per person in one year was 62 percent greater than at the beginning. At mid-century, America was nearly self-sufficient in petroleum; we were a net exporter of natural gas; most of our coal came from underground mines and was produced at the rate of seven-tenths of a short ton per miner hour; nuclear electric power had not been developed; and almost twice as much electricity was used at industrial sites as in homes. Near the end of the century, half of the petroleum we use comes from other countries; 15 percent of our natural gas consumption is imported; more of our coal comes from surface mines than underground mines and U.S. miners produce coal at a rate of over 6 short tons per miner hour; about a fifth of U.S. electricity is supplied by nuclear electric power; and residences use more electricity than industrial sites.

  3. Vulnerability of schools to floods in Nyando River catchment, Kenya.

    Science.gov (United States)

    Ochola, Samuel O; Eitel, Bernhard; Olago, Daniel O

    2010-07-01

    This paper assesses the vulnerability of schools to floods in the Nyando River catchment (3,600 km(2)) in western Kenya and identifies measures needed to reduce this vulnerability. It surveys 130 schools in the lower reaches, where flooding is a recurrent phenomenon. Of the primary schools assessed, 40% were vulnerable, 48% were marginally vulnerable and 12% were not vulnerable. Of the secondary schools, 8% were vulnerable, 73% were marginally vulnerable and 19% were not vulnerable. Vulnerability to floods is due to a lack of funds, poor building standards, local topography, soil types and inadequate drainage. The Constituencies Development Fund (CDF), established in 2003, provides financial support to cover school construction and reconstruction costs; CDF Committees are expected to adopt school building standards. In an effort to promote safe and resilient construction and retrofitting to withstand floods, this paper presents vulnerability reduction strategies and recommendations for incorporating minimum standards in the on-going Primary School Infrastructure Programme Design.

  4. Assessing species vulnerability to climate change

    Science.gov (United States)

    Pacifici, Michela; Foden, Wendy B.; Visconti, Piero; Watson, James E. M.; Butchart, Stuart H. M.; Kovacs, Kit M.; Scheffers, Brett R.; Hole, David G.; Martin, Tara G.; Akçakaya, H. Resit; Corlett, Richard T.; Huntley, Brian; Bickford, David; Carr, Jamie A.; Hoffmann, Ary A.; Midgley, Guy F.; Pearce-Kelly, Paul; Pearson, Richard G.; Williams, Stephen E.; Willis, Stephen G.; Young, Bruce; Rondinini, Carlo

    2015-03-01

    The effects of climate change on biodiversity are increasingly well documented, and many methods have been developed to assess species' vulnerability to climatic changes, both ongoing and projected in the coming decades. To minimize global biodiversity losses, conservationists need to identify those species that are likely to be most vulnerable to the impacts of climate change. In this Review, we summarize different currencies used for assessing species' climate change vulnerability. We describe three main approaches used to derive these currencies (correlative, mechanistic and trait-based), and their associated data requirements, spatial and temporal scales of application and modelling methods. We identify strengths and weaknesses of the approaches and highlight the sources of uncertainty inherent in each method that limit projection reliability. Finally, we provide guidance for conservation practitioners in selecting the most appropriate approach(es) for their planning needs and highlight priority areas for further assessments.

  5. The Mental Vulnerability Questionnaire: a psychometric evaluation

    DEFF Research Database (Denmark)

    Eplov, Lene Falgaard; Petersen, Janne; Jørgensen, Torben

    2010-01-01

    The Mental Vulnerability Questionnaire was originally a 22 item scale, later reduced to a 12 item scale. In population studies the 12 item scale has been a significant predictor of health and illness. The scale has not been psychometrically evaluated for more than 30 years, and the aim of the pre......The Mental Vulnerability Questionnaire was originally a 22 item scale, later reduced to a 12 item scale. In population studies the 12 item scale has been a significant predictor of health and illness. The scale has not been psychometrically evaluated for more than 30 years, and the aim...... 0.30 for the 12 and the 22 item scales. All five Mental Vulnerability scales had positively skewed score distributions which were associated significantly with both SCL-90-R symptom scores and NEO-PI-R personality scales (primarily Neuroticism and Extraversion). Coefficient alpha was highest...

  6. Mental vulnerability and survival after cancer

    DEFF Research Database (Denmark)

    Nakaya, Naoki; Bidstrup, Pernille E; Eplov, Lene F

    2009-01-01

    BACKGROUND: It has been hypothesized that personality traits affect survival after cancer, but studies have produced inconsistent results. This study examined the association between mental vulnerability and survival after cancer in Denmark in a prospective cohort study. METHODS: Between 1976...... and 2001, 12733 residents of Copenhagen completed a questionnaire eliciting information on a 12-item mental vulnerability scale, as well as various personal data. Follow-up in the Danish Cancer Registry until 2003 identified 884 incident cases of primary cancer, and follow-up for death from the date...... of cancer diagnosis until 2003 identified 382 deaths. Mental vulnerability scores were divided into 4 approximately equal-sized groups. Cox proportional hazards regression models were used to estimate the hazard ratio (HR) of all-cause mortality. RESULTS: Multivariate HR for all-cause mortality for persons...

  7. Reflexivity and vulnerability in collaborative knowledge production

    DEFF Research Database (Denmark)

    Jakobsen, Helle Nordentoft; Olesen, Birgitte Ravn

    -reports of positive learning outcomes and fails to illuminate how power is always at play leaving certain participants exposed and potentially vulnerable (Fenwick, 2008). As such, it remains unclear how power relations unfold in moment-by-moment interactions including how the researcher’s position matters...... because their voices are subjugated and they appear to be vulnerable. The extent of this development in the peer interactions and the reproductive nature of the knowledge produced were unexpected. In other words we – the researchers – became struck in the analytical process. In the final part of the paper......, we discuss how the reproduction of power relations invokes ethical concerns and raises critical perspectives on the undeniable common good of collaborative research in which participants’ vulnerability may be overlooked in potentially reflexive moments (Nordentoft and Kappel, 2011). Still, we find...

  8. Narcissistic grandiosity and narcissistic vulnerability in psychotherapy.

    Science.gov (United States)

    Pincus, Aaron L; Cain, Nicole M; Wright, Aidan G C

    2014-10-01

    This article briefly summarizes the empirical and clinical literature underlying a contemporary clinical model of pathological narcissism. Unlike the DSM Narcissistic Personality Disorder (NPD), this clinical model identifies and differentiates between two phenotypic themes of dysfunction-narcissistic grandiosity and narcissistic vulnerability-that can be expressed both overtly and covertly in patients' ways of thinking, feeling, behaving, and participating in treatment. Clinical recognition that narcissistic patients can and often do present for psychotherapy in vulnerable states of depression, anxiety, shame, and even suicidality increases the likelihood of accurate diagnosis and effective treatment planning. This article provides case examples derived from psychotherapies with narcissistic patients to demonstrate how narcissistic grandiosity and narcissistic vulnerability concurrently present in patients who seek treatment. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  9. Tactical Vulnerability Assessment Training Program

    International Nuclear Information System (INIS)

    Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.; Paulus, W.K.; Winblad, A.G.; Graves, B.R.

    1987-01-01

    The Department of Energy sponsors a 9-day training program for individuals who are responsible for evaluating and planning safeguards systems and for preparing DOE Master and Security Agreements (MSSAs). These agreements between DOE headquarters and operations offices establish required levels of protection. The curriculum includes: (1) the nature of potential insider and outsider threats involving theft or diversion of special nuclear material, (2) use of computerized tools for evaluating the effectiveness of physical protection and material control and accountability systems, and (3) methods for analyzing the benefits and costs of safeguards improvements and for setting priorities among proposed upgrades. The training program is varied and high interactive. Presentations are intermixed with class discussions and ''hands-on'' analysis using computer tools. At the end of the program, participants demonstrate what they have learned in a two-and-one-half day ''field exercise,'' which is conducted on a facility scale-model. The training program has been conducted six times and has been attended by representatives of all DOE facilities. Additional sessions are planned at four-month intervals. This paper describes the training program, use of the tools in preparing MSSAs for various DOE sites, and recent extensions and refinements of the evaluation tools

  10. Tactical Vulnerability Assessment Training Program

    International Nuclear Information System (INIS)

    Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.; Paulus, W.K.; Winblad, A.E.; Graves, B.R.

