WorldWideScience

Sample records for identifying vulnerable equipment

  1. Nuclear material production cycle vulnerability analysis

    International Nuclear Information System (INIS)

    Bott, T.F.

    1996-01-01

    This paper discusses a method for rapidly and systematically identifying vulnerable equipment in a nuclear material or similar production process and ranking that equipment according to its attractiveness to a malevolent attacker. A multistep approach was used in the analysis. First, the entire production cycle was modeled as a flow diagram. This flow diagram was analyzed using graph theoretical methods to identify processes in the production cycle and their locations. Models of processes that were judged to be particularly vulnerable based on the cycle analysis then were developed in greater detail to identify equipment in that process that is vulnerable to intentional damage

  2. Reactor sabotage vulnerability and vital-equipment identification

    International Nuclear Information System (INIS)

    Boudreau, J.M.; Haarman, R.A.

    1982-01-01

    Two ongoing programs at Los Alamos, the Vital Area Analysis Program and the Reactor Sabotage Vulnerability Program, are discussed. The Laboratory has been providing the Nuclear Regulatory Commission with technical support in identifying the vital areas at nuclear power plants through the use of sabotage fault trees. This procedure is being expanded to provide support for the Reactor Sabotage Vulnerability Assessment Program. A re-examination of some of the original system modeling assumptions, including a survey of the applicable research, is underway. A description of the survey work and the computerized data bases being used is provided. This program is expected to result in refinements in the existing procedures

  3. Assessing vulnerability to drought: identifying underlying factors across Europe

    Science.gov (United States)

    Urquijo, Julia; Gonzalez Tánago, Itziar; Ballesteros, Mario; De Stefano, Lucia

    2015-04-01

    Drought is considered one of the most severe and damaging natural hazards in terms of people and sectors affected and associated losses. Drought is a normal and recurrent climatic phenomenon that occurs worldwide, although its spatial and temporal characteristics vary significantly among climates. In the case of Europe, in the last thirty years, the region has suffered several drought events that have caused estimated economic damages over a €100 billion and have affected almost 20% of its territory and population. In recent years, there has been a growing awareness among experts and authorities of the need to shift from a reactive crisis approach to a drought risk management approach, as well as of the importance of designing and implementing policies, strategies and plans at country and river basin levels to deal with drought. The identification of whom and what is vulnerable to drought is a central aspect of drought risk mitigation and planning and several authors agree that societal vulnerability often determines drought risk more than the actual precipitation shortfalls. The final aim of a drought vulnerability assessment is to identify the underlying sources of drought impact, in order to develop policy options that help to enhance coping capacity and therefore to prevent drought impact. This study identifies and maps factors underlying vulnerability to drought across Europe. The identification of factors influencing vulnerability starts from the analysis of past drought impacts in four European socioeconomic sectors. This analysis, along with an extensive literature review, led to the selection of vulnerability factors that are both relevant and adequate for the European context. Adopting the IPCC model, vulnerability factors were grouped to describe exposure, sensitivity and adaptive capacity. The aggregation of these components has resulted in the mapping of vulnerability to drought across Europe at NUTS02 level. Final results have been compared with

  4. spatially identifying vulnerable areas

    African Journals Online (AJOL)

    The model structure is aimed at understanding the critical vulnerable factors that ... This paper incorporates multiple criteria and rank risk factors. ..... In terms of quantifying vulnerable areas within the country, the analysis is done based on 9 ...

  5. Modelling farm vulnerability to flooding: A step toward vulnerability mitigation policies appraisal

    Science.gov (United States)

    Brémond, P.; Abrami, G.; Blanc, C.; Grelot, F.

    2009-04-01

    flood. In the case of farm activities, vulnerability mitigation consists in implementing measures which can be: physical (equipment or electric power system elevation), organizational (emergency or recovery plan) or financial (insurance). These measures aim at decreasing the total damage incurred by farmers in case of flooding. For instance, if equipment is elevated, it will not suffer direct damage such as degradation. As a consequence, equipment will be available to continue production or recovery tasks, thus, avoiding indirect damage such as delays, indebtedness… The effects of these policies on farms, in particular vulnerability mitigation cannot be appraised using current methodologies mainly because they do not consider farm as a whole and focus on direct damage at the land plot scale (loss of yield). Moreover, since vulnerability mitigation policies are quite recent, few examples of implementation exist and no feedback experience can be processed. Meanwhile, decision makers and financial actors require more justification of the efficiency of public fund by economic appraisal of the projects. On the Rhône River, decision makers asked for an economic evaluation of the program of farm vulnerability mitigation they plan to implement. This implies to identify the effects of the measures to mitigate farm vulnerability, and to classify them by comparing their efficacy (avoided damage) and their cost of implementation. In this presentation, we propose and discuss a conceptual model of vulnerability at the farm scale. The modelling, in Unified Modelling Language, enabled to represent the ties between spatial, organizational and temporal dimensions, which are central to understanding of farm vulnerability and resilience to flooding. Through this modelling, we encompass three goals: To improve the comprehension of farm vulnerability and create a framework that allow discussion with experts of different disciplines as well as with local farmers; To identify data which

  6. Could cognitive vulnerability identify high-risk subjects for schizophrenia?

    Science.gov (United States)

    Sarfati, Yves; Hardy-Baylé, Marie-Christine

    2002-12-08

    This review puts into questions the possible role of cognitive vulnerability markers in prediction and prevention of schizophrenia. Until recently, none of the identified cognitive anomalies has been proved to be definitive. However, as new promising candidates are emerging (DS-CPT, CPT-IP, P suppression, Saccadic Eye Movements), the predictive value of these trait-type anomalies may be criticized regarding four issues, which are discussed: technical, metrological, theoretical, and clinical. As things stand, the existence of a cognitive vulnerability marker, which testify to a permanent pathological trait, does not constitute a sufficient factor to identify and treat subjects who are at risk for schizophrenia. Copyright 2002 Wiley-Liss, Inc.

  7. Identifying typical patterns of vulnerability: A 5-step approach based on cluster analysis

    Science.gov (United States)

    Sietz, Diana; Lüdeke, Matthias; Kok, Marcel; Lucas, Paul; Carsten, Walther; Janssen, Peter

    2013-04-01

    Specific processes that shape the vulnerability of socio-ecological systems to climate, market and other stresses derive from diverse background conditions. Within the multitude of vulnerability-creating mechanisms, distinct processes recur in various regions inspiring research on typical patterns of vulnerability. The vulnerability patterns display typical combinations of the natural and socio-economic properties that shape a systems' vulnerability to particular stresses. Based on the identification of a limited number of vulnerability patterns, pattern analysis provides an efficient approach to improving our understanding of vulnerability and decision-making for vulnerability reduction. However, current pattern analyses often miss explicit descriptions of their methods and pay insufficient attention to the validity of their groupings. Therefore, the question arises as to how do we identify typical vulnerability patterns in order to enhance our understanding of a systems' vulnerability to stresses? A cluster-based pattern recognition applied at global and local levels is scrutinised with a focus on an applicable methodology and practicable insights. Taking the example of drylands, this presentation demonstrates the conditions necessary to identify typical vulnerability patterns. They are summarised in five methodological steps comprising the elicitation of relevant cause-effect hypotheses and the quantitative indication of mechanisms as well as an evaluation of robustness, a validation and a ranking of the identified patterns. Reflecting scale-dependent opportunities, a global study is able to support decision-making with insights into the up-scaling of interventions when available funds are limited. In contrast, local investigations encourage an outcome-based validation. This constitutes a crucial step in establishing the credibility of the patterns and hence their suitability for informing extension services and individual decisions. In this respect, working at

  8. Using cyber vulnerability testing techniques to expose undocumented security vulnerabilities in DCS and SCADA equipment

    International Nuclear Information System (INIS)

    Pollet, J.

    2006-01-01

    This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-critical networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)

  9. Using cyber vulnerability testing techniques to expose undocumented security vulnerabilities in DCS and SCADA equipment

    Energy Technology Data Exchange (ETDEWEB)

    Pollet, J. [PlantData Technologies, Inc., 1201 Louisiana Street, Houston, TX 77002 (United States)

    2006-07-01

    This session starts by providing an overview of typical DCS (Distributed Control Systems) and SCADA (Supervisory Control and Data Acquisition) architectures, and exposes cyber security vulnerabilities that vendors never admit, but are found through a comprehensive cyber testing process. A complete assessment process involves testing all of the layers and components of a SCADA or DCS environment, from the perimeter firewall all the way down to the end devices controlling the process, including what to look for when conducting a vulnerability assessment of real-time control systems. The following systems are discussed: 1. Perimeter (isolation from corporate IT or other non-critical networks) 2. Remote Access (third Party access into SCADA or DCS networks) 3. Network Architecture (switch, router, firewalls, access controls, network design) 4. Network Traffic Analysis (what is running on the network) 5. Host Operating Systems Hardening 6. Applications (how they communicate with other applications and end devices) 7. End Device Testing (PLCs, RTUs, DCS Controllers, Smart Transmitters) a. System Discovery b. Functional Discovery c. Attack Methodology i. DoS Tests (at what point does the device fail) ii. Malformed Packet Tests (packets that can cause equipment failure) iii. Session Hijacking (do anything that the operator can do) iv. Packet Injection (code and inject your own SCADA commands) v. Protocol Exploitation (Protocol Reverse Engineering / Fuzzing) This paper will provide information compiled from over five years of conducting cyber security testing on control systems hardware, software, and systems. (authors)

  10. A GIS Approach to Identifying Socially and Medically Vulnerable Older Adult Populations in South Florida.

    Science.gov (United States)

    Hames, Elizabeth; Stoler, Justin; Emrich, Christopher T; Tewary, Sweta; Pandya, Naushira

    2017-11-10

    We define, map, and analyze geodemographic patterns of socially and medically vulnerable older adults within the tri-county region of South Florida. We apply principal components analysis (PCA) to a set of previously identified indicators of social and medical vulnerability at the census tract level. We create and map age-stratified vulnerability scores using a geographic information system (GIS), and use spatial analysis techniques to identify patterns and interactions between social and medical vulnerability. Key factors contributing to social vulnerability in areas with higher numbers of older adults include age, large household size, and Hispanic ethnicity. Medical vulnerability in these same areas is driven by disease burden, access to emergency cardiac services, availability of nursing home and hospice beds, access to home health care, and available mental health services. Age-dependent areas of social vulnerability emerge in Broward County, whereas age-dependent areas of medical vulnerability emerge in Palm Beach County. Older-adult social and medical vulnerability interact differently throughout the study area. Spatial analysis of older adult social and medical vulnerability using PCA and GIS can help identify age-dependent pockets of vulnerability that are not easily identifiable in a populationwide analysis; improve our understanding of the dynamic spatial organization of health care, health care needs, access to care, and outcomes; and ultimately serve as a tool for health care planning. © The Author 2016. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  11. Helping air quality managers identify vulnerable communities

    CSIR Research Space (South Africa)

    Wright, C

    2008-10-01

    Full Text Available population exposure and vulnerability risk prioritisation model is proposed for potential use by air quality managers in conjunction with their air quality management plans. The model includes factors such as vulnerability caused by poverty, respiratory...

  12. Environmental Health Related Socio-Spatial Inequalities: Identifying “Hotspots” of Environmental Burdens and Social Vulnerability

    Science.gov (United States)

    Shrestha, Rehana; Flacke, Johannes; Martinez, Javier; van Maarseveen, Martin

    2016-01-01

    Differential exposure to multiple environmental burdens and benefits and their distribution across a population with varying vulnerability can contribute heavily to health inequalities. Particularly relevant are areas with high cumulative burdens and high social vulnerability termed as “hotspots”. This paper develops an index-based approach to assess these multiple burdens and benefits in combination with vulnerability factors at detailed intra-urban level. The method is applied to the city of Dortmund, Germany. Using non-spatial and spatial methods we assessed inequalities and identified “hotspot” areas in the city. We found modest inequalities burdening higher vulnerable groups in Dortmund (CI = −0.020 at p vulnerability, is essential to inform environmental justice debates and to mobilize local stakeholders. Locating “hotspot” areas at this detailed spatial level can serve as a basis to develop interventions that target vulnerable groups to ensure a health conducive equal environment. PMID:27409625

  13. Identifying Vulnerabilities and Hardening Attack Graphs for Networked Systems

    Energy Technology Data Exchange (ETDEWEB)

    Saha, Sudip; Vullinati, Anil K.; Halappanavar, Mahantesh; Chatterjee, Samrat

    2016-09-15

    We investigate efficient security control methods for protecting against vulnerabilities in networked systems. A large number of interdependent vulnerabilities typically exist in the computing nodes of a cyber-system; as vulnerabilities get exploited, starting from low level ones, they open up the doors to more critical vulnerabilities. These cannot be understood just by a topological analysis of the network, and we use the attack graph abstraction of Dewri et al. to study these problems. In contrast to earlier approaches based on heuristics and evolutionary algorithms, we study rigorous methods for quantifying the inherent vulnerability and hardening cost for the system. We develop algorithms with provable approximation guarantees, and evaluate them for real and synthetic attack graphs.

  14. Consumer financial vulnerability: identifying transmission linkages ...

    African Journals Online (AJOL)

    activates the postulated consumer financial vulnerability index (CFVI) .... words, the relationship between income, consumption, debt and saving as well as .... separation/divorce and bad financial management, as well as exogenous factors.

  15. Lack of security of networked medical equipment in radiology.

    Science.gov (United States)

    Moses, Vinu; Korah, Ipeson

    2015-02-01

    OBJECTIVE. There are few articles in the literature describing the security and safety aspects of networked medical equipment in radiology departments. Most radiologists are unaware of the security issues. We review the security of the networked medical equipment of a typical radiology department. MATERIALS AND METHODS. All networked medical equipment in a radiology department was scanned for vulnerabilities with a port scanner and a network vulnerability scanner, and the vulnerabilities were classified using the Common Vulnerability Scoring System. A network sniffer was used to capture and analyze traffic on the radiology network for exposure of confidential patient data. We reviewed the use of antivirus software and firewalls on the networked medical equipment. USB ports and CD and DVD drives in the networked medical equipment were tested to see whether they allowed unauthorized access. Implementation of the virtual private network (VPN) that vendors use to access the radiology network was reviewed. RESULTS. Most of the networked medical equipment in our radiology department used vulnerable software with open ports and services. Of the 144 items scanned, 64 (44%) had at least one critical vulnerability, and 119 (83%) had at least one high-risk vulnerability. Most equipment did not encrypt traffic and allowed capture of confidential patient data. Of the 144 items scanned, two (1%) used antivirus software and three (2%) had a firewall enabled. The USB ports were not secure on 49 of the 58 (84%) items with USB ports, and the CD or DVD drive was not secure on 17 of the 31 (55%) items with a CD or DVD drive. One of three vendors had an insecure implementation of VPN access. CONCLUSION. Radiologists and the medical industry need to urgently review and rectify the security issues in existing networked medical equipment. We hope that the results of our study and this article also raise awareness among radiologists about the security issues of networked medical equipment.

  16. Identifying Vulnerable Nodes of Complex Networks in Cascading Failures Induced by Node-Based Attacks

    Directory of Open Access Journals (Sweden)

    Shudong Li

    2013-01-01

    Full Text Available In the research on network security, distinguishing the vulnerable components of networks is very important for protecting infrastructures systems. Here, we probe how to identify the vulnerable nodes of complex networks in cascading failures, which was ignored before. Concerned with random attack (RA and highest load attack (HL on nodes, we model cascading dynamics of complex networks. Then, we introduce four kinds of weighting methods to characterize the nodes of networks including Barabási-Albert scale-free networks (SF, Watts-Strogatz small-world networks (WS, Erdos-Renyi random networks (ER, and two real-world networks. The simulations show that, for SF networks under HL attack, the nodes with small value of the fourth kind of weight are the most vulnerable and the ones with small value of the third weight are also vulnerable. Also, the real-world autonomous system with power-law distribution verifies these findings. Moreover, for WS and ER networks under both RA and HL attack, when the nodes have low tolerant ability, the ones with small value of the fourth kind of weight are more vulnerable and also the ones with high degree are easier to break down. The results give us important theoretical basis for digging the potential safety loophole and making protection strategy.

  17. Acoustic Camera as a Fool for Identifying Machinery and Equipment Failures

    Directory of Open Access Journals (Sweden)

    Ľudmila Pavlikova

    2018-03-01

    Full Text Available Sound and noise are as old as humanity itself. They have accompanied civilization, evolution, and development for centuries. Music and speech represent not only the key elements of human life but also unpleasant feelings of noise that have always been an integral part of human existence. As industrial development has required more energy, powerful machinery, and equipment, there have been still noisier machines. Traffic has grown quickly due to the number and speed of vehicles. For that reason, an acoustic camera is used for the dynamic visualization of machinery and equipment noise as it analyses the sources of noise in details. Subsequently, qualified measures are introduced based on the results of the analysis. The paper considers launching another application. According to the proposed methodology, its use in identifying machinery and equipment failures and their maintenance is proved. The experiment was performed on a four-wheel lawn mower. The primary focus was on the identification of failures using an acoustic camera. The previous method allowed to quickly, precisely and efficiently identifying the failures in two out of five tested machines.

  18. Identifying novel phenotypes of vulnerability and resistance to activity-based anorexia in adolescent female rats.

    Science.gov (United States)

    Barbarich-Marsteller, Nicole C; Underwood, Mark D; Foltin, Richard W; Myers, Michael M; Walsh, B Timothy; Barrett, Jeffrey S; Marsteller, Douglas A

    2013-11-01

    Activity-based anorexia is a translational rodent model that results in severe weight loss, hyperactivity, and voluntary self-starvation. The goal of our investigation was to identify vulnerable and resistant phenotypes of activity-based anorexia in adolescent female rats. Sprague-Dawley rats were maintained under conditions of restricted access to food (N = 64; or unlimited access, N = 16) until experimental exit, predefined as a target weight loss of 30-35% or meeting predefined criteria for animal health. Nonlinear mixed effects statistical modeling was used to describe wheel running behavior, time to event analysis was used to assess experimental exit, and a regressive partitioning algorithm was used to classify phenotypes. Objective criteria were identified for distinguishing novel phenotypes of activity-based anorexia, including a vulnerable phenotype that conferred maximal hyperactivity, minimal food intake, and the shortest time to experimental exit, and a resistant phenotype that conferred minimal activity and the longest time to experimental exit. The identification of objective criteria for defining vulnerable and resistant phenotypes of activity-based anorexia in adolescent female rats provides an important framework for studying the neural mechanisms that promote vulnerability to or protection against the development of self-starvation and hyperactivity during adolescence. Ultimately, future studies using these novel phenotypes may provide important translational insights into the mechanisms that promote these maladaptive behaviors characteristic of anorexia nervosa. Copyright © 2013 Wiley Periodicals, Inc.

  19. Structured Assessment Approach: a microcomputer-based insider-vulnerability analysis tool

    International Nuclear Information System (INIS)

    Patenaude, C.J.; Sicherman, A.; Sacks, I.J.

    1986-01-01

    The Structured Assessment Approach (SAA) was developed to help assess the vulnerability of safeguards systems to insiders in a staged manner. For physical security systems, the SAA identifies possible diversion paths which are not safeguarded under various facility operating conditions and insiders who could defeat the system via direct access, collusion or indirect tampering. For material control and accounting systems, the SAA identifies those who could block the detection of a material loss or diversion via data falsification or equipment tampering. The SAA, originally desinged to run on a mainframe computer, has been converted to run on a personal computer. Many features have been added to simplify and facilitate its use for conducting vulnerability analysis. For example, the SAA input, which is a text-like data file, is easily readable and can provide documentation of facility safeguards and assumptions used for the analysis

  20. Identifying the World's Most Climate Change Vulnerable Species: A Systematic Trait-Based Assessment of all Birds, Amphibians and Corals

    Science.gov (United States)

    Foden, Wendy B.; Butchart, Stuart H. M.; Stuart, Simon N.; Vié, Jean-Christophe; Akçakaya, H. Resit; Angulo, Ariadne; DeVantier, Lyndon M.; Gutsche, Alexander; Turak, Emre; Cao, Long; Donner, Simon D.; Katariya, Vineet; Bernard, Rodolphe; Holland, Robert A.; Hughes, Adrian F.; O’Hanlon, Susannah E.; Garnett, Stephen T.; Şekercioğlu, Çagan H.; Mace, Georgina M.

    2013-01-01

    Climate change will have far-reaching impacts on biodiversity, including increasing extinction rates. Current approaches to quantifying such impacts focus on measuring exposure to climatic change and largely ignore the biological differences between species that may significantly increase or reduce their vulnerability. To address this, we present a framework for assessing three dimensions of climate change vulnerability, namely sensitivity, exposure and adaptive capacity; this draws on species’ biological traits and their modeled exposure to projected climatic changes. In the largest such assessment to date, we applied this approach to each of the world’s birds, amphibians and corals (16,857 species). The resulting assessments identify the species with greatest relative vulnerability to climate change and the geographic areas in which they are concentrated, including the Amazon basin for amphibians and birds, and the central Indo-west Pacific (Coral Triangle) for corals. We found that high concentration areas for species with traits conferring highest sensitivity and lowest adaptive capacity differ from those of highly exposed species, and we identify areas where exposure-based assessments alone may over or under-estimate climate change impacts. We found that 608–851 bird (6–9%), 670–933 amphibian (11–15%), and 47–73 coral species (6–9%) are both highly climate change vulnerable and already threatened with extinction on the IUCN Red List. The remaining highly climate change vulnerable species represent new priorities for conservation. Fewer species are highly climate change vulnerable under lower IPCC SRES emissions scenarios, indicating that reducing greenhouse emissions will reduce climate change driven extinctions. Our study answers the growing call for a more biologically and ecologically inclusive approach to assessing climate change vulnerability. By facilitating independent assessment of the three dimensions of climate change vulnerability

  1. Functional genomics identifies specific vulnerabilities in PTEN-deficient breast cancer.

    Science.gov (United States)

    Tang, Yew Chung; Ho, Szu-Chi; Tan, Elisabeth; Ng, Alvin Wei Tian; McPherson, John R; Goh, Germaine Yen Lin; Teh, Bin Tean; Bard, Frederic; Rozen, Steven G

    2018-03-22

    -SSL patterns of activity in a large proportion of PTEN-deficient breast cancer cell lines and are potential specific vulnerabilities in PTEN-deficient breast cancer. Furthermore, the NUAK1 PTEN-SSL vulnerability identified by RNA interference techniques can be recapitulated and exploited using the small molecule kinase inhibitor HTH-01-015. Thus, NUAK1 inhibition may be an effective strategy for precision treatment of PTEN-deficient breast tumors.

  2. Targetable vulnerabilities in T- and NK-cell lymphomas identified through preclinical models.

    Science.gov (United States)

    Ng, Samuel Y; Yoshida, Noriaki; Christie, Amanda L; Ghandi, Mahmoud; Dharia, Neekesh V; Dempster, Joshua; Murakami, Mark; Shigemori, Kay; Morrow, Sara N; Van Scoyk, Alexandria; Cordero, Nicolas A; Stevenson, Kristen E; Puligandla, Maneka; Haas, Brian; Lo, Christopher; Meyers, Robin; Gao, Galen; Cherniack, Andrew; Louissaint, Abner; Nardi, Valentina; Thorner, Aaron R; Long, Henry; Qiu, Xintao; Morgan, Elizabeth A; Dorfman, David M; Fiore, Danilo; Jang, Julie; Epstein, Alan L; Dogan, Ahmet; Zhang, Yanming; Horwitz, Steven M; Jacobsen, Eric D; Santiago, Solimar; Ren, Jian-Guo; Guerlavais, Vincent; Annis, D Allen; Aivado, Manuel; Saleh, Mansoor N; Mehta, Amitkumar; Tsherniak, Aviad; Root, David; Vazquez, Francisca; Hahn, William C; Inghirami, Giorgio; Aster, Jon C; Weinstock, David M; Koch, Raphael

    2018-05-22

    T- and NK-cell lymphomas (TCL) are a heterogenous group of lymphoid malignancies with poor prognosis. In contrast to B-cell and myeloid malignancies, there are few preclinical models of TCLs, which has hampered the development of effective therapeutics. Here we establish and characterize preclinical models of TCL. We identify multiple vulnerabilities that are targetable with currently available agents (e.g., inhibitors of JAK2 or IKZF1) and demonstrate proof-of-principle for biomarker-driven therapies using patient-derived xenografts (PDXs). We show that MDM2 and MDMX are targetable vulnerabilities within TP53-wild-type TCLs. ALRN-6924, a stapled peptide that blocks interactions between p53 and both MDM2 and MDMX has potent in vitro activity and superior in vivo activity across 8 different PDX models compared to the standard-of-care agent romidepsin. ALRN-6924 induced a complete remission in a patient with TP53-wild-type angioimmunoblastic T-cell lymphoma, demonstrating the potential for rapid translation of discoveries from subtype-specific preclinical models.

  3. The French fire protection concept. Vulnerability analysis

    International Nuclear Information System (INIS)

    Kaercher, M.

    1998-01-01

    The French fire protection concept is based on a principle of three levels of defence in depth: fire prevention, fire containing and fire controlling. Fire prevention is based on arrangements which prevent the fire from starting or which make difficult for the fire to start. Fire containing is based on design measures so that the fire will have no impact on the safety of the installation. For fire controlling, equipment nad personnel are on duty in order to detect, to fight and to gain control over the fire as early as possible. The French fire protection concept gives priority to fire containing based on passive structural measures. All buildings containing safety equipment are divided into fire compartments (or fire areas) and fire cells (or fire zones). Basically, a compartment houses safety equipment belonging to one division (or train) so that the other division is always available to reach the plant safe shut down or to mitigate an accident. Because there is a large number of fire compartments and fire cells, deviations from the general principle can be observed. To this reason the RCC-I (Design and Construction Rules applicable for fire protection) requires to implement an assessment of the principle of division. This assessment is called vulnerability analysis. The vulnerability analysis is usually performed at the end of the project, before erection. It is also possible to perform a vulnerability analysis in an operating nuclear power plant in the scope of a fire safety upgrading programme. In the vulnerability analysis, the functional failure of all the equipment (except for those protected by a qualified fire barrier, designed or able to withstand the fire consequences) within the fire compartment or cell, where the fire breaks out, is postulated. The potential consequences for the plant safety are analysed

  4. Isolating social influences on vulnerability to earthquake shaking: identifying cost-effective mitigation strategies.

    Science.gov (United States)

    Bhloscaidh, Mairead Nic; McCloskey, John; Pelling, Mark; Naylor, Mark

    2013-04-01

    Until expensive engineering solutions become more universally available, the objective targeting of resources at demonstrably effective, low-cost interventions might help reverse the trend of increasing mortality in earthquakes. Death tolls in earthquakes are the result of complex interactions between physical effects, such as the exposure of the population to strong shaking, and the resilience of the exposed population along with supporting critical infrastructures and institutions. The identification of socio-economic factors that contribute to earthquake mortality is crucial to identifying and developing successful risk management strategies. Here we develop a quantitative methodology more objectively to assess the ability of communities to withstand earthquake shaking, focusing on, in particular, those cases where risk management performance appears to exceed or fall below expectations based on economic status. Using only published estimates of the shaking intensity and population exposure for each earthquake, data that is available for earthquakes in countries irrespective of their level of economic development, we develop a model for mortality based on the contribution of population exposure to shaking only. This represents an attempt to remove, as far as possible, the physical causes of mortality from our analysis (where we consider earthquake engineering to reduce building collapse among the socio-economic influences). The systematic part of the variance with respect to this model can therefore be expected to be dominated by socio-economic factors. We find, as expected, that this purely physical analysis partitions countries in terms of basic socio-economic measures, for example GDP, focusing analytical attention on the power of economic measures to explain variance in observed distributions of earthquake risk. The model allows the definition of a vulnerability index which, although broadly it demonstrates the expected income-dependence of vulnerability to

  5. Analysis of bathymetric surveys to identify coastal vulnerabilities at Cape Canaveral, Florida

    Science.gov (United States)

    Thompson, David M.; Plant, Nathaniel G.; Hansen, Mark E.

    2015-10-07

    Cape Canaveral, Florida, is a prominent feature along the Southeast U.S. coastline. The region includes Merritt Island National Wildlife Refuge, Cape Canaveral Air Force Station, NASA’s Kennedy Space Center, and a large portion of Canaveral National Seashore. The actual promontory of the modern Cape falls within the jurisdictional boundaries of Cape Canaveral Air Force Station. Erosion hazards result from winter and tropical storms, changes in sand resources, sediment budgets, and sea-level rise. Previous work by the USGS has focused on the vulnerability of the dunes to storms, where updated bathymetry and topography have been used for modeling efforts. Existing research indicates that submerged shoals, ridges, and sandbars affect patterns of wave refraction and height, coastal currents, and control sediment transport. These seabed anomalies indicate the availability and movement of sand within the nearshore environment, which may be directly related to the stability of the Cape Canaveral shoreline. Understanding the complex dynamics of the offshore bathymetry and associated sediment pathways can help identify current and future erosion vulnerabilities due to short-term (for example, hurricane and other extreme storms) and long-term (for example, sea-level rise) hazards.

  6. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  7. Identifying Population Vulnerable to Extreme Heat Events in San Jose, California.

    Science.gov (United States)

    Rivera, A. L.

    2016-12-01

    The extreme heat days not only make cities less comfortable for living but also they are associated with increased morbidity and mortality. Mapping studies have demonstrated spatial variability in heat vulnerability. A study conducted between 2000 and 2011 in New York City shows that deaths during heat waves was more likely to occur in black individuals, at home in census tracts which received greater public assistance. This map project intends to portray areas in San Jose California that are vulnerable to extreme heat events. The variables considered to build a vulnerability index are: land surface temperature, vegetated areas (NDVI), and people exposed to these area (population density).

  8. Vulnerability Identification Errors in Security Risk Assessments

    OpenAIRE

    Taubenberger, Stefan

    2014-01-01

    At present, companies rely on information technology systems to achieve their business objectives, making them vulnerable to cybersecurity threats. Information security risk assessments help organisations to identify their risks and vulnerabilities. An accurate identification of risks and vulnerabilities is a challenge, because the input data is uncertain. So-called ’vulnerability identification errors‘ can occur if false positive vulnerabilities are identified, or if vulnerabilities remain u...

  9. Development of information security and vulnerability risk management system for J-PARC

    International Nuclear Information System (INIS)

    Ishikawa, Hiroyuki; Tate, Akihiro; Murakami, Tadashi

    2012-02-01

    In J-PARC (Japan Proton Accelerator Research Complex) we have set up intra-network (internal network, we will abbreviate it as JLAN, below) to support research activity and communication among users. In JLAN, we set up various kinds of security devices to keep JLAN secure. However, the servers which provide information or service to public are still in danger of being accessed illegally. If there is an illegal access, that may cause defacement of data or information leak. Furthermore, the victim servers are manipulated by the malicious attackers, and they themselves attack the external information equipments. Vulnerability of servers enables unauthorized access. So, vulnerability test with use of a vulnerability tool is one of the most effective ways to take measures for vulnerability of the equipments. However, it is not enough to just conduct a vulnerability test. It is also essential for information security to take measures to cover constantly for the vulnerability of servers. We focused on the points above, and developed the vulnerability testing system for security. It is not only a testing tool for the vulnerability of servers, but also management system which enables the server administrators in charge of taking measures for vulnerabilities to manage risks and handles PDCA (Plan-Do-Check-Action) cycles as countermeasure for vulnerability. In this paper, we report the technologies and ingenuities for the development of the above system. (author)

  10. Cyber Security Vulnerability Impact on I and C Reliability

    International Nuclear Information System (INIS)

    Hadley, Mark D.; McBride, Justin B.

    2006-01-01

    We present a discussion of the cyber security vulnerability impact on instrument and control reliability. In the discussion we demonstrate the likely vector of attack and vulnerabilities associated with commodity hardware, protocols and communication media. The current fleet of nuclear power plants in the United States utilizes aging analog instrument and control systems which are more frequently suffering from obsolescence and failure. The commodity equipment available now and in the near future incorporates features from information technology systems which compound cyber vulnerabilities

  11. Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data

    Science.gov (United States)

    Majeed, Abdul; Ullah, Farman; Lee, Sungchang

    2017-01-01

    Personally identifiable information (PII) affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in determining the user to whom such information relates. Each item of user PII reveals identity differently, and some types of PII are highly identity vulnerable. More vulnerable types of PII enable unique identification more easily, and their presence in published data increases privacy risks. Existing privacy models treat all types of PII equally from an identity revelation point of view, and they mainly focus on hiding user PII in a crowd of other users. Ignoring the identity vulnerability of each type of PII during anonymization is not an effective method of protecting user privacy in a fine-grained manner. This paper proposes a new anonymization scheme that considers the identity vulnerability of PII to effectively protect user privacy. Data generalization is performed adaptively based on the identity vulnerability of PII as well as diversity to anonymize data. This adaptive generalization effectively enables anonymous data, which protects user identity and private information disclosures while maximizing the utility of data for performing analyses and building classification models. Additionally, the proposed scheme has low computational overheads. The simulation results show the effectiveness of the scheme and verify the aforementioned claims. PMID:28481298

  12. Vulnerability- and Diversity-Aware Anonymization of Personally Identifiable Information for Improving User Privacy and Utility of Publishing Data

    Directory of Open Access Journals (Sweden)

    Abdul Majeed

    2017-05-01

    Full Text Available Personally identifiable information (PII affects individual privacy because PII combinations may yield unique identifications in published data. User PII such as age, race, gender, and zip code contain private information that may assist an adversary in determining the user to whom such information relates. Each item of user PII reveals identity differently, and some types of PII are highly identity vulnerable. More vulnerable types of PII enable unique identification more easily, and their presence in published data increases privacy risks. Existing privacy models treat all types of PII equally from an identity revelation point of view, and they mainly focus on hiding user PII in a crowd of other users. Ignoring the identity vulnerability of each type of PII during anonymization is not an effective method of protecting user privacy in a fine-grained manner. This paper proposes a new anonymization scheme that considers the identity vulnerability of PII to effectively protect user privacy. Data generalization is performed adaptively based on the identity vulnerability of PII as well as diversity to anonymize data. This adaptive generalization effectively enables anonymous data, which protects user identity and private information disclosures while maximizing the utility of data for performing analyses and building classification models. Additionally, the proposed scheme has low computational overheads. The simulation results show the effectiveness of the scheme and verify the aforementioned claims.

  13. VULNERABILITY OF COMPANIES

    Directory of Open Access Journals (Sweden)

    ARMEAN ANDREEA

    2013-06-01

    Full Text Available In present, the study of vulnerability of companies is increasing in every field due to the unstable economic environment influences. The object of this research is to define and identify vulnerabilities of companies and the establishment of evaluation methods at their level. This article emphasizes the importance and usefulness of one of the best known model in this way, from our point of view, namely Băileşteanu, Negrila Pattern. This pattern covers both external factors and internal ones, that increase vulnerabilities of companies, and fit the companies in which the state of vulnerability are (vitality, viability, vulnerability, high vulnerability, difficulty and high difficulty, with a matrix. The result of the research is that any company belonging to any field, can be analyzed using this model, and assigned to one of the conditions defined within.

  14. Mining Bug Databases for Unidentified Software Vulnerabilities

    Energy Technology Data Exchange (ETDEWEB)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  15. Social network characteristics and HIV vulnerability among transgender persons in San Salvador: identifying opportunities for HIV prevention strategies.

    Science.gov (United States)

    Barrington, Clare; Wejnert, Cyprian; Guardado, Maria Elena; Nieto, Ana Isabel; Bailey, Gabriela Paz

    2012-01-01

    The purpose of this study is to improve understanding of HIV vulnerability and opportunities for HIV prevention within the social networks of male-to-female transgender persons in San Salvador, El Salvador. We compare HIV prevalence and behavioral data from a sample of gay-identified men who have sex with men (MSM) (n = 279), heterosexual or bisexual identified MSM (n = 229) and transgender persons (n = 67) recruited using Respondent Driven Sampling. Transgender persons consistently reported higher rates of HIV risk behavior than the rest of the study population and were significantly more likely to be involved in sex work. While transgender persons reported the highest rates of exposure to HIV educational activities they had the lowest levels of HIV-related knowledge. Transgender respondents' social networks were homophilous and efficient at recruiting other transgender persons. Findings suggest that transgender social networks could provide an effective and culturally relevant opportunity for HIV prevention efforts in this vulnerable population.

  16. A data mining approach to derive flood-related economic vulnerability of companies

    Science.gov (United States)

    Sieg, Tobias; Kreibich, Heidi; Vogel, Kristin; Merz, Bruno

    2017-04-01

    The assessment of vulnerability gained more and more attention in flood risk research during the recent years. However, there is still not much knowledge available about flood vulnerability of companies and its influencing factors. This study follows the natural sciences concept which defines vulnerability as the degree of loss to a given element at risk resulting from flooding of a given magnitude. Machine learning algorithms like Random Forests (RFs) are promising approaches, since they consider many influencing variables and as such allow for a detailed assessment of flood vulnerability. Only these variables which are meaningful for the differentiation of a certain target variable are used by the derived models. This allows for an identification of relevant damage influencing variables and hence for a more detailed picture of flood vulnerability of companies. This study aims to identify relevant damage influencing variables by means of the variable importance provided by Random Forests. The data sets used are taken from two surveys conducted after the floods in the Elbe and Danube catchments in the years 2002 and 2013 in Germany. Damage to buildings (n = 430), equipment (n = 651) as well as goods and stock (n = 530) are taken into account. The analysis is done for the entire data set as well as for four groups of different company sectors and the corresponding data subsets. Relevant damage influencing variables separated by sector and assets are identified as, for example, the degree of contamination or precautionary measures undertaken before the flood event. The results provide insight into the damage processes and improve data-acquisition in future surveys by, for instance, asking specific questions for company sectors and assets.

  17. MRI-derived measurements of fibrous-cap and lipid-core thickness: the potential for identifying vulnerable carotid plaques in vivo

    International Nuclear Information System (INIS)

    Trivedi, Rikin A.; U-King-Im, Jean-Marie; Graves, Martin J.; Horsley, Jo; Goddard, Martin; Kirkpatrick, Peter J.; Gillard, Jonathan H.

    2004-01-01

    Vulnerable plaques have thin fibrous caps overlying large necrotic lipid cores. Recent studies have shown that high-resolution MR imaging can identify these components. We set out to determine whether in vivo high-resolution MRI could quantify this aspect of the vulnerable plaque. Forty consecutive patients scheduled for carotid endarterectomy underwent pre-operative in vivo multi-sequence MR imaging of the carotid artery. Individual plaque constituents were characterised on MR images. Fibrous-cap and lipid-core thickness was measured on MRI and histology images. Bland-Altman plots were generated to determine the level of agreement between the two methods. Multi-sequence MRI identified 133 corresponding MR and histology slices. Plaque calcification or haemorrhage was seen in 47 of these slices. MR and histology derived fibrous cap-lipid-core thickness ratios showed strong agreement with a mean difference between MR and histology ratios of 0.02 (±0.04). The intra-class correlation coefficient between two readers for measurements was 0.87 (95% confidence interval, 0.73 and 0.93). Multi-sequence, high-resolution MR imaging accurately quantified the relative thickness of fibrous-cap and lipid-core components of carotid atheromatous plaques. This may prove to be a useful tool to characterise vulnerable plaques in vivo. (orig.)

  18. MRI-derived measurements of fibrous-cap and lipid-core thickness: the potential for identifying vulnerable carotid plaques in vivo

    Energy Technology Data Exchange (ETDEWEB)

    Trivedi, Rikin A. [Addenbrooke' s Hospital, University Department of Radiology, Cambridge (United Kingdom); Addenbrooke' s Hospital, Academic Department of Neurosurgery, Cambridge (United Kingdom); U-King-Im, Jean-Marie; Graves, Martin J. [Addenbrooke' s Hospital, University Department of Radiology, Cambridge (United Kingdom); Horsley, Jo; Goddard, Martin [Papworth Hospital, Department of Histopathology, Papworth Everard (United Kingdom); Kirkpatrick, Peter J. [Addenbrooke' s Hospital, Academic Department of Neurosurgery, Cambridge (United Kingdom); Gillard, Jonathan H. [Addenbrooke' s Hospital, University Department of Radiology, Cambridge (United Kingdom); Addenbrooke' s Hospital, Hills Road, Box 219, Cambridge (United Kingdom)

    2004-09-01

    Vulnerable plaques have thin fibrous caps overlying large necrotic lipid cores. Recent studies have shown that high-resolution MR imaging can identify these components. We set out to determine whether in vivo high-resolution MRI could quantify this aspect of the vulnerable plaque. Forty consecutive patients scheduled for carotid endarterectomy underwent pre-operative in vivo multi-sequence MR imaging of the carotid artery. Individual plaque constituents were characterised on MR images. Fibrous-cap and lipid-core thickness was measured on MRI and histology images. Bland-Altman plots were generated to determine the level of agreement between the two methods. Multi-sequence MRI identified 133 corresponding MR and histology slices. Plaque calcification or haemorrhage was seen in 47 of these slices. MR and histology derived fibrous cap-lipid-core thickness ratios showed strong agreement with a mean difference between MR and histology ratios of 0.02 ({+-}0.04). The intra-class correlation coefficient between two readers for measurements was 0.87 (95% confidence interval, 0.73 and 0.93). Multi-sequence, high-resolution MR imaging accurately quantified the relative thickness of fibrous-cap and lipid-core components of carotid atheromatous plaques. This may prove to be a useful tool to characterise vulnerable plaques in vivo. (orig.)

  19. An assessment of fire vulnerability for aged electrical relays

    International Nuclear Information System (INIS)

    Vigil, R.A.; Nowlen, S.P.

    1995-03-01

    There has been some concern that, as nuclear power plants age, protective measures taken to control and minimize the impact of fire may become ineffective, or significantly less effective, and hence result in an increased fire risk. One objective of the Fire Vulnerability of Aged Electrical Components Program is to assess the effects of aging and service wear on the fire vulnerability of electrical equipment. An increased fire vulnerability of components may lead to an overall increase in fire risk to the plant. Because of their widespread use in various electrical safety systems, electromechanical relays were chosen to be the initial components for evaluation. This test program assessed the impact of operational and thermal aging on the vulnerability of these relays to fire-induced damage. Only thermal effects of a fire were examined in this test program. The impact of smoke, corrosive materials, or fire suppression effects on relay performance were not addressed in this test program. The purpose of this test program was to assess whether the fire vulnerability of electrical relays increased with aging. The sequence followed for the test program was to: identify specific relay types, develop three fire scenarios, artificially age several relays, test the unaged and aged relays in the fire exposure scenarios, and compare the results. The relays tested were Agastat GPI, General Electric (GE) HMA, HGA, and HFA. At least two relays of each type were artificially aged and at least two relays of each type were new. Relays were operationally aged by cycling the relay under rated load for 2,000 operations. These relays were then thermally aged for 60 days with their coil energized

  20. Automated Source Code Analysis to Identify and Remove Software Security Vulnerabilities: Case Studies on Java Programs

    OpenAIRE

    Natarajan Meghanathan

    2013-01-01

    The high-level contribution of this paper is to illustrate the development of generic solution strategies to remove software security vulnerabilities that could be identified using automated tools for source code analysis on software programs (developed in Java). We use the Source Code Analyzer and Audit Workbench automated tools, developed by HP Fortify Inc., for our testing purposes. We present case studies involving a file writer program embedded with features for password validation, and ...

  1. Application of Geomorphologic Factors for Identifying Soil Loss in Vulnerable Regions of the Cameron Highlands

    Directory of Open Access Journals (Sweden)

    Kahhoong Kok

    2018-03-01

    Full Text Available The main purpose of this study is to propose a methodology for identifying vulnerable regions in the Cameron Highlands that are susceptible to soil loss, based on runoff aggregation structure and the energy expenditure pattern of the natural river basin, within the framework of power law distribution. To this end, three geomorphologic factors, namely shear stress and stream power, as well as the drainage area of every point in the basin of interest, have been extracted using GIS, and then their complementary cumulative distributions are graphically analyzed by fitting them to power law distribution, with the purpose of identifying the sensitive points within the basin that are susceptible to soil loss with respect to scaling regimes of shear stress and stream power. It is observed that the range of vulnerable regions by the scaling regime of shear stress is much narrower than by the scaling regime of stream power. This result seems to suggest that shear stress is a scale-dependent factor, which does not follow power law distribution and does not adequately reflect the energy expenditure pattern of a river basin. Therefore, stream power is preferred as a more reasonable factor for the evaluation of soil loss. The methodology proposed in this study can be validated by visualizing the path of soil loss, which is generated from the hillslope process (characterized by the local slope to the valley through a fluvial process (characterized by the drainage area as well as the local slope.