    1987-01-01

    The Department of Energy sponsors a 9-day training program for individual who are responsible for evaluating and planning safeguards systems and for preparing DOE Master and Security Agreements (MSSAs). These agreements between DOE headquarters and operations offices establish required levels of protection. The curriculum includes: (1) the nature of potential insider and outsider threats involving theft or diversion of special nuclear material, (2) use of computerized tools for evaluating the effectiveness of physical protection and material control and acoountability systems, and (3) methods for analyzing the benefits and costs of safeguards improvements and for setting priorities among proposed upgrades. The training program is varied and highly interactive. Presentations are intermixed with class discussions and ''hands-on'' analysis using computer tools. At the end of the program, participants demonstrate what they have learned in a two-and-one-half day ''field excercise,'' which is conducted on a facility scale-model. The training programs has been conducted six times and has been attended by representatives of all DOE facilities. Additional sessions are planned at four-month intervals. This paper describes the training program, use of the tools in preparing MSSAs for various DOE sites, and recent extensions and refinements of the evaluation tools

  11. FUEL CASK IMPACT LIMITER VULNERABILITIES

    International Nuclear Information System (INIS)

    Leduc, D.; England, J.; Rothermel, R.

    2009-01-01

    Cylindrical fuel casks often have impact limiters surrounding just the ends of the cask shaft in a typical 'dumbbell' arrangement. The primary purpose of these impact limiters is to absorb energy to reduce loads on the cask structure during impacts associated with a severe accident. Impact limiters are also credited in many packages with protecting closure seals and maintaining lower peak temperatures during fire events. For this credit to be taken in safety analyses, the impact limiter attachment system must be shown to retain the impact limiter following Normal Conditions of Transport (NCT) and Hypothetical Accident Conditions (HAC) impacts. Large casks are often certified by analysis only because of the costs associated with testing. Therefore, some cask impact limiter attachment systems have not been tested in real impacts. A recent structural analysis of the T-3 Spent Fuel Containment Cask found problems with the design of the impact limiter attachment system. Assumptions in the original Safety Analysis for Packaging (SARP) concerning the loading in the attachment bolts were found to be inaccurate in certain drop orientations. This paper documents the lessons learned and their applicability to impact limiter attachment system designs

  12. European information on climate change impacts, vulnerability and adaptation

    Science.gov (United States)

    Jol, A.; Isoard, S.

    2010-09-01

    Vulnerability to natural and technological disasters is increasing due to a combination of intensifying land use, increasing industrial development, further urban expansion and expanding infrastructure and also climate change. At EU level the European Commission's White Paper on adaptation to climate change (published in 2009) highlights that adaptation actions should be focused on the most vulnerable areas and communities in Europe (e.g. mountains, coastal areas, river flood prone areas, Mediterranean, Arctic). Mainstreaming of climate change into existing EU policies will be a key policy, including within the Water Framework Directive, Marine Strategy Framework Directive, Nature protection and biodiversity policies, integrated coastal zone management, other (sectoral) policies (agriculture, forestry, energy, transport, health) and disaster risk prevention. 2010 is the international year on biodiversity and the Conference of Parties of the biodiversity convention will meet in autumn 2010 (Japan) to discuss amongst other post-2010 strategies, objectives and indicators. Both within the Biodiversity Convention (CBD) and the Climate Change Convention (UNFCCC) there is increasing recognition of the need for integration of biodiversity conservation into climate change mitigation and adaptation activities. Furthermore a number of European countries and also some regions have started to prepare and/or have adopted national adaptation plans or frameworks. Sharing of good practices on climate change vulnerability methods and adaptation actions is so far limited, but is essential to improve such plans, at national, sub national and local level where much of the adaptation action is already taking place and will be expanding in future, also involving increasingly the business community. The EU Clearinghouse on CC impacts, vulnerability and adaptation should address these needs and it is planned to be operational end of 2011. The EEA is expected to have a role in its

  13. Vulnerability and controllability of networks of networks

    International Nuclear Information System (INIS)

    Liu, Xueming; Peng, Hao; Gao, Jianxi

    2015-01-01

    Network science is a highly interdisciplinary field ranging from natural science to engineering technology and it has been applied to model complex systems and used to explain their behaviors. Most previous studies have been focus on isolated networks, but many real-world networks do in fact interact with and depend on other networks via dependency connectivities, forming “networks of networks” (NON). The interdependence between networks has been found to largely increase the vulnerability of interacting systems, when a node in one network fails, it usually causes dependent nodes in other networks to fail, which, in turn, may cause further damage on the first network and result in a cascade of failures with sometimes catastrophic consequences, e.g., electrical blackouts caused by the interdependence of power grids and communication networks. The vulnerability of a NON can be analyzed by percolation theory that can be used to predict the critical threshold where a NON collapses. We review here the analytic framework for analyzing the vulnerability of NON, which yields novel percolation laws for n-interdependent networks and also shows that percolation theory of a single network studied extensively in physics and mathematics in the last 50 years is a specific limited case of the more general case of n interacting networks. Understanding the mechanism behind the cascading failure in NON enables us finding methods to decrease the vulnerability of the natural systems and design of more robust infrastructure systems. By examining the vulnerability of NON under targeted attack and studying the real interdependent systems, we find two methods to decrease the systems vulnerability: (1) protect the high-degree nodes, and (2) increase the degree correlation between networks. Furthermore, the ultimate proof of our understanding of natural and technological systems is reflected in our ability to control them. We also review the recent studies and challenges on the

  14. Net Zero Energy Military Installations: A Guide to Assessment and Planning

    Energy Technology Data Exchange (ETDEWEB)

    Booth, S.; Barnett, J.; Burman, K.; Hambrick, J.; Westby, R.

    2010-08-01

    The U.S. Department of Defense (DoD) recognizes the strategic importance of energy to its mission, and is working to reduce energy consumption and enhance energy self-sufficiency by drawing on local clean energy sources. A joint initiative formed between DoD and the U.S. Department of Energy (DOE) in 2008 to address military energy use led to a task force to examine the potential for net zero energy military installations, which would produce as much energy on site as they consume in buildings, facilities, and fleet vehicles. This report presents an assessment and planning process to examine military installations for net zero energy potential. Net Zero Energy Installation Assessment (NZEIA) presents a systematic framework to analyze energy projects at installations while balancing other site priorities such as mission, cost, and security.

  15. Terminological Ontologies for Risk and Vulnerability Analysis

    DEFF Research Database (Denmark)

    Madsen, Bodil Nistrup; Erdman Thomsen, Hanne

    2014-01-01

    Risk and vulnerability analyses are an important preliminary stage in civil contingency planning. The Danish Emergency Management Agency has developed a generic model and a set of tools that may be used in the preparedness planning, i.e. for identifying and describing society’s critical functions......, for formulating threat scenarios and for assessing consequences. Terminological ontologies, which are systems of domain specific concepts comprising concept relations and characteristics, are useful, both when describing the central concepts of risk and vulnerability analysis (meta concepts), and for further...

  16. Urban Vulnerability and Climate Change in Africa

    DEFF Research Database (Denmark)

    Urbanisation and climate change are among the major challenges for sustainable development in Africa. The overall aim of this book is to present innovative approaches to vulnerability analysis and for enhancing the resilience of African cities against climate change-induced risks. Locally adapted...... explores the role of governance in successfully coping with climate-induced risks in urban areas. The book is unique in that it combines: a top-down perspective of climate change modeling with a bottom-up perspective of vulnerability assessment; quantitative approaches from engineering sciences...

  17. The right to health care and vulnerability

    Directory of Open Access Journals (Sweden)

    João Carlos Loureiro

    2017-10-01

    Full Text Available The article seeks to clarify the concept of vulnerability, by taking structural and epochal frailty into account. To understand the right to health care, the author reflects about the fundamental goods, and he then examines how that same right is present in the Portuguese and the Spanish constitutions. The association between vulnerability and the law is also tackled, with a special reference –in dialogue with Herbert Hart– to its fundamental level and to other links between both terms in the field of health. The article closes with a few remarks on posthumanist attempts at saying goodbye to human frailty.

  18. Nuclear and renewable energies, master cards of UK

    International Nuclear Information System (INIS)

    Anon.