  2. Animal models to study plaque vulnerability

    NARCIS (Netherlands)

    Schapira, K.; Heeneman, S.; Daemen, M. J. A. P.

    2007-01-01

    The need to identify and characterize vulnerable atherosclerotic lesions in humans has lead to the development of various animal models of plaque vulnerability. In this review, current concepts of the vulnerable plaque as it leads to an acute coronary event are described, such as plaque rupture,

  3. Tsunami survivors' perspectives on vulnerability and vulnerability reduction: evidence from Koh Phi Phi Don and Khao Lak, Thailand.

    Science.gov (United States)

    Steckley, Marylynn; Doberstein, Brent

    2011-07-01

    This paper presents the results of primary research with 40 survivors of the 2004 Indian Ocean tsunami in two communities: Khao Lak (n=20) and Koh Phi Phi Don (n=20), Thailand. It traces tsunami survivors' perceptions of vulnerability, determines whether residents felt that the tsunami affected different communities differently, identifies the populations and sub-community groups that survivors distinguished as being more vulnerable than others, highlights community-generated ideas about vulnerability reduction, and pinpoints a range of additional vulnerability reduction actions. Tsunami survivors most consistently identified the 'most vulnerable' community sub-populations as women, children, the elderly, foreigners, and the poor. In Khao Lak, however, respondents added 'Burmese migrants' to this list, whereas in Koh Phi Phi Don, they added 'Thai Muslims'. Results suggest that the two case study communities, both small, coastal, tourism-dominated communities no more than 100 kilometres apart, have differing vulnerable sub-groups and environmental vulnerabilities, requiring different post-disaster vulnerability reduction efforts. © 2011 The Author(s). Disasters © Overseas Development Institute, 2011.

  4. Selection of equipment for equipment qualification

    International Nuclear Information System (INIS)

    Torr, K.G.

    1989-01-01

    This report describes the methodology applied in selecting equipment in the special safety systems for equipment qualification in the CANDU 600 MW nuclear generating stations at Gentilly 2 and Point Lepreau. Included is an explanation of the selection procedure adopted and the rationale behind the criteria used in identifying the equipment. The equipment items on the list have been grouped into three priority categories as a planning aid to AECB staff for a review of the qualification status of the special safety systems

  5. THE METHOD FOR IDENTIFYING THE MOST VULNERABLE AREAS CAUSED BY EXOGENOUS PROCESSES UNDER ARIDIFICATION/HUMIDIFICATION (BASED ON GIS AND RS

    Directory of Open Access Journals (Sweden)

    D. A. Chupina

    2017-01-01

    Full Text Available The paper presents the method of identifying the most vulnerable territories under exogenous processes caused by aridification/humidification. It is based on the assumption that some forms and types of relief increase resistance of terrestrial ecosystems to external influences, while other kinds of relief make them vulnerable. The relationship between landscape and moistening (ground and climatic is of great importance to plains which have groundwater close to the surface. We have used morphometric analysis to divide the territory into hydromorphic and automorphic landscapes. Hydromorphic territories are those that are affected by additional surface moistening and groundwater, while automorphic landscapes are less dependent on groundwater under normal atmospheric moisture. The territory is ranked according to the degree of vulnerability by expert evaluation method. The developed approach is based entirely on using GIS software (ArcGIS 10.2.1 and processing the DEM SRTM. As a result, two models of vulnerability of natural terrestrial ecosystems to exogenic processes on Baraba Plain (Western Siberia have been created for both aridification and humidification cases. The opportunity to estimate the vulnerability is the novel feature for these models of terrestrial ecosystems, in both regional and local scales. The results obtained confirm the existing ideas about the discrete mosaic character of changes in spatial landscape patterns in the area under consideration. For the southern part of Western Siberia where farming is risky the assessment of the potential degree of vulnerability for ecosystems under conditions of increasing climate aridity and extremes is relevant.

  6. Perspectives on plant vulnerabilities ampersand other plant and containment improvements

    International Nuclear Information System (INIS)

    LaChance, J.; Kolaczkowski, A.; Kahn, J.

    1996-01-01

    The primary goal of the Individual Plant Examination (IPE) Program was for licensees to identify plant-unique vulnerabilities and actions to address these vulnerabilities. A review of these vulnerabilities and plant improvements that were identified in the IPEs was performed as part of the IPE Insights Program sponsored by the U.S. Nuclear Regulatory Commission (NRC). The purpose of this effort was to characterize the identified vulnerabilities and the impact of suggested plant improvements. No specific definition for open-quotes vulnerabilityclose quotes was provided in NRC Generic Letter 88-20 or in the subsequent NRC IPE submittal guidance documented in NUREG-1335. Thus licensees were left to use their own definitions. Only 20% of the plants explicitly stated that they had vulnerabilities. However, most licensees identified other plant improvements to address issues not explicitly classified as vulnerabilities, but pertaining to areas in which overall plant safety could potentially be increased. The various definitions of open-quotes vulnerabilityclose quotes used by the licensees, explicitly identified vulnerabilities, proposed plant improvements to address these vulnerabilities, and other plant improvements are summarized and discussed

  7. Single Point Vulnerability Analysis of Automatic Seismic Trip System

    International Nuclear Information System (INIS)

    Oh, Seo Bin; Chung, Soon Il; Lee, Yong Suk; Choi, Byung Pil

    2016-01-01

    Single Point Vulnerability (SPV) analysis is a process used to identify individual equipment whose failure alone will result in a reactor trip, turbine generator failure, or power reduction of more than 50%. Automatic Seismic Trip System (ASTS) is a newly installed system to ensure the safety of plant when earthquake occurs. Since this system directly shuts down the reactor, the failure or malfunction of its system component can cause a reactor trip more frequently than other systems. Therefore, an SPV analysis of ASTS is necessary to maintain its essential performance. To analyze SPV for ASTS, failure mode and effect analysis (FMEA) and fault tree analysis (FTA) was performed. In this study, FMEA and FTA methods were performed to select SPV equipment of ASTS. D/O, D/I, A/I card, seismic sensor, and trip relay had an effect on the reactor trip but their single failure will not cause reactor trip. In conclusion, ASTS is excluded as SPV. These results can be utilized as the basis data for ways to enhance facility reliability such as design modification and improvement of preventive maintenance procedure

  8. Single Point Vulnerability Analysis of Automatic Seismic Trip System

    Energy Technology Data Exchange (ETDEWEB)

    Oh, Seo Bin; Chung, Soon Il; Lee, Yong Suk [FNC Technology Co., Yongin (Korea, Republic of); Choi, Byung Pil [KHNP CRI, Daejeon (Korea, Republic of)

    2016-10-15

    Single Point Vulnerability (SPV) analysis is a process used to identify individual equipment whose failure alone will result in a reactor trip, turbine generator failure, or power reduction of more than 50%. Automatic Seismic Trip System (ASTS) is a newly installed system to ensure the safety of plant when earthquake occurs. Since this system directly shuts down the reactor, the failure or malfunction of its system component can cause a reactor trip more frequently than other systems. Therefore, an SPV analysis of ASTS is necessary to maintain its essential performance. To analyze SPV for ASTS, failure mode and effect analysis (FMEA) and fault tree analysis (FTA) was performed. In this study, FMEA and FTA methods were performed to select SPV equipment of ASTS. D/O, D/I, A/I card, seismic sensor, and trip relay had an effect on the reactor trip but their single failure will not cause reactor trip. In conclusion, ASTS is excluded as SPV. These results can be utilized as the basis data for ways to enhance facility reliability such as design modification and improvement of preventive maintenance procedure.

  9. Not the usual suspects: addressing layers of vulnerability.

    Science.gov (United States)

    Luna, Florencia; Vanderpoel, Sheryl

    2013-07-01

    This paper challenges the traditional account of vulnerability in healthcare which conceptualizes vulnerability as a list of identifiable subpopulations. This list of 'usual suspects', focusing on groups from lower resource settings, is a narrow account of vulnerability. In this article we argue that in certain circumstances middle-class individuals can be also rendered vulnerable. We propose a relational and layered account of vulnerability and explore this concept using the case study of cord blood (CB) banking. In the first section, two different approaches to 'vulnerability' are contrasted: categorical versus layered. In the second section, we describe CB banking and present a case study of CB banking in Argentina. We examine the types of pressure that middle-class pregnant women feel when considering CB collection and storage. In section three, we use the CB banking case study to critique the categorical approach to vulnerability: this model is unable to account for the ways in which these women are vulnerable. A layered account of vulnerability identifies several ways in which middle-class women are vulnerable. Finally, by utilizing the layered approach, this paper suggests how public health policies could be designed to overcome vulnerabilities. © 2013 John Wiley & Sons Ltd.

  10. Fluctuation between grandiose and vulnerable narcissism.

    Science.gov (United States)

    Gore, Whitney L; Widiger, Thomas A

    2016-10-01

    Current literature on narcissistic personality disorder has emphasized a distinction between grandiose and vulnerable narcissism. Some researchers have further suggested that narcissistic persons fluctuate between grandiose and vulnerable narcissism. However, this perception has been confined largely to clinical experience with no systematic research testing the hypothesis. Clinicians and clinical psychology professors in the current study identified 143 persons who fit a description of either a grandiose or a vulnerable narcissist and indicated the extent to which these persons ever demonstrated traits of the complementary variant. The results supported the fluctuation hypothesis, particularly for episodes of vulnerable narcissism in persons identified as a grandiose narcissist. Correlations of the grandiose and vulnerable narcissism traits with a brief five-factor model measure corroborated past trait descriptions of the 2 respective variants of narcissism. The results of the current study are compared with existing cross-sectional and longitudinal research, and suggestions for future research are provided. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  11. An Extreme-Value Approach to Anomaly Vulnerability Identification

    Science.gov (United States)

    Everett, Chris; Maggio, Gaspare; Groen, Frank

    2010-01-01

    The objective of this paper is to present a method for importance analysis in parametric probabilistic modeling where the result of interest is the identification of potential engineering vulnerabilities associated with postulated anomalies in system behavior. In the context of Accident Precursor Analysis (APA), under which this method has been developed, these vulnerabilities, designated as anomaly vulnerabilities, are conditions that produce high risk in the presence of anomalous system behavior. The method defines a parameter-specific Parameter Vulnerability Importance measure (PVI), which identifies anomaly risk-model parameter values that indicate the potential presence of anomaly vulnerabilities, and allows them to be prioritized for further investigation. This entails analyzing each uncertain risk-model parameter over its credible range of values to determine where it produces the maximum risk. A parameter that produces high system risk for a particular range of values suggests that the system is vulnerable to the modeled anomalous conditions, if indeed the true parameter value lies in that range. Thus, PVI analysis provides a means of identifying and prioritizing anomaly-related engineering issues that at the very least warrant improved understanding to reduce uncertainty, such that true vulnerabilities may be identified and proper corrective actions taken.

  12. Identifying vulnerable populations to death and injuries from residential fires.

    Science.gov (United States)

    Gilbert, Stanley W; Butry, David T

    2017-08-03

    This study proposes and evaluates the theory that people who are susceptible to injury in residential fires are not susceptible to death in residential fires and vice versa. It is proposed that the population vulnerable to death in residential fires can be proxied by 'frailty', which is measured as age-gender adjusted fatality rates due to natural causes. This study uses an ecological approach and controls for exposure to estimate the vulnerability of different population groups to death and injury in residential fires. It allows fatalities and injuries to be estimated by different models. Frailty explains fire-related death in adults while not explaining injuries, which is consistent with the idea that deaths and injuries affect disjoint populations. Deaths and injuries in fire are drawn from different populations. People who are susceptible to dying in fires are unlikely to be injured in fires, and the people who are susceptible to injury are unlikely to die in fires. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  13. Multi-dimensional flood vulnerability assessment using data envelopment analysis

    Science.gov (United States)

    Zahid, Zalina; Saharizan, Nurul Syuhada; Hamzah, Paezah; Hussin, Siti Aida Sheikh; Khairi, Siti Shaliza Mohd

    2017-11-01

    Malaysia has been greatly impacted by flood during monsoon seasons. Even though flood prone areas are well identified, assessment on the vulnerability of the disaster is lacking. Assessment of flood vulnerability, defined as the potential for loss when a disaster occurs, is addressed in this paper. The focus is on the development of flood vulnerability measurement in 11 states in Peninsular Malaysia using a non-parametric approach of Data Envelopment Analysis. Scores for three dimensions of flood vulnerability (Population Vulnerability, Social Vulnerability and Biophysical) were calculated using secondary data of selected input and output variables across an 11-year period from 2004 to 2014. The results showed that Johor and Pahang were the most vulnerable to flood in terms of Population Vulnerability, followed by Kelantan, the most vulnerable to flood in terms of Social Vulnerability and Kedah, Pahang and Terengganu were the most vulnerable to flood in terms of Biophysical Vulnerability among the eleven states. The results also showed that the state of Johor, Pahang and Kelantan to be most vulnerable across the three dimensions. Flood vulnerability assessment is important as it provides invaluable information that will allow the authority to identify and develop plans for flood mitigation and to reduce the vulnerability of flood at the affected regions.

  14. Experiences in seismic upgrading of equipment and structures in Kozloduy nuclear power plant (440 WWER-PWR)

    International Nuclear Information System (INIS)

    Ordonez Villalobos, A.

    1993-01-01

    Within the framework of the 'Emergency programme for Nuclear Safety of Kozloduy NPP' it has been concluded that the increase in seismic safety of a NPP can be achieved by upgrading the key equipment in a cost effective way. Essential and vulnerable equipment has to be identified. Seismic capacity should be evaluated base don realistic state of the art criteria. Seismic review teams ef experienced engineers should conduct planned walk-downs in order to propose effective upgrading solutions. Team work of plan engineers and construction engineers would enhance the effectiveness of the solutions. It is recommended that all the participants be motivated and have a clear understanding of the objectives of the upgrading

  15. Coping with subjectivity in vulnerability assessment

    International Nuclear Information System (INIS)

    Renis, T.A.; Cardwell, R.G.

    1988-01-01

    Vulnerability assessment models are widely used to systematically evaluate the performance of complex safeguards systems against a variety of threats. These models require varying levels of detail and input data about the physical design of a facility and its safeguards operations and procedures. However, to evaluate safeguards effectiveness and give a performance rating, these models require additional performance data reflecting probabilities of detection, assessment, interruption, and neutralization, as well as the associated times for various adversary scenarios. These data may be attained from equipment design specifications, laboratory testing, expert judgment, or component testing. Regardless of how these data are obtained, they are inherently subjective. This paper addresses the uses of various vulnerability assessment models and the nature of subjectivity in those models. The paper also describes methods for coping with subjective data

  16. LMHC/TWRS year 2000 equipment project renovation and contingency plan

    International Nuclear Information System (INIS)

    ADAMS, M.R.

    1999-01-01

    A program has been completed to assess, renovate and document tank farm field equipment year 2000 compliance. A communication plan has also been prepared (see section 8.0). The objective of the program was to assure that no adverse effects occur in tank farm operations as a result of equipment malfunction due to the advent of year 2000. The purposes of this document are to: describe the process used to assess field equipment; document items found to be compliant; document items found to be non-compliant including options for making the equipment year 2000 functional and/or tolerant; describe location and management of field equipment year 2000 documentation; assess overall vulnerability of TWRS field equipment with regard to year 2000 problems and describe plans to communicate year 2000 equipment review results and corrective actions

  17. The politics of vulnerability and resilience

    NARCIS (Netherlands)

    Frerks, G.E.; Warner, J.F.; Weijs, B.

    2011-01-01

    Much conceptual confusion exists over the concepts of vulnerability and (social) resilience, reinforced by the different paradigms (the article identifies four) and disciplinary traditions underlying their use. While since the 1980s the social construction of "vulnerability" as a driver for disaster

  18. Spatial-temporal analysis of dengue deaths: identifying social vulnerabilities.

    Science.gov (United States)

    Silva, Maria do Socorro da; Branco, Maria Dos Remédios Freitas Carvalho; Aquino, José; Queiroz, Rejane Christine de Sousa; Bani, Emanuele; Moreira, Emnielle Pinto Borges; Medeiros, Maria Nilza Lima; Rodrigues, Zulimar Márita Ribeiro

    2017-01-01

    Currently, dengue fever, chikungunya fever, and zika virus represent serious public health issues in Brazil, despite efforts to control the vector, the Aedes aegypti mosquito. This was a descriptive and ecological study of dengue deaths occurring from 2002 to 2013 in São Luis, Maranhão, Brazil. Geoprocessing software was used to draw maps, linking the geo-referenced deaths with urban/social data at census tract level. There were 74 deaths, concentrated in areas of social vulnerability. The use of geo-technology tools pointed to a concentration of dengue deaths in specific intra-urban areas.

  19. Identification of vulnerability within a child and family health service.

    Science.gov (United States)

    Kimla, Katarina; Nathanson, Dania; Woolfenden, Susan; Zwi, Karen

    2017-11-21

    Objective The aims of the present study were to describe the prevalence of vulnerability in a cohort of newborns, identify the factors that increase the risk of vulnerability and examine whether those who are most vulnerable are receiving home visits. Methods A prospective cross-sectional study was performed using data collected from questionnaires completed by child and family health nurses and obstetric discharge summaries for each mother-baby dyad. Descriptive frequencies and percentages are used to describe the proportions of children who were vulnerable, offered services and had risk factors for vulnerability. Categorical data were compared using Pearson's Chi-squared analysis. Results In all, 1517 newborns were included in the present study. Of these, 40.5% were identified as vulnerable and 13.9% had two or more risk factors for vulnerability (95% confidence interval (CI) 12-16%). The most common risk factors were biological. Across all newborns, 33.7% were visited at home, and 74.6% of vulnerable newborns were offered a home visit. Children identified as vulnerable were more likely to have a home visit than those who were not (z for 95% CI=1.96; Pvulnerability allowed the offer of home visiting to be directed towards those most likely to benefit. What is known about the topic? Of the Australian child population, 10-20% are vulnerable to adverse health, developmental and wellbeing outcomes. Vulnerable infants are at a greater risk of becoming vulnerable children, adolescents and adults over the life course. Biological and psychosocial risk factors for vulnerability are well described. Families with the greatest need are often the least likely to access or receive support, and have lower utilisation of preventative health services despite evidence that support in the first few years of life can significantly improve long-term outcomes. What does this paper add? This paper provides a detailed description of vulnerabilities in a cohort of newborns and

  20. Vulnerable Genders, Vulnerable Loves

    DEFF Research Database (Denmark)

    Schleicher, Marianne

    2015-01-01

    This chapter analyses religious reflections on vulnerable genders and vulnerable loves from the Hebrew Bible to early Rabbinic literature. It is based on theories by inter alia Donna Haraway on complex identities, Turner and Maryanski on love as a prerequisite for survival, Michel Foucault...... on gathering knowledge and its often unpremeditated effect of recognition and inclusion, and Judith Butler on cultural intelligibility and subversion from within. With these theories as a departing point for the analysis, the chapter links the vulnerability of complex identities with the vulnerability...... of cultures which leads to the overall understanding that culture can accommodate complex identities associated with individual and cultural vulnerability as long as the overall survival of the culture is not threatened. This understanding questions the feasibility of the ethical position of thinkers...

  1. Recognizing Risk and Vulnerability in Research Ethics: Imagining the "What Ifs?"

    Science.gov (United States)

    Peter, Elizabeth; Friedland, Judith

    2017-04-01

    Research ethics committees (RECs) may misunderstand the vulnerability of participants, given their distance from the field. What RECs identify as the vulnerabilities that were not adequately recognized in protocols and how they attempt to protect the perceived vulnerability of participants and mitigate risks were examined using the response letters sent to researchers by three university-based RECs. Using a critical qualitative method informed by feminist ethics, we identified an overarching theme of recognizing and responding to cascading vulnerabilities and four subthemes: identifying vulnerable groups, recognizing potentially risky research, imagining the "what ifs," and mitigating perceived risks. An ethics approach that is up-close, as opposed to distant, is needed to foster closer relationships among participants, researchers, and RECs and to understand participant vulnerability and strength better.

  2. Analysis of Zero-Day Vulnerabilities in Java

    OpenAIRE

    Marius Popa

    2013-01-01

    The zero-day vulnerability is a security lack of the computer system that is unknown to software vendor. This kind of vulnerability permits building attack strategies for gaining the access to the resources and data of a computer system. The main issue of the topic is how a computer system can be protected by zero-day vulnerabilities using the actual security procedures and tools for identifying the potential attacks that exploit the vulnerabilities unknown to computer users and software prov...

  3. Spatial-temporal analysis of dengue deaths: identifying social vulnerabilities

    Directory of Open Access Journals (Sweden)

    Maria do Socorro da Silva

    Full Text Available Abstract: INTRODUCTION Currently, dengue fever, chikungunya fever, and zika virus represent serious public health issues in Brazil, despite efforts to control the vector, the Aedes aegypti mosquito. METHODS: This was a descriptive and ecological study of dengue deaths occurring from 2002 to 2013 in São Luis, Maranhão, Brazil. Geoprocessing software was used to draw maps, linking the geo-referenced deaths with urban/social data at census tract level. RESULTS: There were 74 deaths, concentrated in areas of social vulnerability. CONCLUSIONS: The use of geo-technology tools pointed to a concentration of dengue deaths in specific intra-urban areas.

  4. Characterization equipment essential drawing plan

    International Nuclear Information System (INIS)

    WILSON, G.W.

    1999-01-01

    The purpose of this document is to list the Characterization equipment drawings that are classified as Essential Drawings. Essential Drawings: Are those drawings identified by the facility staff as necessary to directly support the safe operation of the facility or equipment (HNF 1997a). The Characterization equipment drawings identified in this report are deemed essential drawings as defined in HNF-PRO-242, Engineering Drawing Requirements (HNF 1997a). These drawings will be prepared, revised, and maintained per HNF-PRO-440, Engineering Document Change Control (HNF 1997b). All other Characterization equipment drawings not identified in this document will be considered Support drawings until the Characterization Equipment Drawing Evaluation Report is completed

  5. Identifying Vulnerable Plaques with Acoustic Radiation Force Impulse Imaging

    Science.gov (United States)

    Doherty, Joshua Ryan

    The rupture of arterial plaques is the most common cause of ischemic complications including stroke, the fourth leading cause of death and number one cause of long term disability in the United States. Unfortunately, because conventional diagnostic tools fail to identify plaques that confer the highest risk, often a disabling stroke and/or sudden death is the first sign of disease. A diagnostic method capable of characterizing plaque vulnerability would likely enhance the predictive ability and ultimately the treatment of stroke before the onset of clinical events. This dissertation evaluates the hypothesis that Acoustic Radiation Force Impulse (ARFI) imaging can noninvasively identify lipid regions, that have been shown to increase a plaque's propensity to rupture, within carotid artery plaques in vivo. The work detailed herein describes development efforts and results from simulations and experiments that were performed to evaluate this hypothesis. To first demonstrate feasibility and evaluate potential safety concerns, finite- element method simulations are used to model the response of carotid artery plaques to an acoustic radiation force excitation. Lipid pool visualization is shown to vary as a function of lipid pool geometry and stiffness. A comparison of the resulting Von Mises stresses indicates that stresses induced by an ARFI excitation are three orders of magnitude lower than those induced by blood pressure. This thesis also presents the development of a novel pulse inversion harmonic tracking method to reduce clutter-imposed errors in ultrasound-based tissue displacement estimates. This method is validated in phantoms and was found to reduce bias and jitter displacement errors for a marked improvement in image quality in vivo. Lastly, this dissertation presents results from a preliminary in vivo study that compares ARFI imaging derived plaque stiffness with spatially registered composition determined by a Magnetic Resonance Imaging (MRI) gold standard

  6. Water vulnerabilities for existing coal-fired power plants.

    Energy Technology Data Exchange (ETDEWEB)

    Elcock, D.; Kuiper, J.; Environmental Science Division

    2010-08-19

    This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were

  7. Mental vulnerability and survival after cancer

    DEFF Research Database (Denmark)

    Nakaya, Naoki; Bidstrup, Pernille E; Eplov, Lene F

    2009-01-01

    BACKGROUND: It has been hypothesized that personality traits affect survival after cancer, but studies have produced inconsistent results. This study examined the association between mental vulnerability and survival after cancer in Denmark in a prospective cohort study. METHODS: Between 1976...... and 2001, 12733 residents of Copenhagen completed a questionnaire eliciting information on a 12-item mental vulnerability scale, as well as various personal data. Follow-up in the Danish Cancer Registry until 2003 identified 884 incident cases of primary cancer, and follow-up for death from the date...... of cancer diagnosis until 2003 identified 382 deaths. Mental vulnerability scores were divided into 4 approximately equal-sized groups. Cox proportional hazards regression models were used to estimate the hazard ratio (HR) of all-cause mortality. RESULTS: Multivariate HR for all-cause mortality for persons...

  8. Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.

    Energy Technology Data Exchange (ETDEWEB)

    Dawson, Lon Andrew; Stinebaugh, Jennifer A.

    2010-04-01

    The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

  9. Effectiveness of Using Red-Teams to Identify Maritime Security Vulnerabilities to Terrorist Attack

    National Research Council Canada - National Science Library

    Culpepper, Anna

    2004-01-01

    .... Moreover, there have been no attacks on homeland U.S. targets since September 11. The red team concept provides an innovative method to examine these vulnerabilities from the terrorist perspective...

  10. Electrical equipment qualification

    International Nuclear Information System (INIS)

    Farmer, W.S.

    1983-01-01

    Electrical equipment qualification research programs being carried out by CEA, JAERI, and Sandia Laboratories are discussed. Objectives of the program are: (1) assessment of accident simulation methods for electrical equipment qualification testing; lower coarse (2) evaluation of equipment aging and accelerated aging methods; (3) determine radiation dose spectrum to electrical equipment and assess simulation methods for qualification; (4) identify inadequacies in electrical equipment qualification procedures and standards and potential failure modes; and (5) provide data for verifying and improving standards, rules and regulatory guides

  11. Development of a heat vulnerability index for New York State.

    Science.gov (United States)

    Nayak, S G; Shrestha, S; Kinney, P L; Ross, Z; Sheridan, S C; Pantea, C I; Hsu, W H; Muscatiello, N; Hwang, S A

    2017-12-01

    The frequency and intensity of extreme heat events are increasing in New York State (NYS) and have been linked with increased heat-related morbidity and mortality. But these effects are not uniform across the state and can vary across large regions due to regional sociodemographic and environmental factors which impact an individual's response or adaptive capacity to heat and in turn contribute to vulnerability among certain populations. We developed a heat vulnerability index (HVI) to identify heat-vulnerable populations and regions in NYS. Census tract level environmental and sociodemographic heat-vulnerability variables were used to develop the HVI to identify heat-vulnerable populations and areas. Variables were identified from a comprehensive literature review and climate-health research in NYS. We obtained data from 2010 US Census Bureau and 2011 National Land Cover Database. We used principal component analysis to reduce correlated variables to fewer uncorrelated components, and then calculated the cumulative HVI for each census tract by summing up the scores across the components. The HVI was then mapped across NYS (excluding New York City) to display spatial vulnerability. The prevalence rates of heat stress were compared across HVI score categories. Thirteen variables were reduced to four meaningful components representing 1) social/language vulnerability; 2) socioeconomic vulnerability; 3) environmental/urban vulnerability; and 4) elderly/ social isolation. Vulnerability to heat varied spatially in NYS with the HVI showing that metropolitan areas were most vulnerable, with language barriers and socioeconomic disadvantage contributing to the most vulnerability. Reliability of the HVI was supported by preliminary results where higher rates of heat stress were collocated in the regions with the highest HVI. The NYS HVI showed spatial variability in heat vulnerability across the state. Mapping the HVI allows quick identification of regions in NYS that could

  12. Detecting Network Vulnerabilities Through Graph TheoreticalMethods

    Energy Technology Data Exchange (ETDEWEB)

    Cesarz, Patrick; Pomann, Gina-Maria; Torre, Luis de la; Villarosa, Greta; Flournoy, Tamara; Pinar, Ali; Meza Juan

    2007-09-30

    Identifying vulnerabilities in power networks is an important problem, as even a small number of vulnerable connections can cause billions of dollars in damage to a network. In this paper, we investigate a graph theoretical formulation for identifying vulnerabilities of a network. We first try to find the most critical components in a network by finding an optimal solution for each possible cutsize constraint for the relaxed version of the inhibiting bisection problem, which aims to find loosely coupled subgraphs with significant demand/supply mismatch. Then we investigate finding critical components by finding a flow assignment that minimizes the maximum among flow assignments on all edges. We also report experiments on IEEE 30, IEEE 118, and WSCC 179 benchmark power networks.

  13. Health Services Vulnerability During the Ebola Outbreak: A Qualitative Report

    Directory of Open Access Journals (Sweden)

    Nasir Amanat

    2017-07-01

    Full Text Available Ebola is an infectious disease, which is caused by a virus belonging to the Filoviridae group. The outbreak of the disease in the African countries in 2015 caused massive death and contamination of the healthcare personnel those who were engaged in treating the infected patients and caused irreparable damage to the healthcare system. In this study, the vulnerability of the team of health service providers during the Ebola outbreak in Liberia, Guinea and Sierra Leone is studied. The article also proposes solutions that can be learned as a lesson, help in increasing their resilience in similar biological hazards and planning management strategies for similar events in the future. Long before the outbreak took place, West African countries were already facing acute problems in terms of access to health services and health infrastructure. The most important shortcomings for the same were identified as insufficient number of health personnel and capacity shortage that prevented the people from being ready to deal with such uncalled events viz. accidents and epidemic disease outbreak. The Ebola epidemic exacerbated the persisting problems caused due to a shortage of personnel in these countries and caused the death of a large number of common people as well as healthcare personnel. Generally, the vulnerability of the health team working during the Ebola outbreak could be divided into five general dimensions: 1. Management weakness; 2. Lack of engineering and environmental control; 3. Obstacles in the use of personal protective equipment; 4. Not having enough skills and practice exercises; and 5. Ignoring the social factors and satisfaction of the healthcare personnel. The main theme of the study was failure to understand the risk of personnel in accidents and disasters. Findings revealed building capacity and reducing vulnerability of the healthcare personnel against disasters and epidemics depends upon the perceived risk, which is a decisive factor

  14. Mapping human vulnerability to climate change in the Brazilian Amazon: The construction of a municipal vulnerability index.

    Science.gov (United States)

    Menezes, Júlia Alves; Confalonieri, Ulisses; Madureira, Ana Paula; Duval, Isabela de Brito; Santos, Rhavena Barbosa Dos; Margonari, Carina

    2018-01-01

    Vulnerability, understood as the propensity to be adversely affected, has attained importance in the context of climate change by helping to understand what makes populations and territories predisposed to its impacts. Conditions of vulnerability may vary depending on the characteristics of each territory studied-social, environmental, infrastructural, public policies, among others. Thus, the present study aimed to evaluate what makes the municipalities of the state of Amazonas, Brazil, vulnerable to climate change in the context of the largest tropical forest in the world, and which regions of the State are the most susceptible. A Municipal Vulnerability Index was developed, which was used to associate current socio-environmental characteristics of municipalities with climate change scenarios in order to identify those that may be most affected by climate change. The results showed that poor adaptive capacity and poverty had the most influence on current vulnerability of the municipalities of Amazonas with the most vulnerable areas being the southern, northern, and eastern regions of the state. When current vulnerability was related to future climate change projections, the most vulnerable areas were the northern, northeastern, extreme southern, and southwestern regions. From a socio-environmental and climatic point of view, these regions should be a priority for public policy efforts to reduce their vulnerability and prepare them to cope with the adverse aspects of climate change.

  15. Mapping human vulnerability to climate change in the Brazilian Amazon: The construction of a municipal vulnerability index.

    Directory of Open Access Journals (Sweden)

    Júlia Alves Menezes

    Full Text Available Vulnerability, understood as the propensity to be adversely affected, has attained importance in the context of climate change by helping to understand what makes populations and territories predisposed to its impacts. Conditions of vulnerability may vary depending on the characteristics of each territory studied-social, environmental, infrastructural, public policies, among others. Thus, the present study aimed to evaluate what makes the municipalities of the state of Amazonas, Brazil, vulnerable to climate change in the context of the largest tropical forest in the world, and which regions of the State are the most susceptible. A Municipal Vulnerability Index was developed, which was used to associate current socio-environmental characteristics of municipalities with climate change scenarios in order to identify those that may be most affected by climate change. The results showed that poor adaptive capacity and poverty had the most influence on current vulnerability of the municipalities of Amazonas with the most vulnerable areas being the southern, northern, and eastern regions of the state. When current vulnerability was related to future climate change projections, the most vulnerable areas were the northern, northeastern, extreme southern, and southwestern regions. From a socio-environmental and climatic point of view, these regions should be a priority for public policy efforts to reduce their vulnerability and prepare them to cope with the adverse aspects of climate change.

  16. Vulnerability

    Science.gov (United States)

    Taback, I.

    1979-01-01

    The discussion of vulnerability begins with a description of some of the electrical characteristics of fibers before definiting how vulnerability calculations are done. The vulnerability results secured to date are presented. The discussion touches on post exposure vulnerability. After a description of some shock hazard work now underway, the discussion leads into a description of the planned effort and some preliminary conclusions are presented.

  17. Assessing species vulnerability to climate change

    Science.gov (United States)

    Pacifici, Michela; Foden, Wendy B.; Visconti, Piero; Watson, James E. M.; Butchart, Stuart H. M.; Kovacs, Kit M.; Scheffers, Brett R.; Hole, David G.; Martin, Tara G.; Akçakaya, H. Resit; Corlett, Richard T.; Huntley, Brian; Bickford, David; Carr, Jamie A.; Hoffmann, Ary A.; Midgley, Guy F.; Pearce-Kelly, Paul; Pearson, Richard G.; Williams, Stephen E.; Willis, Stephen G.; Young, Bruce; Rondinini, Carlo

    2015-03-01

    The effects of climate change on biodiversity are increasingly well documented, and many methods have been developed to assess species' vulnerability to climatic changes, both ongoing and projected in the coming decades. To minimize global biodiversity losses, conservationists need to identify those species that are likely to be most vulnerable to the impacts of climate change. In this Review, we summarize different currencies used for assessing species' climate change vulnerability. We describe three main approaches used to derive these currencies (correlative, mechanistic and trait-based), and their associated data requirements, spatial and temporal scales of application and modelling methods. We identify strengths and weaknesses of the approaches and highlight the sources of uncertainty inherent in each method that limit projection reliability. Finally, we provide guidance for conservation practitioners in selecting the most appropriate approach(es) for their planning needs and highlight priority areas for further assessments.

  18. Assessing Financial System Vulnerabilities: An Early Warning Approach

    OpenAIRE

    Gurnain Pasricha; Tom Roberts; Ian Christensen; Brad Howell

    2013-01-01

    This article focuses on a quantitative method to identify financial system vulnerabilities, specifically, an imbalance indicator model (IIM) and its application to Canada. An IIM identifies potential vulnerabilities in a financial system by comparing current economic and financial data with data from periods leading up to past episodes of financial stress. It complements other sources of information - including market intelligence and regular monitoring of the economy - that policy-makers use...

  19. Assessing inter- and intraspecific variability of xylem vulnerability to embolism in oaks

    DEFF Research Database (Denmark)

    Lobo, Albin; Torres-Ruiz, José M.; Burlett, Regis

    2018-01-01

    for future afforestation. However, the presence of long vessels makes it difficult to assess xylem vulnerability to embolism in these species. Thanks to the development of a flow centrifuge equipped with a large rotor, we quantified (i) the between species variability of embolism resistance in four native...

  20. Plutonium Vulnerability Management Plan

    International Nuclear Information System (INIS)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy's response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department's Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B

  1. Road Network Vulnerability Analysis Based on Improved Ant Colony Algorithm

    Directory of Open Access Journals (Sweden)

    Yunpeng Wang

    2014-01-01

    Full Text Available We present an improved ant colony algorithm-based approach to assess the vulnerability of a road network and identify the critical infrastructures. This approach improves computational efficiency and allows for its applications in large-scale road networks. This research involves defining the vulnerability conception, modeling the traffic utility index and the vulnerability of the road network, and identifying the critical infrastructures of the road network. We apply the approach to a simple test road network and a real road network to verify the methodology. The results show that vulnerability is directly related to traffic demand and increases significantly when the demand approaches capacity. The proposed approach reduces the computational burden and may be applied in large-scale road network analysis. It can be used as a decision-supporting tool for identifying critical infrastructures in transportation planning and management.

  2. Air pollution and vulnerability: solving the puzzle of prioritization

    CSIR Research Space (South Africa)

    Wright, CY

    2011-01-01

    Full Text Available conditions exacerbates the problem. Air quality management plans identify prioritized strategies for improved air quality independent of consideration of vulnerability. A population exposure and vulnerability risk prioritization framework comprising five...

  3. Europe's vulnerability to energy crises

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-01-15

    The growing dependency of Europe as a whole on energy imports and anticipated further increases in energy prices reinforce the concerns about meeting the energy demand in the future. The objective of the Study is to identify the threats leading to potential energy crises and suggest solutions for facing, in an appropriate way, the related key challenges. In addition, the Study intends to develop a number of indicators effective enough to assess the level of different types of vulnerability, as well the overall vulnerability of a country or region, including threats to physical disruption, higher energy prices etc. The use of vulnerability indicators is highly recommended for all WEC-European countries, as well as to policy makers and market players.

  4. An integrated chemical biology approach identifies specific vulnerability of Ewing's sarcoma to combined inhibition of Aurora kinases A and B.

    Science.gov (United States)

    Winter, Georg E; Rix, Uwe; Lissat, Andrej; Stukalov, Alexey; Müllner, Markus K; Bennett, Keiryn L; Colinge, Jacques; Nijman, Sebastian M; Kubicek, Stefan; Kovar, Heinrich; Kontny, Udo; Superti-Furga, Giulio

    2011-10-01

    Ewing's sarcoma is a pediatric cancer of the bone that is characterized by the expression of the chimeric transcription factor EWS-FLI1 that confers a highly malignant phenotype and results from the chromosomal translocation t(11;22)(q24;q12). Poor overall survival and pronounced long-term side effects associated with traditional chemotherapy necessitate the development of novel, targeted, therapeutic strategies. We therefore conducted a focused viability screen with 200 small molecule kinase inhibitors in 2 different Ewing's sarcoma cell lines. This resulted in the identification of several potential molecular intervention points. Most notably, tozasertib (VX-680, MK-0457) displayed unique nanomolar efficacy, which extended to other cell lines, but was specific for Ewing's sarcoma. Furthermore, tozasertib showed strong synergies with the chemotherapeutic drugs etoposide and doxorubicin, the current standard agents for Ewing's sarcoma. To identify the relevant targets underlying the specific vulnerability toward tozasertib, we determined its cellular target profile by chemical proteomics. We identified 20 known and unknown serine/threonine and tyrosine protein kinase targets. Additional target deconvolution and functional validation by RNAi showed simultaneous inhibition of Aurora kinases A and B to be responsible for the observed tozasertib sensitivity, thereby revealing a new mechanism for targeting Ewing's sarcoma. We further corroborated our cellular observations with xenograft mouse models. In summary, the multilayered chemical biology approach presented here identified a specific vulnerability of Ewing's sarcoma to concomitant inhibition of Aurora kinases A and B by tozasertib and danusertib, which has the potential to become a new therapeutic option.

  5. Analysis of computational vulnerabilities in digital repositories

    Directory of Open Access Journals (Sweden)

    Valdete Fernandes Belarmino

    2015-04-01

    Full Text Available Objective. Demonstrates the results of research that aimed to analyze the computational vulnerabilities of digital directories in public Universities. Argues the relevance of information in contemporary societies like an invaluable resource, emphasizing scientific information as an essential element to constitute scientific progress. Characterizes the emergence of Digital Repositories and highlights its use in academic environment to preserve, promote, disseminate and encourage the scientific production. Describes the main software for the construction of digital repositories. Method. The investigation identified and analyzed the vulnerabilities that are exposed the digital repositories using Penetration Testing running. Discriminating the levels of risk and the types of vulnerabilities. Results. From a sample of 30 repositories, we could examine 20, identified that: 5% of the repositories have critical vulnerabilities, 85% high, 25% medium and 100% lowers. Conclusions. Which demonstrates the necessity to adapt actions for these environments that promote informational security to minimizing the incidence of external and / or internal systems attacks.Abstract Grey Text – use bold for subheadings when needed.

  6. Bayesian distributed lag interaction models to identify perinatal windows of vulnerability in children's health.

    Science.gov (United States)

    Wilson, Ander; Chiu, Yueh-Hsiu Mathilda; Hsu, Hsiao-Hsien Leon; Wright, Robert O; Wright, Rosalind J; Coull, Brent A

    2017-07-01

    Epidemiological research supports an association between maternal exposure to air pollution during pregnancy and adverse children's health outcomes. Advances in exposure assessment and statistics allow for estimation of both critical windows of vulnerability and exposure effect heterogeneity. Simultaneous estimation of windows of vulnerability and effect heterogeneity can be accomplished by fitting a distributed lag model (DLM) stratified by subgroup. However, this can provide an incomplete picture of how effects vary across subgroups because it does not allow for subgroups to have the same window but different within-window effects or to have different windows but the same within-window effect. Because the timing of some developmental processes are common across subpopulations of infants while for others the timing differs across subgroups, both scenarios are important to consider when evaluating health risks of prenatal exposures. We propose a new approach that partitions the DLM into a constrained functional predictor that estimates windows of vulnerability and a scalar effect representing the within-window effect directly. The proposed method allows for heterogeneity in only the window, only the within-window effect, or both. In a simulation study we show that a model assuming a shared component across groups results in lower bias and mean squared error for the estimated windows and effects when that component is in fact constant across groups. We apply the proposed method to estimate windows of vulnerability in the association between prenatal exposures to fine particulate matter and each of birth weight and asthma incidence, and estimate how these associations vary by sex and maternal obesity status in a Boston-area prospective pre-birth cohort study. © The Author 2017. Published by Oxford University Press. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  7. Current status of vulnerable plaque detection.

    LENUS (Irish Health Repository)

    Sharif, Faisal

    2012-02-01

    Critical coronary stenoses have been shown to contribute to only a minority of acute coronary syndromes (ACS) and sudden cardiac death. Autopsy studies have identified a subgroup of high-risk patients with disrupted vulnerable plaque and modest stenosis. Consequently, a clinical need exists to develop methods to identify these plaques prospectively before disruption and clinical expression of disease. Recent advances in invasive and noninvasive imaging techniques have shown the potential to identify these high-risk plaques. The anatomical characteristics of the vulnerable plaque such as thin cap fibroatheroma and lipid pool can be identified with angioscopy, high frequency intravascular ultrasound, intravascular MRI, and optical coherence tomography. Efforts have also been made to recognize active inflammation in high-risk plaques using intravascular thermography. Plaque chemical composition by measuring electromagnetic radiation using spectroscopy is also an emerging technology to detect vulnerable plaques. Noninvasive imaging with MRI, CT, and PET also holds the potential to differentiate between low and high-risk plaques. However, at present none of these imaging modalities are able to detect vulnerable plaque neither has been shown to definitively predict outcome. Nevertheless in contrast, there has been a parallel development in the physiological assessment of advanced atherosclerotic coronary artery disease. Thus recent trials using fractional flow reserve in patients with modest non flow-limiting stenoses have shown that deferral of PCI with optimal medical therapy in these patients is superior to coronary intervention. Further trials are needed to provide more information regarding the natural history of high-risk but non flow-limiting plaque to establish patient-specific targeted therapy and to refine plaque stabilizing strategies in the future.

  8. Assessment of Chemical and Radiological Vulnerabilities

    International Nuclear Information System (INIS)

    SETH, S.S.

    2000-01-01

    Following the May 14, 1997 chemical explosion at Hanford's Plutonium Reclamation Facility, the Department of Energy Richland Operations Office and its prime contractor, Fluor Hanford, Inc., completed an extensive assessment to identify and address chemical and radiological safety vulnerabilities at all facilities under the Project Hanford Management Contract. This was a challenging undertaking because of the immense size of the problem, unique technical issues, and competing priorities. This paper focuses on the assessment process, including the criteria and methodology for data collection, evaluation, and risk-based scoring. It does not provide details on the facility-specific results and corrective actions, but discusses the approach taken to address the identified vulnerabilities

  9. Proceedings of FED remote maintenance equipment workshop

    International Nuclear Information System (INIS)

    Sager, P.; Garin, J.; Hager, E.R.; Spampinato, P.T.; Tobias, D.; Young, N.