    2007-01-01

    UK's greenhouse gas emissions have increased in 2004 and 2005 and the country is no longer self-sufficient with respect to energy supplies. In front of global warming and energy security threats, UK is reconsidering its energy policy. Based on low carbon solutions, the UK energy economy tries to valorize renewable energies: recovery of methane, combined combustion of biomass and fossil fuels, development of offshore wind and wave power, etc. One reason is also for UK to locally recover part of its lost autonomy thanks to energy decentralization. Since 2006, public hearings have been launched to consider a renewal of the present nuclear park, a development of offshore gas storage and LNG terminal facilities and a promotion of cogeneration systems. (J.S.)

  19. An Energy Management Service for the Smart Office

    Directory of Open Access Journals (Sweden)

    Cristina Rottondi

    2015-10-01

    Full Text Available The evolution of the electricity grid towards the smart grid paradigm is fostering the integration of distributed renewable energy sources in smart buildings: a combination of local power generation, battery storage and controllable loads can greatly increase the energetic self-sufficiency of a smart building, enabling it to maximize the self-consumption of photovoltaic electricity and to participate in the energy market, thus taking advantage of time-variable tariffs to achieve economic savings. This paper proposes an energy management infrastructure specifically tailored for a smart office building, which relies on measured data and on forecasting algorithms to predict the future patterns of both local energy generation and power loads. The performance is compared to the optimal energy usage scheduling, which would be obtained assuming the exact knowledge of the future energy production and consumption trends, showing gaps below 10% with respect to the optimum.

  20. Multi-dimensional flood vulnerability assessment using data envelopment analysis

    Science.gov (United States)

    Zahid, Zalina; Saharizan, Nurul Syuhada; Hamzah, Paezah; Hussin, Siti Aida Sheikh; Khairi, Siti Shaliza Mohd

    2017-11-01

    Malaysia has been greatly impacted by flood during monsoon seasons. Even though flood prone areas are well identified, assessment on the vulnerability of the disaster is lacking. Assessment of flood vulnerability, defined as the potential for loss when a disaster occurs, is addressed in this paper. The focus is on the development of flood vulnerability measurement in 11 states in Peninsular Malaysia using a non-parametric approach of Data Envelopment Analysis. Scores for three dimensions of flood vulnerability (Population Vulnerability, Social Vulnerability and Biophysical) were calculated using secondary data of selected input and output variables across an 11-year period from 2004 to 2014. The results showed that Johor and Pahang were the most vulnerable to flood in terms of Population Vulnerability, followed by Kelantan, the most vulnerable to flood in terms of Social Vulnerability and Kedah, Pahang and Terengganu were the most vulnerable to flood in terms of Biophysical Vulnerability among the eleven states. The results also showed that the state of Johor, Pahang and Kelantan to be most vulnerable across the three dimensions. Flood vulnerability assessment is important as it provides invaluable information that will allow the authority to identify and develop plans for flood mitigation and to reduce the vulnerability of flood at the affected regions.

  1. Renewable energy islands in Europe

    Energy Technology Data Exchange (ETDEWEB)

    Oestergaard, Iben [ed.

    1998-12-31

    This publication includes a compiled presentation of various aspects concerning the possible transformation of some European islands into renewable energy communities and these projects were presented by a selection of pioneer islands at the first European Seminar on Renewable Energy Islands, held on the Danish island of Samsoee, 29-30 June 1998. This issue has increased in importance with the presentation of the ambitious EU-White Paper: `Energy for the future: Renewable Sources of Energy` which was adopted in 1998. One of the key elements of the strategy for an accelerated implementation of renewable energy is to transform 100 localities within Europe into communities which are to be 100% self-sufficient with renewable energy before 2010. In line with this strategy, the Danish Government appointed the island of Samsoe towards the end of 1997 to be the first `official` Danish, renewable energy island. This is to serve as a demonstration project for other local communities, both in Denmark as well as in the rest Europe. Gothland, Madeira, Canary Islands, Cape Verde, Arki, Crete, Minorca and Orkney Islands were represented. Environmental advantages of wind, solar and wave power for distant island communities were indicated. Serious savings would be achieved by limitation of fossil fuel import and utilization of local resources. (EG)

  2. Vulnerability Assessments and Resilience Planning at Federal Facilities. Preliminary Synthesis of Project

    Energy Technology Data Exchange (ETDEWEB)

    Moss, R. H. [Pacific Northwest National Lab. (PNNL)/Univ. of Maryland, College Park, MD (United States). Joint Global Change Research Inst.; Blohm, A. J. [Univ. of Maryland, College Park, MD (United States); Delgado, A. [Pacific Northwest National Lab. (PNNL)/Univ. of Maryland, College Park, MD (United States). Joint Global Change Research Inst.; Henriques, J. J. [James Madison Univ., Harrisonburg, VA (United States); Malone, E L. [Pacific Northwest National Lab. (PNNL)/Univ. of Maryland, College Park, MD (United States). Joint Global Change Research Inst.

    2015-08-15

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. Agencies have been experimenting with these frameworks and approaches. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Department of Energy and the Department of Defense. The purpose of the paper is to solicit comments and feedback from interested program managers and analysts before final conclusions are published. The paper describes the characteristics of a systematic process for prioritizing needs for adaptation planning at individual facilities and examines requirements and methods needed. It then suggests a framework of steps for vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change. The case studies point to several preliminary conclusions; (1) Vulnerability assessments are needed to translate potential changes in climate exposure to estimates of impacts and evaluation of their significance for operations and mission attainment, in other words into information that is related to and useful in ongoing planning, management, and decision-making processes; (2) To increase the relevance and utility of vulnerability assessments to site personnel, the assessment process needs to emphasize the characteristics of the site infrastructure, not just climate change; (3) A multi-tiered framework that includes screening, vulnerability assessments at the most vulnerable installations, and adaptation design will efficiently target high-risk sites and infrastructure

  3. Vulnerability of the Nordic power system. Executive summary

    International Nuclear Information System (INIS)

    Doorman, Gerard; Kjoeelle, Gerd; Uhlen, Kjetil; Huse, Einar Staale; Flataboe, Nils

    2004-05-01

    The objective of the analysis is to identify the vulnerability of the Nordic power system, identify barriers to reduce vulnerability in a Nordic context and to propose possible actions. The study focuses on vulnerability with respect to energy shortage, capacity shortage and power system failures. Vulnerability is defined with respect to the unwanted situations ''High prices'', ''Curtailment'' and ''Blackouts''. The main tool of the study is risk analysis, where risk is a result of the probability of an event and its consequences. With respect to energy shortage, the system is in a medium risk state. For the present system the probability of a situation like the 2002/03 winter or considerably worse is once every ten years. Under the assumption that power production increases with increasing demand, the situation will be similar towards 2010. In the opposite case, the risk of extremely high prices increases. With respect to capacity shortage, the system is in a low risk state. This is partly due to actions already taken by the TSOs. The risk state will slightly deteriorate towards 2010. With respect to blackouts, the system is in a medium risk state. This is due to the fact that large blackouts in Southern Scandinavia cannot be completely ruled out. Such blackouts involve many consumers resulting in major or potentially even critical consequences. However this is not different from the situation before deregulation. There are no indications that the situation will become worse towards 2010, but there is uncertainty with regard to the effect of changed maintenance routines. Reductions in qualified technical personnel also gives reason for concern. The study identifies significant differences between the Nordic countries with respect to the framework for transmission system investment, system balancing, rules and price setting in the case of curtailment, congestion management and the handling of import and export. Recommended actions include reduction of regulatory

  4. Chemical Safety Vulnerability Working Group Report

    Energy Technology Data Exchange (ETDEWEB)

    1994-09-01

    This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

  5. Oil Vulnerabilities and United States Strategy

    Science.gov (United States)

    2007-02-08

    Mazda, Mercedes - Benz , Ford, Mercury, and Nissan offer flexible fuel vehicles in the United States. Ethanol is currently produced in the United States...USAWC STRATEGY RESEARCH PROJECT OIL VULNERABILITIES AND UNITED STATES STRATEGY by Colonel Shawn P. Walsh...Colleges and Schools, 3624 Market Street, Philadelphia, PA 19104, (215) 662-5606. The Commission on Higher Education is an institutional accrediting

  6. Retrieval from Memory: Vulnerable or Inviolable?

    Science.gov (United States)

    Jones, Dylan M.; Marsh, John E.; Hughes, Robert W.