    1981-11-01

    A workshop was convened in two sessions in January and March 1981, on the remote maintenance equipment for the Fusion Engineering Device (FED). The objectives of the first session were to familiarize the participants with the status of the design of the FED and to develop a remote maintenance equipment list for the FED. The objective of the second session was to have the participants present design concepts for the equipment which had been identified in the first session. The equipment list was developed for general purpose and special purpose equipment. The general purpose equipment was categorized as manipulators and other, while the special purpose equipment was subdivided according to the reactor subsystem it serviced: electrical, magnetic, and nuclear. Both mobile and fixed base manipulators were identified. Handling machines were identified as the major requirement for special purpose equipment

  10. Vulnerability Management for an Enterprise Resource Planning System

    Science.gov (United States)

    Goel, Shivani; Kiran, Ravi; Garg, Deepak

    2012-09-01

    Enterprise resource planning (ERP) systems are commonly used in technical educational institutions(TEIs). ERP systems should continue providing services to its users irrespective of the level of failure. There could be many types of failures in the ERP systems. There are different types of measures or characteristics that can be defined for ERP systems to handle the levels of failure. Here in this paper, various types of failure levels are identified along with various characteristics which are concerned with those failures. The relation between all these is summarized. The disruptions causing vulnerabilities in TEIs are identified .A vulnerability management cycle has been suggested along with many commercial and open source vulnerability management tools. The paper also highlights the importance of resiliency in ERP systems in TEIs.

  11. CALTRANS CLIMATE CHANGE VULNERABILITY ASSESSMENTS

    Science.gov (United States)

    2018-01-01

    The following report was developed for the California Department of Transportation (Caltrans) to summarize a vulnerability assessment conducted for assets in Caltrans District 4. The assessment was developed to specifically identify the potential eff...

  12. Safety Review related to Commercial Grade Digital Equipment in Safety System

    International Nuclear Information System (INIS)

    Yu, Yeongjin; Park, Hyunshin; Yu, Yeongjin; Lee, Jaeheung

    2013-01-01

    The upgrades or replacement of I and C systems on safety system typically involve digital equipment developed in accordance with non-nuclear standards. However, the use of commercial grade digital equipment could include the vulnerability for software common-mode failure, electromagnetic interference and unanticipated problems. Although guidelines and standards for dedication methods of commercial grade digital equipment are provided, there are some difficulties to apply the methods to commercial grade digital equipment for safety system. This paper focuses on regulatory guidelines and relevant documents for commercial grade digital equipment and presents safety review experiences related to commercial grade digital equipment in safety system. This paper focuses on KINS regulatory guides and relevant documents for dedication of commercial grade digital equipment and presents safety review experiences related to commercial grade digital equipment in safety system. Dedication including critical characteristics is required to use the commercial grade digital equipment on safety system in accordance with KEPIC ENB 6370 and EPRI TR-106439. The dedication process should be controlled in a configuration management process. Appropriate methods, criteria and evaluation result should be provided to verify acceptability of the commercial digital equipment used for safety function

  13. Downstream management practices of transnational companies in institutionally vulnerable countries

    DEFF Research Database (Denmark)

    Jørgensen, Michael Søgaard; Milanez, Bruno

    2017-01-01

    Analyses of social and environmental management in transnational product chains focus often upstream on suppliers in socially and institutionally vulnerable countries and these suppliers' hazardous processes. Furthermore focus is on transnational companies' responsibility when they source from...... such suppliers. On the contrary, not much focus has been on transnational companies' downstream export of hazardous products to vulnerable countries and the product use in those countries. The article uses pesticides as case of hazardous products and identifies mechanisms in the downstream social...... and environmental management of a Danish pesticide company in vulnerable countries and especially in Brazil. The identified mechanisms are: the transnational company's on-going interpretation of the regulatory and ethical obligations for development and use of its hazardous products in vulnerable countries, path...

  14. Preliminary regulatory assessment of nuclear power plants vulnerabilities

    International Nuclear Information System (INIS)

    Kostadinov, V.; Petelin, S.

    2004-01-01

    Preliminary attempts to develop models for nuclear regulatory vulnerability assessment of nuclear power plants are presented. Development of the philosophy and computer tools could be new and important insight for management of nuclear operators and nuclear regulatory bodies who face difficult questions about how to assess the vulnerability of nuclear power plants and other nuclear facilities to external and internal threats. In the situation where different and hidden threat sources are dispersed throughout the world, the assessment of security and safe operation of nuclear power plants is very important. Capability to evaluate plant vulnerability to different kinds of threats, like human and natural occurrences and terrorist attacks and preparation of emergency response plans and estimation of costs are of vital importance for assurance of national security. On the basis of such vital insights, nuclear operators and nuclear regulatory bodies could plan and optimise changes in oversight procedures, organisations, equipment, hardware and software to reduce risks taking into account security and safety of nuclear power plants operation, budget, manpower, and other limitations. Initial qualitative estimations of adapted assessments for nuclear applications are shortly presented. (author)

  15. A pragmatic analysis of vulnerability in clinical research.

    Science.gov (United States)

    Wendler, David

    2017-09-01

    Identifying which subjects are vulnerable, and implementing safeguards to protect them, is widely regarded as essential to clinical research. Commentators have endorsed a number of responses to these challenges and have thereby made significant progress in understanding vulnerability in clinical research. At the same time, this literature points to a central contradiction which calls into question its potential to protect vulnerable subjects in practice. Specifically, analysis suggests that all human subjects are vulnerable and vulnerability in clinical research is comparative and context dependent, in the sense that individuals are vulnerable relative to others and in some contexts only. Yet, if everyone is vulnerable, there seems to be no point in citing the vulnerability of some individuals. Moreover, the conclusion that everyone is vulnerable seems inconsistent with the claims that vulnerability is comparative and context dependent, raising concern over whether it will be possible to develop a comprehensive account of vulnerability that is internally consistent. The solution to this dilemma lies in recognition of the fact that the practical significance of claims regarding vulnerability depends on the context in which they are used. The claims that appear to lead to the central contradiction are in fact accurate conclusions that follow from different uses of the term 'vulnerability'. The present manuscript describes this 'pragmatic' approach to vulnerability in clinical research and considers its implications for ensuring that subjects receive appropriate protection. Published 2017. This article is a U.S. Government work and is in the public domain in the USA.

  16. Vulnerability of schools to floods in Nyando River catchment, Kenya.

    Science.gov (United States)

    Ochola, Samuel O; Eitel, Bernhard; Olago, Daniel O

    2010-07-01

    This paper assesses the vulnerability of schools to floods in the Nyando River catchment (3,600 km(2)) in western Kenya and identifies measures needed to reduce this vulnerability. It surveys 130 schools in the lower reaches, where flooding is a recurrent phenomenon. Of the primary schools assessed, 40% were vulnerable, 48% were marginally vulnerable and 12% were not vulnerable. Of the secondary schools, 8% were vulnerable, 73% were marginally vulnerable and 19% were not vulnerable. Vulnerability to floods is due to a lack of funds, poor building standards, local topography, soil types and inadequate drainage. The Constituencies Development Fund (CDF), established in 2003, provides financial support to cover school construction and reconstruction costs; CDF Committees are expected to adopt school building standards. In an effort to promote safe and resilient construction and retrofitting to withstand floods, this paper presents vulnerability reduction strategies and recommendations for incorporating minimum standards in the on-going Primary School Infrastructure Programme Design.

  17. A synthesized biophysical and social vulnerability assessment for Taiwan

    Science.gov (United States)

    Lee, Yung-Jaan

    2017-11-01

    Taiwan, located in the Western Pacific, is a country that is one of the most vulnerable to disasters that are associated with the changing climate; it is located within the Ring of Fire, which is the most geologically active region in the world. The environmental and geological conditions in Taiwan are sensitive and vulnerable to such disasters. Owing to increasing urbanization in Taiwan, floods and climate-related disasters have taken an increasing toll on human lives. As global warming accelerates the rising of sea levels and increasing of the frequency of extreme weather events, disasters will continue to affect socioeconomic development and human conditions. Under such circumstances, researchers and policymakers alike must recognize the importance of providing useful knowledge concerning vulnerability, disaster recovery and resilience. Strategies for reducing vulnerability and climate-related disaster risks and for increasing resilience involve preparedness, mitigation and adaptation. In the last two decades, extreme climate events have caused severe flash floods, debris flows, landslides, and other disasters and have had negative effects of many sectors, including agriculture, infrastructure and health. Since climate change is expected to have a continued impact on socio-economic development, this work develops a vulnerability assessment framework that integrates both biophysical and social vulnerability and supports synthesized vulnerability analyses to identify vulnerable areas in Taiwan. Owing to its geographical, geological and climatic features, Taiwan is susceptible to earthquakes, typhoons, droughts and various induced disasters. Therefore, Taiwan has the urgent task of establishing a framework for assessing vulnerability as a planning and policy tool that can be used to identify not only the regions that require special attention but also hotspots in which efforts should be made to reduce vulnerability and the risk of climate-related disaster. To

  18. Vulnerabilities Classification for Safe Development on Android

    Directory of Open Access Journals (Sweden)

    Ricardo Luis D. M. Ferreira

    2016-06-01

    Full Text Available The global sales market is currently led by devices with the Android operating system. In 2015, more than 1 billion smartphones were sold, of which 81.5% were operated by the Android platform. In 2017, it is estimated that 267.78 billion applications will be downloaded from Google Play. According to Qian, 90% of applications are vulnerable, despite the recommendations of rules and standards for the safe software development. This study presents a classification of vulnerabilities, indicating the vulnerability, the safety aspect defined by the Brazilian Association of Technical Standards (Associação Brasileira de Normas Técnicas - ABNT norm NBR ISO/IEC 27002 which will be violated, which lines of code generate the vulnerability and what should be done to avoid it, and the threat agent used by each of them. This classification allows the identification of possible points of vulnerability, allowing the developer to correct the identified gaps.

  19. Cyber/Physical Security Vulnerability Assessment Integration

    International Nuclear Information System (INIS)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-01-01

    This internally funded Laboratory-Directed R and D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  20. Statistics of software vulnerability detection in certification testing

    Science.gov (United States)

    Barabanov, A. V.; Markov, A. S.; Tsirlov, V. L.

    2018-05-01

    The paper discusses practical aspects of introduction of the methods to detect software vulnerability in the day-to-day activities of the accredited testing laboratory. It presents the approval results of the vulnerability detection methods as part of the study of the open source software and the software that is a test object of the certification tests under information security requirements, including software for communication networks. Results of the study showing the allocation of identified vulnerabilities by types of attacks, country of origin, programming languages used in the development, methods for detecting vulnerability, etc. are given. The experience of foreign information security certification systems related to the detection of certified software vulnerabilities is analyzed. The main conclusion based on the study is the need to implement practices for developing secure software in the development life cycle processes. The conclusions and recommendations for the testing laboratories on the implementation of the vulnerability analysis methods are laid down.

  1. Care and support of orphaned and vulnerable children at school: helping teachers to respond

    Directory of Open Access Journals (Sweden)

    Lesley Wood

    2011-01-01

    Full Text Available It is acknowledged that teacher training programmes around HIV in most of sub-Saharan Africa appear not to have been very effective in assisting teachers to respond to the demands placed on them by the pandemic. In response to the need identified by international development agencies, for research into teacher education and HIV in sub-Saharan Africa, this study investigated teacher perceptions of the effectiveness of training programmes offered in a specific school district in South Africa to equip them to deal with issues arising from having orphans and vulnerable children in their classrooms. A qualitative research design was followed to purposively select teachers who had attended the departmental training to participate in focus groups to explore the phenomenon of teaching orphaned and vulnerable children. The findings that emerged from the thematic data analysis provided supporting evidence that current teacher education approaches in this regard are not perceived to be effective. The results are used to suggest guidelines for an alternative approach to the current forms of HIV and AIDS training for teachers that is more likely to be sustainable, culturally appropriate and suited to the context.

  2. Extinction vulnerability of coral reef fishes.

    Science.gov (United States)

    Graham, Nicholas A J; Chabanet, Pascale; Evans, Richard D; Jennings, Simon; Letourneur, Yves; Aaron Macneil, M; McClanahan, Tim R; Ohman, Marcus C; Polunin, Nicholas V C; Wilson, Shaun K

    2011-04-01

    With rapidly increasing rates of contemporary extinction, predicting extinction vulnerability and identifying how multiple stressors drive non-random species loss have become key challenges in ecology. These assessments are crucial for avoiding the loss of key functional groups that sustain ecosystem processes and services. We developed a novel predictive framework of species extinction vulnerability and applied it to coral reef fishes. Although relatively few coral reef fishes are at risk of global extinction from climate disturbances, a negative convex relationship between fish species locally vulnerable to climate change vs. fisheries exploitation indicates that the entire community is vulnerable on the many reefs where both stressors co-occur. Fishes involved in maintaining key ecosystem functions are more at risk from fishing than climate disturbances. This finding is encouraging as local and regional commitment to fisheries management action can maintain reef ecosystem functions pending progress towards the more complex global problem of stabilizing the climate. © 2011 Blackwell Publishing Ltd/CNRS.

  3. Extending Vulnerability Assessment to Include Life Stages Considerations.

    Science.gov (United States)

    Hodgson, Emma E; Essington, Timothy E; Kaplan, Isaac C

    2016-01-01

    Species are experiencing a suite of novel stressors from anthropogenic activities that have impacts at multiple scales. Vulnerability assessment is one tool to evaluate the likely impacts that these stressors pose to species so that high-vulnerability cases can be identified and prioritized for monitoring, protection, or mitigation. Commonly used semi-quantitative methods lack a framework to explicitly account for differences in exposure to stressors and organism responses across life stages. Here we propose a modification to commonly used spatial vulnerability assessment methods that includes such an approach, using ocean acidification in the California Current as an illustrative case study. Life stage considerations were included by assessing vulnerability of each life stage to ocean acidification and were used to estimate population vulnerability in two ways. We set population vulnerability equal to: (1) the maximum stage vulnerability and (2) a weighted mean across all stages, with weights calculated using Lefkovitch matrix models. Vulnerability was found to vary across life stages for the six species explored in this case study: two krill-Euphausia pacifica and Thysanoessa spinifera, pteropod-Limacina helicina, pink shrimp-Pandalus jordani, Dungeness crab-Metacarcinus magister and Pacific hake-Merluccius productus. The maximum vulnerability estimates ranged from larval to subadult and adult stages with no consistent stage having maximum vulnerability across species. Similarly, integrated vulnerability metrics varied greatly across species. A comparison showed that some species had vulnerabilities that were similar between the two metrics, while other species' vulnerabilities varied substantially between the two metrics. These differences primarily resulted from cases where the most vulnerable stage had a low relative weight. We compare these methods and explore circumstances where each method may be appropriate.

  4. Assessing Vulnerability to Heat: A Geospatial Analysis for the City of Philadelphia

    Directory of Open Access Journals (Sweden)

    Laura Barron

    2018-04-01

    Full Text Available Urban heat island (UHI effect is an increasingly prominent health and environmental hazard that is linked to urbanization and climate change. Greening reduces the negative impacts of UHI; trees specifically are the most effective in ambient temperature reduction. This paper investigates vulnerability to heat in the Philadelphia, Pennsylvania and identifies where street trees can be planted as a public intervention. We used geospatial information systems (GIS software to map a validated Heat Vulnerability Index to identify vulnerability at the block level. Using a high-low geospatial cluster analysis, we assessed where the City of Philadelphia can most effectively plant street trees to address UHI. This information was then aggregated to the neighborhood level for more effective citizen communication and policymaking. We identified that 26 of 48 (54% neighborhoods that were vulnerable to heat also lacked street trees. Of 158 Philadelphia neighborhoods, 63 (40% contained block groups of high vulnerability to either heat or street tree infrastructure. Neighborhoods that were ranked highest in both classifications were identified in two adjacent West Philadelphia neighborhoods. Planting street trees is a public service a city can potentially reduce the negative health impacts of UHI. GIS can be used to identify and recommend street tree plantings to reduce urban heat.

  5. How to Assess Vulnerabilities of Water Policies to Global Change?

    Science.gov (United States)

    Kumar, A.; Haasnoot, M.; Weijs, S.

    2017-12-01

    Water managers are confronted with uncertainties arising from hydrological, societal, economical and political drivers. To manage these uncertainties two paradigms have been identified: top-down and bottom-up approaches. Top-down or prediction-based approaches use socio-economic scenarios together with a discrete set of GCM projections (often downscaled) to assess the expected impact of drivers and policies on water resource system through various hydrological and social systems models. Adaptation strategies to alleviate these impacts are then identified and tested against the scenarios. To address GCM and downscaling uncertainties, these approaches put more focus on climate predictions, rather than the decision problem itself. Triggered by the wish to have a more scenario-neutral approach and address downscaling uncertainties, recent analyses have been shifted towards vulnerability-based (bottom-up or decision-centric) approaches. They begin at the local scale by addressing socio-economic responses to climate, often involving stakeholder's input; identify vulnerabilities under a larger sample of plausible futures and evaluate sensitivity and robustness of possible adaptation options. Several bottom-up approaches have emerged so far and are increasingly recommended. Fundamentally they share several core ideas, however, subtle differences exist in vulnerability assessment, visualization tools for exploring vulnerabilities and computational methods used for identifying robust water policies. Through this study, we try to identify how these approaches are progressing, how the climate and non-climate uncertainties are being confronted and how to integrate existing and new tools. We find that choice of a method may depend on the number of vulnerability drivers identified and type of threshold levels (environmental conditions or policy objectives) defined. Certain approaches are suited well for assessing adaptive capacities, tipping points and sequencing of decisions

  6. Vulnerability of networks of interacting Markov chains.

    Science.gov (United States)

    Kocarev, L; Zlatanov, N; Trajanov, D

    2010-05-13

    The concept of vulnerability is introduced for a model of random, dynamical interactions on networks. In this model, known as the influence model, the nodes are arranged in an arbitrary network, while the evolution of the status at a node is according to an internal Markov chain, but with transition probabilities that depend not only on the current status of that node but also on the statuses of the neighbouring nodes. Vulnerability is treated analytically and numerically for several networks with different topological structures, as well as for two real networks--the network of infrastructures and the EU power grid--identifying the most vulnerable nodes of these networks.

  7. Characterization equipment essential/support drawing plan

    International Nuclear Information System (INIS)

    WILSON, G.W.

    1999-01-01

    The purpose of this document is to list the Characterization equipment drawings that are classified as Essential Drawings and Support Drawings. Essential Drawings: Are those drawings identified by the facility staff as necessary to directly support the safe operation of the facility or equipment (HNF 1997a). Support Drawings: Are those drawings identified by facility staff that further describe the design details of structures, systems, or components shown on essential drawings. (HNF 1997a) The Characterization equipment drawings identified in this report are deemed essential drawings as defined in HNF-PRO-242, Engineering Drawing Requirements (HNF 1997a). These drawings will be prepared, revised, and maintained per HNF-PRO-440, Engineering Document Change Control (HNF 1997b). All other Characterization equipment drawings not identified in this document will be considered General drawings until the Characterization Equipment Drawing Evaluation Report (Wilson 1998) is updated during fiscal year 1999. Trucks 1 and 2 drawings are not included in this revision of the essential drawing list due to uncertainty about future use

  8. Mental vulnerability--a risk factor for ischemic heart disease

    DEFF Research Database (Denmark)

    Eplov, Lene Falgaard; Jørgensen, Torben; Birket-Smith, Morten

    2006-01-01

    OBJECTIVE: The purpose of this study is to examine whether mental vulnerability is a risk factor for the development of ischemic heart disease (IHD) after adjustment for well-established risk factors. METHODS: In three prospective cohort studies in Copenhagen County, Denmark, we recorded the level...... of mental vulnerability and possible risk factors to IHD at baseline. For follow-up, the sample was linked to relevant registries to identify all cases of fatal and nonfatal IHD. The relationship between mental vulnerability and IHD was examined using both Kaplan-Meir and Cox proportional hazard models...... adjusting for possible confounding factors. RESULTS: Mental vulnerability was significantly associated with the risk for IHD (medium mental vulnerability: hazard ratio 1.41, 95% confidence interval 1.04-1.91; and high mental vulnerability: hazard ratio 2.05; 95% confidence interval 1.46-2.88), after...

  9. Assessment of human-natural system characteristics influencing global freshwater supply vulnerability

    Science.gov (United States)

    Padowski, Julie C.; Gorelick, Steven M.; Thompson, Barton H.; Rozelle, Scott; Fendorf, Scott

    2015-10-01

    Global freshwater vulnerability is a product of environmental and human dimensions, however, it is rarely assessed as such. Our approach identifies freshwater vulnerability using four broad categories: endowment, demand, infrastructure, and institutions, to capture impacts on natural and managed water systems within the coupled human-hydrologic environment. These categories are represented by 19 different endogenous and exogenous characteristics affecting water supply vulnerability. By evaluating 119 lower per capita income countries (Yemen and Djibouti nearly as vulnerable. Surprising similarities in vulnerability were also found among geographically disparate nations such as Vietnam, Sri Lanka, and Guatemala. Determining shared patterns of freshwater vulnerability provides insights into why water supply vulnerabilities are manifested in human-water systems at the national scale.

  10. Modeling Coastal Vulnerability through Space and Time.

    Science.gov (United States)

    Hopper, Thomas; Meixler, Marcia S

    2016-01-01

    Coastal ecosystems experience a wide range of stressors including wave forces, storm surge, sea-level rise, and anthropogenic modification and are thus vulnerable to erosion. Urban coastal ecosystems are especially important due to the large populations these limited ecosystems serve. However, few studies have addressed the issue of urban coastal vulnerability at the landscape scale with spatial data that are finely resolved. The purpose of this study was to model and map coastal vulnerability and the role of natural habitats in reducing vulnerability in Jamaica Bay, New York, in terms of nine coastal vulnerability metrics (relief, wave exposure, geomorphology, natural habitats, exposure, exposure with no habitat, habitat role, erodible shoreline, and surge) under past (1609), current (2015), and future (2080) scenarios using InVEST 3.2.0. We analyzed vulnerability results both spatially and across all time periods, by stakeholder (ownership) and by distance to damage from Hurricane Sandy. We found significant differences in vulnerability metrics between past, current and future scenarios for all nine metrics except relief and wave exposure. The marsh islands in the center of the bay are currently vulnerable. In the future, these islands will likely be inundated, placing additional areas of the shoreline increasingly at risk. Significant differences in vulnerability exist between stakeholders; the Breezy Point Cooperative and Gateway National Recreation Area had the largest erodible shoreline segments. Significant correlations exist for all vulnerability (exposure/surge) and storm damage combinations except for exposure and distance to artificial debris. Coastal protective features, ranging from storm surge barriers and levees to natural features (e.g. wetlands), have been promoted to decrease future flood risk to communities in coastal areas around the world. Our methods of combining coastal vulnerability results with additional data and across multiple time

  11. Vulnerability of Coastal Communities from Storm Surge and Flood Disasters

    Science.gov (United States)

    Bathi, Jejal Reddy; Das, Himangshu S.

    2016-01-01

    Disasters in the form of coastal storms and hurricanes can be very destructive. Preparing for anticipated effects of such disasters can help reduce the public health and economic burden. Identifying vulnerable population groups can help prioritize resources for the most needed communities. This paper presents a quantitative framework for vulnerability measurement that incorporates both socioeconomic and flood inundation vulnerability. The approach is demonstrated for three coastal communities in Mississippi with census tracts being the study unit. The vulnerability results are illustrated as thematic maps for easy usage by planners and emergency responders to assist in prioritizing their actions to vulnerable populations during storm surge and flood disasters. PMID:26907313

  12. Distributed Generation to Counter Grid Vulnerability

    National Research Council Canada - National Science Library

    Nerad, Anton H

    2007-01-01

    In this paper I examine how the United States can best defend against the interruption of critical electrical energy by hostile acts, identify and examine some of the vulnerabilities to our nation's...

  13. Assessing flash flood vulnerability using a multi-vulnerability approach

    Directory of Open Access Journals (Sweden)

    Karagiorgos Konstantinos

    2016-01-01

    Full Text Available In the framework of flood risk assessment, while the understanding of hazard and exposure has significantly improved over the last years, knowledge on vulnerability remains one of the challenges. Current approaches in vulnerability research are characterised by a division between social scientists and natural scientists. In order to close this gap, we present an approach that combines information on physical and social vulnerability in order to merge information on the susceptibility of elements at risk and society. With respect to physical vulnerability, the study is based on local-scale vulnerability models using nonlinear regression approaches. Modified Weibull distributions were fit to the data in order to represent the relationship between process magnitude and degree of loss. With respect to social vulnerability we conducted a door-to-door survey which resulted in particular insights on flood risk awareness and resilience strategies of exposed communities. In general, both physical and social vulnerability were low in comparison with other European studies, which may result from (a specific building regulations in the four Mediterranean test sites as well as general design principles leading to low structural susceptibility of elements at risk, and (b relatively low social vulnerability of citizens exposed. As a result it is shown that a combination of different perspectives of vulnerability will lead to a better understanding of exposure and capacities in flood risk management.

  14. Community vulnerability to health impacts of wildland fire smoke exposure

    Science.gov (United States)

    Identifying communities vulnerable to adverse health effects from exposure to wildfire smoke may help prepare responses, increase the resilience to smoke and improve public health outcomes during smoke days. We developed a Community Health-Vulnerability Index (CHVI) based on fact...

  15. Savannah River Site management response plan for chemical safety vulnerability field assessment. Revision 1

    International Nuclear Information System (INIS)

    Kahal, E.J.; Murphy, S.L.; Salaymeh, S.R.

    1994-09-01

    As part of the U.S. Department of Energy's (DOE) initiative to identify potential chemical safety vulnerabilities in the DOE complex, the Chemical Safety Vulnerability Core Working Group issued a field verification assessment report. While the report concluded that Savannah River Site (SRS) is moving in a positive direction, the report also identified five chemical safety vulnerabilities with broad programmatic impact that are not easily nor quickly remedied. The May 1994 SRS Management Response Plan addressed the five SRS vulnerabilities identified in the field assessment report. The SRS response plan listed observations supporting the vulnerabilities and any actions taken or planned toward resolution. Many of the observations were resolved by simple explanations, such as the existence of implementation plans for Safety Analysis Report updates. Recognizing that correcting individual observations does not suffice in remedying the vulnerabilities, a task team was assembled to address the broader programmatic issues and to recommend corrective actions

  16. Evaluation and Testing of Several Free/Open Source Web Vulnerability Scanners

    OpenAIRE

    Suteva, Natasa; Zlatkovski, Dragi; Mileva, Aleksandra

    2013-01-01

    Web Vulnerability Scanners (WVSs) are software tools for identifying vulnerabilities in web applications. There are commercial WVSs, free/open source WVSs, and some companies offer them as a Software-as-a-Service. In this paper, we test and evaluate six free/open source WVSs using the web application WackoPicko with many known vulnerabilities, primary for false negative rates.

  17. Investigative Operations: Use of Covert Testing to Identify Security Vulnerabilities and Fraud, Waste, and Abuse

    National Research Council Canada - National Science Library

    2007-01-01

    ... and internal control weaknesses at executive branch agencies. These vulnerabilities and internal control weaknesses include those that could compromise homeland security, affect public safety, or have a financial impact on taxpayer's dollars...

  18. [The social vulnerability index regarding Medellín's disabled population].

    Science.gov (United States)

    Cardona-Arango, Doris; Agudelo-Martínez, Alejandra; Restrepo-Molina, Lucas; Segura-Cardona, Angela M

    2014-01-01

    Constructing a social vulnerability index (SVI) for Medellín's disabled population during 2008 aimed at determining areas which were reducing opportunities for this population to use their tangible and intangible assets, thus impairing their quality of life. This descriptive cross-sectional study drew on a source of secondary information regarding people having some kind of limitation recorded in the Quality of Life Survey, 2008. Physical, human and social variables were grouped when constructing the SVI; the models were run in principal component analysis to determine their degree of vulnerability, defined by the number of negative factors identified (high category=4 or 5, medium=2 or 3 and low=1 or none). Such classification led to identifying non-causal relationships with demographic variables through Mann-Whitney, Chi-square and Kruskal-Wallis tests (5.0 % statistical significance level); multinomial logistic regression was used for calculating adjusted measures for epidemiological measurement, such as opportunity ratios and confidence intervals. A degree of medium vulnerability predominated in disabled people living in Medellín (60.3 %) followed by low vulnerability (28.7 %) and high vulnerability populations (11.0 %). The proposed ISV classified the city's communes according to high, medium or low vulnerability, supported by the use of statistical and spatial location techniques.

  19. Comparative studies of groundwater vulnerability assessment

    Science.gov (United States)

    Maria, Rizka

    2018-02-01

    Pollution of groundwater is a primary issue because aquifers are susceptible to contamination from land use and anthropogenic impacts. Groundwater susceptibility is intrinsic and specific. Intrinsic vulnerability refers to an aquifer that is susceptible to pollution and to the geological and hydrogeological features. Vulnerability assessment is an essential step in assessing groundwater contamination. This approach provides a visual analysis for helping planners and decision makers to achieve the sustainable management of water resources. Comparative studies are applying different methodologies to result in the basic evaluation of the groundwater vulnerability. Based on the comparison of methods, there are several advantages and disadvantages. SI can be overlaid on DRASTIC and Pesticide DRASTIC to extract the divergence in sensitivity. DRASTIC identifies low susceptibility and underestimates the pollution risk while Pesticide DRASTIC and SI represents better risk and is recommended for the future. SINTACS method generates very high vulnerability zones with surface waters and aquifer interactions. GOD method could be adequate for vulnerability mapping in karstified carbonate aquifers at small-moderate scales, and EPIK method can be used for large scale. GOD method is suitable for designing large area such as land management while DRASTIC has good accuracy and more real use in geoenvironmental detailed studies.

  20. Climate variability and climate change vulnerability and adaptation. Workshop summary

    International Nuclear Information System (INIS)

    Bhatti, N.; Cirillo, R.R.; Dixon, R.K.

    1995-01-01

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country's vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations

  1. Climate variability and climate change vulnerability and adaptation. Workshop summary

    Energy Technology Data Exchange (ETDEWEB)

    Bhatti, N.; Cirillo, R.R. [Argonne National Lab., IL (United States); Dixon, R.K. [U.S. Country Studies Program, Washington, DC (United States)] [and others

    1995-12-31

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

  2. Vulnerability of families with children with intestinal stomas

    Directory of Open Access Journals (Sweden)

    Clara Ferraz Lazarini Zacarin

    2014-06-01

    Full Text Available Intestinal stomas cause transformations in the body and create specific and continuous needs for care that imply in hospitalization and surgeries. In this context, we applied the concept of family vulnerability in order to identify the vulnerability of the family living with a child who has intestinal stoma. It is a qualitative study which interviewed the mothers of children with this chronic condition. We used narrative analysis based on the concept of family vulnerability. The results display that the family has gone through previous noteworthy experiences associated with the child’s condition. The family cares for the child on their own and seeks ways to control the situation and regain autonomy, hoping for stoma reversal. Based on the concept of vulnerability, we observed that these families can be considered vulnerable, for they experience threats to their autonomy, but are moved by the hope of reversal and intestinal tract reconstruction. doi: 10.5216/ree.v16i2.26639.

  3. Vulnerability analysis of process plants subject to domino effects

    International Nuclear Information System (INIS)

    Khakzad, Nima; Reniers, Genserik; Abbassi, Rouzbeh; Khan, Faisal

    2016-01-01

    In the context of domino effects, vulnerability analysis of chemical and process plants aims to identify and protect installations which are relatively more susceptible to damage and thus contribute more to the initiation or propagation of domino effects. In the present study, we have developed a methodology based on graph theory for domino vulnerability analysis of hazardous installations within process plants, where owning to the large number of installations or complex interdependencies, the application of sophisticated reasoning approaches such as Bayesian network is limited. We have taken advantage of a hypothetical chemical storage plant to develop the methodology and validated the results using a dynamic Bayesian network approach. The efficacy and out-performance of the developed methodology have been demonstrated via a real-life complex case study. - Highlights: • Graph theory is a reliable tool for vulnerability analysis of chemical plants as to domino effects. • All-closeness centrality score can be used to identify most vulnerable installations. • As for complex chemical plants, the methodology outperforms Bayesian network.

  4. Social vulnerability assessment: a growing practice in Europe?

    Science.gov (United States)

    Tapsell, S.; McC arthy, S.

    2012-04-01

    country policy and the particular risk management focus to the smaller scale risk management perceptions of the analysis techniques employed being to resource expensive, difficult to interpret or to operationalise. This paper will provide a context with some empirical examples to perhaps explain the growing popularity of concepts such as resilience and capacity building which lie more comfortably with policy makers and risk managers as concepts which focus on the solution rather than identifying a problem by assessing social vulnerability.

  5. Vulnerability

    NARCIS (Netherlands)

    Issa, Sahar; van der Molen, Irna; Stel, Nora

    2015-01-01

    This chapter reviews the literature on vulnerability. Together with Chapter 3, that offers a literature review specifically focused on resilience, it lays the conceptual foundations for the empirical chapters in this edited volume. Vulnerability symbolizes the susceptibility of a certain system to

  6. Chemical Safety Vulnerability Working Group report. Volume 1

    Energy Technology Data Exchange (ETDEWEB)

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

  7. Chemical Safety Vulnerability Working Group report. Volume 1

    International Nuclear Information System (INIS)

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms

  8. Community vulnerability to health impacts of wildland fire ...

    Science.gov (United States)

    Identifying communities vulnerable to adverse health effects from exposure to wildfire smoke may help prepare responses, increase the resilience to smoke and improve public health outcomes during smoke days. We developed a Community Health-Vulnerability Index (CHVI) based on factors known to increase the risks of health effects from air pollution and wildfire smoke exposures. These factors included county prevalence rates for asthma in children and adults, chronic obstructive pulmonary disease, hypertension, diabetes, obesity, percent of population 65 years of age and older, and indicators of socioeconomic status including poverty, education, income and unemployment. Using air quality simulated for the period between 2008 and 2012 over the continental U.S. we also characterized the population size at risk with respect to the level and duration of exposure to fire-originated fine particulate matter (fire-PM2.5) and CHVI. We estimate that 10% of the population (30.5 million) lived in the areas where the contribution of fire-PM2.5 to annual average ambient PM2.5 was high (>1.5 µg m3) and that 10.3 million individuals experienced unhealthy air quality levels for more than 10 days due to smoke. Using CHVI we identified the most vulnerable counties and determined that these communities experience more smoke exposures in comparison to less vulnerable communities. We describe the development of an index of community vulnerability for the health effects of smoke based o

  9. Climate change vulnerability for species-Assessing the assessments.

    Science.gov (United States)

    Wheatley, Christopher J; Beale, Colin M; Bradbury, Richard B; Pearce-Higgins, James W; Critchlow, Rob; Thomas, Chris D

    2017-09-01

    Climate change vulnerability assessments are commonly used to identify species at risk from global climate change, but the wide range of methodologies available makes it difficult for end users, such as conservation practitioners or policymakers, to decide which method to use as a basis for decision-making. In this study, we evaluate whether different assessments consistently assign species to the same risk categories and whether any of the existing methodologies perform well at identifying climate-threatened species. We compare the outputs of 12 climate change vulnerability assessment methodologies, using both real and simulated species, and validate the methods using historic data for British birds and butterflies (i.e. using historical data to assign risks and more recent data for validation). Our results show that the different vulnerability assessment methods are not consistent with one another; different risk categories are assigned for both the real and simulated sets of species. Validation of the different vulnerability assessments suggests that methods incorporating historic trend data into the assessment perform best at predicting distribution trends in subsequent time periods. This study demonstrates that climate change vulnerability assessments should not be used interchangeably due to the poor overall agreement between methods when considering the same species. The results of our validation provide more support for the use of trend-based rather than purely trait-based approaches, although further validation will be required as data become available. © 2017 The Authors. Global Change Biology Published by John Wiley & Sons Ltd.

  10. Europe's vulnerability to energy crises

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-01-15

    The growing dependency of Europe as a whole on energy imports and anticipated further increases in energy prices reinforce the concerns about meeting the energy demand in the future. The objective of the Study is to identify the threats leading to potential energy crises and suggest solutions for facing, in an appropriate way, the related key challenges. In addition, the Study intends to develop a number of indicators effective enough to assess the level of different types of vulnerability, as well the overall vulnerability of a country or region, including threats to physical disruption, higher energy prices etc. The use of vulnerability indicators is highly recommended for all WEC-European countries, as well as to policy makers and market players.

  11. Applying spatial clustering analysis to a township-level social vulnerability assessment in Taiwan

    Directory of Open Access Journals (Sweden)

    Wen-Yen Lin

    2016-09-01

    Full Text Available The degree of social vulnerability may vary according to the conditions and backgrounds of different locations, yet spatial clustering phenomena may exist when nearby spatial units exhibit similar characteristics. This study applied spatial autocorrelation statistics to analyze the spatial association of vulnerability among townships in Taiwan. The vulnerability was first assessed on the basis of a social vulnerability index that was constructed using Fuzzy Delphi and analytic hierarchy process methods. Subsequently, the corresponding indicator variables were applied to calculate standardized vulnerability assessment scores by using government data. According to the results of the vulnerability assessment in which T scores were normalized, the distribution of social vulnerabilities varied among the townships. The scores were further analyzed using spatial autocorrelation statistics for spatial clustering of vulnerability distribution. The Local G statistic identified 42 significant spatial association pockets, whereas the Global G statistic indicated no spatial phenomenon of clustering. This phenomenon was verified and explained by applying Moran's I statistics to examine the homogeneity and heterogeneity of spatial associations. Although both statistics were originally designed to identify the existence of spatial clustering, they serve diverse purposes, and the results can be compared to obtain additional insights into the distribution patterns of social vulnerability.

  12. Californium-252 Program Equipment Evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Chattin, Fred Rhea [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Wilson, Kenton [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Ezold, Julie G. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2017-12-01

    To successfully continue the 252Cf production and meet the needs of the customers, a comprehensive evaluation of the Building 7920 processing equipment was requested to identify equipment critical to the operational continuity of the program.

  13. Modelling Favourability for Invasive Species Encroachment to Identify Areas of Native Species Vulnerability

    OpenAIRE

    Romero, David; Báez, José C.; Ferri-Yáñez, Francisco; Bellido, Jesús J.; Real, Raimundo

    2014-01-01

    We assessed the vulnerability of the native Mediterranean pond turtle to encroachment by the invasive red-eared slider in southern Spain. We first obtained an ecogeographical favourability model for the Mediterranean pond turtle. We then modelled the presence/absence of the red-eared slider in the Mediterranean pond turtle range and obtained an encroachment favourability model. We also obtained a favourability model for the red-eared slider using the ecogeographical favourability for the Medi...

  14. Applicability of vulnerability maps

    International Nuclear Information System (INIS)

    Andersen, L.J.; Gosk, E.

    1989-01-01

    A number of aspects to vulnerability maps are discussed: the vulnerability concept, mapping purposes, possible users, and applicability of vulnerability maps. Problems associated with general-type vulnerability mapping, including large-scale maps, universal pollutant, and universal pollution scenario are also discussed. An alternative approach to vulnerability assessment - specific vulnerability mapping for limited areas, specific pollutant, and predefined pollution scenario - is suggested. A simplification of the vulnerability concept is proposed in order to make vulnerability mapping more objective and by this means more comparable. An extension of the vulnerability concept to the rest of the hydrogeological cycle (lakes, rivers, and the sea) is proposed. Some recommendations regarding future activities are given

  15. Kernel density surface modelling as a means to identify significant concentrations of vulnerable marine ecosystem indicators.

    Directory of Open Access Journals (Sweden)

    Ellen Kenchington

    Full Text Available The United Nations General Assembly Resolution 61/105, concerning sustainable fisheries in the marine ecosystem, calls for the protection of vulnerable marine ecosystems (VME from destructive fishing practices. Subsequently, the Food and Agriculture Organization (FAO produced guidelines for identification of VME indicator species/taxa to assist in the implementation of the resolution, but recommended the development of case-specific operational definitions for their application. We applied kernel density estimation (KDE to research vessel trawl survey data from inside the fishing footprint of the Northwest Atlantic Fisheries Organization (NAFO Regulatory Area in the high seas of the northwest Atlantic to create biomass density surfaces for four VME indicator taxa: large-sized sponges, sea pens, small and large gorgonian corals. These VME indicator taxa were identified previously by NAFO using the fragility, life history characteristics and structural complexity criteria presented by FAO, along with an evaluation of their recovery trajectories. KDE, a non-parametric neighbour-based smoothing function, has been used previously in ecology to identify hotspots, that is, areas of relatively high biomass/abundance. We present a novel approach of examining relative changes in area under polygons created from encircling successive biomass categories on the KDE surface to identify "significant concentrations" of biomass, which we equate to VMEs. This allows identification of the VMEs from the broader distribution of the species in the study area. We provide independent assessments of the VMEs so identified using underwater images, benthic sampling with other gear types (dredges, cores, and/or published species distribution models of probability of occurrence, as available. For each VME indicator taxon we provide a brief review of their ecological function which will be important in future assessments of significant adverse impact on these habitats here

  16. Report: Results of Technical Network Vulnerability Assessment: EPA’s Ronald Reagan Building

    Science.gov (United States)

    Report #10-P-0212, September 7, 2010. Vulnerability testing of EPA’s Ronald Reagan Building network conducted in June 2010 identified Internet Protocol addresses with numerous high-risk and medium-risk vulnerabilities.

  17. Human trafficking in hotels: an 'invisible' threat for a vulnerable industry

    OpenAIRE

    Paraskevas, Alexandros; Brookes, Maureen

    2018-01-01

    Purpose: To identify and analyse the hotel sector's vulnerabilities that human traffickers exploit in order to use hotels as conduits for trafficking in human beings (THB).\\ud Design/methodology/approach: Using the MAVUS framework of sector vulnerability analysis, the study adopted a qualitative approach employing environmental scanning and semi-structured key stakeholder interviews in three European countries: UK, Finland and Romania.\\ud Findings: The study identifies the types of THB occurr...

  18. Assessing the Vulnerability of Wheat Farmers to Drought in North of Fars Province

    Directory of Open Access Journals (Sweden)

    H. Iraji

    2016-03-01

    Full Text Available Introduction: Iran is constantly exposed to natural disasters such as floods, earthquakes and drought. In the meantime, drought is the major natural disaster which leads to numerous losses in agriculture and water resources, and this phenomenon is slow and creeping.Available evidence suggests that drought management is based on crisis management. As the present management in our country is based on crisis management, and drought-proneareasin thecountryhave become a society vulnerable to drought. So, the authorities require a new set of data for drought preparedness to deal with these challenges, in order to obtain the resources to be properly and effectively prioritized and reduce the effects of drought and its consequences. Undoubtedly, the starting point of vulnerability assessment and risk management is a prerequisite that has been sadly neglected in our country. In this context, the aim of this study is to determine the vulnerability of technical, economic and social vulnerability assessment determined before and after the drought and vulnerability patterns for wheat farmers in the North of Fars province. Materials and Methods: The vulnerability of wheat farmers in the North of Fars province is determined using three methods. The first method measured ex ante vulnerability based on estimated income distributions, and the other identified ex post vulnerability according to farmers asset positions and drought coping strategy in the 1390 drought. The final section determined the patterns of vulnerability using cluster analysis and data mining. A sample of 203 farmers in three plains was selected for interview and collection of necessary farm level data for two years (1390 and 1391 was carried out. In this study, to assess the vulnerability of households in the North of Fars province against drought, the formula Me-bar and Valdez has been used. In North of Fars province, as many other fields, agriculture is the main source of income and income

  19. Digital Threat and Vulnerability Management: The SVIDT Method

    Directory of Open Access Journals (Sweden)

    Roland W. Scholz

    2017-04-01

    Full Text Available The Digital Revolution is inducing major threats to many types of human systems. We present the SVIDT method (a Strengths, Vulnerability, and Intervention Assessment related to Digital Threats for managing the vulnerabilities of human systems with respect to digital threats and changes. The method first performs a multilevel system–actor analysis for assessing vulnerabilities and strengths with respect to digital threats. Then, the method identifies threat scenarios that may become real. By constructing, evaluating, and launching interventions against all identified digital threats and their critical negative outcomes, the resilience of a specific human system can be improved. The evaluation of interventions is done when strengthening the adaptive capacity, i.e., a system’s capability to cope with negative outcomes that may take place in the future. The SVIDT method is embedded in the framework of coupled human–environment systems, the theory of risk and vulnerability assessment, types of adaptation (assimilation vs. accommodation, and a comprehensive sustainability evaluation. The SVIDT method is exemplarily applied to an enterprise (i.e., a Swiss casino for which online gaming has become an essential digital-business field. The discussion reflects on the specifics of digital threats and discusses both the potential benefits and limitations of the SVIDT method.