    2012-01-01

    We show that retrieval from semantic memory is vulnerable even to the mere presence of speech. Irrelevant speech impairs semantic fluency--namely, lexical retrieval cued by a semantic category name--but only if it is meaningful (forward speech compared to reversed speech or words compared to nonwords). Moreover, speech related semantically to the…

  7. Food fraud vulnerability and its key factors

    NARCIS (Netherlands)

    Ruth, van Saskia M.; Huisman, Wim; Luning, Pieternel A.

    2017-01-01

    Background Food fraud prevention and fraud vulnerability reduction are the first steps to combat food fraud and require a recurrent effort throughout the food supply chain. Due to the intentional nature of fraud, it requires different tactics than the common food safety approaches. However,

  8. Web vulnerability study of online pharmacy sites.

    Science.gov (United States)

    Kuzma, Joanne

    2011-01-01

    Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers' personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The objective is to identify the level of web application security vulnerabilities in online pharmacies and the common types of flaws, thus expanding on prior studies. Technical, managerial and legal recommendations on how to mitigate security issues are presented. The proposed four-step method first consists of choosing an online testing tool. The next steps involve choosing a list of 60 online pharmacy sites to test, and then running the software analysis to compile a list of flaws. Finally, an in-depth analysis is performed on the types of web application vulnerabilities. The majority of sites had serious vulnerabilities, with the majority of flaws being cross-site scripting or old versions of software that have not been updated. A method is proposed for the securing of web pharmacy sites, using a multi-phased approach of technical and managerial techniques together with a thorough understanding of national legal requirements for securing systems.

  9. Vulnerability and Knowledge of Sexually Transmitted Infections ...

    African Journals Online (AJOL)

    Vulnerability and Knowledge of Sexually Transmitted Infections Among Female Traders of Reproductive Age in Enugu, Nigeria. ... Conclusion: The inclusion of health education in schools' curricula to ensure that adolescents are adequately aware of STIs, their modes of transmission, prevention and treatment before ...

  10. Development on Vulnerability Assessment Methods of PPS

    Institute of Scientific and Technical Information of China (English)

    MIAO; Qiang; ZHANG; Wen-liang; BU; Li-xin; YIN; Hong-he; LI; Xin-jun; FANG; Xin

    2013-01-01

    Through investigating information from domestic and abroad,joint the domestic assessment experience,we present a set of physical protection system(PPS)vulnerability assessment methods for on-operating nuclear power plants and for on-designing nuclear facilities.The methods will help to strengthen and upgrade the security measures of the nuclear facilities,improve the effectiveness and

  11. Vulnerability to Climate Change in Rural Nicaragua

    Science.gov (United States)

    Byrne, T. R.; Townshend, I.; Byrne, J. M.; McDaniel, S. A.

    2013-12-01

    While there is a growing recognition of the impact that climate change may have on human development, there has been a shift in focus from an impacts-led assessment approach towards a vulnerability-led assessment approach. This research operationalizes the IPCC's definition of vulnerability in a sub-national assessment to understand how different factors that shape vulnerability to climate change vary spatially across rural Nicaragua. The research utilizes the Food and Agriculture Organization of the United Nations' (FAO UN) CropWat model to evaluate how the annual yield of two of Nicaragua's staple crops may change under projected changes in temperature and precipitation. This analysis of agricultural sensitivity under exposure to climate change is then overlain with an indicator-based assessment of adaptive capacity in rural Nicaraguan farming households. Adaptive capacity was evaluated using household survey data from the 2001 National Household Survey on Living Standards Measurement, which was provided to us by the FAO UN. The result is a map representing current vulnerability to future climate change, and can serve as a basis for targeting policy interventions in rural Nicaragua.

  12. AGRICULTURAL VULNERABILITY TO CLIMATE CHANGE IN ...

    African Journals Online (AJOL)

    victoria

    climate change in eight selected rural settlements in Sokoto State, Nigeria adopting the ... on the environmental and socio-economic determinants of agricultural vulnerability to .... global warming show increasing trends in Sokoto. .... One of the consequences of desertification is southward migration of nomads to the more.

  13. Care and housing for vulnerable elderly

    NARCIS (Netherlands)

    M.M.Y. de Klerk

    2004-01-01

    Original title: Zorg en wonen voor kwetsbare ouderen. There is a general belief that old age automatically brings infirmities, though this is by no means always the case. This edition of the Report on the Elderly investigates which elderly people are vulnerable. They include older persons

  14. Using Fuzz Testing for Searching Software Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Bogdan Leonidovich Kozirsky

    2014-12-01

    Full Text Available This article deals with fuzz testing (fuzzing, a software testing and vulnerability searching technique based on providing inputs of programs with random data and further analysis of their behavior. The basics of implementing cmdline argument fuzzer, environment variable fuzzer and syscall fuzzer in any UNIX-like OS have been closely investigated.

  15. Configuration Fuzzing for Software Vulnerability Detection.

    Science.gov (United States)

    Dai, Huning; Murphy, Christian; Kaiser, Gail

    2010-02-15

    Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environment. One approach to detecting these vulnerabilities is fuzz testing, which feeds a range of randomly modified inputs to a software application while monitoring it for failures. However, typical fuzz testing makes no guarantees regarding the syntactic and semantic validity of the input, or of how much of the input space will be explored. To address these problems, in this paper we present a new testing methodology called configuration fuzzing. Configuration fuzzing is a technique whereby the configuration of the running application is randomly modified at certain execution points, in order to check for vulnerabilities that only arise in certain conditions. As the application runs in the deployment environment, this testing technique continuously fuzzes the configuration and checks "security invariants" that, if violated, indicate a vulnerability; however, the fuzzing is performed in a duplicated copy of the original process, so that it does not affect the state of the running application. In addition to discussing the approach and describing a prototype framework for implementation, we also present the results of a case study to demonstrate the approach's efficiency.

  16. Defense Against National Vulnerabilities in Public Data

    Science.gov (United States)

    2017-02-28

    ingestion of subscription based precision data sources ( Business Intelligence Databases, Monster, others).  Flexible data architecture that allows for...components of program execution from technical design to business and program management, to ensure timely and complete execution of contract...type. Satellite Imagery Adapters Planet and Carto Adapter Juno Services Vulnerability Assessment Framework Computer Model Facebook Graph API

  17. Economic factors of vulnerability trade and exploitation

    NARCIS (Netherlands)

    Allodi, L.

    2017-01-01

    Cybercrime markets support the development and diffusion of new attack technologies, vulnerability exploits, and malware. Whereas the revenue streams of cyber attackers have been studied multiple times in the literature, no quantitative account currently exists on the economics of attack acquisition

  18. Assessing infrastructure vulnerability to major floods

    Energy Technology Data Exchange (ETDEWEB)

    Jenssen, Lars

    1998-12-31

    This thesis proposes a method for assessing the direct effects of serious floods on a physical infrastructure or utility. This method should be useful in contingency planning and in the design of structures likely to be damaged by flooding. A review is given of (1) methods of floodplain management and strategies for mitigating floods, (2) methods of risk analysis that will become increasingly important in flood management, (3) methods for hydraulic computations, (4) a variety of scour assessment methods and (5) applications of geographic information systems (GIS) to the analysis of flood vulnerability. Three computer codes were developed: CULVCAP computes the headwater level for circular and box culverts, SCOUR for assessing riprap stability and scour depths, and FASTFLOOD prepares input rainfall series and input files for the rainfall-runoff model used in the case study. A road system in central Norway was chosen to study how to analyse the flood vulnerability of an infrastructure. Finally, the thesis proposes a method for analysing the flood vulnerability of physical infrastructure. The method involves a general stage that will provide data on which parts of the infrastructure are potentially vulnerable to flooding and how to analyse them, and a specific stage which is concerned with analysing one particular kind of physical infrastructure in a study area. 123 refs., 59 figs., 17 tabs= .

  19. Analysis of computational vulnerabilities in digital repositories

    Directory of Open Access Journals (Sweden)

    Valdete Fernandes Belarmino

    2015-04-01

    Full Text Available Objective. Demonstrates the results of research that aimed to analyze the computational vulnerabilities of digital directories in public Universities. Argues the relevance of information in contemporary societies like an invaluable resource, emphasizing scientific information as an essential element to constitute scientific progress. Characterizes the emergence of Digital Repositories and highlights its use in academic environment to preserve, promote, disseminate and encourage the scientific production. Describes the main software for the construction of digital repositories. Method. The investigation identified and analyzed the vulnerabilities that are exposed the digital repositories using Penetration Testing running. Discriminating the levels of risk and the types of vulnerabilities. Results. From a sample of 30 repositories, we could examine 20, identified that: 5% of the repositories have critical vulnerabilities, 85% high, 25% medium and 100% lowers. Conclusions. Which demonstrates the necessity to adapt actions for these environments that promote informational security to minimizing the incidence of external and / or internal systems attacks.Abstract Grey Text – use bold for subheadings when needed.