  20. Terminological Ontologies for Risk and Vulnerability Analysis

    DEFF Research Database (Denmark)

    Madsen, Bodil Nistrup; Erdman Thomsen, Hanne

    2014-01-01

    Risk and vulnerability analyses are an important preliminary stage in civil contingency planning. The Danish Emergency Management Agency has developed a generic model and a set of tools that may be used in the preparedness planning, i.e. for identifying and describing society’s critical functions......, for formulating threat scenarios and for assessing consequences. Terminological ontologies, which are systems of domain specific concepts comprising concept relations and characteristics, are useful, both when describing the central concepts of risk and vulnerability analysis (meta concepts), and for further...

  1. County-level heat vulnerability of urban and rural residents in Tibet, China.

    Science.gov (United States)

    Bai, Li; Woodward, Alistair; Cirendunzhu; Liu, Qiyong

    2016-01-12

    Tibet is especially vulnerable to climate change due to the relatively rapid rise of temperature over past decades. The effects on mortality and morbidity of extreme heat in Tibet have been examined in previous studies; no heat adaptation initiatives have yet been implemented. We estimated heat vulnerability of urban and rural populations in 73 Tibetan counties and identified potential areas for public health intervention and further research. According to data availability and vulnerability factors identified previously in Tibet and elsewhere, we selected 10 variables related to advanced age, low income, illiteracy, physical and mental disability, small living spaces and living alone. We separately created and mapped county-level cumulative heat vulnerability indices for urban and rural residents by summing up factor scores produced by a principal components analysis (PCA). For both study populations, PCA yielded four factors with similar structure. The components for rural and urban residents explained 76.5 % and 77.7 % respectively of the variability in the original vulnerability variables. We found spatial variability of heat vulnerability across counties, with generally higher vulnerability in high-altitude counties. Although we observed similar median values and ranges of the cumulative heat vulnerability index values among urban and rural residents overall, the pattern varied strongly from one county to another. We have developed a measure of population vulnerability to high temperatures in Tibet. These are preliminary findings, but they may assist targeted adaptation plans in response to future rapid warming in Tibet.

  2. Ethical considerations in export of hazardous products to institutionally vulnerable countries

    DEFF Research Database (Denmark)

    Jørgensen, Michael Søgaard; Milanez, Bruno

    2018-01-01

    company in vulnerable countries with a special focus on Brazil. The identified ethical considerations are related to: The transnational company’s interpretation of its regulatory and ethical obligations for development and use of its hazardous products in vulnerable countries, path dependency and path...

  3. Linking degradation status with ecosystem vulnerability to environmental change

    Science.gov (United States)

    Angeler, David G.; Baho, Didier L.; Allen, Craig R.; Johnson, Richard K.

    2015-01-01

    Environmental change can cause regime shifts in ecosystems, potentially threatening ecosystem services. It is unclear if the degradation status of ecosystems correlates with their vulnerability to environmental change, and thus the risk of future regime shifts. We assessed resilience in acidified (degraded) and circumneutral (undegraded) lakes with long-term data (1988–2012), using time series modeling. We identified temporal frequencies in invertebrate assemblages, which identifies groups of species whose population dynamics vary at particular temporal scales. We also assessed species with stochastic dynamics, those whose population dynamics vary irregularly and unpredictably over time. We determined the distribution of functional feeding groups of invertebrates within and across the temporal scales identified, and in those species with stochastic dynamics, and assessed attributes hypothesized to contribute to resilience. Three patterns of temporal dynamics, consistent across study lakes, were identified in the invertebrates. The first pattern was one of monotonic change associated with changing abiotic lake conditions. The second and third patterns appeared unrelated to the environmental changes we monitored. Acidified and the circumneutral lakes shared similar levels and patterns of functional richness, evenness, diversity, and redundancy for species within and across the observed temporal scales and for stochastic species groups. These similar resilience characteristics suggest that both lake types did not differ in vulnerability to the environmental changes observed here. Although both lake types appeared equally vulnerable in this study, our approach demonstrates how assessing systemic vulnerability by quantifying ecological resilience can help address uncertainty in predicting ecosystem responses to environmental change across ecosystems.

  4. Principles of Security Vulnerability Analysis of stationary industrial installations

    International Nuclear Information System (INIS)

    Borysiewicz, M.

    2006-01-01

    Security and safety have been key priorities at facilities that manufacture, store, use, or handle hazardous chemicals, after the terrorist attacks on the United States of September 11, 2001. Security improvements may be needed, especially at sites that pose a more attractive target to terrorists due to their economic importance, perceived level of consequences, and other factors. The first step in the process of managing security risks is to identify and analyze the threats and the vulnerabilities facing a facility by conducting a Security Vulnerability Analysis (SVA). The SVA is a systematic process that evaluates the likelihood that a threat against a facility will be successful. It considers the potential severity of consequences to the facility itself, to the surrounding community and on the energy supply chain. The objective of conducting a SVA is to identify security hazards, threats, and vulnerabilities facing a facility, and to evaluate the countermeasures to provide for the protection of the public, workers, national interests, the environment, and the company. With this information security risks can be assessed and strategies can be formed to reduce vulnerabilities as required. SVA is a tool to assist management in making decisions on the need for countermeasures to address the threats and vulnerabilities. The paper provides an overview of fundamental steps of SVA for stationary industrial installations. (author)

  5. Vulnerability of roads and associated structures to the effects of climate change

    International Nuclear Information System (INIS)

    Arisz, H.; Therrien, M.; Burrell, B.C.; LeBlanc, M.M.

    2009-01-01

    The vulnerability of roads and associated structures in the City of Greater Sudbury to the effects of climate change was evaluated using the Public Infrastructure Vulnerability Committee (PIEVC) Engineering Protocol for Climate Change Infrastructure Assessment. Study objectives were to evaluate the vulnerability of road-related infrastructure in Greater Sudbury to climate change, and to identify potential impediments to the application of the protocol in other municipalities. Based on the experience gained during this study, recommendations were provided with respect to the vulnerabilities of roads and associated structures to the predicted effects of climate change and the performance of vulnerability assessments. (author)

  6. The double tragedy of agriculture vulnerability to climate variability in Africa: How vulnerable is smallholder agriculture to rainfall variability in Ghana?

    Directory of Open Access Journals (Sweden)

    Emmanuel K. Derbile

    2016-04-01

    Full Text Available This article analysed vulnerability of smallholder agriculture to climate variability, particularly the alternating incidences of drought and heavy precipitation events in Ghana. Although there is an unmet need for understanding the linkages between climate change and livelihoods, the urgent need for climate change adaptation planning (CCAP in response to climate change makes vulnerability assessment even more compelling in development research. The data for analysis were collected from two complementary studies. These included a regional survey in the Upper West Region and an in-depth study in three selected communities in the Sissala East District. The results showed that smallholder agriculture is significantly vulnerable to climate variability in the region and that three layers of vulnerability can be identified in a ladder of vulnerability. Firstly, farmers are confronted with the double tragedy of droughts and heavy precipitation events, which adversely affect both crops and livestock. Secondly, farmers have to decide on crops for adaptation, but each option – whether indigenous crops, new early-maturing crops or genetically modified crops – predisposes farmers to a different set of risks. Finally, the overall impact is a higher-level vulnerability, namely the risk of total livelihood failure and food insecurity. The article recommended CCAP and an endogenous development (ED approach to addressing agriculture vulnerability to climate variability within the framework of decentralisation and local governance in Ghana. Keywords: Climate variability; agriculture; vulnerability; endogenous development; Ghana

  7. Narcissistic grandiosity and narcissistic vulnerability in psychotherapy.

    Science.gov (United States)

    Pincus, Aaron L; Cain, Nicole M; Wright, Aidan G C

    2014-10-01

    This article briefly summarizes the empirical and clinical literature underlying a contemporary clinical model of pathological narcissism. Unlike the DSM Narcissistic Personality Disorder (NPD), this clinical model identifies and differentiates between two phenotypic themes of dysfunction-narcissistic grandiosity and narcissistic vulnerability-that can be expressed both overtly and covertly in patients' ways of thinking, feeling, behaving, and participating in treatment. Clinical recognition that narcissistic patients can and often do present for psychotherapy in vulnerable states of depression, anxiety, shame, and even suicidality increases the likelihood of accurate diagnosis and effective treatment planning. This article provides case examples derived from psychotherapies with narcissistic patients to demonstrate how narcissistic grandiosity and narcissistic vulnerability concurrently present in patients who seek treatment. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  8. Inflammation and vascular remodeling in the ventral hippocampus contributes to vulnerability to stress.

    Science.gov (United States)

    Pearson-Leary, J; Eacret, D; Chen, R; Takano, H; Nicholas, B; Bhatnagar, S

    2017-06-27

    During exposure to chronic stress, some individuals engage in active coping behaviors that promote resiliency to stress. Other individuals engage in passive coping that is associated with vulnerability to stress and with anxiety and depression. In an effort to identify novel molecular mechanisms that underlie vulnerability or resilience to stress, we used nonbiased analyses of microRNAs in the ventral hippocampus (vHPC) to identify those miRNAs differentially expressed in active (long-latency (LL)/resilient) or passive (short-latency (SL)/vulnerable) rats following chronic social defeat. In the vHPC of active coping rats, miR-455-3p level was increased, while miR-30e-3p level was increased in the vHPC of passive coping rats. Pathway analyses identified inflammatory and vascular remodeling pathways as enriched by genes targeted by these microRNAs. Utilizing several independent markers for blood vessels, inflammatory processes and neural activity in the vHPC, we found that SL/vulnerable rats exhibit increased neural activity, vascular remodeling and inflammatory processes that include both increased blood-brain barrier permeability and increased number of microglia in the vHPC relative to control and resilient rats. To test the relevance of these changes for the development of the vulnerable phenotype, we used pharmacological approaches to determine the contribution of inflammatory processes in mediating vulnerability and resiliency. Administration of the pro-inflammatory cytokine vascular endothelial growth factor-164 increased vulnerability to stress, while the non-steroidal anti-inflammatory drug meloxicam attenuated vulnerability. Collectively, these results show that vulnerability to stress is determined by a re-designed neurovascular unit characterized by increased neural activity, vascular remodeling and pro-inflammatory mechanisms in the vHPC. These results suggest that dampening inflammatory processes by administering anti-inflammatory agents reduces

  9. Environmental impact assessment: Classification of ecosystems with respect to vulnerability for radioactive contamination

    International Nuclear Information System (INIS)

    Blytt, Line Diana

    1999-01-01

    This presentation recommends that an environmental impact assessment should be made ahead of any major action plan in the environment. The final document should point out to the authorities and public that expertise has been systematised in order to predict the effects of an action plan on the environment. This should be done for different scenarios and time scales. A useful tool for an environmental impact assessment is GIS, Geographic Information Systems. It can be used to identify areas and ecosystems that are vulnerable to radioactive contamination. To predict the radiation dose to humans and biota, a vulnerability assessment considers population density, land use, economic resources and the chemical and biological pathways of radionuclides in different ecosystems. Supplemented with knowledge of consumption and dietary habits a vulnerability assessment can be used to identify critical groups and to calculate doses to these groups. For ecosystems, vulnerability can be quantified by using critical loads for radioactive contamination or flux of radionuclides from an area. One criterion for critical load can be that intervention limits for food products should not be exceeded. If the critical load is low, this indicates a high vulnerability. The flux from an area can also identify vulnerability and it can be used to calculate collective dose. The vulnerability approach is a methodology that can be used to select areas that are suitable for treatment, transport and disposal of radioactive waste

  10. Modelling social vulnerability in sub-Saharan West Africa using a geographical information system

    Directory of Open Access Journals (Sweden)

    Olanrewaju Lawal

    2015-05-01

    Full Text Available In recent times, disasters and risk management have gained significant attention, especially with increasing awareness of the risks and increasing impact of natural and other hazards especially in the developing world. Vulnerability, the potential for loss of life or property from disaster, has biophysical or social dimensions. Social vulnerability relates to societal attributes which has negative impacts on disaster outcomes. This study sought to develop a spatially explicit index of social vulnerability, thus addressing the dearth of research in this area in sub-Saharan Africa. Nineteen variables were identified covering various aspects. Descriptive analysis of these variables revealed high heterogeneity across the South West region of Nigeria for both the state and the local government areas (LGAs. Feature identification using correlation analysis identified six important variables. Factor analysis identified two dimensions, namely accessibility and socioeconomic conditions, from this subset. A social vulnerability index (SoVI showed that Ondo and Ekiti have more vulnerable LGAs than other states in the region. About 50% of the LGAs in Osun and Ogun have a relatively low social vulnerability. Distribution of the SoVI shows that there are great differences within states as well as across regions. Scores of population density, disability and poverty have a high margin of error in relation to mean state scores. The study showed that with a geographical information system there are opportunities to model social vulnerability and monitor its evolution and dynamics across the continent.

  11. Vulnerability detection using data-flow graphs and SMT solvers

    Science.gov (United States)

    2016-10-31

    SECURITY CLASSIFICATION OF: 1. REPORT DATE (DD-MM-YYYY) 4. TITLE AND SUBTITLE 13. SUPPLEMENTARY NOTES 12. DISTRIBUTION AVAILIBILITY STATEMENT 6. AUTHORS...correctly. Developers rarely develop with consideration for eliminating vulnerabilities in source code. Source code is not always available for...as deep neural networks. We also plan to define heuristics on what type of learners and features to use with identifying different vulnerabilities

  12. Aircraft vulnerability analysis by modeling and simulation

    Science.gov (United States)

    Willers, Cornelius J.; Willers, Maria S.; de Waal, Alta

    2014-10-01

    guidance acceleration and seeker sensitivity. For the purpose of this investigation the aircraft is equipped with conventional pyrotechnic decoy flares and the missile has no counter-countermeasure means (security restrictions on open publication). This complete simulation is used to calculate the missile miss distance, when the missile is launched from different locations around the aircraft. The miss distance data is then graphically presented showing miss distance (aircraft vulnerability) as a function of launch direction and range. The aircraft vulnerability graph accounts for aircraft and missile characteristics, but does not account for missile deployment doctrine. A Bayesian network is constructed to fuse the doctrinal rules with the aircraft vulnerability data. The Bayesian network now provides the capability to evaluate the combined risk of missile launch and aircraft vulnerability. It is shown in this paper that it is indeed possible to predict the aircraft vulnerability to missile attack in a comprehensive modelling and a holistic process. By using the appropriate real-world models, this approach is used to evaluate the effectiveness of specific countermeasure techniques against specific missile threats. The use of a Bayesian network provides the means to fuse simulated performance data with more abstract doctrinal rules to provide a realistic assessment of the aircraft vulnerability.

  13. Defining Resilience and Vulnerability Based on Ontology Engineering Approach

    Science.gov (United States)

    Kumazawa, T.; Matsui, T.; Endo, A.

    2014-12-01

    It is necessary to reflect the concepts of resilience and vulnerability into the assessment framework of "Human-Environmental Security", but it is also in difficulty to identify the linkage between both concepts because of the difference of the academic community which has discussed each concept. The authors have been developing the ontology which deals with the sustainability of the social-ecological systems (SESs). Resilience and vulnerability are also the concepts in the target world which this ontology covers. Based on this point, this paper aims at explicating the semantic relationship between the concepts of resilience and vulnerability based on ontology engineering approach. For this purpose, we first examine the definitions of resilience and vulnerability which the existing literatures proposed. Second, we incorporate the definitions in the ontology dealing with sustainability of SESs. Finally, we focus on the "Water-Energy-Food Nexus Index" to assess Human-Environmental Security, and clarify how the concepts of resilience and vulnerability are linked semantically through the concepts included in these index items.

  14. The SAVI Vulnerability Analysis Software Package

    International Nuclear Information System (INIS)

    Mc Aniff, R.J.; Paulus, W.K.; Key, B.; Simpkins, B.

    1987-01-01

    SAVI (Systematic Analysis of Vulnerability to Intrusion) is a new PC-based software package for modeling Physical Protection Systems (PPS). SAVI utilizes a path analysis approach based on the Adversary Sequence Diagram (ASD) methodology. A highly interactive interface allows the user to accurately model complex facilities, maintain a library of these models on disk, and calculate the most vulnerable paths through any facility. Recommendations are provided to help the user choose facility upgrades which should reduce identified path vulnerabilities. Pop-up windows throughout SAVI are used for the input and display of information. A menu at the top of the screen presents all options to the user. These options are further explained on a message line directly below the menu. A diagram on the screen graphically represents the current protection system model. All input is checked for errors, and data are presented in a logical and clear manner. Print utilities provide the user with hard copies of all information and calculated results

  15. Review Article: A comparison of flood and earthquake vulnerability assessment indicators

    Science.gov (United States)

    de Ruiter, Marleen C.; Ward, Philip J.; Daniell, James E.; Aerts, Jeroen C. J. H.

    2017-07-01

    In a cross-disciplinary study, we carried out an extensive literature review to increase understanding of vulnerability indicators used in the disciplines of earthquake- and flood vulnerability assessments. We provide insights into potential improvements in both fields by identifying and comparing quantitative vulnerability indicators grouped into physical and social categories. Next, a selection of index- and curve-based vulnerability models that use these indicators are described, comparing several characteristics such as temporal and spatial aspects. Earthquake vulnerability methods traditionally have a strong focus on object-based physical attributes used in vulnerability curve-based models, while flood vulnerability studies focus more on indicators applied to aggregated land-use classes in curve-based models. In assessing the differences and similarities between indicators used in earthquake and flood vulnerability models, we only include models that separately assess either of the two hazard types. Flood vulnerability studies could be improved using approaches from earthquake studies, such as developing object-based physical vulnerability curve assessments and incorporating time-of-the-day-based building occupation patterns. Likewise, earthquake assessments could learn from flood studies by refining their selection of social vulnerability indicators. Based on the lessons obtained in this study, we recommend future studies for exploring risk assessment methodologies across different hazard types.

  16. Vulnerabilities, Influences and Interaction Paths: Failure Data for Integrated System Risk Analysis

    Science.gov (United States)

    Malin, Jane T.; Fleming, Land

    2006-01-01

    We describe graph-based analysis methods for identifying and analyzing cross-subsystem interaction risks from subsystem connectivity information. By discovering external and remote influences that would be otherwise unexpected, these methods can support better communication among subsystem designers at points of potential conflict and to support design of more dependable and diagnosable systems. These methods identify hazard causes that can impact vulnerable functions or entities if propagated across interaction paths from the hazard source to the vulnerable target. The analysis can also assess combined impacts of And-Or trees of disabling influences. The analysis can use ratings of hazards and vulnerabilities to calculate cumulative measures of the severity and importance. Identification of cross-subsystem hazard-vulnerability pairs and propagation paths across subsystems will increase coverage of hazard and risk analysis and can indicate risk control and protection strategies.

  17. Vulnerability of solar energy infrastructure and output to extreme events: Climate change implications (Conference paper)

    OpenAIRE

    Patt, A.; Pfenninger, S.; Lilliestam, J.

    2010-01-01

    This paper explores the potential vulnerability of solar energy systems to future extreme event risks as a consequence of climate change. We describe the three main technologies likely to be used to harness sunlight -- thermal heating, photovoltaic (PV), and concentrating solar power (CSP) -- and identify critical extreme event vulnerabilities for each one. We then compare these vulnerabilities with assessments of future changes in extreme event risk levels. We do not identify any vulnerabili...

  18. Chemical Safety Vulnerability Working Group Report

    Energy Technology Data Exchange (ETDEWEB)

    1994-09-01

    This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

  19. Categorization of subjects in vulnerability condition: a review in the bioethics perspective

    Directory of Open Access Journals (Sweden)

    Ricardo de Amorim Cini

    2017-10-01

    Full Text Available The use of the term vulnerability in the discussion of bioethics, either as a concept or as a reality, has become increasingly recurrent. The first, and also most important use of this term is to protect subjects participating in experiments, but its use has been expanded to other situations. The aim of this research was to identify the subjects or realities that are classified as vulnerable. We used the descriptors “bioethics” and “vulnerability” to search for literature in Scielo.BR, Scielo.ORG and Lilacs, and analyzed 79 articles. Furthermore, in these articles we identified four categories of vulnerability that can be grouped as vulnerability in: [1] stages of life and gender; [2] health, disease and research; [3] socioeconomic and cultural exclusion; [4] and environment. This categorization demonstrates that the bioethical reflection on the vulnerability of life is still predominantly anthropocentric, which makes the protection of the dignity of life as a whole a challenge that is still to be faced by bioethical discussion.

  20. GIS-Mapping and Statistical Analyses to Identify Climate-Vulnerable Communities and Populations Exposed to Superfund Sites

    Science.gov (United States)

    Climate change-related cumulative health risks are expected to be disproportionately greater for overburdened communities, due to differential proximity and exposures to chemical sources and flood zones. Communities and populations vulnerable to climate change-associated impacts ...

  1. Flood vulnerability of critical infrastructure in Cork, Ireland

    Directory of Open Access Journals (Sweden)

    de Bruijn Karin M.

    2016-01-01

    Full Text Available Recent flood events in Ireland and particularly in County Cork have caused significant disruption to health service provisions, interruption of water and power supplies, and damage to roads and other transportation infrastructure, affecting the lives of hundreds of thousands of people over a prolonged period of weeks. These events clearly reveal- the vulnerability of the critical infrastructure to flooding and the dependence of society on critical infrastructure. In order to reduce the flood vulnerability and increase the resilience of the critical infrastructure networks in the future, detailed evidence-based analysis and assessment is essential. To this end a case study has been carried out on Cork City which analyses this vulnerability as it was in 2009, and as it is currently, and identifies adaptation options to reduce the future vulnerability of critical infrastructure to flooding and to build a more resilient society. This paper describes the storyline approach and CIrcle tool and their application to Cork City which focused on the analysis of the flood vulnerability of critical infrastructure and the impacts of failure of the infrastructure for other critical functions and on society.

  2. Combining analytical frameworks to assess livelihood vulnerability to climate change and analyse adaptation options.

    Science.gov (United States)

    Reed, M S; Podesta, G; Fazey, I; Geeson, N; Hessel, R; Hubacek, K; Letson, D; Nainggolan, D; Prell, C; Rickenbach, M G; Ritsema, C; Schwilch, G; Stringer, L C; Thomas, A D

    2013-10-01

    Experts working on behalf of international development organisations need better tools to assist land managers in developing countries maintain their livelihoods, as climate change puts pressure on the ecosystem services that they depend upon. However, current understanding of livelihood vulnerability to climate change is based on a fractured and disparate set of theories and methods. This review therefore combines theoretical insights from sustainable livelihoods analysis with other analytical frameworks (including the ecosystem services framework, diffusion theory, social learning, adaptive management and transitions management) to assess the vulnerability of rural livelihoods to climate change. This integrated analytical framework helps diagnose vulnerability to climate change, whilst identifying and comparing adaptation options that could reduce vulnerability, following four broad steps: i) determine likely level of exposure to climate change, and how climate change might interact with existing stresses and other future drivers of change; ii) determine the sensitivity of stocks of capital assets and flows of ecosystem services to climate change; iii) identify factors influencing decisions to develop and/or adopt different adaptation strategies, based on innovation or the use/substitution of existing assets; and iv) identify and evaluate potential trade-offs between adaptation options. The paper concludes by identifying interdisciplinary research needs for assessing the vulnerability of livelihoods to climate change.

  3. Social Vulnerability and Ebola Virus Disease in Rural Liberia.

    Directory of Open Access Journals (Sweden)

    John A Stanturf

    Full Text Available The Ebola virus disease (EVD epidemic that has stricken thousands of people in the three West African countries of Liberia, Sierra Leone, and Guinea highlights the lack of adaptive capacity in post-conflict countries. The scarcity of health services in particular renders these populations vulnerable to multiple interacting stressors including food insecurity, climate change, and the cascading effects of disease epidemics such as EVD. However, the spatial distribution of vulnerable rural populations and the individual stressors contributing to their vulnerability are unknown. We developed a Social Vulnerability Classification using census indicators and mapped it at the district scale for Liberia. According to the Classification, we estimate that districts having the highest social vulnerability lie in the north and west of Liberia in Lofa, Bong, Grand Cape Mount, and Bomi Counties. Three of these counties together with the capital Monrovia and surrounding Montserrado and Margibi counties experienced the highest levels of EVD infections in Liberia. Vulnerability has multiple dimensions and a classification developed from multiple variables provides a more holistic view of vulnerability than single indicators such as food insecurity or scarcity of health care facilities. Few rural Liberians are food secure and many cannot reach a medical clinic in <80 minutes. Our results illustrate how census and household survey data, when displayed spatially at a sub-county level, may help highlight the location of the most vulnerable households and populations. Our results can be used to identify vulnerability hotspots where development strategies and allocation of resources to address the underlying causes of vulnerability in Liberia may be warranted. We demonstrate how social vulnerability index approaches can be applied in the context of disease outbreaks, and our methods are relevant elsewhere.

  4. Modeling groundwater vulnerability to pollution using Optimized DRASTIC model

    International Nuclear Information System (INIS)

    Mogaji, Kehinde Anthony; Lim, Hwee San; Abdullar, Khiruddin

    2014-01-01

    The prediction accuracy of the conventional DRASTIC model (CDM) algorithm for groundwater vulnerability assessment is severely limited by the inherent subjectivity and uncertainty in the integration of data obtained from various sources. This study attempts to overcome these problems by exploring the potential of the analytic hierarchy process (AHP) technique as a decision support model to optimize the CDM algorithm. The AHP technique was utilized to compute the normalized weights for the seven parameters of the CDM to generate an optimized DRASTIC model (ODM) algorithm. The DRASTIC parameters integrated with the ODM algorithm predicted which among the study areas is more likely to become contaminated as a result of activities at or near the land surface potential. Five vulnerability zones, namely: no vulnerable(NV), very low vulnerable (VLV), low vulnerable (LV), moderate vulnerable (MV) and high vulnerable (HV) were identified based on the vulnerability index values estimated with the ODM algorithm. Results show that more than 50% of the area belongs to both moderate and high vulnerable zones on the account of the spatial analysis of the produced ODM-based groundwater vulnerability prediction map (GVPM).The prediction accuracy of the ODM-based – GVPM with the groundwater pH and manganese (Mn) concentrations established correlation factors (CRs) result of 90 % and 86 % compared to the CRs result of 62 % and 50 % obtained for the validation accuracy of the CDM – based GVPM. The comparative results, indicated that the ODM-based produced GVPM is more reliable than the CDM – based produced GVPM in the study area. The study established the efficacy of AHP as a spatial decision support technique in enhancing environmental decision making with particular reference to future groundwater vulnerability assessment

  5. Index-based groundwater vulnerability mapping models using hydrogeological settings: A critical evaluation

    International Nuclear Information System (INIS)

    Kumar, Prashant; Bansod, Baban K.S.; Debnath, Sanjit K.; Thakur, Praveen Kumar; Ghanshyam, C.

    2015-01-01

    Groundwater vulnerability maps are useful for decision making in land use planning and water resource management. This paper reviews the various groundwater vulnerability assessment models developed across the world. Each model has been evaluated in terms of its pros and cons and the environmental conditions of its application. The paper further discusses the validation techniques used for the generated vulnerability maps by various models. Implicit challenges associated with the development of the groundwater vulnerability assessment models have also been identified with scientific considerations to the parameter relations and their selections. - Highlights: • Various index-based groundwater vulnerability assessment models have been discussed. • A comparative analysis of the models and its applicability in different hydrogeological settings has been discussed. • Research problems of underlying vulnerability assessment models are also reported in this review paper

  6. Index-based groundwater vulnerability mapping models using hydrogeological settings: A critical evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Kumar, Prashant, E-mail: prashantkumar@csio.res.in [CSIR-Central Scientific Instruments Organisation, Chandigarh 160030 (India); Academy of Scientific and Innovative Research—CSIO, Chandigarh 160030 (India); Bansod, Baban K.S.; Debnath, Sanjit K. [CSIR-Central Scientific Instruments Organisation, Chandigarh 160030 (India); Academy of Scientific and Innovative Research—CSIO, Chandigarh 160030 (India); Thakur, Praveen Kumar [Indian Institute of Remote Sensing (ISRO), Dehradun 248001 (India); Ghanshyam, C. [CSIR-Central Scientific Instruments Organisation, Chandigarh 160030 (India); Academy of Scientific and Innovative Research—CSIO, Chandigarh 160030 (India)

    2015-02-15

    Groundwater vulnerability maps are useful for decision making in land use planning and water resource management. This paper reviews the various groundwater vulnerability assessment models developed across the world. Each model has been evaluated in terms of its pros and cons and the environmental conditions of its application. The paper further discusses the validation techniques used for the generated vulnerability maps by various models. Implicit challenges associated with the development of the groundwater vulnerability assessment models have also been identified with scientific considerations to the parameter relations and their selections. - Highlights: • Various index-based groundwater vulnerability assessment models have been discussed. • A comparative analysis of the models and its applicability in different hydrogeological settings has been discussed. • Research problems of underlying vulnerability assessment models are also reported in this review paper.

  7. Exploring vulnerability and adaptation to climate change of communities in the forest zone of Cameroon.

    NARCIS (Netherlands)

    Bele, M.Y.; Tiani, A.M.; Somorin, O.A.; Sonwa, D.J.

    2013-01-01

    Understanding vulnerability to the impacts of global environmental change and identifying adaptation measures to cope with these impacts require localized investigations that can help find actual and exact answers to the questions about who and what are vulnerable, to what are they vulnerable, how

  8. Community-level climate change vulnerability research: trends, progress, and future directions

    Science.gov (United States)

    McDowell, Graham; Ford, James; Jones, Julie

    2016-03-01

    This study systematically identifies, characterizes, and critically evaluates community-level climate change vulnerability assessments published over the last 25 years (n = 274). We find that while the field has advanced considerably in terms of conceptual framing and methodological approaches, key shortcomings remain in how vulnerability is being studied at the community-level. We argue that vulnerability research needs to more critically engage with the following: methods for evaluating future vulnerability, the relevance of vulnerability research for decision-making, interdependencies between social and ecological systems, attention to researcher / subject power dynamics, critical interpretation of key terms, and consideration of the potentially positive opportunities presented by a changing climate. Addressing these research needs is necessary for generating knowledge that supports climate-affected communities in navigating the challenges and opportunities ahead.

  9. Complex-wide review of DOE's Low-Level Waste Management ES ampersand H vulnerabilities. Volume II. Final report

    International Nuclear Information System (INIS)

    1996-05-01

    Volume I of this report presents a summary of DOE's complex-wide review of its low-level waste management system, including the assessment scope and methodology, site-specific and complex-wide vulnerabilities, and DOE's conclusions and recommendations. Volume II presents a more detailed discussion of the assessment methodology and evaluation instruments developed by the Assessment Working Group for identifying site-specific vulnerabilities, categorizing and classifying vulnerabilities, and identifying and analyzing complex-wide vulnerabilities. Attachments A and B of this volume contain, respectively, the Site Evaluation Survey and the Vulnerability Assessment Form used in those processes. Volume III contains the site-specific assessment reports for the 36 sites (38 facilities) assessed in the complex-wide review from which the complex-wide vulnerabilities were drawn

  10. Report: Results of Technical Network Vulnerability Assessment: EPA’s Research Triangle Park Finance Center

    Science.gov (United States)

    Report #09-P-0227, August 31, 2009. Vulnerability testing conducted in April 2009 of EPA’s Research Triangle Park Finance Center network identified Internet Protocol addresses with several highrisk vulnerabilities.

  11. Millstone Unit 1 plant vulnerabilities during postulated severe nuclear accidents

    International Nuclear Information System (INIS)

    Khalil, Y.F.

    1993-01-01

    Generic Letter 88-20, Supplement No. 1 (Ref. 1), issued by the Nuclear Regulatory Commission (NRC) requested all licensees holding operating licenses and construction permits for nuclear power reactor facilities to perform Individual Plant Examinations (IPE) of their plant(s) for severe accident vulnerabilities and to submit the results to the Commission. This paper summarizes the major Front-End (Level-1 PRA) and Back-End (Level-2 PRA) insights gained from the Millstone Unit 1 (MP-1) IPE study. No major plant vulnerabilities have been identified from a Front-End perspective. The Back-End analysis, however, has identified two potential containment vulnerabilities during postulated events that progress beyond the Design Basis Accidents (DBAs), namely, (1) MP-1 is dominated by early source term releases that would occur within a six-hour time frame from time of accident initiation, or reactor trip, and (2) MP-1 containment is somewhat vulnerable to leak-type failure through the drywell head. As a result of the second finding, a recommendation currently under evaluation, has been made to increase the drywell head bolt's preload from 54 Kips to resist the containment design pressure value (62 psig)

  12. GIS Analysis of Available Data to Identify regions in the U.S. Where Shallow Ground Water Supplies are Particularly Vulnerable to Contamination by Releases to Biofuels from Underground Storage Tanks

    Science.gov (United States)

    GIS analysis of available data to identify regions in the U.S. where shallow ground water supplies are particularly vulnerable to contamination by releases of biofuels from underground storage tanks. In this slide presentation, GIS was used to perform a simple numerical and ...

  13. Urban Heat Wave Vulnerability Analysis Considering Climate Change

    Science.gov (United States)

    JE, M.; KIM, H.; Jung, S.

    2017-12-01

    Much attention has been paid to thermal environments in Seoul City in South Korea since 2016 when the worst heatwave in 22 years. It is necessary to provide a selective measure by singling out vulnerable regions in advance to cope with the heat wave-related damage. This study aims to analyze and categorize vulnerable regions of thermal environments in the Seoul and analyzes and discusses the factors and risk factors for each type. To do this, this study conducted the following processes: first, based on the analyzed various literature reviews, indices that can evaluate vulnerable regions of thermal environment are collated. The indices were divided into climate exposure index related to temperature, sensitivity index including demographic, social, and economic indices, and adaptation index related to urban environment and climate adaptation policy status. Second, significant variables were derived to evaluate a vulnerable region of thermal environment based on the summarized indices in the above. this study analyzed a relationship between the number of heat-related patients in Seoul and variables that affected the number using multi-variate statistical analysis to derive significant variables. Third, the importance of each variable was calculated quantitatively by integrating the statistical analysis results and analytic hierarchy process (AHP) method. Fourth, a distribution of data for each index was identified based on the selected variables and indices were normalized and overlapped. Fifth, For the climate exposure index, evaluations were conducted as same as the current vulnerability evaluation method by selecting future temperature of Seoul predicted through the representative concentration pathways (RCPs) climate change scenarios as an evaluation variable. The results of this study can be utilized as foundational data to establish a countermeasure against heatwave in Seoul. Although it is limited to control heatwave occurrences itself completely, improvements

  14. Vulnerability assessments, identity and spatial scale challenges in disaster-risk reduction

    Directory of Open Access Journals (Sweden)

    Edward R. Carr

    2015-11-01

    Full Text Available Current approaches to vulnerability assessment for disaster-risk reduction (DRR commonly apply generalised, a priori determinants of vulnerability to particular hazards in particular places. Although they may allow for policy-level legibility at high levels of spatial scale, these approaches suffer from attribution problems that become more acute as the level of analysis is localised and the population under investigation experiences greater vulnerability. In this article, we locate the source of this problem in a spatial scale mismatch between the essentialist framings of identity behind these generalised determinants of vulnerability and the intersectional, situational character of identity in the places where DRR interventions are designed and implemented. Using the Livelihoods as Intimate Government (LIG approach to identify and understand different vulnerabilities to flooding in a community in southern Zambia, we empirically demonstrate how essentialist framings of identity produce this mismatch. Further, we illustrate a means of operationalising intersectional, situational framings of identity to achieve greater and more productive understandings of hazard vulnerability than available through the application of general determinants of vulnerability to specific places and cases.

  15. Web vulnerability study of online pharmacy sites.

    Science.gov (United States)

    Kuzma, Joanne

    2011-01-01

    Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers' personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The objective is to identify the level of web application security vulnerabilities in online pharmacies and the common types of flaws, thus expanding on prior studies. Technical, managerial and legal recommendations on how to mitigate security issues are presented. The proposed four-step method first consists of choosing an online testing tool. The next steps involve choosing a list of 60 online pharmacy sites to test, and then running the software analysis to compile a list of flaws. Finally, an in-depth analysis is performed on the types of web application vulnerabilities. The majority of sites had serious vulnerabilities, with the majority of flaws being cross-site scripting or old versions of software that have not been updated. A method is proposed for the securing of web pharmacy sites, using a multi-phased approach of technical and managerial techniques together with a thorough understanding of national legal requirements for securing systems.

  16. A systematic review of local vulnerability to climate change in developing country agriculture

    NARCIS (Netherlands)

    Crane, Todd A.; Delaney, Aogán; Tamás, Peter A.; Chesterman, Sabrina; Ericksen, Polly

    2017-01-01

    In the mid-2000s, several highly-cited papers called for improving conceptual coherence and methodological transparency in vulnerability research to support greater policy relevance. As reducing vulnerability rises on political agendas, identifying empirically validated measures will become

  17. FLOOD VULNERABILITY IN BODVA RIVER BASIN IN SLOVAKIA

    Directory of Open Access Journals (Sweden)

    ZELENAKOVA MARTINA

    2015-03-01

    Full Text Available The aim of the paper is to generate a composite map for decision makers using selected factors, mainly of natural character, causing floods. In the analyses, some of the causative factors for flooding in a catchment area are taken into account, such as soil type, precipitation, land use, size of catchment and basin slope. A case study of flood vulnerability identification in the Bodva river basin in eastern Slovakia is employed to illustrate the different approaches. A geographical information system (GIS is integrated with multicriteria analysis (MCA in the paper. The identification of flood vulnerability consists of two basic phases. Firstly, the effective factors causing floods are identified. Secondly several approaches to MCA in a GIS environment are applied and these approaches are evaluated in order to prepared flood vulnerability map.

  18. Optimal Equipment Investments for Northern Plains Grain Farms

    OpenAIRE

    Terrance Jalbert; Mercedes Jalbert; James E. Briley

    2010-01-01

    This case presents a teaching tool which requires students to identify an optimal equipment plan for a northern plains small grain farm. Students are presented with information from a farm owner regarding farm size, available labor, farming techniques used and other relevant issues. Students are required to analyze this information to identify the equipment necessary to operate the farm. Students must balance equipment costs and labor issues. They must develop a plan that remains within a pre...

  19. Mapping social-ecological vulnerability to inform local decision making.

    Science.gov (United States)

    Thiault, Lauric; Marshall, Paul; Gelcich, Stefan; Collin, Antoine; Chlous, Frédérique; Claudet, Joachim

    2018-04-01

    An overarching challenge of natural resource management and biodiversity conservation is that relationships between people and nature are difficult to integrate into tools that can effectively guide decision making. Social-ecological vulnerability offers a valuable framework for identifying and understanding important social-ecological linkages, and the implications of dependencies and other feedback loops in the system. Unfortunately, its implementation at local scales has hitherto been limited due at least in part to the lack of operational tools for spatial representation of social-ecological vulnerability. We developed a method to map social-ecological vulnerability based on information on human-nature dependencies and ecosystem services at local scales. We applied our method to the small-scale fishery of Moorea, French Polynesia, by combining spatially explicit indicators of exposure, sensitivity, and adaptive capacity of both the resource (i.e., vulnerability of reef fish assemblages to fishing) and resource users (i.e., vulnerability of fishing households to the loss of fishing opportunity). Our results revealed that both social and ecological vulnerabilities varied considerably through space and highlighted areas where sources of vulnerability were high for both social and ecological subsystems (i.e., social-ecological vulnerability hotspots) and thus of high priority for management intervention. Our approach can be used to inform decisions about where biodiversity conservation strategies are likely to be more effective and how social impacts from policy decisions can be minimized. It provides a new perspective on human-nature linkages that can help guide sustainability management at local scales; delivers insights distinct from those provided by emphasis on a single vulnerability component (e.g., exposure); and demonstrates the feasibility and value of operationalizing the social-ecological vulnerability framework for policy, planning, and participatory

  20. Ecosystem Vulnerability Review: Proposal of an Interdisciplinary Ecosystem Assessment Approach

    Science.gov (United States)

    Weißhuhn, Peter; Müller, Felix; Wiggering, Hubert

    2018-06-01

    To safeguard the sustainable use of ecosystems and their services, early detection of potentially damaging changes in functional capabilities is needed. To support a proper ecosystem management, the analysis of an ecosystem's vulnerability provide information on its weaknesses as well as on its capacity to recover after suffering an impact. However, the application of the vulnerability concept to ecosystems is still an emerging topic. After providing background on the vulnerability concept, we summarize existing ecosystem vulnerability research on the basis of a systematic literature review with a special focus on ecosystem type, disciplinary background, and more detailed definition of the ecosystem vulnerability components. Using the Web of ScienceTM Core Collection, we overviewed the literature from 1991 onwards but used the 5 years from 2011 to 2015 for an in-depth analysis, including 129 articles. We found that ecosystem vulnerability analysis has been applied most notably in conservation biology, climate change research, and ecological risk assessments, pinpointing a limited spreading across the environmental sciences. It occurred primarily within marine and freshwater ecosystems. To avoid confusion, we recommend using the unambiguous term ecosystem vulnerability rather than ecological, environmental, population, or community vulnerability. Further, common ground has been identified, on which to define the ecosystem vulnerability components exposure, sensitivity, and adaptive capacity. We propose a framework for ecosystem assessments that coherently connects the concepts of vulnerability, resilience, and adaptability as different ecosystem responses. A short outlook on the possible operationalization of the concept by ecosystem vulnerabilty indices, and a conclusion section complete the review.

  1. Sensitivity Analysis of DRASTIC Model in Vulnerability Assessment of Shahrood Alluvial Aquifer

    Directory of Open Access Journals (Sweden)

    Shadi Abolhasan Almasi

    2017-07-01

    Full Text Available Groundwater vulnerability assessment is typically accomplished as a management tool to protect groundwater resources. In this research, the DRASTIC model which is an empirical one used for evaluating the potential of an aquifer for pollution was employed to evaluate the vulnerability of Shahrood alluvial aquifer. Moreover, the sensitivity of the model paramneters was assessed to identify the ones with greatest effect on vulnerability. The model layers including depth to groundwater table level, recharge, aquifer media, topography, impact of unsaturated zone, and hydraulic conductivity were prepared and classified in the ArcGIS software based on analyses of both the available data and the layer of surface soil texture using Aster satellite images. Once the vulnerability index was calculated, the sensitivity map of Shahroud aquifer vulnerability was analyzed using the two parameter removal and single parameter sensitivity methods. These were further verified by textural analysis of soil samples from different parts of the region. The layers with appropriate weights were overlaid and the DRASTIC index of the aquifer was estimated at 28 to 148. The highest vulnerability was detected in the northern margins and southwestern parts of the aquifer while other parts were characterized by medium to low vulnerability. The low nitrogen concentration observed in the farm areas and its rise to 45 mg/l in the northern stretches of the aquifer bear witness to the accuracy of the zoning rendered by the DRASTIC model. Based on the vulnerability map of Sharoud aquifer, it was found that 1.6% of the aquifer’s area has a very high vulnerability or potential for pollution followed by 10%, 28.8%, and 18.9% of the area were identified as having high, medium and low potentials for pollution, respecytively. The remaining (i.e., 40.5% was found to have no risk of pollution.

  2. Assessing social vulnerability to drought in South Africa: Policy implication for drought risk reduction

    Directory of Open Access Journals (Sweden)

    Fumiso Muyambo

    2017-01-01

    Full Text Available The aim of this article was to assess and identify social vulnerability of communal farmers to drought in the O.R. Tambo district in the Eastern Cape province of South Africa using a survey data and social vulnerability index (SoVI. Eleven social vulnerability indicators were identified using Bogardi, Birkman and Cardona conceptual framework. The result found that an SoVI estimated for O.R. Tambo district was very high with a Likert scale of 5 for cultural values and practices, security or safety, social networks, social dependence, preparedness strategies and psychological stress attributed for the high value of social vulnerability to drought. Indigenous knowledge and education had an SoVI value of 2, which was of low vulnerability, contributing positively to resilience to drought. The study also found that government involvement in drought risk reduction is limited; as a result, the study recommends that a national, provincial and district municipalities policy on drought risk reduction and mitigation should be developed.

  3. Tsunami vulnerability assessment in the western coastal belt in Sri Lanka

    Science.gov (United States)

    Ranagalage, M. M.

    2017-12-01

    26th December 2004 tsunami disaster has caused massive loss of life, damage to coastal infrastructures and disruption to economic activities in the coastal belt of Sri Lanka. Tsunami vulnerability assessment is a requirement for disaster risk and vulnerability reduction. It plays a major role in identifying the extent and level of vulnerabilities to disasters within the communities. There is a need for a clearer understanding of the disaster risk patterns and factors contributing to it in different parts of the coastal belt. The main objective of this study is to investigate tsunami vulnerability assessment of Moratuwa Municipal council area in Sri Lanka. We have selected Moratuwa area due to considering urbanization pattern and Tsunami hazards of the country. Different data sets such as one-meter resolution LiDAR data, orthophoto, population, housing data and road layer were employed in this study. We employed tsunami vulnerability model for 1796 housing units located there, for a tsunami scenario with a maximum run-up 8 meters. 86% of the total land area affected by the tsunami in 8 meters scenarios. Additionally, building population has been used to estimate population in different vulnerability levels. The result shows that 32% of the buildings have extremely critical vulnerability level, 46% have critical vulnerability level, 22% have high vulnerability level, and 1% have a moderate vulnerability. According to the population estimation model results, 18% reside building with extremely critical vulnerability, 43% with critical vulnerability, 36% with high vulnerability and 3% belong to moderate vulnerability level. The results of the study provide a clear picture of tsunami vulnerability. Outcomes of this analysis can use as a valuable tool for urban planners to assess the risk and extent of disaster risk reduction which could be achieved via suitable mitigation measures to manage the coastal belt in Sri Lanka.

  4. An holistic view on aquifer vulnerability based on a distinction of different types of vulnerability

    Science.gov (United States)

    De Luca, Domenico Antonio; Lasagna, Manuela; Franchino, Elisa

    2016-04-01

    AN HOLISTIC VIEW ON AQUIFER VULNERABILITY BASED ON A DISTINCTION OF DIFFERENT TYPES OF VULNERABILITY D.A. De Luca1 , M. Lasagna1, E. Franchino1 1Department of Earth Sciences, University of Turin The concept of vulnerability is certainly useful in the field of groundwater protection. Nevertheless, within the scientific community, the definition of groundwater vulnerability is still debatable and not clear and conclusive. This is probably due to the fact that researchers often have very different experiences and education. A positive effect of it is a constant exchange of ideas, but there are also negative consequences and difficulties in deepening the issue. The different approaches are very important but they are usable only if the concept of vulnerability is standardized: thus, for the sake of clarity, a number of definitions should be laid down, based on the different types of vulnerability. These definitions can then provide the necessary holistic view for the aquifer vulnerability assessment. Nowadays vulnerability methods focus on the degree of vulnerability and the parameters needed for its evaluation, often neglecting to clarify what is the type of vulnerability the proposed methods are referred. The type of vulnerability, indeed, is both logically and hierarchically superior to the degree of vulnerability. More specifically the type of vulnerability represents the evaluation of the hydrogeological conditions considered in the vulnerability assessment and able to influence the way in which the contamination can take place. Currently the only distinction, based on of the type of vulnerability, is referred to intrinsic and specific vulnerability. Intrinsic vulnerability assesses the susceptibility of the receptor based on the natural properties of the land and subsurface; specific vulnerability also includes properties of the analyzed contaminant. This distinction is useful but not exhaustive. In addition to this, e.g., a distinction of vertical vulnerability

  5. 75 FR 26180 - Effects on Broadband Communications Networks of Damage To or Failure of Network Equipment or...

    Science.gov (United States)

    2010-05-11

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Chapter I [PS Docket No. 10-92; FCC 10-62] Effects on... the National Broadband Plan, the Federal Communications Commission (Commission or FCC) adopted this... networks and to explore potential measures to reduce network vulnerability to failures in network equipment...

  6. Early Markers of Vulnerable Language Skill Development in Galactosaemia

    Science.gov (United States)

    Lewis, Fiona M.; Coman, David J.; Syrmis, Maryanne

    2014-01-01

    There are no known biomedical or genetic markers to identify which infants with galactosaemia (GAL) are most at risk of poor language skill development, yet pre-linguistic communicative "red flag" behaviours are recognised as early identifiers of heightened vulnerability to impaired language development. We report on pre-linguistic…

  7. Vulnerability curves vs. vulnerability indicators: application of an indicator-based methodology for debris-flow hazards

    Science.gov (United States)

    Papathoma-Köhle, Maria

    2016-08-01

    The assessment of the physical vulnerability of elements at risk as part of the risk analysis is an essential aspect for the development of strategies and structural measures for risk reduction. Understanding, analysing and, if possible, quantifying physical vulnerability is a prerequisite for designing strategies and adopting tools for its reduction. The most common methods for assessing physical vulnerability are vulnerability matrices, vulnerability curves and vulnerability indicators; however, in most of the cases, these methods are used in a conflicting way rather than in combination. The article focuses on two of these methods: vulnerability curves and vulnerability indicators. Vulnerability curves express physical vulnerability as a function of the intensity of the process and the degree of loss, considering, in individual cases only, some structural characteristics of the affected buildings. However, a considerable amount of studies argue that vulnerability assessment should focus on the identification of these variables that influence the vulnerability of an element at risk (vulnerability indicators). In this study, an indicator-based methodology (IBM) for mountain hazards including debris flow (Kappes et al., 2012) is applied to a case study for debris flows in South Tyrol, where in the past a vulnerability curve has been developed. The relatively "new" indicator-based method is being scrutinised and recommendations for its improvement are outlined. The comparison of the two methodological approaches and their results is challenging since both methodological approaches deal with vulnerability in a different way. However, it is still possible to highlight their weaknesses and strengths, show clearly that both methodologies are necessary for the assessment of physical vulnerability and provide a preliminary "holistic methodological framework" for physical vulnerability assessment showing how the two approaches may be used in combination in the future.

  8. Groundwater vulnerability mapping in Guadalajara aquifers system (Western Mexico)

    Science.gov (United States)

    Rizo-Decelis, L. David; Marín, Ana I.; Andreo, Bartolomé

    2016-04-01

    Groundwater vulnerability mapping is a practical tool to implement strategies for land-use planning and sustainable socioeconomic development coherent with groundwater protection. The objective of vulnerability mapping is to identify the most vulnerable zones of catchment areas and to provide criteria for protecting the groundwater used for drinking water supply. The delineation of protection zones in fractured aquifers is a challenging task due to the heterogeneity and anisotropy of hydraulic conductivities, which makes difficult prediction of groundwater flow organization and flow velocities. Different methods of intrinsic groundwater vulnerability mapping were applied in the Atemajac-Toluquilla groundwater body, an aquifers system that covers around 1300 km2. The aquifer supplies the 30% of urban water resources of the metropolitan area of Guadalajara (Mexico), where over 4.6 million people reside. Study area is located in a complex neotectonic active volcanic region in the Santiago River Basin (Western Mexico), which influences the aquifer system underneath the city. Previous works have defined the flow dynamics and identified the origin of recharge. In addition, the mixture of fresh groundwater with hydrothermal and polluted waters have been estimated. Two main aquifers compose the multilayer system. The upper aquifer is unconfined and consists of sediments and pyroclastic materials. Recharge of this aquifer comes from rainwater and ascending vertical fluids from the lower aquifer. The lower aquifer consists of fractured basalts of Pliocene age. Formerly, the main water source has been the upper unit, which is a porous and unconsolidated unit, which acts as a semi-isotropic aquifer. Intense groundwater usage has resulted in lowering the water table in the upper aquifer. Therefore, the current groundwater extraction is carried out from the deeper aquifer and underlying bedrock units, where fracture flow predominates. Pollution indicators have been reported in

  9. A systematic review of local vulnerability to climate change: In search of transparency, coherence and comparability

    NARCIS (Netherlands)

    Delaney, A.; Chesterman, S.; Crane, T.A.; Tamas, P.A.; Ericksen, P.J.

    2014-01-01

    Because vulnerability is a conceptual construct rather than a directly observable phenomenon, most vulnerability assessments measure a set of “vulnerability indicators”. In order to identify the core approaches and range of variation in the field, we conducted a systematic literature review on local

  10. Using fuzzy logic to determine the vulnerability of marine species to climate change.

    Science.gov (United States)

    Jones, Miranda C; Cheung, William W L

    2018-02-01

    Marine species are being impacted by climate change and ocean acidification, although their level of vulnerability varies due to differences in species' sensitivity, adaptive capacity and exposure to climate hazards. Due to limited data on the biological and ecological attributes of many marine species, as well as inherent uncertainties in the assessment process, climate change vulnerability assessments in the marine environment frequently focus on a limited number of taxa or geographic ranges. As climate change is already impacting marine biodiversity and fisheries, there is an urgent need to expand vulnerability assessment to cover a large number of species and areas. Here, we develop a modelling approach to synthesize data on species-specific estimates of exposure, and ecological and biological traits to undertake an assessment of vulnerability (sensitivity and adaptive capacity) and risk of impacts (combining exposure to hazards and vulnerability) of climate change (including ocean acidification) for global marine fishes and invertebrates. We use a fuzzy logic approach to accommodate the variability in data availability and uncertainties associated with inferring vulnerability levels from climate projections and species' traits. Applying the approach to estimate the relative vulnerability and risk of impacts of climate change in 1074 exploited marine species globally, we estimated their index of vulnerability and risk of impacts to be on average 52 ± 19 SD and 66 ± 11 SD, scaling from 1 to 100, with 100 being the most vulnerable and highest risk, respectively, under the 'business-as-usual' greenhouse gas emission scenario (Representative Concentration Pathway 8.5). We identified 157 species to be highly vulnerable while 294 species are identified as being at high risk of impacts. Species that are most vulnerable tend to be large-bodied endemic species. This study suggests that the fuzzy logic framework can help estimate climate vulnerabilities and risks

  11. Is a clean river fun for all? Recognizing social vulnerability in watershed planning.

    Science.gov (United States)

    Cutts, Bethany B; Greenlee, Andrew J; Prochaska, Natalie K; Chantrill, Carolina V; Contractor, Annie B; Wilhoit, Juliana M; Abts, Nancy; Hornik, Kaitlyn

    2018-01-01

    Watershed planning can lead to policy innovation and action toward environmental protection. However, groups often suffer from low engagement with communities that experience disparate impacts from flooding and water pollution. This can limit the capacity of watershed efforts to dismantle pernicious forms of social inequality. As a result, the benefits of environmental changes often flow to more empowered residents, short-changing the power of watershed-based planning as a tool to transform ecological, economic, and social relationships. The objectives of this paper are to assess whether the worldview of watershed planning actors are sufficiently attuned to local patterns of social vulnerability and whether locally significant patterns of social vulnerability can be adequately differentiated using conventional data sources. Drawing from 35 in-depth interviews with watershed planners and community stakeholders in the Milwaukee River Basin (WI, USA), we identify five unique definitions of social vulnerability. Watershed planners in our sample articulate a narrower range of social vulnerability definitions than other participants. All five definitions emphasize spatial and demographic characteristics consistent with existing ways of measuring social vulnerability. However, existing measures do not adequately differentiate among the spatio-temporal dynamics used to distinguish definitions. In response, we develop two new social vulnerability measures. The combination of interviews and demographic analyses in this study provides an assessment technique that can help watershed planners (a) understand the limits of their own conceptualization of social vulnerability and (b) acknowledge the importance of place-based vulnerabilities that may otherwise be obscured. We conclude by discussing how our methods can be a useful tool for identifying opportunities to disrupt social vulnerability in a watershed by evaluating how issue frames, outreach messages, and engagement tactics

  12. Is a clean river fun for all? Recognizing social vulnerability in watershed planning

    Science.gov (United States)

    Greenlee, Andrew J.; Prochaska, Natalie K.; Chantrill, Carolina V.; Contractor, Annie B.; Wilhoit, Juliana M.; Abts, Nancy; Hornik, Kaitlyn

    2018-01-01

    Watershed planning can lead to policy innovation and action toward environmental protection. However, groups often suffer from low engagement with communities that experience disparate impacts from flooding and water pollution. This can limit the capacity of watershed efforts to dismantle pernicious forms of social inequality. As a result, the benefits of environmental changes often flow to more empowered residents, short-changing the power of watershed-based planning as a tool to transform ecological, economic, and social relationships. The objectives of this paper are to assess whether the worldview of watershed planning actors are sufficiently attuned to local patterns of social vulnerability and whether locally significant patterns of social vulnerability can be adequately differentiated using conventional data sources. Drawing from 35 in-depth interviews with watershed planners and community stakeholders in the Milwaukee River Basin (WI, USA), we identify five unique definitions of social vulnerability. Watershed planners in our sample articulate a narrower range of social vulnerability definitions than other participants. All five definitions emphasize spatial and demographic characteristics consistent with existing ways of measuring social vulnerability. However, existing measures do not adequately differentiate among the spatio-temporal dynamics used to distinguish definitions. In response, we develop two new social vulnerability measures. The combination of interviews and demographic analyses in this study provides an assessment technique that can help watershed planners (a) understand the limits of their own conceptualization of social vulnerability and (b) acknowledge the importance of place-based vulnerabilities that may otherwise be obscured. We conclude by discussing how our methods can be a useful tool for identifying opportunities to disrupt social vulnerability in a watershed by evaluating how issue frames, outreach messages, and engagement tactics

  13. 33 CFR 105.250 - Security systems and equipment maintenance.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... systems and equipment maintenance. (a) Security systems and equipment must be in good working order and... include procedures for identifying and responding to security system and equipment failures or...

  14. 33 CFR 104.260 - Security systems and equipment maintenance.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Security systems and equipment... systems and equipment maintenance. (a) Security systems and equipment must be in good working order and... procedures for identifying and responding to security system and equipment failures or malfunctions. ...

  15. Biophysical, Socioeconomic, and Geopolitical Vulnerabilities to Hydropower Development on the Nu River, China

    Directory of Open Access Journals (Sweden)

    Desiree D. Tullos

    2013-09-01

    Full Text Available Rapid hydropower development is occurring in China's Yunnan province in response to increasing clean energy demands, exposing potential vulnerabilities of the area's ecosystems, communities, and geopolitical systems. Here, we present original data on the cultures, economics, hydro-politics, and environments of the Nu River basin, based on household surveys, analysis of geopolitical events, and hydrological, hydraulic, and landscape modeling. We identify sources of vulnerability and investigate relationships among biophysical, socioeconomic, and geopolitical elements that contribute to vulnerability. Our results illustrate the role of geographic isolation in intensifying vulnerability to hydropower development and how access to information, data uncertainty, and geopolitics influence the vulnerability of people and the environment. We emphasize specific needs for developing support mechanisms for social, ecological, and political groups that are vulnerable to hydropower development.

  16. Connected Equipment Maturity Model Version 1.0

    Energy Technology Data Exchange (ETDEWEB)

    Butzbaugh, Joshua B. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Mayhorn, Ebony T. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Sullivan, Greg [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Whalen, Scott A. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2017-05-01

    The Connected Equipment Maturity Model (CEMM) evaluates the high-level functionality and characteristics that enable equipment to provide the four categories of energy-related services through communication with other entities (e.g., equipment, third parties, utilities, and users). The CEMM will help the U.S. Department of Energy, industry, energy efficiency organizations, and research institutions benchmark the current state of connected equipment and identify capabilities that may be attained to reach a more advanced, future state.

  17. Vulnerability of European freshwater catchments to climate change.

    Science.gov (United States)

    Markovic, Danijela; Carrizo, Savrina F; Kärcher, Oskar; Walz, Ariane; David, Jonathan N W

    2017-09-01

    Climate change is expected to exacerbate the current threats to freshwater ecosystems, yet multifaceted studies on the potential impacts of climate change on freshwater biodiversity at scales that inform management planning are lacking. The aim of this study was to fill this void through the development of a novel framework for assessing climate change vulnerability tailored to freshwater ecosystems. The three dimensions of climate change vulnerability are as follows: (i) exposure to climate change, (ii) sensitivity to altered environmental conditions and (iii) resilience potential. Our vulnerability framework includes 1685 freshwater species of plants, fishes, molluscs, odonates, amphibians, crayfish and turtles alongside key features within and between catchments, such as topography and connectivity. Several methodologies were used to combine these dimensions across a variety of future climate change models and scenarios. The resulting indices were overlaid to assess the vulnerability of European freshwater ecosystems at the catchment scale (18 783 catchments). The Balkan Lakes Ohrid and Prespa and Mediterranean islands emerge as most vulnerable to climate change. For the 2030s, we showed a consensus among the applied methods whereby up to 573 lake and river catchments are highly vulnerable to climate change. The anthropogenic disruption of hydrological habitat connectivity by dams is the major factor reducing climate change resilience. A gap analysis demonstrated that the current European protected area network covers climate change. Priority should be placed on enhancing stakeholder cooperation at the major basin scale towards preventing further degradation of freshwater ecosystems and maintaining connectivity among catchments. The catchments identified as most vulnerable to climate change provide preliminary targets for development of climate change conservation management and mitigation strategies. © 2017 John Wiley & Sons Ltd.

  18. Identification of vulnerable areas for gully erosion under different scenarios of land abandonment in Southeast Spain

    NARCIS (Netherlands)

    Lesschen, J.P.; Kok, K.; Verburg, P.H.; Cammeraat, L.H.

    2007-01-01

    Abandonment of agricultural land is one of the main changes in Mediterranean land use. To mitigate runoff and erosion from abandoned land, it is necessary to identify locations that are vulnerable to erosion as a result of land abandonment. The objective of our study was to identify vulnerable areas

  19. Defining energy vulnerability in mobility. Measuring energy vulnerability in mobility. Acting against energy vulnerability in mobility. Discussing energy vulnerability in mobility. Task no. 4

    International Nuclear Information System (INIS)

    Jouffe, Yves; Massot, Marie-Helene; Noble, Cyprien

    2015-01-01

    Extensive expansion of urban areas generates transportation needs and energy expenses for mobility. Households already impacted by fuel poverty also suffer from energy vulnerability in their mobility. This report was prepared in the framework of the study of fuel poverty in France in the light of several indicators from existing inquiries, databases and modeling tools. The report is organised in 4 parts dealing with: the definition of energy vulnerability in mobility, its measurement, the possible remedial actions, and the discussions about energy vulnerability in mobility through working group meetings, respectively

  20. Informality and employment vulnerability: application in sellers with subsistence work

    Science.gov (United States)

    Garzón-Duque, María Osley; Cardona-Arango, María Doris; Rodríguez-Ospina, Fabio León; Segura-Cardona, Angela María

    2017-01-01

    ABSTRACT OBJECTIVE To describe the origin, evolution, and application of the concept of employment vulnerability in workers who subsist on street sales. METHODS We have carried out an analysis of the literature in database in Spanish, Portuguese, and English, without restriction by country. This is a review of the gray literature of government reports, articles, and documents from Latin America and the Caribbean. We have analyzed information on the informal economy, social-employment vulnerability, and subsistence workers. RESULTS AND CONCLUSIONS The concept of informal economy is dispersed and suggested as synonymous with employment vulnerability. As a polysemic term, it generates confusion and difficulty in identifying defined profiles of employment vulnerability in informal subsistence workers, who sell their products on the streets and sidewalks of cities. The lack of a clear concept and profile of employment vulnerability for this type of workers generates a restriction on defined actions to reduce employment vulnerability. The profiles could facilitate access to the acquisition of assets that support their structure of opportunities, facilitating and mediating in the passage from vulnerability to social mobility with opportunities. We propose as a concept of employment vulnerability for subsistence workers in the informal sector, the condition of those who must work by day to eat at night, who have little or no ownership of assets, and who have a minimum structure of opportunities to prevent, face, and resist the critical situations that occur daily, putting at risk their subsistence and that of the persons who are their responsibility, thus making the connection between social and employment vulnerability. PMID:29020122

  1. Informality and employment vulnerability: application in sellers with subsistence work

    Directory of Open Access Journals (Sweden)

    María Osley Garzón-Duque

    2017-10-01

    Full Text Available ABSTRACT OBJECTIVE To describe the origin, evolution, and application of the concept of employment vulnerability in workers who subsist on street sales. METHODS We have carried out an analysis of the literature in database in Spanish, Portuguese, and English, without restriction by country. This is a review of the gray literature of government reports, articles, and documents from Latin America and the Caribbean. We have analyzed information on the informal economy, social-employment vulnerability, and subsistence workers. RESULTS AND CONCLUSIONS The concept of informal economy is dispersed and suggested as synonymous with employment vulnerability. As a polysemic term, it generates confusion and difficulty in identifying defined profiles of employment vulnerability in informal subsistence workers, who sell their products on the streets and sidewalks of cities. The lack of a clear concept and profile of employment vulnerability for this type of workers generates a restriction on defined actions to reduce employment vulnerability. The profiles could facilitate access to the acquisition of assets that support their structure of opportunities, facilitating and mediating in the passage from vulnerability to social mobility with opportunities. We propose as a concept of employment vulnerability for subsistence workers in the informal sector, the condition of those who must work by day to eat at night, who have little or no ownership of assets, and who have a minimum structure of opportunities to prevent, face, and resist the critical situations that occur daily, putting at risk their subsistence and that of the persons who are their responsibility, thus making the connection between social and employment vulnerability.

  2. Informality and employment vulnerability: application in sellers with subsistence work.

    Science.gov (United States)

    Garzón-Duque, María Osley; Cardona-Arango, María Doris; Rodríguez-Ospina, Fabio León; Segura-Cardona, Angela María

    2017-10-05

    To describe the origin, evolution, and application of the concept of employment vulnerability in workers who subsist on street sales. We have carried out an analysis of the literature in database in Spanish, Portuguese, and English, without restriction by country. This is a review of the gray literature of government reports, articles, and documents from Latin America and the Caribbean. We have analyzed information on the informal economy, social-employment vulnerability, and subsistence workers. The concept of informal economy is dispersed and suggested as synonymous with employment vulnerability. As a polysemic term, it generates confusion and difficulty in identifying defined profiles of employment vulnerability in informal subsistence workers, who sell their products on the streets and sidewalks of cities. The lack of a clear concept and profile of employment vulnerability for this type of workers generates a restriction on defined actions to reduce employment vulnerability. The profiles could facilitate access to the acquisition of assets that support their structure of opportunities, facilitating and mediating in the passage from vulnerability to social mobility with opportunities. We propose as a concept of employment vulnerability for subsistence workers in the informal sector, the condition of those who must work by day to eat at night, who have little or no ownership of assets, and who have a minimum structure of opportunities to prevent, face, and resist the critical situations that occur daily, putting at risk their subsistence and that of the persons who are their responsibility, thus making the connection between social and employment vulnerability.

  3. Report: Results of Technical Vulnerability Assessment: EPA’s Directory Service System Authentication and Authorization Servers

    Science.gov (United States)

    Report #11-P-0597, September 9, 2011. Vulnerability testing of EPA’s directory service system authentication and authorization servers conducted in March 2011 identified authentication and authorization servers with numerous vulnerabilities.

  4. ANALYSIS OF ANDROID VULNERABILITIES AND MODERN EXPLOITATION TECHNIQUES

    Directory of Open Access Journals (Sweden)

    Himanshu Shewale

    2014-03-01

    Full Text Available Android is an operating system based on the Linux kernel. It is the most widely used and popular operating system among Smartphones and portable devices. Its programmable and open nature attracts attackers to take undue advantage. Android platform allows developers to freely access and modify source code. But at the same time it increases the security issue. A user is likely to download and install malicious applications written by software hackers. This paper focuses on understanding and analyzing the vulnerabilities present in android platform. In this paper firstly we study the android architecture; analyze the existing threats and security weaknesses. Then we identify various exploit mitigation techniques to mitigate known vulnerabilities. A detailed analysis will help us to identify the existing loopholes and it will give strategic direction to make android operating system more secure.

  5. Vulnerability assessment of atmospheric environment driven by human impacts.

    Science.gov (United States)

    Zhang, Yang; Shen, Jing; Ding, Feng; Li, Yu; He, Li

    2016-11-15

    Atmospheric environment quality worsening is a substantial threat to public health worldwide, and in many places, air pollution due to the intensification of the human activity is increasing dramatically. However, no studies have been investigated the integration of vulnerability assessment and atmospheric environment driven by human impacts. The objective of this study was to identify and prioritize the undesirable environmental changes as an early warning system for environment managers and decision makers in term of human, atmospheric environment, and social economic elements. We conduct a vulnerability assessment method of atmospheric environment associated with human impact, this method integrates spatial context of Geographic Information System (GIS) tool, multi-criteria decision analysis (MCDA) method, ordered weighted averaging (OWA) operators under the Exposure-Sensitivity- Adaptive Capacity (ESA) framework. Decision makers can find out relevant vulnerability assessment results with different vulnerable attitudes. In the Beijing-Tianjin-Hebei (BTH) region, China, we further applied this developed method and proved it to be reliable and consistent with the China Environmental Status Bulletin. Results indicate that the vulnerability of atmospheric environment in the BTH region is not optimistic, and environment managers should do more about air pollution. Thus, the most appropriate strategic decision and development program of city or state can be picked out assisting by the vulnerable results. Copyright © 2016 Elsevier B.V. All rights reserved.

  6. Urban settlements' vulnerability to flood risks in African cities: A conceptual framework

    Directory of Open Access Journals (Sweden)

    Rafiu O. Salami

    2017-02-01

    Full Text Available In the recent past, the frequency and gravity of large-scale flood disasters have increased globally, resulting in casualties, destruction of property and huge economic loss. The destructive flood disaster devastating Louisiana, USA, is a recent example. Despite the availability of advanced technological capabilities for dealing with floods in developed nations, flood disasters continue to become more rampant and disastrous. Developing countries in Africa such as Benin, Ghana, Nigeria, Senegal and Sudan have recently experienced severe flooding, leaving a considerable number of human casualties and thousands displaced. In African cities, most vulnerable urban residents usually have lesser capacity and fewer resources to recover from the shocks of disaster as a result of the failure of governments to build human security for poor African residents. Many scholars have acknowledged the lack of appropriate vulnerability assessment frameworks and policies, questioning the efficiency and effectiveness of the tested models in Africa. The ability to accurately identify, measure and evaluate the various vulnerabilities of affected people and communities is a right step towards reducing disaster risk. This article aimed at developing a framework for assessing urban settlements’ vulnerability to flood risks in Africa. The framework is currently being tested to assess various dimensions of vulnerability drivers in three urban communities in Ibadan metropolis, the third largest city in Nigeria, focusing more on flood risk perceptions and behaviour of the risk bearers. It uses participatory and mixed method approaches to socially construct vulnerability of populations at risk. This model emanates from the evaluation of considerable relevant literature and an array of vulnerability assessment frameworks. It integrates some approaches that are applicable to African cities in a bid to create a versatile tool to assess, identify and mitigate the effects of

  7. The replace repair decision for heavy equipment.

    Science.gov (United States)

    2004-01-01

    The fleet of equipment operated by the Virginia Department of Transportation (VDOT) constitutes a large investment, on the order of half a billion dollars. A means of identifying earlier and more accurately those pieces of equipment whose timely repl...

  8. Are older people a vulnerable group? Philosophical and bioethical perspectives on ageing and vulnerability.

    Science.gov (United States)

    Bozzaro, Claudia; Boldt, Joachim; Schweda, Mark

    2018-05-01

    The elderly are often considered a vulnerable group in public and academic bioethical debates and regulations. In this paper, we examine and challenge this assumption and its ethical implications. We begin by systematically delineating the different concepts of vulnerability commonly used in bioethics, before then examining whether these concepts can be applied to old age. We argue that old age should not, in and of itself, be used as a marker of vulnerability, since ageing is a process that can develop in a variety of different ways and is not always associated with particular experiences of vulnerability. We, therefore, turn to more fundamental phenomenological considerations in order to reconstruct from a first person perspective the intricate interconnections between the experiences of ageing and vulnerability. According to this account, ageing and old age are phenomena in which the basic anthropological vulnerability of human beings can manifest itself in an increased likelihood of harm and exploitation. Thus, we plead for a combined model of vulnerability that helps to avoid problems related to the current concepts of vulnerability. We conclude first that old age as such is not a sufficient criterion for being categorized as vulnerable in applied ethics, and second that reflections on ageing can help to develop a better understanding of the central role of vulnerability in human existence and in applied ethics. © 2018 John Wiley & Sons Ltd.

  9. The effect of smoke from plastics on digital communications equipment

    International Nuclear Information System (INIS)

    Tanaka, T.J.; Chapin, J.T.

    1998-01-01

    Smoke from plastics can cause immediate problems in electrical equipment in the form of shorting and increased leakage currents, as well as long-term corrosion (metal loss). The short-term problems can be especially serious for critical control instrumentation such as that found in nuclear reactors or telecommunications systems. The US Nuclear Regulatory Commission and Sandia National Laboratories are sponsoring a program to determine the modes and probabilities of digital equipment failure during exposure to smoke and up to 24 hours after the exposure. Early tests on computer systems have shown that the most common immediate problems are temporary and are likely to be caused by increased leakage currents. High-voltage circuits are especially vulnerable since the charged particles in smoke are drawn to those surfaces. To study failure probabilities, smoke exposure tests with real-time measurements will be carried out to determine how the electrical properties of the environment are affected by smoke concentration and content. Digital communication cable will be included in the tests because temporary shorts that cannot be detected through dc measurements may cause interruptions in communications between computers. The reaction of the equipment to changed electrical properties of the environment will be modeled. Equipment that can be used for testing and modeling is being solicited

  10. A user exposure based approach for non-structural road network vulnerability analysis.

    Directory of Open Access Journals (Sweden)

    Lei Jin

    Full Text Available Aiming at the dense urban road network vulnerability without structural negative consequences, this paper proposes a novel non-structural road network vulnerability analysis framework. Three aspects of the framework are mainly described: (i the rationality of non-structural road network vulnerability, (ii the metrics for negative consequences accounting for variant road conditions, and (iii the introduction of a new vulnerability index based on user exposure. Based on the proposed methodology, a case study in the Sioux Falls network which was usually threatened by regular heavy snow during wintertime is detailedly discussed. The vulnerability ranking of links of Sioux Falls network with respect to heavy snow scenario is identified. As a result of non-structural consequences accompanied by conceivable degeneration of network, there are significant increases in generalized travel time costs which are measurements for "emotionally hurt" of topological road network.

  11. Equipment and physical plant changes in response to the Fukushima event

    International Nuclear Information System (INIS)

    Newman, G.

    2013-01-01

    The Fukushima event led the international nuclear industry and regulatory bodies to challenge the ability of existing nuclear power plants to prevent and mitigate the effects of a severe external event leading to a total loss of AC power and resultant loss of cooling. Canadian Nuclear Industry's immediate response was to provide a high level of assurance that the existing plant is in a high state of readiness to deal with design basis and beyond design basis events, verify the capability of the existing plant to deal with beyond design basis events (equipment, procedures, staff qualification, external support agreements, etc), verify capability to mitigate station black out events, verify capability to cope with internal and external floods and address vulnerabilities to seismically induced damage to mitigation equipment.

  12. Vulnerability analysis and critical areas identification of the power systems under terrorist attacks

    Science.gov (United States)

    Wang, Shuliang; Zhang, Jianhua; Zhao, Mingwei; Min, Xu

    2017-05-01

    This paper takes central China power grid (CCPG) as an example, and analyzes the vulnerability of the power systems under terrorist attacks. To simulate the intelligence of terrorist attacks, a method of critical attack area identification according to community structures is introduced. Meanwhile, three types of vulnerability models and the corresponding vulnerability metrics are given for comparative analysis. On this basis, influence of terrorist attacks on different critical areas is studied. Identifying the vulnerability of different critical areas will be conducted. At the same time, vulnerabilities of critical areas under different tolerance parameters and different vulnerability models are acquired and compared. Results show that only a few number of vertex disruptions may cause some critical areas collapse completely, they can generate great performance losses the whole systems. Further more, the variation of vulnerability values under different scenarios is very large. Critical areas which can cause greater damage under terrorist attacks should be given priority of protection to reduce vulnerability. The proposed method can be applied to analyze the vulnerability of other infrastructure systems, they can help decision makers search mitigation action and optimum protection strategy.

  13. Report: Results of Technical Network Vulnerability Assessment: EPA’s Andrew W. Breidenbach Environmental Research Center

    Science.gov (United States)

    Report #10-P-0210, September 7, 2010. Vulnerability testing of EPA’s Andrew W. Breidenbach Environmental Research Center network conducted in June 2010 identified Internet Protocol addresses with numerous high-risk and medium-risk vulnerabilities.

  14. Vulnerability of damage-accumulating systems

    International Nuclear Information System (INIS)

    Lind, Niels C.

    1996-01-01

    Disastrous failures have shown that systems can be highly vulnerable. Quantified vulnerability can help designers and regulators to decide how much vulnerability is tolerable. Vulnerability of a system to a specified disturbance is defined as the ratio of the probability of failure of the disturbed system to the probability of failure of the undisturbed system. This vulnerability can be specialized to particular system types. It is adapted here to systems that are expected to deteriorate while in service due to processes such as fatigue, creep, corrosion, aging, neglect or insufficient maintenance. Application is illustrated by vulnerability to fatigue under constant and variable stress

  15. Vulnerability assessment of urban ecosystems driven by water resources, human health and atmospheric environment

    Science.gov (United States)

    Shen, Jing; Lu, Hongwei; Zhang, Yang; Song, Xinshuang; He, Li

    2016-05-01

    As ecosystem management is a hotspot and urgent topic with increasing population growth and resource depletion. This paper develops an urban ecosystem vulnerability assessment method representing a new vulnerability paradigm for decision makers and environmental managers, as it's an early warning system to identify and prioritize the undesirable environmental changes in terms of natural, human, economic and social elements. The whole idea is to decompose a complex problem into sub-problem, and analyze each sub-problem, and then aggregate all sub-problems to solve this problem. This method integrates spatial context of Geographic Information System (GIS) tool, multi-criteria decision analysis (MCDA) method, ordered weighted averaging (OWA) operators, and socio-economic elements. Decision makers can find out relevant urban ecosystem vulnerability assessment results with different vulnerable attitude. To test the potential of the vulnerability methodology, it has been applied to a case study area in Beijing, China, where it proved to be reliable and consistent with the Beijing City Master Plan. The results of urban ecosystem vulnerability assessment can support decision makers in evaluating the necessary of taking specific measures to preserve the quality of human health and environmental stressors for a city or multiple cities, with identifying the implications and consequences of their decisions.

  16. Classification of vulnerability information

    International Nuclear Information System (INIS)

    Gibson, W.G.

    1984-01-01

    The current upgrading of security measures at sensitive Department of Energy (DOE) facilities reflects the continuing concern over possible terrorist and other criminal acts against these facilities. Security reviews are periodically conducted at DOE facilities, deficiencies are identified, and corrective actions are recommended. While security upgrades are initiated as soon as possible, the process of securing funding and the construction or other activities necessary to complete upgrades can cause delays in correcting security vulnerabilities. Details of security weaknesses at important DOE facilities are classified in order to deny valuable information to terrorists and other malefactors

  17. Medical equipment in government health facilities: Missed opportunities

    OpenAIRE

    Pardeshi Geeta

    2005-01-01

    BACKGROUND: The availability and optimal utilization of medical equipment is important for improving the quality of health services. Significant investments are made for the purchase, maintenance and repair of medical equipment. Inadequate management of these equipment will result in financial losses and deprive the public of the intended benefits. This analysis is based on the conceptual framework drawn from the WHO recommended- lifecycle of medical equipment. AIMS: (1) To identify the probl...

  18. Data Integration for Climate Vulnerability Mapping in West Africa

    Directory of Open Access Journals (Sweden)

    Alex de Sherbinin

    2015-11-01

    Full Text Available Vulnerability mapping reveals areas that are likely to be at greater risk of climate-related disasters in the future. Through integration of climate, biophysical, and socioeconomic data in an overall vulnerability framework, so-called “hotspots” of vulnerability can be identified. These maps can be used as an aid to targeting adaptation and disaster risk management interventions. This paper reviews vulnerability mapping efforts in West Africa conducted under the USAID-funded African and Latin American Resilience to Climate Change (ARCC project. The focus is on the integration of remotely sensed and socioeconomic data. Data inputs included a range of sensor data (e.g., MODIS NDVI, Landsat, SRTM elevation, DMSP-OLS night-time lights as well as high-resolution poverty, conflict, and infrastructure data. Two basic methods were used, one in which each layer was transformed into standardized indicators in an additive approach, and another in which remote sensing data were used to contextualize the results of composite indicators. We assess the benefits and challenges of data integration, and the lessons learned from these mapping exercises.

  19. Mangrove vulnerability index using GIS

    Science.gov (United States)

    Yunus, Mohd Zulkifli Mohd; Ahmad, Fatimah Shafinaz; Ibrahim, Nuremira

    2018-02-01

    Climate change, particularly its associated sea level rise, is major threat to mangrove coastal areas, and it is essential to develop ways to reduce vulnerability through strategic management planning. Environmental vulnerability can be understood as a function of exposure to impacts and the sensitivity and adaptive capacity of ecological systems towards environmental tensors. Mangrove vulnerability ranking using up to 14 parameters found in study area, which is in Pulau Kukup and Sg Pulai, where 1 is low vulnerability and 5 is very high vulnerability. Mangrove Vulnerability Index (MVI) is divided into 3 main categories Physical Mangrove Index (PMI), Biological Mangrove Index (BMI) and Hazard Mangrove Index (HMI).

  20. Automated Software Vulnerability Analysis

    Science.gov (United States)

    Sezer, Emre C.; Kil, Chongkyung; Ning, Peng

    Despite decades of research, software continues to have vulnerabilities. Successful exploitations of these vulnerabilities by attackers cost millions of dollars to businesses and individuals. Unfortunately, most effective defensive measures, such as patching and intrusion prevention systems, require an intimate knowledge of the vulnerabilities. Many systems for detecting attacks have been proposed. However, the analysis of the exploited vulnerabilities is left to security experts and programmers. Both the human effortinvolved and the slow analysis process are unfavorable for timely defensive measure to be deployed. The problem is exacerbated by zero-day attacks.

  1. An assessment of flood vulnerability in Khyber Pukhtunkhwa province of Pakistan

    Directory of Open Access Journals (Sweden)

    Said Qasim

    2017-02-01

    Full Text Available In this research we have attempted to measure vulnerability of the communities living in the flood prone area of Khyber Pukhtunkhwa province of Pakistan. Extensive literature review was conducted to identify the flood vulnerability indicators. Primary data were used to achieve the objective of this study. Questionnaires were used to collect the primary data from the selected households and from the director of Centre for Disaster Preparedness and Management. Subjective assessment technique was used to allocate weights to the selected indicators of vulnerability. A sample size of 280 respondents was taken from three selected locations of Charsadda, Nowshera and Peshawar. Simple random sampling was employed for the selection of respondents. Results revealed that overall vulnerability as well as component vulnerability for the selected locations was very high. The study therefore recommends preparedness, provision of funds for building houses with flood resistant materials and building houses in safer places. There is also a need for enhancing the adaptive capacities of the concerned communities through their socio-economic uplift. Implementation of these policies would lower the vulnerability of the communities to flood disasters.

  2. Current techniques for the investigation of vulnerable atherosclerotic plaques

    International Nuclear Information System (INIS)

    Riou, L.; Broisat, A.; Fagret, D.; Ghezzi, C.

    2005-01-01

    Atherosclerosis is the single most important contributor to cardiovascular diseases, the leading cause of death in industrialized countries. Atherosclerosis complications such as vulnerable coronary plaque rupture or erosion result in acute coronary events, i.e. myocardial infarction and sudden death. Vulnerable plaques initially develop eccentrically without impeding on the vessel lumen and are therefore not detectable using angiography. New techniques for the investigation of vulnerable plaques are needed to identify and treat vulnerable patients. Invasive techniques require the use of intracoronary probes and are thereby not applicable to large populations of patients. Intravascular ultrasound (IVUS) and optical coherence tomography (OCT) are the most promising invasive modalities. They provide morphological data that could potentially be associated with a more functional approach such as thermography, elasto-graphy, or spectroscopy, Non-invasive techniques are better suited for studying larger populations of patients. Computed tomography is currently used for calcium scoring, but the biological meaning and the prognostic value of this index remain to be fully determined. Non-invasive coronary magnetic resonance imaging (MRI) faces numerous technical challenges, and it essentially provides morphological data. Molecular nuclear imaging offers a great sensitivity and the ability to provide metabolic data about atherosclerotic lesions. New potential tracers of vulnerable plaques are currently being evaluated. Nuclear Medicine should therefore play a major role in the future as a non invasive imaging modality for the assessment of vulnerable atherosclerotic plaques. (author)

  3. What Does Vulnerability Mean?

    Science.gov (United States)

    Parley, Fiona F

    2011-01-01

    Protection of those deemed vulnerable has received increasing attention since 2000. This article reports on care staff views of vulnerability using original data from a research study (Parley. "Vulnerability and abuse: an exploration of views of care staff working with people who have learning disabilities," PhD Thesis, 2007) in which care staff…

  4. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    Science.gov (United States)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  5. A client-server software for the identification of groundwater vulnerability to pesticides at regional level.

    Science.gov (United States)

    Di Guardo, Andrea; Finizio, Antonio

    2015-10-15

    The groundwater VULnerability to PESticide software system (VULPES) is a user-friendly, GIS-based and client-server software developed to identify vulnerable areas to pesticides at regional level making use of pesticide fate models. It is a Decision Support System aimed to assist the public policy makers to investigate areas sensitive to specific substances and to propose limitations of use or mitigation measures. VULPES identify the so-called Uniform Geographical Unit (UGU) which are areas characterised by the same agro-environmental conditions. In each UGU it applies the PELMO model obtaining the 80th percentile of the substance concentration at 1 metre depth; then VULPES creates a vulnerability map in shapefile format which classifies the outputs comparing them with the lower threshold set to the legal limit concentration in groundwater (0.1 μg/l). This paper describes the software structure in details and a case study with the application of the terbuthylazine herbicide on the Lombardy region territory. Three zones with different degrees of vulnerabilities has been identified and described. Copyright © 2015 Elsevier B.V. All rights reserved.

  6. Interim Stabilization Equipment Essential and Support Drawing Plan

    International Nuclear Information System (INIS)

    KOCH, M.R.

    1999-01-01

    The purpose of this document is to list the Interim Stabilization equipment drawings that are classified as Essential or Support drawings. Essential Drawings: Those drawings identified by the facility staff as necessary to directly support the safe operation of the facility or equipment. Support Drawings: Those drawings identified by the facility staff that further describe the design details of structures, systems or components shown on essential drawings

  7. The Vulnerable Faces of Pathological Gambling

    OpenAIRE

    Fong, Timothy W.

    2005-01-01

    Pathological gambling is an emerging psychiatric disorder that has medical, psychiatric, and social consequences. Recently, research has been focusing on identifying which portions of the population are most vulnerable to developing problems related to ongoing gambling. Specific populations of interest have included adolescents, elderly, minorities, those with comorbid psychiatric or substance use disorders, and gender differences. Each group possesses unique biological, psychological, and/or...

  8. Redistributing vulnerabilities

    DEFF Research Database (Denmark)

    Seeberg, Jens; Padmawati, Retna Siwi

    2015-01-01

    It is widely accepted that the social distribution of vulnerability in a given society may turn hazardous events into disasters. This distributional approach draws attention to continuities that explain catastrophes by virtue of the workings of society prior to the event. In this paper, we draw...... attention to the social processes whereby vulnerability is modified and renegotiated during the post-disaster period where resources for disaster alleviation and reconstruction enter local communities. Specifically, we explore the social dynamics of house damage classification in the wake of the 2006...... Central Java earthquake, and we explore relations between citizens and the state during post-disaster house reconstruction. We argue that disastrous outcomes of catastrophic events do not follow pre-existing fault lines of vulnerability in a simple or predictable manner, and that the social process...

  9. Predicting risk in space: Genetic markers for differential vulnerability to sleep restriction

    Science.gov (United States)

    Goel, Namni; Dinges, David F.

    2012-08-01

    Several laboratories have found large, highly reliable individual differences in the magnitude of cognitive performance, fatigue and sleepiness, and sleep homeostatic vulnerability to acute total sleep deprivation and to chronic sleep restriction in healthy adults. Such individual differences in neurobehavioral performance are also observed in space flight as a result of sleep loss. The reasons for these stable phenotypic differential vulnerabilities are unknown: such differences are not yet accounted for by demographic factors, IQ or sleep need, and moreover, psychometric scales do not predict those individuals cognitively vulnerable to sleep loss. The stable, trait-like (phenotypic) inter-individual differences observed in response to sleep loss—with intraclass correlation coefficients accounting for 58-92% of the variance in neurobehavioral measures—point to an underlying genetic component. To this end, we utilized multi-day highly controlled laboratory studies to investigate the role of various common candidate gene variants—each independently—in relation to cumulative neurobehavioral and sleep homeostatic responses to sleep restriction. These data suggest that common genetic variations (polymorphisms) involved in sleep-wake, circadian, and cognitive regulation may serve as markers for prediction of inter-individual differences in sleep homeostatic and neurobehavioral vulnerability to sleep restriction in healthy adults. Identification of genetic predictors of differential vulnerability to sleep restriction—as determined from candidate gene studies—will help identify astronauts most in need of fatigue countermeasures in space flight and inform medical standards for obtaining adequate sleep in space. This review summarizes individual differences in neurobehavioral vulnerability to sleep deprivation and ongoing genetic efforts to identify markers of such differences.