  20. The vulnerability and resilience of historic structures

    Czech Academy of Sciences Publication Activity Database

    Drdácký, Miloš

    2017-01-01

    Roč. 11, č. 4 (2017), s. 8-12 ISSN 1842-5631 R&D Projects: GA ČR(CZ) GBP105/12/G059 Institutional support: RVO:68378297 Keywords : emergency situations * vulnerability * resilience * maintenance * cultural heritage Subject RIV: AL - Art, Architecture, Cultural Heritage OBOR OECD: Architecture engineering

  1. Climate change vulnerability map of Southeast Asia

    International Development Research Centre (IDRC) Digital Library (Canada)

    anshory

    Development Studies (CEDS), Padjadjaran University, for his excellent research assistance. ... Malaysia, and Philippines) are the most vulnerable to climate change. 2. ... system to adjust to climate change (including climate variability and extremes), ... national administrative areas in seven countries in Southeast Asia, i.e., ...

  2. Cyber/Physical Security Vulnerability Assessment Integration

    International Nuclear Information System (INIS)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-01-01

    This internally funded Laboratory-Directed R and D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  3. Perceived Vulnerability to Disease Predicts Environmental Attitudes

    Science.gov (United States)

    Prokop, Pavol; Kubiatko, Milan

    2014-01-01

    Investigating predictors of environmental attitudes may bring valuable benefits in terms of improving public awareness about biodiversity degradation and increased pro-environmental behaviour. Here we used an evolutionary approach to study environmental attitudes based on disease-threat model. We hypothesized that people vulnerable to diseases may…

  4. Environmental conflicts and women's vulnerability in Africa

    African Journals Online (AJOL)

    based violence since environmental conflicts increase women's vulnerability .... on 'immediate' and 'hard' security issues over 'everyday politics' has meant that .... these studies provide valuable information about the plight of women and key ..... schools: Case studies from the Durban Metropolitan Area, M.A. dissertation ...

  5. A pragmatic analysis of vulnerability in clinical research.

    Science.gov (United States)

    Wendler, David

    2017-09-01

    Identifying which subjects are vulnerable, and implementing safeguards to protect them, is widely regarded as essential to clinical research. Commentators have endorsed a number of responses to these challenges and have thereby made significant progress in understanding vulnerability in clinical research. At the same time, this literature points to a central contradiction which calls into question its potential to protect vulnerable subjects in practice. Specifically, analysis suggests that all human subjects are vulnerable and vulnerability in clinical research is comparative and context dependent, in the sense that individuals are vulnerable relative to others and in some contexts only. Yet, if everyone is vulnerable, there seems to be no point in citing the vulnerability of some individuals. Moreover, the conclusion that everyone is vulnerable seems inconsistent with the claims that vulnerability is comparative and context dependent, raising concern over whether it will be possible to develop a comprehensive account of vulnerability that is internally consistent. The solution to this dilemma lies in recognition of the fact that the practical significance of claims regarding vulnerability depends on the context in which they are used. The claims that appear to lead to the central contradiction are in fact accurate conclusions that follow from different uses of the term 'vulnerability'. The present manuscript describes this 'pragmatic' approach to vulnerability in clinical research and considers its implications for ensuring that subjects receive appropriate protection. Published 2017. This article is a U.S. Government work and is in the public domain in the USA.

  6. Water vulnerabilities for existing coal-fired power plants.

    Energy Technology Data Exchange (ETDEWEB)

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were

  7. Aircraft vulnerability analysis by modeling and simulation

    Science.gov (United States)

    Willers, Cornelius J.; Willers, Maria S.; de Waal, Alta

    2014-10-01

    Infrared missiles pose a significant threat to civilian and military aviation. ManPADS missiles are especially dangerous in the hands of rogue and undisciplined forces. Yet, not all the launched missiles hit their targets; the miss being either attributable to misuse of the weapon or to missile performance restrictions. This paper analyses some of the factors affecting aircraft vulnerability and demonstrates a structured analysis of the risk and aircraft vulnerability problem. The aircraft-missile engagement is a complex series of events, many of which are only partially understood. Aircraft and missile designers focus on the optimal design and performance of their respective systems, often testing only in a limited set of scenarios. Most missiles react to the contrast intensity, but the variability of the background is rarely considered. Finally, the vulnerability of the aircraft depends jointly on the missile's performance and the doctrine governing the missile's launch. These factors are considered in a holistic investigation. The view direction, altitude, time of day, sun position, latitude/longitude and terrain determine the background against which the aircraft is observed. Especially high gradients in sky radiance occur around the sun and on the horizon. This paper considers uncluttered background scenes (uniform terrain and clear sky) and presents examples of background radiance at all view angles across a sphere around the sensor. A detailed geometrical and spatially distributed radiometric model is used to model the aircraft. This model provides the signature at all possible view angles across the sphere around the aircraft. The signature is determined in absolute terms (no background) and in contrast terms (with background). It is shown that the background significantly affects the contrast signature as observed by the missile sensor. A simplified missile model is constructed by defining the thrust and mass profiles, maximum seeker tracking rate, maximum

  8. Linking Energy- and Land-Use Systems: Energy Potentials and Environmental Risks of Using Agricultural Residues in Tanzania

    Directory of Open Access Journals (Sweden)

    Julia C. Terrapon-Pfaff

    2012-02-01

    Full Text Available This paper attempts to assess whether renewable energy self-sufficiency can be achieved in the crop production and processing sector in Tanzania and if this could be accomplished in an environmentally sustainable manner. In order to answer these questions the theoretical energy potential of process residues from commercially produced agricultural crops in Tanzania is evaluated. Furthermore, a set of sustainability indicators with focus on environmental criteria is applied to identify risks and opportunities of using these residues for energy generation. In particular, the positive and negative effects on the land-use-system (soil fertility, water use and quality, biodiversity, etc. are evaluated. The results show that energy generation with certain agricultural process residues could not only improve and secure the energy supply but could also improve the sustainability of current land-use practices.

  9. Promoting Decentralized Sustainable Energy Systems in Different Supply Scenarios: The Role of Autarky Aspiration

    International Nuclear Information System (INIS)

    Ecker, Franz; Hahnel, Ulf J. J.; Spada, Hans

    2017-01-01

    The development of decentralized renewable energy systems is of crucial importance for the decarbonization of energy generation worldwide. Purchase decisions regarding innovative energy systems depend to some extent on consumers’ perception of the systems’ degree of autarky. We assumed that, in addition to the energetic perspective, consumers associate other non-energetic facets such as independence, autonomy, self-sufficiency, or control with the concept of autarky. These psychological facets of autarky were expected to contribute to purchase decisions. In Study 1, participants (N = 168) evaluated three future energy supply scenarios. The scenarios varied regarding their range of autarky (household/neighborhood/small town), but the individually realized degree of energetic autarky did not vary. Participants reported a higher willingness to pay in connection with a higher perceived psychological autarky for the Household Scenario. Study 1’s findings were confirmed by Study 2, in which qualitative interviews (N = 13) also revealed that participants favored the Household Scenario on several points. These evaluations were driven by the anticipated psychological facets of autarky that is the subjective perception of being independent, autonomous, self-sufficient, energy secure, and of control. To promote an adoption of renewable energy systems, these psychological autarky facets need to be addressed. Enabling the people to self-determine, control, and secure their energy provision even in complex organizational settings in such a manner is likely to increase their acceptance and therefore foster the required social transition as a whole.