  10. Assessment of agricultural drought vulnerability in the Philippines using remote sensing and GIS-based techniques

    International Nuclear Information System (INIS)

    Macapagal, Marco D.; Olivares, Resi O.; Perez, Gay Jane P.

    2015-01-01

    Drought is a recurrent extreme climate event that can cause crop damage and yield loss, thereby inflicting negative socioeconomic impacts all over the world. According to several climate studies, drought events may be more frequent and more severe as global warming progresses. As an agricultural country, the Philippines is highly susceptible to adverse impacts of drought using remotely sensed information and geographic processing techniques. An agricultural drought vulnerability map identifying croplands that are least vulnerable, moderately vulnerable, and most vulnerable to crop water-related stress, was developed. Vulnerability factors, including land use system, irrigation support. Available soil-water holding capacity, as well as satellite-derived evapotranspiration and rainfall, were taken into consideration in classifying and mapping agricultural drought vulnerability at a national level. (author)

  11. Business continuity, emergency planning and special needs: How to protect the vulnerable.

    Science.gov (United States)

    Reilly, Daniel

    2015-01-01

    Emergencies and disasters affect all segments of the population. Some segments are more at risk during the emergency response and recovery efforts owing to vulnerabilities that increase the risk of harm. These vulnerabilities are due to individuals' disabilities, which must be incorporated into emergency and business continuity planning. Some disabilities are obvious, such as impaired vision, hearing or mobility, while other are less evident, but equally disabling, such as cognitive disorders, geographical or language isolation, and numerous age-related factors. Taken together when creating emergency or business continuity plans, the issues identified as disabilities can be grouped by functionality and termed as special needs. This paper will detail the identification of special needs populations, explain how these persons are vulnerable during the emergency or disaster response and recovery process, and provide examples of how to partner with individuals within identified special needs populations to improve the planning process.

  12. Poverty and Vulnerability - An Interdisciplinary Approach

    OpenAIRE

    Makoka, Donald; Kaplan, Marcus

    2005-01-01

    This paper describes the concepts of poverty and vulnerability as well as the interconnections and differences between them using an interdisciplinary approach. While poverty is a static concept, vulnerability has a forward-looking dimension. We, therefore, review the methodologies that different disciplines use to measure poverty and vulnerability. In particular, the differences between vulnerability to natural disasters, vulnerability to climate change, as well as vulnerability to poverty a...

  13. Vulnerability of complex networks

    Science.gov (United States)

    Mishkovski, Igor; Biey, Mario; Kocarev, Ljupco

    2011-01-01

    We consider normalized average edge betweenness of a network as a metric of network vulnerability. We suggest that normalized average edge betweenness together with is relative difference when certain number of nodes and/or edges are removed from the network is a measure of network vulnerability, called vulnerability index. Vulnerability index is calculated for four synthetic networks: Erdős-Rényi (ER) random networks, Barabási-Albert (BA) model of scale-free networks, Watts-Strogatz (WS) model of small-world networks, and geometric random networks. Real-world networks for which vulnerability index is calculated include: two human brain networks, three urban networks, one collaboration network, and two power grid networks. We find that WS model of small-world networks and biological networks (human brain networks) are the most robust networks among all networks studied in the paper.

  14. Vulnerability and fragility risk indices for non-renewable resources.

    Science.gov (United States)

    Miller, Anne E; Steele, Nicholas; Tobin, Benjamin W

    2018-06-02

    Protected areas are tasked with mitigating impacts to a wide range of invaluable resources. These resources are often subject to a variety of potential natural and anthropogenic impacts that require monitoring efforts and management actions to minimize the degradation of these resources. However, due to insufficient funding and staff, managers often have to prioritize efforts, leaving some resources at higher risk to impact. Attempts to address this issue have resulted in numerous qualitative and semi-quantitative frameworks for prioritization based on resource vulnerability. Here, we add to those methods by modifying an internationally standardized vulnerability framework, quantify both resource vulnerability, susceptibility to human disturbance, and fragility, susceptibility to natural disturbance. This modified framework quantifies impacts through a six-step process: identifying the resource and management objectives, identifying exposure and sensitivity indicators, define scoring criteria for each indicator, collect and compile data, calculate indices, and prioritize sites for mitigations. We applied this methodology to two resource types in Grand Canyon National Park (GRCA): caves and fossil sites. Three hundred sixty-five cave sites and 127 fossil sites in GRCA were used for this analysis. The majority of cave and fossil sites scored moderate to low vulnerability (0-6 out of 10 points) and moderate to low fragility for fossils. The percentage of sites that fell in the high-priority range was 5.5% for fossils and 21.9% for caves. These results are consistent with the known state of these resources and the results present a tool for managers to utilize to prioritize monitoring and management needs.

  15. Pricing Vulnerable Options with Market Prices of Common Jump Risks under Regime-Switching Models

    Directory of Open Access Journals (Sweden)

    Miao Han

    2018-01-01

    Full Text Available This paper investigates the valuation of vulnerable European options considering the market prices of common systematic jump risks under regime-switching jump-diffusion models. The way of regime-switching Esscher transform is adopted to identify an equivalent martingale measure for pricing vulnerable European options. Explicit analytical pricing formulae for vulnerable European options are derived by risk-neutral pricing theory. For comparison, the other two cases are also considered separately. The first case considers all jump risks as unsystematic risks while the second one assumes all jumps risks to be systematic risks. Numerical examples for the valuation of vulnerable European options are provided to illustrate our results and indicate the influence of the market prices of jump risks on the valuation of vulnerable European options.

  16. Climate change impact and vulnerability assessment of forests in the Indian Western Himalayan region: A case study of Himachal Pradesh, India

    Directory of Open Access Journals (Sweden)

    Sujata Upgupta

    2015-01-01

    Full Text Available Climate change impact and vulnerability assessment at state and regional levels is necessary to develop adaptation strategies for forests in the biogeographically vital Himalayan region. The present study assesses forest ecosystem vulnerability to climate change across Himachal Pradesh and presents the priority districts for vulnerability reduction under ‘current climate’ and ‘future climate’ scenarios. Vulnerability of forests under ‘current climate’ scenario is assessed by adopting indicator-based approach, while the vulnerability under ‘future climate’ scenario is assessed using climate and vegetation impact models. Based on the vulnerability index estimated to present the vulnerability of forests under current and projected climate change impacts representing climate driven vulnerability, five districts – Chamba, Kangra, Kullu, Mandi and Shimla are identified as priority forest districts for adaptation planning. Identifying vulnerable forest districts and forests will help policy makers and forest managers to prioritize resource allocation and forest management interventions, to restore health and productivity of forests and to build long-term resilience to climate change.

  17. Detection of Equipment Faults Before Beam Loss

    CERN Document Server

    Galambos, J.

    2016-01-01

    High-power hadron accelerators have strict limits on fractional beam loss. In principle, once a high-quality beam is set up in an acceptable state, beam loss should remain steady. However, in practice, there are many trips in operational machines, owing to excessive beam loss. This paper deals with monitoring equipment health to identify precursor signals that indicate an issue with equipment that will lead to unacceptable beam loss. To this end, a variety of equipment and beam signal measurements are described. In particular, several operational examples from the Spallation Neutron Source (SNS) of deteriorating equipment functionality leading to beam loss are reported.

  18. Ozone distribution in remote ecologically vulnerable terrain of the southern Sierra Nevada, CA

    International Nuclear Information System (INIS)

    Panek, Jeanne; Saah, David; Esperanza, Annie; Bytnerowicz, Andrzej; Fraczek, Witold; Cisneros, Ricardo

    2013-01-01

    Ozone concentration spatial patterns remain largely uncharacterized across the extensive wilderness areas of the Sierra Nevada, CA, despite being downwind of major pollution sources. These natural areas, including four national parks and four national forests, contain forest species that are susceptible to ozone injury. Forests stressed by ozone are also more vulnerable to other agents of mortality, including insects, pathogens, climate change, and ultimately fire. Here we analyze three years of passive ozone monitor data from the southern Sierra Nevada and interpolate landscape-scale spatial and temporal patterns during the summer-through-fall high ozone concentration period. Segmentation analysis revealed three types of ozone exposure sub-regions: high, low, and variable. Consistently high ozone exposure regions are expected to be most vulnerable to forest mortality. One high exposure sub-region has been documented elsewhere as being further vulnerable to increased drought and fire potential. Identifying such hot-spots of forest vulnerability has utility for prioritizing management. -- Highlights: •Three years of passive ozone sampler data over 49,000 km 2 were analyzed spatially. •Spatial and temporal ozone patterns were mapped across the Sierra Nevada, CA. •Sub-regions of consistently high, low and variable ozone exposure were identified. •The 1700–2400 m elevation band delineated a distinct break in ozone concentration. •This approach has utility for prioritizing management across vulnerable landscapes. -- A passive ozone sampler network in combination with spatial analysis techniques was used to characterize landscape-scale ozone patterns and dynamics, identifying regions of consistently high and low ozone exposure for forest management prioritization

  19. Waste Handling Equipment Development Test and Evaluation Study

    International Nuclear Information System (INIS)

    R.L. Tome

    1998-01-01

    The purpose of this study is to identify candidate Monitored Geologic Repository (MGR) surface waste handling equipment for development testing. This study will also identify strategies for performing the development tests. Development testing shall be implemented to support detail design and reduce design risks. Development testing shall be conducted to confirm design concepts, evaluate alternative design concepts, show the availability of needed technology, and provide design documentation. The candidate equipment will be selected from MGR surface waste handling equipment that is the responsibility of the Management and Operating Contractor (M and O) Surface Design Department. The equipment identified in this study is based on Viability Assessment (VA) design. The ''Monitored Geologic Repository Test and Evaluation Plan'' (MGR T and EP), Reference 5.1, was used as a basis for this study. The MGR T and EP reflects the extent of test planning and analysis that can be conducted, given the current status of the MGR requirements and latest VA design information. The MGR T and EP supports the appropriate sections in the license application (LA) in accordance with 10 CFR 60.2 1(c)(14). The MGR T and EP describes the following test activities: site characterization to confirm, by test and analysis, the suitability of the Yucca Mountain site for housing a geologic repository; development testing to investigate and document design concepts to reduce risk; qualification testing to verify equipment compliance with design requirements, specifications, and regulatory requirements; system testing to validate compliance with MGR requirements, which include the receipt, handling, retrieval, and disposal of waste; periodic performance testing to verify preclosure requirements and to demonstrate safe and reliable MGR operation; and performance confirmation modeling, testing, and analysis to verify adherence to postclosure regulatory requirements. Development test activities can be

  20. Security Vulnerability Profiles of Mission Critical Software: Empirical Analysis of Security Related Bug Reports

    Science.gov (United States)

    Goseva-Popstojanova, Katerina; Tyo, Jacob

    2017-01-01

    While some prior research work exists on characteristics of software faults (i.e., bugs) and failures, very little work has been published on analysis of software applications vulnerabilities. This paper aims to contribute towards filling that gap by presenting an empirical investigation of application vulnerabilities. The results are based on data extracted from issue tracking systems of two NASA missions. These data were organized in three datasets: Ground mission IVV issues, Flight mission IVV issues, and Flight mission Developers issues. In each dataset, we identified security related software bugs and classified them in specific vulnerability classes. Then, we created the security vulnerability profiles, i.e., determined where and when the security vulnerabilities were introduced and what were the dominating vulnerabilities classes. Our main findings include: (1) In IVV issues datasets the majority of vulnerabilities were code related and were introduced in the Implementation phase. (2) For all datasets, around 90 of the vulnerabilities were located in two to four subsystems. (3) Out of 21 primary classes, five dominated: Exception Management, Memory Access, Other, Risky Values, and Unused Entities. Together, they contributed from 80 to 90 of vulnerabilities in each dataset.

  1. Mongolia - Vocational Education - Equipment Upgrades

    Data.gov (United States)

    Millennium Challenge Corporation — Evaluation design The impact evaluation sought to identify the causal impact of exposure to equipment upgrades on subsequent outcomes. Insofar as we were not able to...

  2. LAVA: Large scale Automated Vulnerability Addition

    Science.gov (United States)

    2016-05-23

    LAVA: Large-scale Automated Vulnerability Addition Brendan Dolan -Gavitt∗, Patrick Hulin†, Tim Leek†, Fredrich Ulrich†, Ryan Whelan† (Authors listed...released, and thus rapidly become stale. We can expect tools to have been trained to detect bugs that have been released. Given the commercial price tag...low TCN) and dead (low liveness) program data is a powerful one for vulnera- bility injection. The DUAs it identifies are internal program quantities

  3. Prioritizing equipment for replacement.

    Science.gov (United States)

    Capuano, Mike

    2010-01-01

    It is suggested that clinical engineers take the lead in formulating evaluation processes to recommend equipment replacement. Their skill, knowledge, and experience, combined with access to equipment databases, make them a logical choice. Based on ideas from Fennigkoh's scheme, elements such as age, vendor support, accumulated maintenance cost, and function/risk were used.6 Other more subjective criteria such as cost benefits and efficacy of newer technology were not used. The element of downtime was also omitted due to the data element not being available. The resulting Periop Master Equipment List and its rationale was presented to the Perioperative Services Program Council. They deemed the criteria to be robust and provided overwhelming acceptance of the list. It was quickly put to use to estimate required capital funding, justify items already thought to need replacement, and identify high-priority ranked items for replacement. Incorporating prioritization criteria into an existing equipment database would be ideal. Some commercially available systems do have the basic elements of this. Maintaining replacement data can be labor-intensive regardless of the method used. There is usually little time to perform the tasks necessary for prioritizing equipment. However, where appropriate, a clinical engineering department might be able to conduct such an exercise as shown in the following case study.

  4. Family, welfare state generosity and the vulnerability of older adults : A cross-national study

    NARCIS (Netherlands)

    Moor, J.A.; de Graaf, P.M.; Komter, A.

    2013-01-01

    The availability of family can be considered a protective factor for aging well. In this article, we examine to what extent the family situation of older people creates vulnerability with respect to their quality of life. Because not everyone is vulnerable to the same degree, we try to identify the

  5. Identifying bird and reptile vulnerabilities to climate change in the southwestern United States

    Science.gov (United States)

    Hatten, James R.; Giermakowski, J. Tomasz; Holmes, Jennifer A.; Nowak, Erika M.; Johnson, Matthew J.; Ironside, Kirsten E.; van Riper, Charles; Peters, Michael; Truettner, Charles; Cole, Kenneth L.

    2016-07-06

    Current and future breeding ranges of 15 bird and 16 reptile species were modeled in the Southwestern United States. Rather than taking a broad-scale, vulnerability-assessment approach, we created a species distribution model (SDM) for each focal species incorporating climatic, landscape, and plant variables. Baseline climate (1940–2009) was characterized with Parameter-elevation Regressions on Independent Slopes Model (PRISM) data and future climate with global-circulation-model data under an A1B emission scenario. Climatic variables included monthly and seasonal temperature and precipitation; landscape variables included terrain ruggedness, soil type, and insolation; and plant variables included trees and shrubs commonly associated with a focal species. Not all species-distribution models contained a plant, but if they did, we included a built-in annual migration rate for more accurate plant-range projections in 2039 or 2099. We conducted a group meta-analysis to (1) determine how influential each variable class was when averaged across all species distribution models (birds or reptiles), and (2) identify the correlation among contemporary (2009) habitat fragmentation and biological attributes and future range projections (2039 or 2099). Projected changes in bird and reptile ranges varied widely among species, with one-third of the ranges predicted to expand and two-thirds predicted to contract. A group meta-analysis indicated that climatic variables were the most influential variable class when averaged across all models for both groups, followed by landscape and plant variables (birds), or plant and landscape variables (reptiles), respectively. The second part of the meta-analysis indicated that numerous contemporary habitat-fragmentation (for example, patch isolation) and biological-attribute (for example, clutch size, longevity) variables were significantly correlated with the magnitude of projected range changes for birds and reptiles. Patch isolation was

  6. Livelihood Vulnerability Approach to Assess Climate Change Impacts to Mixed Agro-Livestock Smallholders Around the Gandaki River Basin of Nepal

    Science.gov (United States)

    Panthi, J., Sr.

    2014-12-01

    Climate change vulnerability depends upon various factors and differs between places, sectors and communities. People in developing countries whose subsistence livelihood depends upon agriculture and livestock are identified as particularly vulnerable. Nepal, where the majority of people are in a mixed agro-livestock system, is identified as the world's fourth most vulnerable country to climate change. However, there are few studies on how vulnerable mixed agro-livestock smallholders are and how their vulnerability differs across different ecological regions. This study aims to test two vulnerability assessment indices, livelihood vulnerability index (LVI) and IPCC vulnerability index (VI-IPCC), around the Gandaki river basin of Nepal. A total of 543 households practicing mixed agro-livestock were surveyed from three districts (Dhading, Syangja and Kapilvastu) representing the mountain, mid-hill and lowland altitudinal belts respectively. Data on socio-demographics, livelihoods, social networks, health, food and water security, natural disasters and climate variability were collected. Both indices differed across the three districts, with mixed agro-livestock smallholders of Dhading district found to be the most vulnerable and that of Syangja least vulnerable. This vulnerability index approach may be used to monitor rural vulnerability and/or evaluate potential program/policy effectiveness in poor countries like Nepal. The present findings are intended to help in designing intervention strategies to reduce vulnerability of mixed agro-livestock smallholders and other rural people in developing countries to climate change.

  7. Interim Stabilization Equipment Essential and Support Drawing Plan

    International Nuclear Information System (INIS)

    HORNER, T.M.

    2000-01-01

    The purpose of this document is to list the Interim Stabilization equipment drawings that are classified as Essential or Support drawings. Essential Drawings are those drawings identified by the facility staff as necessary to directly support the safe operation of the facility or equipment. [CHG 2000a]. Support Drawings are those drawings identified by the facility staff that further describe the design details of structures, systems or components shown on essential drawings. [CHG 2000a

  8. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 2

    International Nuclear Information System (INIS)

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. To address the facility-specific and site-specific vulnerabilities, responsible DOE and site-contractor line organizations have developed initial site response plans. These plans, presented as Volume 2 of this Management Response Plan, describe the actions needed to mitigate or eliminate the facility- and site-specific vulnerabilities identified by the CSV Working Group field verification teams. Initial site response plans are described for: Brookhaven National Lab., Hanford Site, Idaho National Engineering Lab., Lawrence Livermore National Lab., Los Alamos National Lab., Oak Ridge Reservation, Rocky Flats Plant, Sandia National Laboratories, and Savannah River Site

  9. Examining elite Parasport athletes with sport involvement and sports equipment.

    Science.gov (United States)

    Hambrick, Marion E; Hums, Mary A; Bower, Glenna G; Wolff, Eli A

    2015-01-01

    Elite athletes require the most advanced sports equipment to maintain their competitive edge, but manufacturers cannot always satisfy these athletes' specific equipment needs. Sport involvement can influence sports-equipment selections and is described as the process by which individuals rely on attitudes and belief systems to make sports-related consumption decisions. This study involved semistructured interviews with 5 elite Parasport athletes to identify and analyze the role of sport involvement in their selection of sports equipment. The results revealed that the athletes identified product limitations, created a collaborative environment, and promoted a culture of innovation to develop new sports products and address existing limitations. Theoretical and practical implications are discussed.

  10. Systems analysis of apoptotic priming in ovarian cancer identifies vulnerabilities and predictors of drug response.

    Science.gov (United States)

    Zervantonakis, Ioannis K; Iavarone, Claudia; Chen, Hsing-Yu; Selfors, Laura M; Palakurthi, Sangeetha; Liu, Joyce F; Drapkin, Ronny; Matulonis, Ursula; Leverson, Joel D; Sampath, Deepak; Mills, Gordon B; Brugge, Joan S

    2017-08-28

    The lack of effective chemotherapies for high-grade serous ovarian cancers (HGS-OvCa) has motivated a search for alternative treatment strategies. Here, we present an unbiased systems-approach to interrogate a panel of 14 well-annotated HGS-OvCa patient-derived xenografts for sensitivity to PI3K and PI3K/mTOR inhibitors and uncover cell death vulnerabilities. Proteomic analysis reveals that PI3K/mTOR inhibition in HGS-OvCa patient-derived xenografts induces both pro-apoptotic and anti-apoptotic signaling responses that limit cell killing, but also primes cells for inhibitors of anti-apoptotic proteins. In-depth quantitative analysis of BCL-2 family proteins and other apoptotic regulators, together with computational modeling and selective anti-apoptotic protein inhibitors, uncovers new mechanistic details about apoptotic regulators that are predictive of drug sensitivity (BIM, caspase-3, BCL-X L ) and resistance (MCL-1, XIAP). Our systems-approach presents a strategy for systematic analysis of the mechanisms that limit effective tumor cell killing and the identification of apoptotic vulnerabilities to overcome drug resistance in ovarian and other cancers.High-grade serous ovarian cancers (HGS-OvCa) frequently develop chemotherapy resistance. Here, the authors through a systematic analysis of proteomic and drug response data of 14 HGS-OvCa PDXs demonstrate that targeting apoptosis regulators can improve response of these tumors to inhibitors of the PI3K/mTOR pathway.

  11. Equipment Operational Requirements

    Energy Technology Data Exchange (ETDEWEB)

    Greenwalt, B; Henderer, B; Hibbard, W; Mercer, M

    2009-06-11

    The Iraq Department of Border Enforcement is rich in personnel, but poor in equipment. An effective border control system must include detection, discrimination, decision, tracking and interdiction, capture, identification, and disposition. An equipment solution that addresses only a part of this will not succeed, likewise equipment by itself is not the answer without considering the personnel and how they would employ the equipment. The solution should take advantage of the existing in-place system and address all of the critical functions. The solutions are envisioned as being implemented in a phased manner, where Solution 1 is followed by Solution 2 and eventually by Solution 3. This allows adequate time for training and gaining operational experience for successively more complex equipment. Detailed descriptions of the components follow the solution descriptions. Solution 1 - This solution is based on changes to CONOPs, and does not have a technology component. It consists of observers at the forts and annexes, forward patrols along the swamp edge, in depth patrols approximately 10 kilometers inland from the swamp, and checkpoints on major roads. Solution 2 - This solution adds a ground sensor array to the Solution 1 system. Solution 3 - This solution is based around installing a radar/video camera system on each fort. It employs the CONOPS from Solution 1, but uses minimal ground sensors deployed only in areas with poor radar/video camera coverage (such as canals and streams shielded by vegetation), or by roads covered by radar but outside the range of the radar associated cameras. This document provides broad operational requirements for major equipment components along with sufficient operational details to allow the technical community to identify potential hardware candidates. Continuing analysis will develop quantities required and more detailed tactics, techniques, and procedures.

  12. Critical location identification and vulnerability analysis of interdependent infrastructure systems under spatially localized attacks

    International Nuclear Information System (INIS)

    Ouyang, Min

    2016-01-01

    Infrastructure systems are usually spatially distributed in a wide area and are subject to many types of hazards. For each type of hazards, modeling their direct impact on infrastructure components and analyzing their induced system-level vulnerability are important for identifying mitigation strategies. This paper mainly studies spatially localized attacks that a set of infrastructure components located within or crossing a circle shaped spatially localized area is subject to damage while other components do not directly fail. For this type of attacks, taking interdependent power and gas systems in Harris County, Texas, USA as an example, this paper proposes an approach to exactly identify critical locations in interdependent infrastructure systems and make pertinent vulnerability analysis. Results show that (a) infrastructure interdependencies and attack radius largely affect the position of critical locations; (b) spatially localized attacks cause less vulnerability than equivalent random failures; (c) in most values of attack radius critical locations identified by considering only node failures do not change when considering both node and edge failures in the attack area; (d) for many values of attack radius critical locations identified by topology-based model are also critical from the flow-based perspective. - Highlights: • We propose a method to identify critical locations in interdependent infrastructures. • Geographical interdependencies and attack radius largely affect critical locations. • Localized attacks cause less vulnerability than equivalent random failures. • Whether considering both node and edge failures affects critical locations. • Topology-based critical locations are also critical from flow-based perspective.

  13. Energy Efficiency of Technological Equipment at the Economic Agent by Identifying the Points with Recoverable Heat Potential

    Directory of Open Access Journals (Sweden)

    Arina Negoiţescu

    2017-11-01

    Full Text Available For an energy-efficient future, the EU needs to step up its efforts to maximize energy savings. In this context, the paper addresses the steps needed to establish energy efficiency measures and proposes effective measures to reduce consumption by recovering large amounts of energy lost to industrial consumers. The points with the highest recoverable energy potential have been identified and it is proposed to install the heat recovery systems on the flue gas exhaust circuits and polluted air from Industrial Technological Equipment (ITE such as dyeing/drying cabins (DDC. Therefore, whenever possible and as small as energy saving, energy recovery solutions at any level, but especially at local level, need to be applied. In conclusion, by concentrating all the energy-saving efforts that are still being wasted, Europe can contribute, by saving energy, to ensuring a sustainable energy future

  14. Vulnerability of the Nordic power system. Executive summary

    International Nuclear Information System (INIS)

    Doorman, Gerard; Kjoeelle, Gerd; Uhlen, Kjetil; Huse, Einar Staale; Flataboe, Nils

    2004-05-01

    The objective of the analysis is to identify the vulnerability of the Nordic power system, identify barriers to reduce vulnerability in a Nordic context and to propose possible actions. The study focuses on vulnerability with respect to energy shortage, capacity shortage and power system failures. Vulnerability is defined with respect to the unwanted situations ''High prices'', ''Curtailment'' and ''Blackouts''. The main tool of the study is risk analysis, where risk is a result of the probability of an event and its consequences. With respect to energy shortage, the system is in a medium risk state. For the present system the probability of a situation like the 2002/03 winter or considerably worse is once every ten years. Under the assumption that power production increases with increasing demand, the situation will be similar towards 2010. In the opposite case, the risk of extremely high prices increases. With respect to capacity shortage, the system is in a low risk state. This is partly due to actions already taken by the TSOs. The risk state will slightly deteriorate towards 2010. With respect to blackouts, the system is in a medium risk state. This is due to the fact that large blackouts in Southern Scandinavia cannot be completely ruled out. Such blackouts involve many consumers resulting in major or potentially even critical consequences. However this is not different from the situation before deregulation. There are no indications that the situation will become worse towards 2010, but there is uncertainty with regard to the effect of changed maintenance routines. Reductions in qualified technical personnel also gives reason for concern. The study identifies significant differences between the Nordic countries with respect to the framework for transmission system investment, system balancing, rules and price setting in the case of curtailment, congestion management and the handling of import and export. Recommended actions include reduction of regulatory

  15. Mobile Phones and Psychosocial Therapies with Vulnerable People: a First State of the Art.

    Science.gov (United States)

    Vázquez, Maria Yolanda García; Sexto, Carlos Ferrás; Rocha, Álvaro; Aguilera, Adrián

    2016-06-01

    Mobile phones are becoming a communication tool commonly used by people all over the world; and they are started to be adopted in psychosocial therapies involving vulnerable people. We are herein presenting the results of an academic literature review. We identified scientific papers published between 2006 and 2015 resorting to academic databases available on the Internet, applying a systematic selection method based on quality criteria. Secondly, we analysed contents, highlighting the scarcity of research involving vulnerable people. The available literature specialized in psychosocial therapies offers investigation results which involve mobile phones and patients in general, focusing particularly on the clinical psychology field and, to a lesser extent, on the social work field. Particularly significant are the investigation works developed in the United States. In the present paper we introduce a first "state of the art", identifying opportunities and also the limitations surrounding the use of mobile phones in psychosocial therapies targeting the vulnerable. Issues concerning privacy and data confidentiality, and the access of vulnerable people to mobile phones and how they use them, pose significant challenges; but they offer the opportunity to reach isolated or impoverished populations, or even to facilitate access to social and healthcare services. We close this paper formulating possible orientations, hypotheses and goals to design new investigation works involving vulnerable populations.

  16. Finding behavioral and network indicators of brain vulnerability

    Directory of Open Access Journals (Sweden)

    Nava eLevit Binnun

    2012-02-01

    Full Text Available Resilience research has usually focused on identifying protective factors associated with specific stress conditions (e.g., war, trauma or psychopathologies (e.g., post-traumatic stress disorder. Implicit in this research is the concept that resilience is a global construct, invariant to the unfavorable circumstances or the psychopathologies that may develop (i.e., the mechanisms underlying the resilience of an individual in all cases are expected to be similar. Here we contribute to the understanding of resilience—and its counterpart, vulnerability—by employing an approach that makes use of this invariant quality. We outline two main characteristics that we would expect from indicators of a vulnerable state: that they should appear across disorders regardless of specific circumstances, and that they should appear much before the disorder is evident. Next, we identify two sets of factors that exhibit this pattern of association with psychopathological states. The first was a set of low-level sensory, motor and regulatory irregularities that have been reported across the clinical literature; we suggest that these can serve as behavioral indicators of a vulnerable state. The second was the set of aberrations in network metrics that have been reported in the field of systems neuroscience; we suggest that these can serve as network indicators of a vulnerable state. Finally, we explore how behavioral indicators may be related to network indicators and discuss the clinical and research-related implications of our work.

  17. Methamphetamine use and dependence in vulnerable female populations.

    Science.gov (United States)

    Kittirattanapaiboon, Phunnapa; Srikosai, Soontaree; Wittayanookulluk, Apisak

    2017-07-01

    The study reviews recent publications on methamphetamine use and dependence women in term of their epidemic, physical health impact, psychosocial impacts, and also in the identified vulnerable issues. Studies of vulnerable populations of women are wide ranging and include sex workers, sexual minorities, homeless, psychiatric patients, suburban women, and pregnant women, in which amphetamine type stimulants (ATSs) are the most commonly reported illicit drug used among them. The prenatal exposure of ATS demonstrated the small for gestational age and low birth weight; however, more research is needed on long-term studies of methamphetamine-exposed children. Intimate partner violence (IPV) is commonly reported by female methamphetamine users as perpetrators and victims. However, statistics and gendered power dynamics suggest that methamphetamine-related IPV indicates a higher chance of femicide. Methamphetamine-abusing women often have unresolved childhood trauma and are introduced to ATS through families or partners. Vulnerable populations of women at risk of methamphetamine abuse and dependence. Impacts on their physical and mental health, IPV, and pregnancy have been reported continuing, which guide that empowering and holistic substance abuse are necessary for specific group.

  18. Transportation System Vulnerability and Resilience to Extreme Weather Events and Other Natural Hazards : Final Results of Vulnerability Assessment of National Highway System for All KYTC Districts

    Science.gov (United States)

    2018-05-01

    Recent federal legislation and the Federal Highway Administration (FHWA) have directed state transportation agencies to identify potential vulnerabilities associated with extreme weather events and climate change, develop a risk-based asset managemen...

  19. Summarizing components of U.S. Department of the Interior vulnerability assessments to focus climate adaptation planning

    Science.gov (United States)

    Thompson, Laura M.; Staudinger, Michelle D.; Carter, Shawn L.

    2015-09-29

    A secretarial order identified climate adaptation as a critical performance objective for future management of U.S. Department of the Interior (DOI) lands and resources in response to global change. Vulnerability assessments can inform climate adaptation planning by providing insight into what natural resources are most at risk and why. Three components of vulnerability—exposure, sensitivity, and adaptive capacity—were defined by the Intergovernmental Panel on Climate Change (IPCC) as necessary for identifying climate adaptation strategies and actions. In 2011, the DOI requested all internal bureaus report ongoing or completed vulnerability assessments about a defined range of assessment targets or climate-related threats. Assessment targets were defined as freshwater resources, landscapes and wildlife habitat, native and cultural resources, and ocean health. Climate-related threats were defined as invasive species, wildfire risk, sea-level rise, and melting ice and permafrost. Four hundred and three projects were reported, but the original DOI survey did not specify that information be provided on exposure, sensitivity, and adaptive capacity collectively as part of the request, and it was unclear which projects adhered to the framework recommended by the IPCC. Therefore, the U.S. Geological Survey National Climate Change and Wildlife Science Center conducted a supplemental survey to determine how frequently each of the three vulnerability components was assessed. Information was categorized for 124 of the 403 reported projects (30.8 percent) based on the three vulnerability components, and it was discovered that exposure was the most common component assessed (87.9 percent), followed by sensitivity (68.5 percent) and adaptive capacity (33.1 percent). The majority of projects did not fully assess vulnerability; projects focused on landscapes/wildlife habitats and sea-level rise were among the minority that simultaneously addressed all three vulnerability

  20. Energy vulnerability relationships

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  1. Construction of an integrated social vulnerability index in urban areas prone to flash flooding

    Science.gov (United States)

    Aroca-Jimenez, Estefania; Bodoque, Jose Maria; Garcia, Juan Antonio; Diez-Herrero, Andres

    2017-09-01

    Among the natural hazards, flash flooding is the leading cause of weather-related deaths. Flood risk management (FRM) in this context requires a comprehensive assessment of the social risk component. In this regard, integrated social vulnerability (ISV) can incorporate spatial distribution and contribution and the combined effect of exposure, sensitivity and resilience to total vulnerability, although these components are often disregarded. ISV is defined by the demographic and socio-economic characteristics that condition a population's capacity to cope with, resist and recover from risk and can be expressed as the integrated social vulnerability index (ISVI). This study describes a methodological approach towards constructing the ISVI in urban areas prone to flash flooding in Castilla y León (Castile and León, northern central Spain, 94 223 km2, 2 478 376 inhabitants). A hierarchical segmentation analysis (HSA) was performed prior to the principal components analysis (PCA), which helped to overcome the sample size limitation inherent in PCA. ISVI was obtained from weighting vulnerability factors based on the tolerance statistic. In addition, latent class cluster analysis (LCCA) was carried out to identify spatial patterns of vulnerability within the study area. Our results show that the ISVI has high spatial variability. Moreover, the source of vulnerability in each urban area cluster can be identified from LCCA. These findings make it possible to design tailor-made strategies for FRM, thereby increasing the efficiency of plans and policies and helping to reduce the cost of mitigation measures.

  2. Lessons from Red Data Books: Plant Vulnerability Increases with Floral Complexity.

    Science.gov (United States)

    Stefanaki, Anastasia; Kantsa, Aphrodite; Tscheulin, Thomas; Charitonidou, Martha; Petanidou, Theodora

    2015-01-01

    The architectural complexity of flower structures (hereafter referred to as floral complexity) may be linked to pollination by specialized pollinators that can increase the probability of successful seed set. As plant-pollinator systems become fragile, a loss of such specialized pollinators could presumably result in an increased likelihood of pollination failure. This is an issue likely to be particularly evident in plants that are currently rare. Using a novel index describing floral complexity we explored whether this aspect of the structure of flowers could be used to predict vulnerability of plant species to extinction. To do this we defined plant vulnerability using the Red Data Book of Rare and Threatened Plants of Greece, a Mediterranean biodiversity hotspot. We also tested whether other intrinsic (e.g. life form, asexual reproduction) or extrinsic (e.g. habitat, altitude, range-restrictedness) factors could affect plant vulnerability. We found that plants with high floral complexity scores were significantly more likely to be vulnerable to extinction. Among all the floral complexity components only floral symmetry was found to have a significant effect, with radial-flower plants appearing to be less vulnerable. Life form was also a predictor of vulnerability, with woody perennial plants having significantly lower risk of extinction. Among the extrinsic factors, both habitat and maximum range were significantly associated with plant vulnerability (coastal plants and narrow-ranged plants are more likely to face higher risk). Although extrinsic and in particular anthropogenic factors determine plant extinction risk, intrinsic traits can indicate a plant's proneness to vulnerability. This raises the potential threat of declining global pollinator diversity interacting with floral complexity to increase the vulnerability of individual plant species. There is potential scope for using plant-pollinator specializations to identify plant species particularly at

  3. Modelling the elements of country vulnerability to earthquake disasters.

    Science.gov (United States)

    Asef, M R

    2008-09-01

    Earthquakes have probably been the most deadly form of natural disaster in the past century. Diversity of earthquake specifications in terms of magnitude, intensity and frequency at the semicontinental scale has initiated various kinds of disasters at a regional scale. Additionally, diverse characteristics of countries in terms of population size, disaster preparedness, economic strength and building construction development often causes an earthquake of a certain characteristic to have different impacts on the affected region. This research focuses on the appropriate criteria for identifying the severity of major earthquake disasters based on some key observed symptoms. Accordingly, the article presents a methodology for identification and relative quantification of severity of earthquake disasters. This has led to an earthquake disaster vulnerability model at the country scale. Data analysis based on this model suggested a quantitative, comparative and meaningful interpretation of the vulnerability of concerned countries, and successfully explained which countries are more vulnerable to major disasters.

  4. Chemical Plants Remain Vulnerable to Terrorists: A Call to Action

    Science.gov (United States)

    Lippin, Tobi Mae; McQuiston, Thomas H.; Bradley-Bull, Kristin; Burns-Johnson, Toshiba; Cook, Linda; Gill, Michael L.; Howard, Donna; Seymour, Thomas A.; Stephens, Doug; Williams, Brian K.

    2006-01-01

    U.S. chemical plants currently have potentially catastrophic vulnerabilities as terrorist targets. The possible consequences of these vulnerabilities echo from the tragedies of the Bhopal incident in 1984 to the terrorist attacks on 11 September 2001 and, most recently, Hurricanes Katrina and Rita. Findings from a 2004 nationwide participatory research study of 125 local union leaders at sites with very large volumes of highly hazardous chemicals suggest that voluntary efforts to achieve chemical plant security are not succeeding. Study respondents reported that companies had only infrequently taken actions that are most effective in preventing or in preparing to respond to a terrorist threat. In addition, companies reportedly often failed to involve key stakeholders, including workers, local unions, and the surrounding communities, in these efforts. The environmental health community thus has an opportunity to play a key role in advocating for and supporting improvements in prevention of and preparation for terrorist attacks. Policy-level recommendations to redress chemical site vulnerabilities and the related ongoing threats to the nation’s security are as follows: a) specify detailed requirements for chemical site assessment and security; b) mandate audit inspections supported by significant penalties for cases of noncompliance; c) require progress toward achieving inherently safer processes, including the minimizing of storage of highly hazardous chemicals; d) examine and require additional effective actions in prevention, emergency preparedness, and response and remediation; e) mandate and fund the upgrading of emergency communication systems; and f) involve workers and community members in plan creation and equip and prepare them to prevent and respond effectively to an incident. PMID:16966080

  5. Memory Vulnerability Diagnosis for Binary Program

    Directory of Open Access Journals (Sweden)

    Tang Feng-Yi

    2016-01-01

    Full Text Available Vulnerability diagnosis is important for program security analysis. It is a further step to understand the vulnerability after it is detected, as well as a preparatory step for vulnerability repair or exploitation. This paper mainly analyses the inner theories of major memory vulnerabilities and the threats of them. And then suggests some methods to diagnose several types of memory vulnerabilities for the binary programs, which is a difficult task due to the lack of source code. The diagnosis methods target at buffer overflow, use after free (UAF and format string vulnerabilities. We carried out some tests on the Linux platform to validate the effectiveness of the diagnosis methods. It is proved that the methods can judge the type of the vulnerability given a binary program.

  6. Territorial Vulnerability Assessment Supporting Risk Managing Coastal Areas Due to Tsunami Impact

    Directory of Open Access Journals (Sweden)

    José Leandro Barros

    2015-09-01

    Full Text Available Portugal’s coastline extends 1187 km. It is characterized by social, economic and physical conditions that differentiate it from the rest of the territory, including population density, location of infrastructure and support of tourism activities. Therefore, it has a significant exposure if a tsunami occurs. Six coastal study sites with varying characteristics were selected for evaluation in this paper, including two core beach-use areas, two residential areas and two industrial areas. These sites are located in the municipalities of Figueira da Foz, Setúbal and Vila do Bispo. The analysis began with the calculation of the potential tsunami inundation area for each site using the 1755 Lisbon tsunami. Next, a methodology distinguished by its multidimensional character was applied to assess local vulnerability to tsunamis. This methodology assesses vulnerabilities associated with morphological, structural, social and tax factors. These four vulnerability components were combined to obtain a Composite Vulnerability Index (CVI, which enabled us to identify the most vulnerable areas and to determine the distinguishing characteristics of each area.

  7. Development of fragility descriptions of equipment for seismic risk assessment of nuclear power plants

    International Nuclear Information System (INIS)

    Hardy, G.S.; Campbell, R.D.

    1983-01-01

    Probabilistic risk assessment (PRA) of a nuclear power plant for postulated hazard requires the development of fragility relationships for the plants' safety related equipment. The objective of this paper is to present some general results and conclusions concerning the development of these seismic fragility levels. Participation in fragility-related research and experience gained from the completion of several PRA studies of a variety of nuclear power plants have provided much insight as to the most vulnerable equipment and the most efficient use of resources for development of fragilities. Plants studied had seismic design bases ranging from very simple equivalent static analysis for some of the earlier plants to state-of-the-art complex multimode dyanamic analyses for plants currently under construction. Increased sophistication and rigor in seismic qualification of equipment has resulted for the most part in increased seismic resistance. The majority of equipment has been found, however, to possess more than adequate resistance to seismic loading regardless of the degree of sophistication utilized in design as long as seismic loading was included in the design process. This paper presents conclusions of the authors as to which items of equipment typically require an individual ''plant-specific'' fragility analysis and which can be treated in a generic fashion. In addition, general conclusions on the relative seismic capacity levels and most frequent failure modes are summarized for generic equipment groups

  8. Chemical Safety Vulnerability Working Group report. Volume 2

    International Nuclear Information System (INIS)

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site

  9. Chemical Safety Vulnerability Working Group report. Volume 2

    Energy Technology Data Exchange (ETDEWEB)

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  10. Automated Detection of Client-State Manipulation Vulnerabilities

    DEFF Research Database (Denmark)

    Møller, Anders; Schwarz, Mathias

    2012-01-01

    automated tools that can assist the programmers in the application development process by detecting weaknesses. Many vulnerabilities are related to web application code that stores references to application state in the generated HTML documents to work around the statelessness of the HTTP protocol....... In this paper, we show that such client-state manipulation vulnerabilities are amenable to tool supported detection. We present a static analysis for the widely used frameworks Java Servlets, JSP, and Struts. Given a web application archive as input, the analysis identifies occurrences of client state...... and infers the information flow between the client state and the shared application state on the server. This makes it possible to check how client-state manipulation performed by malicious users may affect the shared application state and cause leakage or modifications of sensitive information. The warnings...

  11. Agricultural vulnerability to climate change in Sokoto State, Nigeria ...

    African Journals Online (AJOL)

    Although climate change is global threat, developing countries have been identified as most vulnerable owing to their low adaptive capacities. In Nigeria, while the impacts of climate cut across diverse sectors, agriculture remains the most susceptible due to the predominance of rainfed agriculture. This paper examines ...

  12. Inventory of Tank Farm equipment stored or abandoned aboveground

    International Nuclear Information System (INIS)

    Hines, S.C.; Lakes, M.E.

    1994-01-01

    This document provides an inventory of Tank Farm equipment stored or abandoned aboveground and potentially subject to regulation. This inventory was conducted in part to ensure that Westinghouse Hanford Company (WHC) does not violate dangerous waste laws concerning storage of potentially contaminated equipment/debris that has been in contact with dangerous waste. The report identifies areas inventoried and provides photographs of equipment

  13. On the Science-Policy Bridge: Do Spatial Heat Vulnerability Assessment Studies Influence Policy?

    Directory of Open Access Journals (Sweden)

    Tanja Wolf

    2015-10-01

    Full Text Available Human vulnerability to heat varies at a range of spatial scales, especially within cities where there can be noticeable intra-urban differences in heat risk factors. Mapping and visualizing intra-urban heat vulnerability offers opportunities for presenting information to support decision-making. For example the visualization of the spatial variation of heat vulnerability has the potential to enable local governments to identify hot spots of vulnerability and allocate resources and increase assistance to people in areas of greatest need. Recently there has been a proliferation of heat vulnerability mapping studies, all of which, to varying degrees, justify the process of vulnerability mapping in a policy context. However, to date, there has not been a systematic review of the extent to which the results of vulnerability mapping studies have been applied in decision-making. Accordingly we undertook a comprehensive review of 37 recently published papers that use geospatial techniques for assessing human vulnerability to heat. In addition, we conducted an anonymous survey of the lead authors of the 37 papers in order to establish the level of interaction between the researchers as science information producers and local authorities as information users. Both paper review and author survey results show that heat vulnerability mapping has been used in an attempt to communicate policy recommendations, raise awareness and induce institutional networking and learning, but has not as yet had a substantive influence on policymaking or preventive action.

  14. On the Science-Policy Bridge: Do Spatial Heat Vulnerability Assessment Studies Influence Policy?

    Science.gov (United States)

    Wolf, Tanja; Chuang, Wen-Ching; McGregor, Glenn

    2015-10-23

    Human vulnerability to heat varies at a range of spatial scales, especially within cities where there can be noticeable intra-urban differences in heat risk factors. Mapping and visualizing intra-urban heat vulnerability offers opportunities for presenting information to support decision-making. For example the visualization of the spatial variation of heat vulnerability has the potential to enable local governments to identify hot spots of vulnerability and allocate resources and increase assistance to people in areas of greatest need. Recently there has been a proliferation of heat vulnerability mapping studies, all of which, to varying degrees, justify the process of vulnerability mapping in a policy context. However, to date, there has not been a systematic review of the extent to which the results of vulnerability mapping studies have been applied in decision-making. Accordingly we undertook a comprehensive review of 37 recently published papers that use geospatial techniques for assessing human vulnerability to heat. In addition, we conducted an anonymous survey of the lead authors of the 37 papers in order to establish the level of interaction between the researchers as science information producers and local authorities as information users. Both paper review and author survey results show that heat vulnerability mapping has been used in an attempt to communicate policy recommendations, raise awareness and induce institutional networking and learning, but has not as yet had a substantive influence on policymaking or preventive action.

  15. Progress on EPRI electrical equipment qualification research

    International Nuclear Information System (INIS)

    Sliter, G.E.

    1983-01-01

    The objective of EPRI's electrical equipment qualification research program is to provide technical assistance to utilities in meeting nuclear plant safety requirements in a manner consistent with the state of the art. This paper reports progress on several research projects including: radiation effects studies, which compile data on degradation of organic materials in electrical equipment exposed to operational and accident radiation doses; the Equipment Qualification Data Bank, which is a remotely accessible computer system for disseminating qualification information on in-plant equipment, seismic data, and materials data; an aging/seismic correlation program, which is providing test data showing that, in many cases, age degradation has a negligibly small effect on the performance of electrical components under seismic excitation; a review of condition monitoring techniques, which has identified surveillance methods for measuring key performance parameters that have the potential for predicting remaining equipment life; and large-scale hydrogen burn equipment response tests, which are providing data to assess the ability of equipment to remain functional during and after hydrogen burning in postulated degraded core accidents

  16. Is your dam vulnerable to climate change? Using the PIEVC engineering protocol

    International Nuclear Information System (INIS)

    Bourgeois, Gilles; Dickson, Stewart; Ness, Ryan; Lapp, David

    2010-01-01

    The potential impacts of climate change on public infrastructure are currently studied to advance planning and prioritization of adaption strategies. This paper investigated the potential vulnerability of the Claireville and G. Ross Lord dams and reservoirs by considering the projected character, its magnitude and its rate of change in future local climatic conditions, the sensitivity of infrastructure to the changes, and the built-in capacity of the infrastructure to absorb any net negative consequence from the predicted changes in climatic conditions. This study used the public infrastructure engineering vulnerability (PIEV) engineering protocol to study the vulnerabilities of both facilities to current climate, as well as future climate change at the 2050 time horizon. Recommendations were provided for actions to be taken to address the potential vulnerabilities that were identified. The project determined that the two dams have the capacity to withstand the existing and projected future climate.

  17. Post discharge issues identified by a call-back program: identifying improvement opportunities.

    Science.gov (United States)

    Ojeda, Patricia I; Kara, Areeba

    2017-12-01

    The period following discharge from the hospital is one of heightened vulnerability. Discharge instructions serve as a guide during this transition. Yet, clinicians receive little feedback on the quality of this document that ties into the patients' experience. We reviewed the issues voiced by discharged patients via a call-back program and compared them to the discharge instructions they had received. At our institution, patients receive an automated call forty-eight hours following discharge inquiring about progress. If indicated by the response to the call, they are directed to a nurse who assists with problem solving. We reviewed the nursing documentation of these encounters for a period of nine months. The issues voiced were grouped into five categories: communication, medications, durable medical equipment/therapies, follow up and new or ongoing symptoms. The discharge instructions given to each patient were reviewed. We retrieved data on the number of discharges from each specialty from the hospital over the same period. A total of 592 patients voiced 685 issues. The numbers of patients discharged from medical or surgical services identified as having issues via the call-back line paralleled the proportions discharged from medical and surgical services from the hospital during the same period. Nearly a quarter of the issues discussed had been addressed in the discharge instructions. The most common category of issues was related to communication deficits including missing or incomplete information which made it difficult for the patient to enact or understand the plan of care. Medication prescription related issues were the next most common. Resource barriers and questions surrounding medications were often unaddressed. Post discharge issues affect patients discharged from all services equally. Data from call back programs may provide actionable targets for improvement, identify the inpatient team's 'blind spots' and be used to provide feedback to clinicians.

  18. The politics of vulnerability and resilience

    Directory of Open Access Journals (Sweden)

    Georg Frerks

    2011-12-01

    Full Text Available Much conceptual confusion exists over the concepts of vulnerability and (social resilience, reinforced by the different paradigms (the article identifies four and disciplinary traditions underlying their use. While since the 1980s the social construction of "vulnerability" as a driver for disaster received considerable attention, in recent years we have seen increased attention to people's capacities and resilience. The currently popular "complexity" approach to risk moreover appears to offer ways of breaking through entrenched vulnerabilities. Resilience however is also a political project which, we argue, also has its dark, conservative overtones and overlooks structural sources of vulnerability that continue to affect hazard-prone actors. We may therefore need to conceive resilience as the potential for social transformation after disaster.Existe muita confusão conceitual em torno dos conceitos de vulnerabilidade e resiliência (social, reforçada pela diferença de paradigmas (este artigo identifica quarto e tradições disciplinares subjacentes à sua utilização. Enquanto desde os anos 80 a construção social de "vulnerabilidade" como condutor para desastres recebeu atenção considerável, nos últimos anos temos visto maior atenção às capacidades e resiliência das pessoas. Atualmente popular, a abordagem da "complexidade" do risco, além disso, parece oferecer maneiras transformadoras através das vulnerabilidades enraizadas. No entanto, defendemos que a resiliência é um projeto político que também tem seus sombrios sobretons conservadores e omite fontes estruturais de vulnerabilidade que continuam a afetar os atores propensos ao risco. Podemos, portanto, precisar conceber a resiliência como potencial para transformação social depois de desastres.

  19. Fuzzing and Vulnerabilities Search

    OpenAIRE

    Stanislav Evgenyevich Kirillov; Nikolai Petrovich Lavrentiev

    2013-01-01

    Fuzzing for vulnerabilities can be very effective if we know the input data format. This work contains description of network message format recovery algorithm and the usage of restored data model in fuzzing and vulnerabilities search.

  20. Does Aquaculture Support the Needs of Nutritionally Vulnerable Nations?

    Directory of Open Access Journals (Sweden)

    Christopher D. Golden

    2017-05-01

    Full Text Available Aquaculture now supplies half of the fish consumed directly by humans. We evaluate whether aquaculture, given current patterns of production and distribution, supports the needs of poor and food-insecure populations throughout the world. We begin by identifying 41 seafood-reliant nutritionally vulnerable nations (NVNs, and ask whether aquaculture meets human nutritional demand directly via domestic production or trade, or indirectly via purchase of nutritionally rich dietary substitutes. We find that a limited number of NVNs have domestically farmed seafood, and of those, only specific aquaculture approaches (e.g., freshwater in some locations have the potential to benefit nutritionally vulnerable populations. While assessment of aquaculture's direct contribution via trade is constrained by data limitations, we find that it is unlikely to contribute substantially to human nutrition in vulnerable groups, as most exported aquaculture consists of high-value species for international markets. We also determine that subpopulations who benefit from aquaculture profits are likely not the same subpopulations who are nutritionally vulnerable, and more research is needed to understand the impacts of aquaculture income gains. Finally, we discuss the relationship of aquaculture to existing trends in capture fisheries in NVNs, and suggest strategies to create lasting solutions to nutritional security, without exacerbating existing challenges in access to food and land resources.

  1. Aren't we all vulnerable: why do vulnerability analysis?

    Energy Technology Data Exchange (ETDEWEB)

    Moench, Marcus

    2011-11-15

    The idea of 'vulnerability' is widely-used shorthand for the disproportionate impacts that climate change will have on high-risk groups and fragile ecosystems. Decision makers increasingly want to target adaptation funding to those people and environments most affected by climate change. They must also be able to monitor the effectiveness of their investments. Vulnerability analysis is sometimes presented as the solution to these wants and needs — but existing approaches are often of little use: at best, they reiterate what we already know; at worst, they are used to justify entrenched agendas. To be truly useful as a basis for dialogue, action and accountability, the meaning of 'vulnerability' must be clarified and the methods for analysing it greatly strengthened. This means establishing standard, replicable approaches that differentiate between the roles and exposure of stakeholders, systems and institutions.

  2. Brain development in rodents and humans: Identifying benchmarks of maturation and vulnerability to injury across species

    Science.gov (United States)

    Semple, Bridgette D.; Blomgren, Klas; Gimlin, Kayleen; Ferriero, Donna M.; Noble-Haeusslein, Linda J.

    2013-01-01

    Hypoxic-ischemic and traumatic brain injuries are leading causes of long-term mortality and disability in infants and children. Although several preclinical models using rodents of different ages have been developed, species differences in the timing of key brain maturation events can render comparisons of vulnerability and regenerative capacities difficult to interpret. Traditional models of developmental brain injury have utilized rodents at postnatal day 7–10 as being roughly equivalent to a term human infant, based historically on the measurement of post-mortem brain weights during the 1970s. Here we will examine fundamental brain development processes that occur in both rodents and humans, to delineate a comparable time course of postnatal brain development across species. We consider the timing of neurogenesis, synaptogenesis, gliogenesis, oligodendrocyte maturation and age-dependent behaviors that coincide with developmentally regulated molecular and biochemical changes. In general, while the time scale is considerably different, the sequence of key events in brain maturation is largely consistent between humans and rodents. Further, there are distinct parallels in regional vulnerability as well as functional consequences in response to brain injuries. With a focus on developmental hypoxicischemic encephalopathy and traumatic brain injury, this review offers guidelines for researchers when considering the most appropriate rodent age for the developmental stage or process of interest to approximate human brain development. PMID:23583307

  3. Integrated assessment on the vulnerability of animal husbandry to snow disasters under climate change in the Qinghai-Tibetan Plateau

    Science.gov (United States)

    Wei, Yanqiang; Wang, Shijin; Fang, Yiping; Nawaz, Zain

    2017-10-01

    Animal husbandry is a dominant and traditional source of livelihood and income in the Qinghai-Tibetan Plateau. The Qinghai-Tibetan Plateau is the third largest snow covered area in China and is one of the main snow disaster regions in the world. It is thus imperative to urgently address the issue of vulnerability of the animal husbandry sector to snow disasters for disaster mitigation and adaptation under growing risk of these disasters as a result of future climate change. However, there is very few literature reported on the vulnerability of animal husbandry in the Qinghai-Tibetan Plateau. This assessment aims at identifying vulnerability of animal husbandry at spatial scale and to identify the reasons for vulnerability for adaptive planning and disaster mitigation. First, historical snow disaster characteristics have been analyzed and used for the spatial weight for vulnerability assessment. Second, indicator-based vulnerability assessment model and indicator system have been established. We combined risk of snow hazard, sensitivity of livestock to disaster, physical exposure to disaster, and community capacity to adapt to snow disaster in an integrated vulnerability index. Lastly, vulnerability of animal husbandry to snow disaster on the Qinghai-Tibetan Plateau has been evaluated. Results indicate that high vulnerabilities are mainly concentrated in the eastern and central plateau and that vulnerability decreases gradually from the east to the west. Due to global warming, the vulnerability trend has eased to some extent during the last few decades. High livestock density exposure to blizzard-prone regions and shortages of livestock barn and forage are the main reasons of high vulnerability. The conclusion emphasizes the important role of the local government and community to help local pastoralists for reducing vulnerability to snow disaster and frozen hazard. The approaches presented in this paper can be used for snow disaster mitigation, resilience

  4. Vulnerability in the power network - a pre study

    International Nuclear Information System (INIS)

    Kjoelle, Gerd H.; Uhlen, Kjetil; Rolfseng, Lars; Stene, Birger

    2006-02-01

    Vulnerability in the power distribution network has been made a current topic because of various factors, from terror attacks to a strained power balance, large breakdowns in the power system in Europe and North America in recent time and an anticipated increase in climate-related challenges in the coming years; all related to the modern society's critical dependence on reliable power supply. Several questions are posed; whether there is a foundation to say that the vulnerability in the power network is increasing because of factors like cuts in staffing, reduced investments and increased exploitation of the capacity in the power systems, or increased average age on the air network. Different development features can indicate that the power network's ability to resist high stress is about to weaken. Examples of this is the slowly increasing trend in the number of non-reported interruptions, as well as an increase in the error frequency for power lines in the distribution network and for distribution transformers. In the pre-study there has not been found enough evidence to give a clear answer to whether the vulnerability in the power network is in fact on the rise. This is mainly due to the lack of good indicators, measuring methods and the foundation for documentation. Suggestions for methodology in order to identify unwanted incidents, estimate the probability and classify consequences for vulnerability analyses of power networks are presented. The methodology is concretised and exemplified in relation to a specific case: Power loss in the southern Norway affecting more than 250 000 people for 8-12 hours. Such a consequence is classified as critical. For four sub areas it has been exemplified which incidents may potentially cause such breaks. A summary is made of the most important challenges related to making vulnerability analyses of power networks. Comprised here are appropriate concepts, definitions, standards and measuring scales as well as data foundation

  5. Putting the puzzle together: Reducing vulnerability through people-focused planning

    International Nuclear Information System (INIS)

    Hutton, D.

    2009-01-01

    Supporting and integrating vulnerable persons into emergency management has emerged as an increasing priority in emergency management in Canada. Events such as the 2003 European heat wave and Hurricane Katrina have shown that disasters almost always have the harshest affects on the frail elderly, people with disabilities, the disadvantaged and the least able. While it is neither possible-nor the role of emergency management-to eliminate or reduce many factors that make people vulnerable to hazards, it is important that emergency managers work closely with communities to not only identify risks and vulnerabilities, but also to build on the resources and capacities that enable people to effectively prepare for, respond to and recover from threats of all types. To this end, emergency management must take into account the level of capacities and resources that a community has to prepare for emergencies and disasters, in addition to people's vulnerabilities to extreme events. To be successful, people must be viewed not as a part of the problem to be solved or managed during an emergency, but rather a part of the solution to building more resilient and disaster-resistant societies. This requires 'people-focused' planning methodologies that move beyond planning for to planning with all segments of society, including the most vulnerable and marginalised groups that are more readily overlooked. This not only begins to ensure that emergency planning and response capacities can effectively address the diverse needs of all people, but is also an important step to empowering the most vulnerable to prepare themselves for emergencies and other critical events. (authors)

  6. Spatial Modelling of Urban Physical Vulnerability to Explosion Hazards Using GIS and Fuzzy MCDA

    Directory of Open Access Journals (Sweden)

    Yasser Ebrahimian Ghajari

    2017-07-01

    Full Text Available Most of the world’s population is concentrated in accumulated spaces in the form of cities, making the concept of urban planning a significant issue for consideration by decision makers. Urban vulnerability is a major issue which arises in urban management, and is simply defined as how vulnerable various structures in a city are to different hazards. Reducing urban vulnerability and enhancing resilience are considered to be essential steps towards achieving urban sustainability. To date, a vast body of literature has focused on investigating urban systems’ vulnerabilities with regard to natural hazards. However, less attention has been paid to vulnerabilities resulting from man-made hazards. This study proposes to investigate the physical vulnerability of buildings in District 6 of Tehran, Iran, with respect to intentional explosion hazards. A total of 14 vulnerability criteria are identified according to the opinions of various experts, and standard maps for each of these criteria have been generated in a GIS environment. Ultimately, an ordered weighted averaging (OWA technique was applied to generate vulnerability maps for different risk conditions. The results of the present study indicate that only about 25 percent of buildings in the study area have a low level of vulnerability under moderate risk conditions. Sensitivity analysis further illustrates the robustness of the results obtained. Finally, the paper concludes by arguing that local authorities must focus more on risk-reduction techniques in order to reduce physical vulnerability and achieve urban sustainability.

  7. Urban vulnerability and climate change in Africa a multidisciplinary approach

    CERN Document Server

    Coly, Adrien; Fohlmeister, Sandra; Gasparini, Paolo; Jørgensen, Gertrud; Kabisch, Sigrun; Kombe, Wilbard; Lindley, Sarah; Simonis, Ingo; Yeshitela, Kumelachew

    2015-01-01

    The book presents results of CLUVA (CLimate Change and Urban Vulnerability in Africa), a large European Commission funded research project (2010-2013). The project aimed to develop a better understanding of the risks and impacts of climate change related hazards to African cities, assess their vulnerability to these risks, and identify innovative strategies for planning and governance to increase their resilience. For the first time, a systematic and groundbreaking study of this kind was applied in an inter- and trans-disciplinary approach. CLUVA was unique in that it combined: a top-down perspective of climate change modeling with a bottom-up perspective of vulnerability assessment; quantitative approaches from engineering sciences and qualitative approaches of the social sciences; a novel multi-risk modeling methodology; strategic approaches to urban and green infrastructure planning with neighborhood perspectives of adaptation. The book broadly follows the approach taken in the CLUVA project. First, the co...

  8. Fuzzing and Vulnerabilities Search

    Directory of Open Access Journals (Sweden)

    Stanislav Evgenyevich Kirillov

    2013-02-01

    Full Text Available Fuzzing for vulnerabilities can be very effective if we know the input data format. This work contains description of network message format recovery algorithm and the usage of restored data model in fuzzing and vulnerabilities search.

  9. Questioning Complacency: Climate Change Impacts, Vulnerability, and Adaptation in Norway

    International Nuclear Information System (INIS)

    O'Brien, Karen; Eriksen, Siri; Sygna, Linda; Naess, Lars Otto

    2006-01-01

    Most European assessments of climate change impacts have been carried out on sectors and ecosystems, providing a narrow understanding of what climate change really means for society. Furthermore, the main focus has been on technological adaptations, with less attention paid to the process of climate change adaptation. In this article, we present and analyze findings from recent studies on climate change impacts, vulnerability, and adaptation in Norway, with the aim of identifying the wider social impacts of climate change. Three main lessons can be drawn. First, the potential thresholds and indirect effects may be more important than the direct, sectoral effects. Second, highly sensitive sectors, regions, and communities combine with differential social vulnerability to create both winners and losers. Third, high national levels of adaptive capacity mask the barriers and constraints to adaptation, particularly among those who are most vulnerable to climate change. Based on these results, we question complacency in Norway and other European countries regarding climate change impacts and adaptation. We argue that greater attention needs to be placed on the social context of climate change impacts and on the processes shaping vulnerability and adaptation

  10. Evolution of Sex Differences in Trait- and Age-Specific Vulnerabilities.

    Science.gov (United States)

    Geary, David C

    2016-11-01

    Traits that facilitate competition for reproductive resources or that influence mate choice generally have a heightened sensitivity to stressors. They have evolved to signal resilience to infectious disease and nutritional and social stressors, and they are compromised by exposure to man-made toxins. Although these traits can differ from one species or sex to the next, an understanding of the dynamics of competition and choice can in theory be used to generate a priori predictions about sex-, age-, and trait-specific vulnerabilities for any sexually reproducing species. I provide a review of these dynamics and illustrate associated vulnerabilities in nonhuman species. The age- and sex-specific vulnerability of such traits is then illustrated for stressor-related disruptions of boys' and girls' physical growth and play behavior, as well as for aspects of boys' and girls' and men's and women's personality, language, and spatial abilities. There is much that remains to be determined, but enough is now known to reframe trait sensitivity in ways that will allow scientists and practitioners to better identify and understand vulnerable human traits, and eventually ameliorate or prevent their expression. © The Author(s) 2016.

  11. Vulnerability and risk management of Agave species in the Tehuacán Valley, México.

    Science.gov (United States)

    Delgado-Lemus, América; Torres, Ignacio; Blancas, José; Casas, Alejandro

    2014-07-03

    Our study analysed the vulnerability of the useful Agave species of the Tehuacán Valley, Mexico, considering ecological, cultural and economic aspects, and management types. We hypothesized that management intensity is proportional to the degree of risk of a species in order to decrease its vulnerability. Distribution of Agave species was monitored in 36 types of plant associations. Ethnobotanical studies were conducted in 13 villages and six markets. The vulnerability of each species was calculated by assigning risk values to the variables analysed. The vulnerability and management intensity indexes were estimated through the scores of the first principal component of PCA. Variation of management data explained by ecological, cultural and economic information were analysed through canonical correspondence analyses (CCA). A linear regression analysis identified the relation between vulnerability and management intensity. We recorded presence of agave species in 20 of 36 vegetation types. Out of 34 Agave species, 28 were recorded to have one to 16 use types; 16 species are used as food, 13 for live fences, 13 for producing 'pulque', 11 for fibre and ornamental, 9 for construction. Seven species are used for preparing mescal, activity representing the highest risk. Seven Agave species are exclusively extracted from the wild and the others receive some management type. Incipient cultivation was identified in A. potatorum whose seedlings are grown in nurseries. Intensive cultivation through vegetative propagation occurs with domesticated species of wide distribution in Mexico. The highest management intensity values were recorded in widely distributed, cultivated and domesticated species, but the regionally native species more intensively managed were those with higher demand and economic value, protected by collective regulations because of their scarcity. The regression analysis indicated significant relation (R2=0.677, P<0.001) between vulnerability and management

  12. [Health vulnerability mapping in the Community of Madrid (Spain)].

    Science.gov (United States)

    Ramasco-Gutiérrez, Milagros; Heras-Mosteiro, Julio; Garabato-González, Sonsoles; Aránguez-Ruiz, Emiliano; Aguirre Martín-Gil, Ramón

    The Public Health General Directorate of Madrid has developed a health vulnerability mapping methodology to assist regional social health teams in health planning, prioritisation and intervention based on a model of social determinants of health and an equity approach. This process began with the selection of areas with the worst social indicators in health vulnerability. Then, key stakeholders of the region jointly identified priority areas of intervention and developed a consensual plan of action. We present the outcomes of this experience and its connection with theoretical models of asset-based community development, health-integrated georeferencing systems and community health interventions. Copyright © 2016 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.

  13. Development of a standard equipment management model for nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Chang, Hee Seung; Ju, Tae Young; Kim, Jung Wun [KHNP Central Research Institute, Daejeon (Korea, Republic of)

    2012-10-15

    Most utilities that have achieved high performance have introduced a management model to improve performance and operate plants safely. The Nuclear Energy Institute has developed and updated its Standard Nuclear Performance Model (SNPM) in order to provide a summary of nuclear processes, cost definitions, and key business performance measures for business performance comparison and benchmarking. Over the past decade, Korea Hydro and Nuclear Power Co. (KHNP) has introduced and implemented many engineering processes such as Equipment Reliability (ER), Maintenance Rule (MR), Single Point Vulnerability (SPV), Corrective Action Program (CAP), and Self Assessment (SA) to improve plant performance and to sustain high performance. Some processes, however, are not well interfaced with other processes, because they were developed separately and were focused on the process itself. KHNP is developing a Standard Equipment Management Model (SEMM) to integrate these engineering processes and to improve the interrelation among the processes. In this paper, a draft model and attributes of the SEMM are discussed.

  14. Development of a standard equipment management model for nuclear power plants

    International Nuclear Information System (INIS)

    Chang, Hee Seung; Ju, Tae Young; Kim, Jung Wun

    2012-01-01

    Most utilities that have achieved high performance have introduced a management model to improve performance and operate plants safely. The Nuclear Energy Institute has developed and updated its Standard Nuclear Performance Model (SNPM) in order to provide a summary of nuclear processes, cost definitions, and key business performance measures for business performance comparison and benchmarking. Over the past decade, Korea Hydro and Nuclear Power Co. (KHNP) has introduced and implemented many engineering processes such as Equipment Reliability (ER), Maintenance Rule (MR), Single Point Vulnerability (SPV), Corrective Action Program (CAP), and Self Assessment (SA) to improve plant performance and to sustain high performance. Some processes, however, are not well interfaced with other processes, because they were developed separately and were focused on the process itself. KHNP is developing a Standard Equipment Management Model (SEMM) to integrate these engineering processes and to improve the interrelation among the processes. In this paper, a draft model and attributes of the SEMM are discussed

  15. Selective vulnerability in brain hypoxia

    DEFF Research Database (Denmark)

    Cervos-Navarro, J.; Diemer, Nils Henrik

    1991-01-01

    Neuropathology, selective vulnerability, brain hypoxia, vascular factors, excitotoxicity, ion homeostasis......Neuropathology, selective vulnerability, brain hypoxia, vascular factors, excitotoxicity, ion homeostasis...

  16. Ecosystem vulnerability to climate change in the southeastern United States

    Science.gov (United States)

    Cartwright, Jennifer M.; Costanza, Jennifer

    2016-08-11

    Two recent investigations of climate-change vulnerability for 19 terrestrial, aquatic, riparian, and coastal ecosystems of the southeastern United States have identified a number of important considerations, including potential for changes in hydrology, disturbance regimes, and interspecies interactions. Complementary approaches using geospatial analysis and literature synthesis integrated information on ecosystem biogeography and biodiversity, climate projections, vegetation dynamics, soil and water characteristics, anthropogenic threats, conservation status, sea-level rise, and coastal flooding impacts. Across a diverse set of ecosystems—ranging in size from dozens of square meters to thousands of square kilometers—quantitative and qualitative assessments identified types of climate-change exposure, evaluated sensitivity, and explored potential adaptive capacity. These analyses highlighted key gaps in scientific understanding and suggested priorities for future research. Together, these studies help create a foundation for ecosystem-level analysis of climate-change vulnerability to support effective biodiversity conservation in the southeastern United States.

  17. Groundwater vulnerability assessment to assist the measurement planning of the water framework directive - a practical approach with stakeholders

    Science.gov (United States)

    Berkhoff, K.

    2007-05-01

    An evaluation scheme is presented in this paper which can be used to assess groundwater vulnerability according to the requirements of the European Water Framework Directive (WFD). The evaluation scheme results in a groundwater vulnerability map identifying areas of high, medium and low vulnerability, as necessary for the measurement planning of the WFD. The evaluation scheme is based on the definition of the vulnerability of the Intergovernmental Panel on Climate Change (IPCC). It considers exposure, sensitivity and the adaptive capacity of the region. The adaptive capacity is evaluated in an actors' platform, which was constituted for the region in the PartizipA ("Participative modelling, Actor and Ecosystem Analysis in Regions with Intensive Agriculture") project. As a result of the vulnerability assessment, 21% of the catchment area was classified as being highly vulnerable, whereas 73% has medium vulnerability and 6% has low vulnerability. Thus, a groundwater vulnerability assessment approach is presented, which can be used in practice on a catchment scale for the WFD measurement planning.

  18. Spatial vulnerability assessment : methodology for the community and district level applied to floods in Buzi, Mozambique

    International Nuclear Information System (INIS)

    Kienberger, S.

    2010-01-01

    Within this thesis a conceptual model is presented which allows for the definition of a vulnerability assessment according to its time and spatial scale and within a multi-dimensional framework, which should help to design and develop appropriate methodologies and adaptation of concepts for the required scale of implementation. Building on past experiences with participatory approaches in community mapping in the District of Buzi in Mozambique, the relevance of such approaches for a community-based disaster risk reduction framework is analysed. Finally, methodologies are introduced which allow the assessment of vulnerability and the prioritisation of vulnerability factors at the community level. At the district level, homogenous vulnerability regions are identified through the application of integrated modelling approaches which build on expert knowledge and weightings. A set of indicators is proposed, which allow the modelling of vulnerability in a data-scarce environment. In developing these different methodologies for the community and district levels, it has been identified that the monitoring of vulnerability and the identification of trends is essential to addressing the objective of a continuous and improved disaster risk management. In addition to the technical and methodological challenges discussed in this thesis, the commitment from different stakeholders and the availability of capacity in different domains is essential for the successful, practical implementation of the developed approaches. (author)

  19. Web Application Vulnerabilities

    OpenAIRE

    Yadav, Bhanu

    2014-01-01

    Web application security has been a major issue in information technology since the evolvement of dynamic web application. The main objective of this project was to carry out a detailed study on the top three web application vulnerabilities such as injection, cross site scripting, broken authentication and session management, present the situation where an application can be vulnerable to these web threats and finally provide preventative measures against them. ...

  20. Patterns of Freshwater Species Richness, Endemism, and Vulnerability in California.

    Directory of Open Access Journals (Sweden)

    Jeanette K Howard

    Full Text Available The ranges and abundances of species that depend on freshwater habitats are declining worldwide. Efforts to counteract those trends are often hampered by a lack of information about species distribution and conservation status and are often strongly biased toward a few well-studied groups. We identified the 3,906 vascular plants, macroinvertebrates, and vertebrates native to California, USA, that depend on fresh water for at least one stage of their life history. We evaluated the conservation status for these taxa using existing government and non-governmental organization assessments (e.g., endangered species act, NatureServe, created a spatial database of locality observations or distribution information from ~400 data sources, and mapped patterns of richness, endemism, and vulnerability. Although nearly half of all taxa with conservation status (n = 1,939 are vulnerable to extinction, only 114 (6% of those vulnerable taxa have a legal mandate for protection in the form of formal inclusion on a state or federal endangered species list. Endemic taxa are at greater risk than non-endemics, with 90% of the 927 endemic taxa vulnerable to extinction. Records with spatial data were available for a total of 2,276 species (61%. The patterns of species richness differ depending on the taxonomic group analyzed, but are similar across taxonomic level. No particular taxonomic group represents an umbrella for all species, but hotspots of high richness for listed species cover 40% of the hotspots for all other species and 58% of the hotspots for vulnerable freshwater species. By mapping freshwater species hotspots we show locations that represent the top priority for conservation action in the state. This study identifies opportunities to fill gaps in the evaluation of conservation status for freshwater taxa in California, to address the lack of occurrence information for nearly 40% of freshwater taxa and nearly 40% of watersheds in the state, and to

  1. Development and assessment of indices to determine stream fish vulnerability to climate change and habitat alteration

    Science.gov (United States)

    Sievert, Nicholas A.; Paukert, Craig P.; Tsang, Yin-Phan; Infante, Dana M.

    2016-01-01

    measure of validation. Our indices classified species identified as being in need of conservation by the state of Missouri as highly vulnerable. The distribution of vulnerable species in Missouri showed consistent patterns between indices, with the more forest-dominated, groundwater fed streams in the Ozark subregion generally having higher numbers and proportions of vulnerable species per site than subregions that were agriculturally dominated with more overland flow. These results suggest that both indices will identify similar habitats as conservation action targets despite discrepancies in the classification of vulnerable species. Our vulnerability assessment provides a framework that can be refined and used in other regions.

  2. Assessing tsunami vulnerability, an example from Herakleio, Crete

    Science.gov (United States)

    Papathoma, M.; Dominey-Howes, D.; Zong, Y.; Smith, D.

    Recent tsunami have caused massive loss of life, destruction of coastal infrastructures and disruption to economic activity. To date, tsunami hazard studies have concentrated on determining the frequency and magnitude of events and in the production of simplistic flood maps. In general, such maps appear to have assumed a uniform vulnerability of population, infrastructure and business. In reality however, a complex set of factors interact to produce a pattern of vulnerability that varies spatially and temporally. A new vulnerability assessment approach is described, that incorporates multiple factors (e.g. parameters relating to the natural and built environments and socio-demographics) that contribute to tsunami vulnerability. The new methodology is applied on a coastal segment in Greece and, in particular, in Crete, westof the city of Herakleio. The results are presented within a Geographic Information System (GIS). The application of GIS ensures the approach is novel for tsunami studies, since it permits interrogation of the primary database by several different end-users. For example, the GIS may be used: (1) to determine immediate post-tsunami disaster response needs by the emergency services; (2) to preplan tsunami mitigation measures by disaster planners; (3) as a tool for local planning by the municipal authorities or; (4) as a basis for catastrophe modelling by insurance companies. We show that population density varies markedly with the time of the year and that 30% of buildings within the inundation zone are only single story thus increasing the vulnerability of their occupants. Within the high inundation depth zone, 11% of buildings are identified as in need of reinforcement and this figure rises to 50% within the medium inundation depth zone. 10% of businesses are located within the high inundation depth zone and these may need to consider their level of insurance cover to protect against primary building damage, contents loss and business interruption

  3. Behavioural Motives of Acquisition of Solar-driven Equipment

    Directory of Open Access Journals (Sweden)

    Shkurupska Iryna O.

    2013-12-01

    Full Text Available The article identifies needs of the target group, namely structure of motives, which justify making a decision to buy, in order to create efficient marketing strategy of an enterprise, which sell solar-driven equipment in Ukraine. There are five segments in the domestic market of helio-systems: individual consumers, recreation industry, agrarian industry, construction and social spheres. The article allocates 15 motives of acquisition of the solar-driven equipment for these segments, the most important of which are price, availability of solar energy, alternative price and energy saving. Besides, the structure of such motives is determined for each segment individually. In order to choose specific marketing instruments in the policy of promotion of solar-driven equipment, the article identifies differences in the form of goals of use and motives of acquisition between the specified consumer segments. The article reveals certain barriers that interfere with acquisition of solar-driven equipment – low level of trust into helio-systems, conservatism of consumers, absence of free applications for consumers – overcoming which is only possible with the help of certain marketing actions.

  4. A national assessment of underground natural gas storage: identifying wells with designs likely vulnerable to a single-point-of-failure

    Science.gov (United States)

    Michanowicz, Drew R.; Buonocore, Jonathan J.; Rowland, Sebastian T.; Konschnik, Katherine E.; Goho, Shaun A.; Bernstein, Aaron S.

    2017-05-01

    The leak of processed natural gas (PNG) from October 2015 to February 2016 from the Aliso Canyon storage facility, near Los Angeles, California, was the largest single accidental release of greenhouse gases in US history. The Interagency Task Force on Natural Gas Storage Safety and California regulators recently recommended operators phase out single-point-of-failure (SPF) well designs. Here, we develop a national dataset of UGS well activity in the continental US to assess regulatory data availability and uncertainty, and to assess the prevalence of certain well design deficiencies including single-point-of-failure designs. We identified 14 138 active UGS wells associated with 317 active UGS facilities in 29 states using regulatory and company data. State-level wellbore datasets contained numerous reporting inconsistencies that limited data concatenation. We identified 2715 active UGS wells across 160 facilities that, like the failed well at Aliso Canyon, predated the storage facility, and therefore were not originally designed for gas storage. The majority (88%) of these repurposed wells are located in OH, MI, PA, NY, and WV. Repurposed wells have a median age of 74 years, and the 2694 repurposed wells constructed prior to 1979 are particularly likely to exhibit design-related deficiencies. An estimated 210 active repurposed wells were constructed before 1917—before cement zonal isolation methods were utilized. These wells are located in OH, PA, NY, and WV and represent the highest priority related to potential design deficiencies that could lead to containment loss. This national baseline assessment identifies regulatory data uncertainties, highlights a potentially widespread vulnerability of the natural gas supply chain, and can aid in prioritization and oversight for high-risk wells and facilities.

  5. Vulnerabilities, Precautions and Preparedness in the View of Disciplinary Discourse

    DEFF Research Database (Denmark)

    Jørgensen, Ulrik; Hoffmann, Birgitte

    and its population. Not least the continued expansion of a modern (Danish) way of life and its priorities concerning health, housing, social welfare, and economic politics have in different periods of time framed the kinds of vulnerabilities that have been identified based on changing professional...

  6. InfoClim : Platform for Helping Vulnerable Communities Adapt to ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    23 oct. 2007 ... Working in several villages belonging to four communities in the region of Thiès, the project will put in place an observatory of climate change, sensitize local actors, and identify and implement adaptation strategies to improve the living conditions of vulnerable populations, or at least slow down their ...

  7. Estimating vegetation vulnerability to detect areas prone to land degradation in the Mediterranean basin

    Science.gov (United States)

    Imbrenda, Vito; Coluzzi, Rosa; D'Emilio, Mariagrazia; Lanfredi, Maria; Simoniello, Tiziana

    2013-04-01

    Vegetation is one of the key components to study land degradation vulnerability because of the complex interactions and feedbacks that link it to soil. In the Mediterranean region, degradation phenomena are due to a mix of predisposing factors (thin soil horizons, low soil organic matter, increasing aridity, etc.) and bad management practices (overgrazing, deforestation, intensification of agriculture, tourism development). In particular, in areas threatened by degradation processes but still covered by vegetation, large scale soil condition evaluation is a hard task and the detection of stressed vegetation can be useful to identify on-going soil degradation phenomena and to reduce their impacts through interventions for recovery/rehabilitation. In this context the use of satellite time series can increase the efficacy and completeness of the land degradation assessment, providing precious information to understand vegetation dynamics. In order to estimate vulnerability levels in Basilicata (a Mediterranean region of Southern Italy) in the framework of PRO-LAND project (PO-FESR Basilicata 2007-2013), we crossed information on potential vegetation vulnerability with information on photosynthetic activity dynamics. Potential vegetation vulnerability represents the vulnerability related to the type of present cover in terms of fire risk, erosion protection, drought resistance and plant cover distribution. It was derived from an updated land cover map by separately analyzing each factor, and then by combining them to obtain concise information on the possible degradation exposure. The analysis of photosynthetic activity dynamics provides information on the status of vegetation, that is fundamental to discriminate the different vulnerability levels within the same land cover, i.e. the same potential vulnerability. For such a purpose, we analyzed a time series (2000-2010) of a satellite vegetation index (MODIS NDVI) with 250m resolution, available as 16-day composite

  8. Coastal erosion vulnerability and risk assessment focusing in tourism beach use.

    Science.gov (United States)

    Alexandrakis, George

    2016-04-01

    It is well established that the global market for tourism services is a key source of economic growth. Especially among Mediterranean countries, the tourism sector is one of the principal sectors driving national economies. With the majority of the mass tourism activities concentrated around coastal areas, coastal erosion, inter alia, poses a significant threat to coastal economies that depend heavily on revenues from tourism. The economic implications of beach erosion were mainly focused in the cost of coastal protection measures, instead of the revenue losses from tourism. For this, the vulnerability of the coast to sea level rise and associated erosion, in terms of expected land loss and economic activity need to be identified. To achieve this, a joint environmental and economic evaluation approach of the problem can provide a managerial tool to mitigate the impact of beach erosion in tourism, through realistic cost-benefit scenarios for planning alternative protection measures. Such a multipurpose tool needs to consider social, economic and environmental factors, which relationships can be better understood when distributed and analyzed along the geographical space. The risk assessment is implemented through the estimation of the vulnerability and exposure variables of the coast in two scales. The larger scale estimates the vulnerability in a regional level, with the use environmental factors with the use of CVI. The exposure variable is estimated by the use of socioeconomic factors. Subsequently, a smaller scale focuses on highly vulnerable beaches with high social and economic value. The assessment of the natural processes to the environmental characteristics of the beach is estimated with the use of the Beach Vulnerability Index (BVI) method. As exposure variable, the value of beach width that is capitalized in revenues is implemented through a hedonic pricing model. In this econometric modelling, Beach Value is related with economic and environmental

  9. Development and Application of Urban Landslide Vulnerability Assessment Methodology Reflecting Social and Economic Variables

    Directory of Open Access Journals (Sweden)

    Yoonkyung Park

    2016-01-01

    Full Text Available An urban landslide vulnerability assessment methodology is proposed with major focus on considering urban social and economic aspects. The proposed methodology was developed based on the landslide susceptibility maps that Korean Forest Service utilizes to identify landslide source areas. Frist, debris flows are propagated to urban areas from such source areas by Flow-R (flow path assessment of gravitational hazards at a regional scale, and then urban vulnerability is assessed by two categories: physical and socioeconomic aspect. The physical vulnerability is related to buildings that can be impacted by a landslide event. This study considered two popular building structure types, reinforced-concrete frame and nonreinforced-concrete frame, to assess the physical vulnerability. The socioeconomic vulnerability is considered a function of the resistant levels of the vulnerable people, trigger factor of secondary damage, and preparedness level of the local government. An index-based model is developed to evaluate the life and indirect damage under landslide as well as the resilience ability against disasters. To illustrate the validity of the proposed methodology, physical and socioeconomic vulnerability levels are analyzed for Seoul, Korea, using the suggested approach. The general trend found in this study indicates that the higher population density areas under a weaker fiscal condition that are located at the downstream of mountainous areas are more vulnerable than the areas in opposite conditions.

  10. A hybrid framework for assessing maize drought vulnerability in Sub-Saharan Africa

    Science.gov (United States)

    Kamali, B.; Abbaspour, K. C.; Wehrli, B.; Yang, H.

    2017-12-01

    Drought has devastating impacts on crop yields. Quantifying drought vulnerability is the first step to better design of mitigation policies. The vulnerability of crop yield to drought has been assessed with different methods, however they lack a standardized base to measure its components and a procedure that facilitates spatial and temporal comparisons. This study attempts to quantify maize drought vulnerability through linking the Drought Exposure Index (DEI) to the Crop Failure Index (CFI). DEI and CFI were defined by fitting probability distribution functions to precipitation and maize yield respectively. To acquire crop drought vulnerability index (CDVI), DEI and CFI were combined in a hybrid framework which classifies CDVI with the same base as DEI and CFI. The analysis were implemented on Sub-Saharan African countries using maize yield simulated with the Environmental Policy Integrated Climate (EPIC) model at 0.5° resolution. The model was coupled with the Sequential Uncertainty Fitting algorithm for calibration at country level. Our results show that Central Africa and those Western African countries located below the Sahelian strip receive higher amount of precipitation, but experience high crop failure. Therefore, they are identified as more vulnerable regions compared to countries such as South Africa, Tanzania, and Kenya. We concluded that our hybrid approach complements information on crop drought vulnerability quantification and can be applied to different regions and scales.

  11. Open Source Vulnerability Database Project

    Directory of Open Access Journals (Sweden)

    Jake Kouns

    2008-06-01

    Full Text Available This article introduces the Open Source Vulnerability Database (OSVDB project which manages a global collection of computer security vulnerabilities, available for free use by the information security community. This collection contains information on known security weaknesses in operating systems, software products, protocols, hardware devices, and other infrastructure elements of information technology. The OSVDB project is intended to be the centralized global open source vulnerability collection on the Internet.

  12. Vulnerability to shocks in the global seafood trade network

    Science.gov (United States)

    Gephart, Jessica A.; Rovenskaya, Elena; Dieckmann, Ulf; Pace, Michael L.; Brännström, Åke

    2016-03-01

    Trade can allow countries to overcome local or regional losses (shocks) to their food supply, but reliance on international food trade also exposes countries to risks from external perturbations. Countries that are nutritionally or economically dependent on international trade of a commodity may be adversely affected by such shocks. While exposure to shocks has been studied in financial markets, communication networks, and some infrastructure systems, it has received less attention in food-trade networks. Here, we develop a forward shock-propagation model to quantify how trade flows are redistributed under a range of shock scenarios and assess the food-security outcomes by comparing changes in national fish supplies to indices of each country’s nutritional fish dependency. Shock propagation and distribution among regions are modeled on a network of historical bilateral seafood trade data from UN Comtrade using 205 reporting territories grouped into 18 regions. In our model exposure to shocks increases with total imports and the number of import partners. We find that Central and West Africa are the most vulnerable to shocks, with their vulnerability increasing when a willingness-to-pay proxy is included. These findings suggest that countries can reduce their overall vulnerability to shocks by reducing reliance on imports and diversifying food sources. As international seafood trade grows, identifying these types of potential risks and vulnerabilities is important to build a more resilient food system.

  13. Tsunami vulnerability assessment mapping for the west coast of Peninsular Malaysia using a geographical information system (GIS)

    International Nuclear Information System (INIS)

    Najihah, R; Effendi, D M; Hairunnisa, M A; Masiri, K

    2014-01-01

    The catastrophic Indian Ocean tsunami of 26 December 2004 raised a number of questions for scientist and politicians on how to deal with the tsunami risk and assessment in coastal regions. This paper discusses the challenges in tsunami vulnerability assessment and presents the result of tsunami disaster mapping and vulnerability assessment study for West Coast of Peninsular Malaysia. The spatial analysis was carried out using Geographical Information System (GIS) technology to demarcate spatially the tsunami affected village's boundary and suitable disaster management program can be quickly and easily developed. In combination with other thematic maps such as road maps, rail maps, school maps, and topographic map sheets it was possible to plan the accessibility and shelter to the affected people. The tsunami vulnerability map was used to identify the vulnerability of villages/village population to tsunami. In the tsunami vulnerability map, the intensity of the tsunami was classified as hazard zones based on the inundation level in meter (contour). The approach produced a tsunami vulnerability assessment map consists of considering scenarios of plausible extreme, tsunami-generating events, computing the tsunami inundation levels caused by different events and scenarios and estimating the possible range of casualties for computing inundation levels. The study provides an interactive means to identify the tsunami affected areas after the disaster and mapping the tsunami vulnerable village before for planning purpose were the essential exercises for managing future disasters

  14. Tsunami vulnerability assessment mapping for the west coast of Peninsular Malaysia using a geographical information system (GIS)

    Science.gov (United States)

    Najihah, R.; Effendi, D. M.; Hairunnisa, M. A.; Masiri, K.