  10. Promoting Decentralized Sustainable Energy Systems in Different Supply Scenarios: The Role of Autarky Aspiration

    Directory of Open Access Journals (Sweden)

    Franz Ecker

    2017-07-01

    Full Text Available The development of decentralized renewable energy systems is of crucial importance for the decarbonization of energy generation worldwide. Purchase decisions regarding innovative energy systems depend to some extent on consumers’ perception of the systems’ degree of autarky. We assumed that, in addition to the energetic perspective, consumers associate other non-energetic facets such as independence, autonomy, self-sufficiency, or control with the concept of autarky. These psychological facets of autarky were expected to contribute to purchase decisions. In Study 1, participants (N = 168 evaluated three future energy supply scenarios. The scenarios varied regarding their range of autarky (household/neighborhood/small town, but the individually realized degree of energetic autarky did not vary. Participants reported a higher willingness to pay in connection with a higher perceived psychological autarky for the Household Scenario. Study 1’s findings were confirmed by Study 2, in which qualitative interviews (N = 13 also revealed that participants favored the Household Scenario on several points. These evaluations were driven by the anticipated psychological facets of autarky that is the subjective perception of being independent, autonomous, self-sufficient, energy secure, and of control. To promote an adoption of renewable energy systems, these psychological autarky facets need to be addressed. Enabling the people to self-determine, control, and secure their energy provision even in complex organizational settings in such a manner is likely to increase their acceptance and therefore foster the required social transition as a whole.

  11. Promoting Decentralized Sustainable Energy Systems in Different Supply Scenarios: The Role of Autarky Aspiration

    Energy Technology Data Exchange (ETDEWEB)

    Ecker, Franz, E-mail: franz.ecker@psychologie.uni-freiburg.de [Cognition, Action and Sustainability Unit, Department of Psychology, Albert-Ludwigs University of Freiburg, Freiburg (Germany); Hahnel, Ulf J. J. [Consumer Decision and Sustainable Behavior Lab, Department of Psychology, University of Geneva, Geneva (Switzerland); Spada, Hans [Cognition, Action and Sustainability Unit, Department of Psychology, Albert-Ludwigs University of Freiburg, Freiburg (Germany)

    2017-07-10

    The development of decentralized renewable energy systems is of crucial importance for the decarbonization of energy generation worldwide. Purchase decisions regarding innovative energy systems depend to some extent on consumers’ perception of the systems’ degree of autarky. We assumed that, in addition to the energetic perspective, consumers associate other non-energetic facets such as independence, autonomy, self-sufficiency, or control with the concept of autarky. These psychological facets of autarky were expected to contribute to purchase decisions. In Study 1, participants (N = 168) evaluated three future energy supply scenarios. The scenarios varied regarding their range of autarky (household/neighborhood/small town), but the individually realized degree of energetic autarky did not vary. Participants reported a higher willingness to pay in connection with a higher perceived psychological autarky for the Household Scenario. Study 1’s findings were confirmed by Study 2, in which qualitative interviews (N = 13) also revealed that participants favored the Household Scenario on several points. These evaluations were driven by the anticipated psychological facets of autarky that is the subjective perception of being independent, autonomous, self-sufficient, energy secure, and of control. To promote an adoption of renewable energy systems, these psychological autarky facets need to be addressed. Enabling the people to self-determine, control, and secure their energy provision even in complex organizational settings in such a manner is likely to increase their acceptance and therefore foster the required social transition as a whole.

  12. Groundwater vulnerability maps for pesticides for Flanders

    Science.gov (United States)

    Dams, Jef; Joris, Ingeborg; Bronders, Jan; Van Looy, Stijn; Vanden Boer, Dirk; Heuvelmans, Griet; Seuntjens, Piet

    2017-04-01

    Pesticides are increasingly being detected in shallow groundwater and and are one of the main causes of the poor chemical status of phreatic groundwater bodies in Flanders. There is a need for groundwater vulnerability maps in order to design monitoring strategies and land-use strategies for sensitive areas such as drinking water capture zones. This research focuses on the development of generic vulnerability maps for pesticides for Flanders and a tool to calculate substance-specific vulnerability maps at the scale of Flanders and at the local scale. (1) The generic vulnerability maps are constructed using an index based method in which maps of the main contributing factors in soil and saturated zone to high concentrations of pesticides in groundwater are classified and overlain. Different weights are assigned to the contributing factors according to the type of pesticide (low/high mobility, low/high persistence). Factors that are taken into account are the organic matter content and texture of soil, depth of the unsaturated zone, organic carbon and redox potential of the phreatic groundwater and thickness and conductivity of the phreatic layer. (2) Secondly a tool is developed that calculates substance-specific vulnerability maps for Flanders using a hybrid approach where a process-based leaching model GeoPEARL is combined with vulnerability indices that account for dilution in the phreatic layer. The GeoPEARL model is parameterized for Flanders in 1434 unique combinations of soil properties, climate and groundwater depth. Leaching is calculated for a 20 year period for each 50 x 50 m gridcell in Flanders. (3) At the local scale finally, a fully process-based approach is applied combining GeoPEARL leaching calculations and flowline calculations of pesticide transport in the saturated zone to define critical zones in the capture zone of a receptor such as a drinking water well or a river segment. The three approaches are explained more in detail and illustrated

  13. Government in energy affairs - perspectives and alternatives

    International Nuclear Information System (INIS)

    Neethling, D.C.

    1986-01-01

    The present role of the South African Government in energy policy formulation and implementation is assessed in the light of its possible future evolvement, particularly with reference to the tabling of a White Paper on Energy policy during 1986. The brief of the Ministry of Mineral and Energy Affairs is firstly assessed with particular reference to the energy-related functions of the Department itself and those of the various parastatal and statutory organisations and institutions. The various executive and regulatory functions which circumscribe the involvement of government in energy procurement, production and distribution, are critically reviewed in the light of possible further deregulation and the establishment of a more market-orientated energy economy in South Africa. Secondly, the administrative and consultative mechanisms are identified which are believed to be appropriate for the successful co-ordination of the energy-related interests of government and the private sector. It is argued that history has shown that energy policy decisions in South Africa have essentially been guided by non-energy priorities, in particular geopolitical and strategic considerations. It is foreseen that although this situation will prevail to a greater or lesser degree depending on the measure of energy self-sufficiency which will be achieved, particularly insofar as import-dependency of crude oil is concerned, that the emphasis would, indeed should, shift to national energy priorities and considerations. 12 refs., 2 figs

  14. Energy integration into core businesses

    Energy Technology Data Exchange (ETDEWEB)

    Styan, G. [Tolko Industries Ltd., Castlegar, BC (Canada)

    2005-07-01

    An outline of Tolko Industries was presented with reference to their recent focus on biomass energy conversion. Tolko Industries has doubled its size twice over the last 10 year period, and now owns co-generation facilities and electrical generation contracts, along with significant capital investments. Current energy assets of the company are focused on process steam/heat energy with 3 small co-generation facilities. It was suggested that projects displacing natural gas have had the highest potential energy payback in Tolko facilities. A residuals summary for hog fuel, chips, and sawdust and shavings was presented. The company's core business focus is on sawmills, OSB, veneer, plywood and kraft paper. The company also has access to a large volume of biomass. Details of the Tolko's Nexterra Biomass Gasification Project were presented, along with details of the working scale pilot and phased in proposal plans. It was noted that Nexterra now produces enough biomass on site to be self-sufficient throughout its entire operational process. Tolko's expanded use of biomass technology to address emission abatement has resulted in funding from Enercan. Details of greenhouse gas (GHG) offsets were provided. It was concluded that efficient energy use and cost of supply creates a competitive advantage in the manufacturing industry. The Kyoto Protocol has provided advantages for biomass fuel development. tabs., figs.

  15. US command improvements and command vulnerability

    International Nuclear Information System (INIS)

    Ball, D.; Bethe, H.A.; Blair, B.G.; Bracken, P.; Carter, A.B.; Dickinson, H.; Garwin, R.L.; Holloway, D.; Kendall, H.W.

    1988-01-01

    In essence, the United States still relies on the strategic command system erected during the 1960s and 1970s, but as we have seen, this system suffers from a number of serious weaknesses. Among these the authors emphasized the vulnerability of vital communications even before any warheads impact directly on U.S. targets, as well as the systems; heavy reliance on a relatively small number of limited-endurance aircraft as command posts and radio relays. This paper focuses on the committed improvement program, assess its impact on command vulnerability, and offer suggestions for further command improvements designed to enhance crisis stability and to facilitate ware termination should deterrence fail. The reader should note that this chapter is rather more technical than the remainder of this book

  16. Unified communication to reach vulnerable mothers.

    Science.gov (United States)

    Tezcan, B; Von Rege, I; Henkson, H; Oteng-Ntim, E

    2011-01-01

    The feasibility of using a mobile text to reach vulnerable patient groups was assessed in this study. A total of 121 pregnant or postnatal women were randomly asked to complete a questionnaire. The questionnaire was given to them in the antenatal clinic, postnatal ward, antenatal ward or in the day assessment unit at St Thomas' Hospital, London. The forms were collected and analysed using an Excel database. The results of this survey show that mobile technology is readily available for 97% of the obstetric population. In mothers from vulnerable groups and in mothers from deprived areas, 61% possessed 3rd generation mobile technology. The majority of mothers surveyed wanted their care supplemented by the use of their mobile phones.

  17. Vulnerable populations: cultural and spiritual direction.

    Science.gov (United States)

    Quest, Tammie E; Franks, Nicole M

    2006-08-01

    Cultural, spiritual, and religious diversity of emergency department patients is increasing while that of emergency physicians in particular remains predominantly homogeneous. With a discordance of cultural, race, and ethnicity exist, in the case of ethical conflict -resolution becomes that much more difficult. Patients may feel vulnerable when their emergency care provider does not understand his or her cultural, spiritual, and religious uniqueness as it relates to the patient-doctor interaction and health care decision making. This review will examine (1) language differences; (2) cultural, religious, and spiritual differences between patient and provider; (3) differing explanatory models of disease between patient and provider; and (4) diverse bioethical models of decision making of differing cultures in an effort to reduce vulnerabilities.

  18. Coping with subjectivity in vulnerability assessment

    International Nuclear Information System (INIS)

    Renis, T.A.; Cardwell, R.G.

    1988-01-01

    Vulnerability assessment models are widely used to systematically evaluate the performance of complex safeguards systems against a variety of threats. These models require varying levels of detail and input data about the physical design of a facility and its safeguards operations and procedures. However, to evaluate safeguards effectiveness and give a performance rating, these models require additional performance data reflecting probabilities of detection, assessment, interruption, and neutralization, as well as the associated times for various adversary scenarios. These data may be attained from equipment design specifications, laboratory testing, expert judgment, or component testing. Regardless of how these data are obtained, they are inherently subjective. This paper addresses the uses of various vulnerability assessment models and the nature of subjectivity in those models. The paper also describes methods for coping with subjective data

  19. Vulnerability, diversity and scarcity: on universal rights.

    Science.gov (United States)

    Turner, Bryan Stanley; Dumas, Alex

    2013-11-01

    This article makes a contribution to the on-going debates about universalism and cultural relativism from the perspective of sociology. We argue that bioethics has a universal range because it relates to three shared human characteristics,--human vulnerability, institutional precariousness and scarcity of resources. These three components of our argument provide support for a related notion of 'weak foundationalism' that emphasizes the universality and interrelatedness of human experience, rather than their cultural differences. After presenting a theoretical position on vulnerability and human rights, we draw on recent criticism of this approach in order to paint a more nuanced picture. We conclude that the dichotomy between universalism and cultural relativism has some conceptual merit, but it also has obvious limitations when we consider the political economy of health and its impact on social inequality.

  20. Intelligent Techniques for Power Systems Vulnerability Assessment

    Directory of Open Access Journals (Sweden)

    Mohamed A. El-Sharkawi

    2002-06-01

    Full Text Available With power grids considered national security matters, the reliable operation of the system is of top priority to utilities.  This concern is amplified by the utility’s deregulation, which increases the system’s openness while simultaneously decreasing the applied degree of control.  Vulnerability Assessment (VA deals with the power system’s ability to continue to provide service in case of an unforeseen catastrophic contingency.  Such contingencies may include unauthorized tripping, breaks in communication links, sabotage or intrusion by external agents, human errors, natural calamities and faults.  These contingencies could lead to a disruption of service to part or all of the system.  The service disruption is known as outage or blackout.  The paper outlines an approach by which feature extraction and boundary tracking can be implemented to achieve on line vulnerability assessment.

  1. [The Helsinki Declaration: relativism and vulnerability].

    Science.gov (United States)

    Diniz, D; Corrêa, M

    2001-01-01

    The Helsinki Declaration is a crucial ethical landmark for clinical research involving human beings. Since the Declaration was issued, a series of revisions and modifications have been introduced into the original text, but they have not altered its humanist approach or its international force for regulating clinical research. A proposal for an extensive revision of the Declaration's underlying ethical principles has been debated for the past four years. If the proposal is approved, international clinical research involving human beings will be modified, further increasing the vulnerability of certain social groups. This article discusses the historical process involved in passing the Helsinki Declaration and the most recent debate on the new draft. The article analyzes the new text's social implications for underdeveloped countries, arguing for a political approach to the vulnerability concept.

  2. Social Protection and Vulnerability to Climate Shocks: a Panel Data ...

    African Journals Online (AJOL)

    ' autonomous adaptation by reducing vulnerability to climatic shocks. This paper examines the role of the Productive Safety Net Program in reducing vulnerability to climate related shocks and its impacts on autonomous adaptation strategies ...

  3. Vulnerability to air pollution: To intervene or not to intervene

    CSIR Research Space (South Africa)

    John, J

    2008-11-01

    Full Text Available The Environmental Health Research Group has, amongst other interests, a specific focus on understanding and addressing vulnerability of communities to environmental pollution. No appropriate tools to determine vulnerability to environmental...

  4. Vulnerability of Smallholder Farmers to Climate Change in the ...

    African Journals Online (AJOL)

    Yitayal A.

    adopted Vulnerability as expected poverty (VEP)approach was where an individual's vulnerability is the .... cropping seasons. About 21% of the respondents are below the food poverty line of ..... Cambridge, UK: University Press. Stige, L., J.

  5. Psychological Vulnerability to Completed Suicide: A Review of Empirical Studies.

    Science.gov (United States)

    Conner, Kenneth R.; Duberstein, Paul R.; Conwell, Yeates; Seidlitz, Larry; Caine, Eric D.

    2001-01-01

    This article reviews empirical literature on psychological vulnerability to completed suicide. Five constructs have been consistently associated with completed suicide: impulsivity/aggression; depression; anxiety; hopelessness; and self-consciousness/social disengagement. Current knowledge of psychological vulnerability could inform social…

  6. Air pollution and vulnerability: solving the puzzle of prioritization

    CSIR Research Space (South Africa)

    Wright, CY

    2011-01-01

    Full Text Available conditions exacerbates the problem. Air quality management plans identify prioritized strategies for improved air quality independent of consideration of vulnerability. A population exposure and vulnerability risk prioritization framework comprising five...

  7. Climate change vulnerability in Ethiopia : disaggregation of Tigray Region

    NARCIS (Netherlands)

    Gidey Gebrehiwot, T.; Gidey, T.G.; van der Veen, A.

    2013-01-01

    Climate change and variability severely affect rural livelihoods and agricultural productivity, yet they are causes of stress vulnerable rural households have to cope with. This paper investigated farming communities' vulnerability to climate change and climate variability across 34

  8. 77 FR 28894 - Maritime Vulnerability Self-Assessment Tool

    Science.gov (United States)

    2012-05-16

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Maritime Vulnerability Self... maritime vulnerability self- assessment tool. SUMMARY: The Transportation Security Administration (TSA) announces that the TSA Maritime Self-Assessment Risk Module (TMSARM), developed to support the United States...

  9. Households' vulnerability and responses to shocks: evidence from rural Kenya

    NARCIS (Netherlands)

    Ndirangu, L.

    2007-01-01

    Key words: Vulnerability, HIV/AIDS, weather shocks, risk management, coping strategies, rural households, gender. Empirical investigation on household’s responses to sources of vulnerability is important for designing and implementation of social policies. The design of an effective

  10. Cognitive vulnerability to depression : genetic and environmental influences

    NARCIS (Netherlands)

    Antypa, Niki

    2011-01-01

    This thesis explores cognitive vulnerability to depression and the interplay between genetic and environmental influences. Cognitive vulnerability to depression is characterized by negative patterns of information processing. One aspect is cognitive reactivity - the tendency to respond with

  11. Associations Between Social Vulnerabilities and Psychosocial Problems in European Children

    DEFF Research Database (Denmark)

    Iguacel, Isabel; Michels, Nathalie; Fernández-Alvira, Juan M.

    2017-01-01

    The effect of socioeconomic inequalities on children’s mental health remains unclear. This study aims to explore the cross-sectional and longitudinal associations between social vulnerabilities and psychosocial problems, and the association between accumulation of vulnerabilities and psychosocial...

  12. Red Team Operations to Assess Information Technology Vulnerabilities

    NARCIS (Netherlands)

    Veltman, M.; Parker, R.L.

    1999-01-01

    All Information and Communication Technology (ICT) systems have vulnerabilities. Weaknesses in these systems are introduced either during the specification, implementation or operational phase. Leaving aside these introduced vulnerabilities are intentional or unintentional, the fact remains that

  13. Seeing climate vulnerabilities through lived experience in Madagascar

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-04-21

    Apr 21, 2011 ... ... both vulnerability and strategies for reducing risk, and the project is in the process of producing a range ... of the team's effort to paint a composite map of climate vulnerability and risk to agrarian systems. ... Feeling stressed?

  14. The Vulnerable Faces of Pathological Gambling

    OpenAIRE

    Fong, Timothy W.

    2005-01-01

    Pathological gambling is an emerging psychiatric disorder that has medical, psychiatric, and social consequences. Recently, research has been focusing on identifying which portions of the population are most vulnerable to developing problems related to ongoing gambling. Specific populations of interest have included adolescents, elderly, minorities, those with comorbid psychiatric or substance use disorders, and gender differences. Each group possesses unique biological, psychological, and/or...

  15. Overactive bladder in the vulnerable elderly

    Directory of Open Access Journals (Sweden)

    Wolff GF

    2014-10-01

    Full Text Available Gillian F Wolff,1 George A Kuchel,2 Phillip P Smith1,21Division of Urology, Department of Surgery, 2UConn Center on Aging, University of Connecticut Health Center, Farmington, CT, USAAbstract: Overactive bladder (OAB is a common problem that may occur in individuals of all ages. It has a considerable impact on patient quality of life, and although moderately effective management strategies do exist, this condition often remains undiagnosed and untreated. OAB needs to be viewed as a symptom complex. Its presentation and management are complicated in the vulnerable elderly by the presence of baseline frailty and multiple coexisting chronic conditions. Furthermore, and beyond a simple understanding of symptomatology, providers must address patient goals and motivations as well as the expectations of caretakers. These multiple levels of perception, function, expectations, and treatment efficacy/risks must be tailored to the individual patient. While the vulnerable elderly patient may often have evidence of urinary tract dysfunction, OAB and urge urinary incontinence in this population must be understood as a multifactorial geriatric syndrome and viewed in the context of medical and functional baseline and precipitating risk factors. Expectations and goals must be tailored to the resources of vulnerable elderly patients and their caregivers, and care must be coordinated with other medical care providers. The management of OAB in the vulnerable elderly often poses significant management challenges. Nonetheless, with a thoughtful approach and an aim towards future research specifically for this population, significant reductions in morbidity and mortality long with enhancement in health-related quality of life are possible.Keywords: urinary incontinence, urgency, antispasmodics, aging, frailty

  16. Optical measurement of stem xylem vulnerability

    OpenAIRE

    Brodribb, Timothy J.; Carriqui, Marc; Delzon, Sylvain; Lucani, Christopher

    2017-01-01

    The vulnerability of plant water transport tissues to a loss of function by cavitation during water stress is a key indicator of the survival capabilities of plant species during drought. Quantifying this important metric has been greatly advanced by noninvasive techniques that allow embolisms to be viewed directly in the vascular system. Here, we present a new method for evaluating the spatial and temporal propagation of embolizing bubbles in the stem xylem during imposed water stress. We de...

  17. Current status of vulnerable plaque detection.

    LENUS (Irish Health Repository)

    Sharif, Faisal

    2012-02-01

    Critical coronary stenoses have been shown to contribute to only a minority of acute coronary syndromes (ACS) and sudden cardiac death. Autopsy studies have identified a subgroup of high-risk patients with disrupted vulnerable plaque and modest stenosis. Consequently, a clinical need exists to develop methods to identify these plaques prospectively before disruption and clinical expression of disease. Recent advances in invasive and noninvasive imaging techniques have shown the potential to identify these high-risk plaques. The anatomical characteristics of the vulnerable plaque such as thin cap fibroatheroma and lipid pool can be identified with angioscopy, high frequency intravascular ultrasound, intravascular MRI, and optical coherence tomography. Efforts have also been made to recognize active inflammation in high-risk plaques using intravascular thermography. Plaque chemical composition by measuring electromagnetic radiation using spectroscopy is also an emerging technology to detect vulnerable plaques. Noninvasive imaging with MRI, CT, and PET also holds the potential to differentiate between low and high-risk plaques. However, at present none of these imaging modalities are able to detect vulnerable plaque neither has been shown to definitively predict outcome. Nevertheless in contrast, there has been a parallel development in the physiological assessment of advanced atherosclerotic coronary artery disease. Thus recent trials using fractional flow reserve in patients with modest non flow-limiting stenoses have shown that deferral of PCI with optimal medical therapy in these patients is superior to coronary intervention. Further trials are needed to provide more information regarding the natural history of high-risk but non flow-limiting plaque to establish patient-specific targeted therapy and to refine plaque stabilizing strategies in the future.

  18. Analyzing Android Browser Apps for file:// Vulnerabilities

    OpenAIRE

    Wu, Daoyuan; Chang, Rocky K. C.

    2014-01-01

    Securing browsers in mobile devices is very challenging, because these browser apps usually provide browsing services to other apps in the same device. A malicious app installed in a device can potentially obtain sensitive information through a browser app. In this paper, we identify four types of attacks in Android, collectively known as FileCross, that exploits the vulnerable file:// to obtain users' private files, such as cookies, bookmarks, and browsing histories. We design an automated s...

  19. MORAL HARASSMENT DURING WORK AND FEMININE VULNERABILITY

    OpenAIRE

    Silva, Sarah Cristina Andrade; Universidade de Franca - UNIFRAN; Bittar, Cléria Maria; Universidade de Franca - UNIFRAN

    2012-01-01

    Current investigation is a bibliographical review on feminine vulnerability with regard to moral harassment. Moral harassment is defined as all vexation during work, especially when a hierarchy between people has been established. Horizontal moral harassment among people of the same occupation, although it exists, is more difficult to be proved in court. Literature shows that victims of moral harassment may be women and men but research in Brazil and in other countries reveals that most victi...

  20. Seaside, Oregon, Tsunami Vulnerability Assessment Pilot Study

    Science.gov (United States)

    Dunbar, P. K.; Dominey-Howes, D.; Varner, J.

    2006-12-01

    The results of a pilot study to assess the risk from tsunamis for the Seaside-Gearhart, Oregon region will be presented. To determine the risk from tsunamis, it is first necessary to establish the hazard or probability that a tsunami of a particular magnitude will occur within a certain period of time. Tsunami inundation maps that provide 100-year and 500-year probabilistic tsunami wave height contours for the Seaside-Gearhart, Oregon, region were developed as part of an interagency Tsunami Pilot Study(1). These maps provided the probability of the tsunami hazard. The next step in determining risk is to determine the vulnerability or degree of loss resulting from the occurrence of tsunamis due to exposure and fragility. The tsunami vulnerability assessment methodology used in this study was developed by M. Papathoma and others(2). This model incorporates multiple factors (e.g. parameters related to the natural and built environments and socio-demographics) that contribute to tsunami vulnerability. Data provided with FEMA's HAZUS loss estimation software and Clatsop County, Oregon, tax assessment data were used as input to the model. The results, presented within a geographic information system, reveal the percentage of buildings in need of reinforcement and the population density in different inundation depth zones. These results can be used for tsunami mitigation, local planning, and for determining post-tsunami disaster response by emergency services. (1)Tsunami Pilot Study Working Group, Seaside, Oregon Tsunami Pilot Study--Modernization of FEMA Flood Hazard Maps, Joint NOAA/USGS/FEMA Special Report, U.S. National Oceanic and Atmospheric Administration, U.S. Geological Survey, U.S. Federal Emergency Management Agency, 2006, Final Draft. (2)Papathoma, M., D. Dominey-Howes, D.,Y. Zong, D. Smith, Assessing Tsunami Vulnerability, an example from Herakleio, Crete, Natural Hazards and Earth System Sciences, Vol. 3, 2003, p. 377-389.