    2014-02-01

    The catastrophic Indian Ocean tsunami of 26 December 2004 raised a number of questions for scientist and politicians on how to deal with the tsunami risk and assessment in coastal regions. This paper discusses the challenges in tsunami vulnerability assessment and presents the result of tsunami disaster mapping and vulnerability assessment study for West Coast of Peninsular Malaysia. The spatial analysis was carried out using Geographical Information System (GIS) technology to demarcate spatially the tsunami affected village's boundary and suitable disaster management program can be quickly and easily developed. In combination with other thematic maps such as road maps, rail maps, school maps, and topographic map sheets it was possible to plan the accessibility and shelter to the affected people. The tsunami vulnerability map was used to identify the vulnerability of villages/village population to tsunami. In the tsunami vulnerability map, the intensity of the tsunami was classified as hazard zones based on the inundation level in meter (contour). The approach produced a tsunami vulnerability assessment map consists of considering scenarios of plausible extreme, tsunami-generating events, computing the tsunami inundation levels caused by different events and scenarios and estimating the possible range of casualties for computing inundation levels. The study provides an interactive means to identify the tsunami affected areas after the disaster and mapping the tsunami vulnerable village before for planning purpose were the essential exercises for managing future disasters.

  15. Cotton genetic resources and crop vulnerability

    Science.gov (United States)

    A report on the genetic vulnerability of cotton was provided to the National Genetic Resources Advisory Council. The report discussed crop vulnerabilities associated with emerging diseases, emerging pests, and a narrowing genetic base. To address these crop vulnerabilities, the report discussed the ...

  16. Vulnerability and resilience: a critical nexus.

    Science.gov (United States)

    Lotz, Mianna

    2016-02-01

    Not all forms of human fragility or vulnerability are unavoidable. Sometimes we knowingly and intentionally impose conditions of vulnerability on others; and sometimes we knowingly and intentionally enter into and assume conditions of vulnerability for ourselves (for example, when we decide to trust or forgive, enter into intimate relationships with others, become a parent, become a subject of medical or psychotherapeutic treatment, and the like). In this article, I propose a presently overlooked basis on which one might evaluate whether the imposition or assumption of vulnerability is acceptable, and on which one might ground a significant class of vulnerability-related obligations. Distinct from existing accounts of the importance of promoting autonomy in conditions of vulnerability, this article offers a preliminary exploration of the nature, role, and importance of resilience promotion, its relationship to autonomy promotion, and its prospects for improving human wellbeing in autonomy inhibiting conditions.

  17. Update on the Department of Energy's 1994 plutonium vulnerability assessment for the plutonium finishing plant

    International Nuclear Information System (INIS)

    HERZOG, K.R.

    1999-01-01

    A review of the environmental, safety, and health vulnerabilities associated with the continued storage of PFP's inventory of plutonium bearing materials and other SNM. This report re-evaluates the five vulnerabilities identified in 1994 at the PFP that are associated with SNM storage. This new evaluation took a more detailed look and applied a risk ranking process to help focus remediation efforts

  18. High-speed railway signal trackside equipment patrol inspection system

    Science.gov (United States)

    Wu, Nan

    2018-03-01

    High-speed railway signal trackside equipment patrol inspection system comprehensively applies TDI (time delay integration), high-speed and highly responsive CMOS architecture, low illumination photosensitive technique, image data compression technique, machine vision technique and so on, installed on high-speed railway inspection train, and achieves the collection, management and analysis of the images of signal trackside equipment appearance while the train is running. The system will automatically filter out the signal trackside equipment images from a large number of the background image, and identify of the equipment changes by comparing the original image data. Combining with ledger data and train location information, the system accurately locate the trackside equipment, conscientiously guiding maintenance.

  19. Mitigations for Security Vulnerabilities Found in Control System Networks

    Energy Technology Data Exchange (ETDEWEB)

    Trent D. Nelson

    2006-05-01

    Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the Control Systems Security Center (CSSC) at INL to help industry and government improve the security of the CSs used in the nation's critical infrastructures. One of the main CSSC objectives is to identify control system vulnerabilities and develop effective mitigations for them. This paper discusses common problems and vulnerabilities seen in on-site CS assessments and suggests mitigation strategies to provide asset owners with the information they need to better protect their systems from common security flows.

  20. Lessons learned in testing of Safeguards equipment

    International Nuclear Information System (INIS)

    Pepper, Susan; Farnitano, Michael; Carelli, Joseph

    2001-01-01

    Full text: During the 1990s, the IAEA Department of Safeguards began a transition from analog to digital equipment. This included surveillance equipment, seals, NDA measurement systems, and other instruments. The transition to digital equipment was intended to facilitate compatibility between and integration of instruments, remote communication of data, improved data storage, and modernization. Many of the instruments are designed to operate on battery power during loss of facility power, and therefore, are designed to consume minimal power. In 2000, the IAEA experienced a number of failures in digital image surveillance (DIS) equipment. A study of the performance data revealed that the failures occurred in 'high risk' environments where the systems were exposed to neutrons. As a supporter of IAEA equipment development and implementation, the U.S. Support Program worked with the IAEA, the equipment designer, and the equipment manufacturer in special meetings on DIS to determine the cause of the failures. It was as a result of these meetings that single event upset (SEU) was determined to be the root cause of the failures. The meeting participants also identified a list of actions to improve the reliability of DIS systems. As a result of the DIS meetings and the identified actions, the U.S. Support Program approved a request from the IAEA and established Task E.125, 'Remote Monitoring and Unattended Digital Surveillance Systems.' This task is an umbrella task intended to provide a mechanism for response to IAEA needs related to improving the reliability of unattended, remote monitoring and DIS equipment. Subtasks approved under this task include: E.125.1, 'SDIS Software Consolidation and DCM-14 Audit' - This subtask involves the consolidation of a number of individual upgrades to the SDIS and review of the DCM-14 software. As the sponsor of the design of the DCM-14 by Dr. Neumann, the German Support Program is also a participant in this subtask; E.125.2, 'DIS

  1. Coastal vulnerability: climate change and natural hazards perspectives

    Science.gov (United States)

    Romieu, E.; Vinchon, C.

    2009-04-01

    . This concept is a great tool for policy makers to help managing their action and taking into account climate change (McFadden, et al. 2006). However, in those approaches, vulnerability is the output itself (cost of effective impacts, geomorphologic impacts…), but is not integrated it in a risk analysis. Furthermore, those studies emerged from a climatic perspective, which leads to consider climate change as a hazard or pressure whereas risk studies commonly consider hazards such as erosion and flooding, where climate change modifies the drivers of the hazard. 2) The natural hazards and socio economic perspectives In order to reduce impacts of natural hazards, decision makers need a complete risk assessment (probability of losses). Past studies on natural risks (landslide, earthquake...) highlighted the pertinence of defining risk as a combination of : (1)hazard occurrence and intensity, (2) exposition and (3)vulnerability of assets and population to this hazard (e.g. Douglas. 2007, Sarewitz, et al. 2003). Following the Renn and Klinke risk assessment frame, high uncertainties associated with coastal risks considering climatic and anthropic change highlights the importance of working on that concept of "vulnerability" (Klinke and Renn. 2002). Past studies on vulnerability assessment showed a frequently mentioned gap between "impact based" and "human based" points of view. It is nowadays a great issue for natural risk sciences. Many research efforts in FP7 projects such as MOVE and ENSURE focus on integrating the different dimensions of vulnerability (Turner, et al. 2003, Birkmann. 2006). Coastal risk studies highlight another issue of concern. We previously detailed the different use of the term "vulnerability" in the coastal context, quite different of the "natural risk's" use. Interaction of social, economic and physical sciences is considered within two french research projects (Vulsaco, Miseeva), in order to identify the vulnerability of a system to flooding or

  2. VT - Vermont Social Vulnerability Index

    Data.gov (United States)

    Vermont Center for Geographic Information — Social vulnerability refers to the resilience of communities when responding to or recovering from threats to public health. The Vermont Social Vulnerability Index...

  3. Performance Measurement of Mining Equipments by Utilizing OEE

    Directory of Open Access Journals (Sweden)

    Sermin Elevli

    2010-10-01

    Full Text Available Over the past century, open pit mines have steadily increased their production rate by using larger equipments which requireintensive capital investment. Low commodity prices have forced companies to decrease their unit cost by improving productivity. Oneway to improve productivity is to utilize equipment as effectively as possible. Therefore, the accurate estimation of equipmenteffectiveness is very important so that it can be increased. Overall Equipment Effectiveness (OEE is a well-known measurementmethod, which combines availability, performance and quality, for the evaluation of equipment effectiveness in manufacturing industry.However, there isn’t any study in literature about how to use this metric for mining equipments such as shovel, truck, drilling machineetc. This paper will discuss the application of OEE to measure effectiveness of mining equipment. It identifies causes of time losses forshovel and truck operations and introduces procedure to record time losses. The procedure to estimate OEE of shovels and trucks hasalso been presented via numerical example.

  4. The determinants of vulnerability and adaptive capacity at the national level and the implications for adaptation

    Energy Technology Data Exchange (ETDEWEB)

    Brooks, N.; Adger, W.N.; Kelly, P.M. [University of East Anglia, Norwich (United Kingdom). School of Environmental Sciences

    2005-07-01

    We present a set of indicators of vulnerability and capacity to adapt to climate variability, and by extension climate change, derived using a novel empirical analysis of data aggregated at the national level on a decadal timescale. The analysis is based on a conceptual framework in which risk is viewed in terms of outcome, and is a function of physically defined climate hazards and socially constructed vulnerability. Climate outcomes are represented by mortality from climate-related disasters, using the emergency events database data set, statistical relationships between mortality and a shortlist of potential proxies for vulnerability are used to identify key vulnerability indicators. We find that 11 key indicators exhibit a strong relationship with decadally aggregated mortality associated with climate-related disasters. Validation of indicators, relationships between vulnerability and adaptive capacity, and the sensitivity of subsequent vulnerability assessments to different sets of weightings are explored using expert judgement data, collected through a focus group exercise. The data are used to provide a robust assessment of vulnerability to climate-related mortality at the national level, and represent an entry point to more detailed explorations of vulnerability and adaptive capacity. They indicate that the most vulnerable nations are those situated in sub-Saharan Africa and those that have recently experienced conflict. Adaptive capacity - one element of vulnerability - is associated predominantly with governance, civil and political rights, and literacy. (author)

  5. The determinants of vulnerability and adaptive capacity at the national level and the implications for adaptation

    International Nuclear Information System (INIS)

    Brooks, N.; Adger, W.N.; Kelly, P.M.

    2005-01-01

    We present a set of indicators of vulnerability and capacity to adapt to climate variability, and by extension climate change, derived using a novel empirical analysis of data aggregated at the national level on a decadal timescale. The analysis is based on a conceptual framework in which risk is viewed in terms of outcome, and is a function of physically defined climate hazards and socially constructed vulnerability. Climate outcomes are represented by mortality from climate-related disasters, using the emergency events database data set, statistical relationships between mortality and a shortlist of potential proxies for vulnerability are used to identify key vulnerability indicators. We find that 11 key indicators exhibit a strong relationship with decadally aggregated mortality associated with climate-related disasters. Validation of indicators, relationships between vulnerability and adaptive capacity, and the sensitivity of subsequent vulnerability assessments to different sets of weightings are explored using expert judgement data, collected through a focus group exercise. The data are used to provide a robust assessment of vulnerability to climate-related mortality at the national level, and represent an entry point to more detailed explorations of vulnerability and adaptive capacity. They indicate that the most vulnerable nations are those situated in sub-Saharan Africa and those that have recently experienced conflict. Adaptive capacity - one element of vulnerability - is associated predominantly with governance, civil and political rights, and literacy. (author)

  6. ICMPv6 RA Flooding Vulnerability Research

    Directory of Open Access Journals (Sweden)

    Linas Jočys

    2016-06-01

    Full Text Available ICMPv6 is the newest version of internet control message protocol, whose main purpose is to send error message indicating packet processing failure. It is know that ICMPv6 is technologically vulnerable. One of those vulnerabilities is the ICMPv6 RA flooding vulnerability, which can lead to systems in Local Area Network slow down or full stop. This paper will discuss Windows (XP, 7, 8.1 and Linux Ubuntu 14 operating systems resistance to RA flooding attack research and countermeasures to minimize this vulnerability.

  7. Assessing vulnerability of urban African communities

    DEFF Research Database (Denmark)

    Karlsson Nyed, Patrik; Jean-Baptiste, Nathalie; Herslund, Lise Byskov

    2014-01-01

    East African cities are in the process of assessing their vulnerabilities to climate change, but face difficulties in capturing the complexity of the various facets of vulnerability. This holistic approach, captures four different dimensions of vulnerability to flooding - Assets, Institutions......, Attitudes and the Physical environment, with Dar es Salaam, Tanzania, as a case city. The methodology is actively involving the expertise of the stakeholders, and uses GIS to analyze and compile the data. The final output is presented as a comprehensible map, delineating the varying vulnerability...

  8. Comprehensiveness and programmatic vulnerability to stds/hiv/aids in primary care

    Directory of Open Access Journals (Sweden)

    Luciane Ferreira do Val

    2014-08-01

    Full Text Available This study aimed to identify programmatic vulnerability to STDs/HIV/AIDS in primary health centers (PHCs. This is a descrip - tive and quantitative study carried out in the city of São Paulo. An online survey was applied (FormSUS platform, involving administrators from 442 PHCs in the city, with responses received from 328 of them (74.2%, of which 53.6% were nurses. At - tention was raised in relation to program - matic vulnerability in the PHCs regarding certain items of infrastructure, prevention, treatment, prenatal care and integration among services on STDs/HIV/AIDS care. It was concluded that in order to reach comprehensiveness of actions for HIV/ AIDS in primary health care, it is necessary to consider programmatic vulnerability, in addition to more investment and reor - ganization of services in a dialogue with the stakeholders (users, multidisciplinary teams, and managers, among others.

  9. Integrating socio-economic and infrastructural dimension to reveal hazard vulnerability of coastal districts

    Science.gov (United States)

    Mazumdar, Jublee; Paul, Saikat

    2015-04-01

    scores are then mapped for spatial analysis. Utilizing SeVI and InVI, the highly vulnerable districts are demonstrated that are likely to face significant challenges in coping with tropical cyclone and require strategies to address the various aspects of socio-economic and infrastructural vulnerability. Moreover, this model can be incorporated not only for multi-level governance but also to integrate it with the real-time weather forecasts to identify the predictive areas of vulnerability.

  10. Drawing evaluation report for sampling equipment drawings

    International Nuclear Information System (INIS)

    WILSON, G.W.

    1999-01-01

    This document presents the results of a task to evaluate Tank Waste Remediation System (TWRS) sampling equipment drawings and identifies drawings category as either essential, support, or general drawings. This report completes the drawing evaluation task as outlined in Engineering Task Plan For Truck 3 and 4 Drawing Compliance and Evaluation (Wilson, 1997). The scope of this report is limited to an evaluation and identification of drawing category for drawings of certain tank waste sampling equipment for which the TRWS Characterization Project has been assigned custody, including: vapor sampling, grab sampling, auger sampling, and all core sampling equipment (see LMHC Task Order 304). This report does not address drawings for other waste tank deployed equipment systems having similar assigned custody, such as, Light Duty Utility Arm (LDUA), Cone Penetrometer system, or Long Length Contaminated Equipment (LLCE). The LDUA drawings are addressed in the Characterization Equipment Essential Drawings (HNF 1998). The Cone Penetrometer system drawings which are vendor drawings (not H- series) is not currently turned over to operations for deployment. The LLCE equipment was just recently assigned to Characterization Project and were not included in the original scope for this evaluation and will be addressed in the evaluation update scheduled for fiscal year 1999

  11. Free and Open Source Software for land degradation vulnerability assessment

    Science.gov (United States)

    Imbrenda, Vito; Calamita, Giuseppe; Coluzzi, Rosa; D'Emilio, Mariagrazia; Lanfredi, Maria Teresa; Perrone, Angela; Ragosta, Maria; Simoniello, Tiziana

    2013-04-01

    Nowadays the role of FOSS software in scientific research is becoming increasingly important. Besides the important issues of reduced costs for licences, legality and security there are many other reasons that make FOSS software attractive. Firstly, making the code opened is a warranty of quality permitting to thousands of developers around the world to check the code and fix bugs rather than rely on vendors claims. FOSS communities are usually enthusiastic about helping other users for solving problems and expand or customize software (flexibility). Most important for this study, the interoperability allows to combine the user-friendly QGIS with the powerful GRASS-GIS and the richness of statistical methods of R in order to process remote sensing data and to perform geo-statistical analysis in one only environment. This study is focused on the land degradation (i.e. the reduction in the capacity of the land to provide ecosystem goods and services and assure its functions) and in particular on the estimation of the vulnerability levels in order to suggest appropriate policy actions to reduce/halt land degradation impacts, using the above mentioned software. The area investigated is the Basilicata Region (Southern Italy) where large natural areas are mixed with anthropized areas. To identify different levels of vulnerability we adopted the Environmentally Sensitive Areas (ESAs) model, based on the combination of indicators related to soil, climate, vegetation and anthropic stress. Such indicators were estimated by using the following data-sources: - Basilicata Region Geoportal to assess soil vulnerability; - DESERTNET2 project to evaluate potential vegetation vulnerability and climate vulnerability; - NDVI-MODIS satellite time series (2000-2010) with 250m resolution, available as 16-day composite from the NASA LP DAAC to characterize the dynamic component of vegetation; - Agricultural Census data 2010, Corine Land Cover 2006 and morphological information to assess

  12. Current state of commercial radiation detection equipment for homeland security applications

    International Nuclear Information System (INIS)

    Klann, R.T.; Shergur, J.; Mattesich, G.

    2009-01-01

    With the creation of the U.S. Department of Homeland Security (DHS) came the increased concern that terrorist groups would attempt to manufacture and use an improvised nuclear device or radiological dispersal device. As such, a primary mission of DHS is to protect the public against the use of these devices and to assist state and local responders in finding, locating, and identifying these types of devices and materials used to manufacture these devices. This assistance from DHS to state and local responders comes in the form of grant money to procure radiation detection equipment. In addition to this grant program, DHS has supported the development of American National Standards Institute standards for radiation detection equipment and has conducted testing of commercially available instruments. This paper identifies the types and kinds of commercially available equipment that can be used to detect and identify radiological material - for use in traditional search applications as well as primary and secondary screening of personnel, vehicles, and cargo containers. In doing so, key considerations for the conduct of operations are described as well as critical features of the instruments for specific applications. The current state of commercial instruments is described for different categories of detection equipment including personal radiation detectors, radioisotope identifiers, man-portable detection equipment, and radiation portal monitors. In addition, emerging technologies are also discussed, such as spectroscopic detectors and advanced spectroscopic portal monitors

  13. The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures

    International Nuclear Information System (INIS)

    Eusgeld, Irene; Kroeger, Wolfgang; Sansavini, Giovanni; Schlaepfer, Markus; Zio, Enrico

    2009-01-01

    A framework for the analysis of the vulnerability of critical infrastructures has been proposed by some of the authors. The framework basically consists of two successive stages: (i) a screening analysis for identifying the parts of the critical infrastructure most relevant with respect to its vulnerability and (ii) a detailed modeling of the operational dynamics of the identified parts for gaining insights on the causes and mechanisms responsible for the vulnerability. In this paper, a critical presentation is offered of the results of a set of investigations aimed at evaluating the potentials of (i) using network analysis based on measures of topological interconnection and reliability efficiency, for the screening task; (ii) using object-oriented modeling as the simulation framework to capture the detailed dynamics of the operational scenarios involving the most vulnerable parts of the critical infrastructure as identified by the preceding network analysis. A case study based on the Swiss high-voltage transmission system is considered. The results are cross-compared and evaluated; the needs of further research are defined

  14. Comparison and Evaluation of Global Scale Studies of Vulnerability and Risks to Climate Change

    Science.gov (United States)

    Muccione, Veruska; Allen, Simon K.; Huggel, Christian; Birkmann, Joern

    2015-04-01

    Understanding the present and future distribution of different climate change impacts and vulnerability to climate change is a central subject in the context of climate justice and international climate policy. Commonly, it is claimed that poor countries that contributed little to anthropogenic climate change are those most affected and most vulnerable to climate change. Such statements are backed by a number of global-scale vulnerability studies, which identified poor countries as most vulnerable. However, some studies have challenged this view, likewise highlighting the high vulnerability of richer countries. Overall, no consensus has been reached so far about which concept of vulnerability should be applied and what type of indicators should be considered. Furthermore, there is little agreement which specific countries are most vulnerable. This is a major concern in view of the need to inform international climate policy, all the more if such assessments should contribute to allocate climate adaptation funds as was invoked at some instances. We argue that next to the analysis of who is most vulnerable, it is also important to better understand and compare different vulnerability profiles assessed in present global studies. We perform a systematic literature review of global vulnerability assessments with the scope to highlight vulnerability distribution patterns. We then compare these distributions with global risk distributions in line with revised and adopted concepts by most recent IPCC reports. It emerges that improved differentiation of key drivers of risk and the understanding of different vulnerability profiles are important contributions, which can inform future adaptation policies at the regional and national level. This can change the perspective on, and basis for distributional issues in view of climate burden share, and therefore can have implications for UNFCCC financing instruments (e.g. Green Climate Fund). However, in order to better compare

  15. Psychological Vulnerability and Problem Gambling: The Mediational Role of Cognitive Distortions.

    Science.gov (United States)

    Lévesque, David; Sévigny, Serge; Giroux, Isabelle; Jacques, Christian

    2018-01-03

    Despite numerous studies demonstrating the influence of cognitive distortions on gambling problem severity, empirical data regarding the role of psychological vulnerability on the latter is limited. Hence, this study assesses the mediating effect of cognitive distortions between psychological vulnerability (personality and mood), and gambling problem severity. It also verifies whether the relationships between these variables differs according to the preferred gambling activity. The sample is composed of 272 male gamblers [191 poker players; 81 video lottery terminal (VLT) players] aged between 18 and 82 years (M = 35.2). Bootstrap analysis results revealed that cognitive distortions mediate the effect of narcissism on gambling problem severity for both groups. The level of depression for VLT players significantly predicted gambling problem severity, both directly and indirectly via the mediating effect of cognitive distortions. Mediation analyses also indicated that narcissism had an indirect impact on problem gambling through cognitive distortions for both groups. These findings suggest that certain vulnerabilities related to personality and mood may influence cognitive distortion intensity and gambling problem severity. In addition, psychological vulnerabilities could differ based on preferred gambling activity. These results may be useful for prevention policies, identifying high risk gamblers and planning psychological interventions.

  16. Space Station Program threat and vulnerability analysis

    Science.gov (United States)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  17. Analyzing Android Browser Apps for file:// Vulnerabilities

    OpenAIRE

    Wu, Daoyuan; Chang, Rocky K. C.

    2014-01-01

    Securing browsers in mobile devices is very challenging, because these browser apps usually provide browsing services to other apps in the same device. A malicious app installed in a device can potentially obtain sensitive information through a browser app. In this paper, we identify four types of attacks in Android, collectively known as FileCross, that exploits the vulnerable file:// to obtain users' private files, such as cookies, bookmarks, and browsing histories. We design an automated s...

  18. (Non-) robustness of vulnerability assessments to climate change: An application to New Zealand.

    Science.gov (United States)

    Fernandez, Mario Andres; Bucaram, Santiago; Renteria, Willington

    2017-12-01

    Assessments of vulnerability to climate change are a key element to inform climate policy and research. Assessments based on the aggregation of indicators have a strong appeal for their simplicity but are at risk of over-simplification and uncertainty. This paper explores the non-robustness of indicators-based assessments to changes in assumptions on the degree of substitution or compensation between indicators. Our case study is a nationwide assessment for New Zealand. We found that the ranking of geographic areas is sensitive to different parameterisations of the aggregation function, that is, areas that are categorised as highly vulnerable may switch to the least vulnerable category even with respect to the same climate hazards and population groups. Policy implications from the assessments are then compromised. Though indicators-based approaches may help on identifying drivers of vulnerability, there are weak grounds to use them to recommend mitigation or adaptation decisions given the high level of uncertainty because of non-robustness. Copyright © 2017 Elsevier Ltd. All rights reserved.

  19. The 2-year stability of parental perceptions of child vulnerability and parental overprotection.

    Science.gov (United States)

    Thomasgard, M; Metz, W P

    1996-08-01

    Clinicians often identify parent-child relationships that are believed to be problematic for the child's future emotional growth, yet there are minimal outcome data on which to base anticipatory guidance. This 2-year follow-up study examined the stability and child behavioral correlates of parental perceptions of increased child vulnerability and parental overprotection. Of 192 potential participants, 114 parents (93% mothers, 86% white, 75% married, 90% middle-upper socioeconomic status) with children age 4 to 7 years successfully completed the Parent Protection Scale, Child Vulnerability Scale, Child Behavior Checklist 4-18, and the Parental Bonding Instrument. The 2-year stability of high parental overprotection was 37%; for high parental perception of child vulnerability, it was 31%. High perceived vulnerability at enrollment was significantly associated with both internalizing (somatic complaints, anxious/depressed) and externalizing (aggressive) behaviors at follow-up. A history of overprotection in the parent's childhood was not associated with current parental report of overprotective behaviors toward the child.

  20. Motherhood, Marketization, and Consumer Vulnerability

    DEFF Research Database (Denmark)

    Davies, Andrea; Prothero, Andrea; Sørensen, Elin

    2010-01-01

    This article explores consumer vulnerability and the role of public policy by focusing on new mothers. Developing the consumer vulnerability model of Baker, Gentry, and Rittenburg, the authors consider how medical contexts, political and legal factors, economic resources, societal prescriptions...... a time of physical and psychological changes in mothers-to-be. This article illustrates that the extended market logic dominating contemporary mothering environments both contributes to and has the potential to exacerbate new mothers’ vulnerability, raising important challenges for public policy, both...

  1. Groundwater vulnerability mapping of Qatar aquifers

    Science.gov (United States)

    Baalousha, Husam Musa

    2016-12-01

    Qatar is one of the most arid countries in the world with limited water resources. With little rainfall and no surface water, groundwater is the only natural source of fresh water in the country. Whilst the country relies mainly on desalination of seawater to secure water supply, groundwater has extensively been used for irrigation over the last three decades, which caused adverse environmental impact. Vulnerability assessment is a widely used tool for groundwater protection and land-use management. Aquifers in Qatar are carbonate with lots of fractures, depressions and cavities. Karst aquifers are generally more vulnerable to contamination than other aquifers as any anthropogenic-sourced contaminant, especially above a highly fractured zone, can infiltrate quickly into the aquifer and spread over a wide area. The vulnerability assessment method presented in this study is based on two approaches: DRASTIC and EPIK, within the framework of Geographical Information System (GIS). Results of this study show that DRASTIC vulnerability method suits Qatar hydrogeological settings more than EPIK. The produced vulnerability map using DRASTIC shows coastal and karst areas have the highest vulnerability class. The southern part of the country is located in the low vulnerability class due to occurrence of shale formation within aquifer media, which averts downward movement of contaminants.

  2. Development of maintenance equipment for nuclear material fabrication equipment in a highly active hot cell

    International Nuclear Information System (INIS)

    Park, J. J.; Yang, M. S.; Kim, K. H. and others

    2000-09-01

    This report presents the development of a maintenance system for a highly contaminated nuclear material handling equipment at a hot-cell. This maintenance system has mainly three subsystems - a gamma-radiation measurement module for detecting a gamma-radiation level and identifying its distribution in-situ, a dry-type decontamination device for cleaning up contaminated particles, and a maintenance chamber for isolating contaminated equipment. The mechanical design considerations, controller, capabilities and remote operation and manipulation of the maintenance system are described. Such subsystems developed were installed and tested in the IMEF (Irradiated Material Examination Facility) M6 hot-cell after mock-up tests and performed their specific tasks successfully

  3. Development of maintenance equipment for nuclear material fabrication equipment in a highly active hot cell

    Energy Technology Data Exchange (ETDEWEB)

    Park, J. J.; Yang, M. S.; Kim, K. H. and others

    2000-09-01

    This report presents the development of a maintenance system for a highly contaminated nuclear material handling equipment at a hot-cell. This maintenance system has mainly three subsystems - a gamma-radiation measurement module for detecting a gamma-radiation level and identifying its distribution in-situ, a dry-type decontamination device for cleaning up contaminated particles, and a maintenance chamber for isolating contaminated equipment. The mechanical design considerations, controller, capabilities and remote operation and manipulation of the maintenance system are described. Such subsystems developed were installed and tested in the IMEF (Irradiated Material Examination Facility) M6 hot-cell after mock-up tests and performed their specific tasks successfully.

  4. Assessing the Vulnerability of Agriculture to Climate Change in Jordan

    Science.gov (United States)

    Khresat, Sa'eb; Shraidaeh, Fadi; Maddat, Amer

    2015-04-01

    Climate change represents one of the greatest environmental, social and economic threats facing Jordan. In particular, the combined effects of climate change and water scarcity threaten to affect food and water resources that are critical for livelihoods in Jordan. This is especially true for those communities who live in the dryland area in the country and who rely wholly on rain-fed agriculture. The exact nature and extent of the impact of climate change on temperature and precipitation distribution pattern remain uncertain and it is the poor and vulnerable who will be the most susceptible to climate change adverse effects. A vulnerability assessment of rain fed agriculture to climate change and variability in semi-arid parts of Jordan was conducted in 2014. The purpose of this study is to assess the vulnerability and resilience of the most vulnerable groups where rainfed and irrigated agriculture is practiced. Also, the study focused on quantifying the impacts on agricultural productivity in response to climate change. This will help policymakers and researchers better understand and anticipate the likely impacts of climate change on agriculture and on vulnerable communities in Jordan. Also, it will provide them with tools to identify and implement appropriate adaptation strategies. The data used includes; Representative Concentration Pathways (RCPs), RCP 4.5 and RCP 8.5 adopted by the IPCC for its fifth Assessment Report (AR5). Those pathways were used for climate modeling. A decision support system (DSSAT) for agricultural production was used to assess the impact of climate changes on agricultural production. This approach was used for the Identification of climate change risk and their impacts on Agriculture. Outputs from models are used to assess the vulnerability of farmers and crops to climate and socio-economic change by estimating their sensitivity and capacity to adapt to external factors as a means of identifying what causes the differences in their

  5. Experts' perspectives on SwissDRG: Second class care for vulnerable patient groups?

    Science.gov (United States)

    Leu, A; Wepf, H; Elger, B; Wangmo, T

    2018-03-14

    On the 1st of January 2012, Switzerland introduced the diagnosis-related group hospital tariff structure (SwissDRG). It was recognised that healthcare provided to the most vulnerable patient groups would be a challenge for the new SwissDRG. Coincident with the implementation of SwissDRG, we explored hospital experts' perceptions of which patient groups are vulnerable under the SwissDRG system, what has changed for this group, as well as solutions to ensure adequate access to health care for them. We interviewed 43 experts from 40 Swiss hospitals. Participating experts named several vulnerable patient groups who share some common characteristics. These hospital experts were concerned about the patient groups that are not financially profitable and questioned the practicability of the current regulation. At the same time, they highlighted the complexity associated with caring for this group under the new SwissDRG and reported measures at the macro, meso, and micro levels to protect vulnerable patient groups from negative effects. To curb negative outcomes for vulnerable patient groups after the introduction of the SwissDRG, the Swiss legislation has introduced various instruments including the acute and transitional care (ATC) measures. We conclude that ATC measures do not produce the expected effect the legislators had hoped for. More health data is needed to identify situations where vulnerable patient groups are more susceptible to inadequate health care access in Switzerland. Copyright © 2018 Elsevier B.V. All rights reserved.

  6. Vulnerability and risk of deltaic social-ecological systems exposed to multiple hazards.

    Science.gov (United States)

    Hagenlocher, Michael; Renaud, Fabrice G; Haas, Susanne; Sebesvari, Zita

    2018-08-01

    Coastal river deltas are hotspots of global change impacts. Sustainable delta futures are increasingly threatened due to rising hazard exposure combined with high vulnerabilities of deltaic social-ecological systems. While the need for integrated multi-hazard approaches has been clearly articulated, studies on vulnerability and risk in deltas either focus on local case studies or single hazards and do not apply a social-ecological systems perspective. As a result, vulnerabilities and risks in areas with strong social and ecological coupling, such as coastal deltas, are not fully understood and the identification of risk reduction and adaptation strategies are often based on incomplete assumptions. To overcome these limitations, we propose an innovative modular indicator library-based approach for the assessment of multi-hazard risk of social-ecological systems across and within coastal deltas globally, and apply it to the Amazon, Ganges-Brahmaputra-Meghna (GBM), and Mekong deltas. Results show that multi-hazard risk is highest in the GBM delta and lowest in the Amazon delta. The analysis reveals major differences between social and environmental vulnerability across the three deltas, notably in the Mekong and the GBM deltas where environmental vulnerability is significantly higher than social vulnerability. Hotspots and drivers of risk vary spatially, thus calling for spatially targeted risk reduction and adaptation strategies within the deltas. Ecosystems have been identified as both an important element at risk as well as an entry point for risk reduction and adaptation strategies. Copyright © 2018. Published by Elsevier B.V.

  7. The vulnerabilities in childhood and adolescence and the Brazilian public policy intervention.

    Science.gov (United States)

    Fonseca, Franciele Fagundes; Sena, Ramony Kris R; dos Santos, Rocky Lane A; Dias, Orlene Veloso; Costa, Simone de Melo

    2013-06-01

    To review and discuss childhood and adolescence vulnerabilities, as well as Brazilian public policies of intervention. A narrative review was performed, considering studies published between 1990 and 2012, found in the Virtual Health Library databases (Biblioteca Virtual em Saúde - BVS). A combination of the following descriptors was used in the search strategy: "Adolescent Health", "Child Health", "Health Public Politics" and "Vulnerability". In addition, Brazilian official documents, the Statute of the Child and the Adolescent, Guardianship Council, Bolsa Família and Saúde na Escola Programs were evaluated. The results were divided into five categories of analysis: Vulnerability of Children and Adolescents in Brazil, Public Politics of Intervention to Risk Factors in Childhood and Adolescence, the Statute of the Child and the Adolescent and Guardianship Council, Bolsa Família Program and Saúde na Escola Program. The studies show that children and adolescents are vulnerable to environmental and social situations. Vulnerabilities are exhibited in daily violence within families and schools, which results in the premature entrance of children and adolescents in the work environment and/or in the drug traffic. To deal with these problems, the Brazilian Government established the Statute of the Child and the Adolescent as well as social programs. Literature exposes the risks experienced by children and adolescents in Brazil. In the other hand, a Government endeavor was identified to eliminate or minimize the suffering of those in vulnerable situations through public policies targeted to this population group.

  8. Assessment of vulnerability of forest ecosystems to climate change and adaptation planning in Nepal

    Science.gov (United States)

    Matin, M. A.; Chitale, V. S.

    2016-12-01

    Understanding ecosystem level vulnerability of forests and dependence of local communities on these ecosystems is a first step towards developing effective adaptation strategies. As forests are important components of livelihoods system for a large percentage of the population in the Himalayan region, they offer an important basis for creating and safeguarding more climate-resilient communities. Increased frequency, duration, and/or severity of drought and heat stress, changes in winter ecology, and pest and fire outbreaksunder climate change scenarios could fundamentally alter the composition, productivity and biogeography of forests affecting the potential ecosystem services offered and forest-based livelihoods. Hence, forest ecosystem vulnerability assessment to climate change and the development of a knowledgebase to identify and support relevant adaptation strategies is identified as an urgent need. Climate change vulnerability is measured as a function of exposure, sensitivity and the adaptive capacity of the system towards climate variability and extreme events. Effective adaptation to climate change depends on the availability of two important prerequisites: a) information on what, where, and how to adapt, and b) availability of resources to implement the adaptation measures. In the present study, we introduce the concept of two way multitier approach, which can support effective identification and implementation of adaptation measures in Nepal and the framework can be replicated in other countries in the HKH region. The assessment of overall vulnerability of forests comprises of two components: 1) understanding the relationship between exposure and sensitivity and positive feedback from adaptive capacity of forests; 2) quantifying the dependence of local communities on these ecosystems. We use climate datasets from Bioclim and biophysical products from MODIS, alongwith field datasets. We report that most of the forests along the high altitude areas and few

  9. Vulnerability Risk Index Profile for Elder Abuse in Community-Dwelling Population

    Science.gov (United States)

    Dong, XinQi; Simon, Melissa A.

    2013-01-01

    Objectives Elder abuse is associated with increased morbidity and mortality. This study aims to develop a vulnerability index for elder abuse in a community-dwelling population. Design Population-based study Setting Geographically defined community in Chicago. Participants A population-based study was conducted in Chicago of community-dwelling older adults who participated in the Chicago Health and Aging Project (CHAP). Of the 8,157 participants in the CHAP study, 213 participants were reported to social services agency for suspected elder abuse. Measurements A vulnerability index for elder abuse was constructed from sociodemographic, health-related, and psychosocial factors. The outcomes of interest were reported and confirmed elder abuse. Logistic regression models were used to determine the accuracy of the index with respect to elder abuse outcomes. Results Out of the selected risk index for elder abuse, every one point increase in the 9 item vulnerability index items, there was a two fold increase in the risk for reported elder abuse (OR, 2.19 (2.00–2.40) and confirmed elder abuse (OR, 2.19 (1.94–2.47). Compared to the reference group, older adults with 3–4 vulnerability index items had increased risk for reported elder abuse (OR, 2.98 (1.98–4.49) and confirmed elder abuse (OR, 3.90, (2.07–7.36); and older adults with 5 or more risk index items, there was an 18 fold increase in risk for reported elder abuse (OR, 18.46 (12.15–28.04) and confirmed elder abuse (OR, 26.79 (14.18–50.61). Receiver Operating Characteristic (ROC) statistically derived curves for identifying reported elder abuse ranged between 0.77–0.84 and for predicting confirmed elder abuse ranged between 0.79–0.86. Conclusion The vulnerability risk index demonstrates value for identifying individuals at risk for elder abuse. Additional studies are needed to validate this index in other community dwelling populations. PMID:25180376

  10. Drought vulnerability assessment of maize in Sub-Saharan Africa: Insights from physical and social perspectives

    Science.gov (United States)

    Kamali, Bahareh; Abbaspour, Karim C.; Wehrli, Bernhard; Yang, Hong

    2018-03-01

    Drought as a slow-onset phenomenon inflicts important losses to agriculture where the degree of vulnerability depends not only on physical variables such as precipitation and temperature, but also on societal preparedness. While the scopes of physical and social vulnerability are very different in nature, studies distinguishing these two aspects have been lacking. In this study we address the physical and social aspects of drought vulnerability of maize (CDVIphy and CDVIsoc) in Sub-Saharan Africa (SSA). To quantify vulnerability, we applied a probabilistic framework combining a Drought Exposure Index (DEI) with a physical or social Crop Failure Index, CFIphy or CFIsoc, respectively. DEI was derived from the exceedance probability of precipitation. Maize yields, simulated using the Environmental Policy Integrated Climate (EPIC) model, were used to build CFIphy, whereas the residual of simulated and FAO recorded yields were used to construct CFIsoc. The results showed that southern and partially central Africa are more vulnerable to physical drought as compared to other regions. Central and western Africa, however, are socially highly vulnerable. Comparison of CDVIphy and CDVIsoc revealed that societal factors cause more vulnerability than physical variables in almost all SSA countries except Nigeria and South Africa. We conclude that quantification of both drought vulnerabilities help a better characterization of droughts and identify regions where more investments in drought preparedness are required.

  11. Riparian erosion vulnerability model based on environmental features.

    Science.gov (United States)

    Botero-Acosta, Alejandra; Chu, Maria L; Guzman, Jorge A; Starks, Patrick J; Moriasi, Daniel N

    2017-12-01

    Riparian erosion is one of the major causes of sediment and contaminant load to streams, degradation of riparian wildlife habitats, and land loss hazards. Land and soil management practices are implemented as conservation and restoration measures to mitigate the environmental problems brought about by riparian erosion. This, however, requires the identification of vulnerable areas to soil erosion. Because of the complex interactions between the different mechanisms that govern soil erosion and the inherent uncertainties involved in quantifying these processes, assessing erosion vulnerability at the watershed scale is challenging. The main objective of this study was to develop a methodology to identify areas along the riparian zone that are susceptible to erosion. The methodology was developed by integrating the physically-based watershed model MIKE-SHE, to simulate water movement, and a habitat suitability model, MaxEnt, to quantify the probability of presences of elevation changes (i.e., erosion) across the watershed. The presences of elevation changes were estimated based on two LiDAR-based elevation datasets taken in 2009 and 2012. The changes in elevation were grouped into four categories: low (0.5 - 0.7 m), medium (0.7 - 1.0 m), high (1.0 - 1.7 m) and very high (1.7 - 5.9 m), considering each category as a studied "species". The categories' locations were then used as "species location" map in MaxEnt. The environmental features used as constraints to the presence of erosion were land cover, soil, stream power index, overland flow, lateral inflow, and discharge. The modeling framework was evaluated in the Fort Cobb Reservoir Experimental watershed in southcentral Oklahoma. Results showed that the most vulnerable areas for erosion were located at the upper riparian zones of the Cobb and Lake sub-watersheds. The main waterways of these sub-watersheds were also found to be prone to streambank erosion. Approximatively 80% of the riparian zone (streambank

  12. Intrinsic and specific vulnerability of groundwater in central Spain: the risk of nitrate pollution

    Science.gov (United States)

    Martínez-Bastida, Juan J.; Arauzo, Mercedes; Valladolid, Maria

    2010-05-01

    The intrinsic vulnerability of groundwater in the Comunidad de Madrid (central Spain) was evaluated using the DRASTIC and GOD indexes. Groundwater vulnerability to nitrate pollution was also assessed using the composite DRASTIC (CD) and nitrate vulnerability (NV) indexes. The utility of these methods was tested by analyzing the spatial distribution of nitrate concentrations in the different aquifers located in the study area: the Tertiary Detrital Aquifer, the Moor Limestone Aquifer, the Cretaceous Limestone Aquifer and the Quaternary Aquifer. Vulnerability maps based on these four indexes showed very similar results, identifying the Quaternary Aquifer and the lower sub-unit of the Moor Limestone Aquifer as deposits subjected to a high risk of nitrate pollution due to intensive agriculture. As far as the spatial distribution of groundwater nitrate concentrations is concerned, the NV index showed the greatest statistical significance ( p Comunidad de Madrid, in line with European Union Directive 91/676/EEC.

  13. An integrated framework for assessing vulnerability to climate change and developing adaptation strategies for coffee growing families in Mesoamerica.

    Directory of Open Access Journals (Sweden)

    María Baca

    Full Text Available The Mesoamerican region is considered to be one of the areas in the world most vulnerable to climate change. We developed a framework for quantifying the vulnerability of the livelihoods of coffee growers in Mesoamerica at regional and local levels and identify adaptation strategies. Following the Intergovernmental Panel on Climate Change (IPCC concepts, vulnerability was defined as the combination of exposure, sensitivity and adaptive capacity. To quantify exposure, changes in the climatic suitability for coffee and other crops were predicted through niche modelling based on historical climate data and locations of coffee growing areas from Mexico, Guatemala, El Salvador and Nicaragua. Future climate projections were generated from 19 Global Circulation Models. Focus groups were used to identify nine indicators of sensitivity and eleven indicators of adaptive capacity, which were evaluated through semi-structured interviews with 558 coffee producers. Exposure, sensitivity and adaptive capacity were then condensed into an index of vulnerability, and adaptation strategies were identified in participatory workshops. Models predict that all target countries will experience a decrease in climatic suitability for growing Arabica coffee, with highest suitability loss for El Salvador and lowest loss for Mexico. High vulnerability resulted from loss in climatic suitability for coffee production and high sensitivity through variability of yields and out-migration of the work force. This was combined with low adaptation capacity as evidenced by poor post harvest infrastructure and in some cases poor access to credit and low levels of social organization. Nevertheless, the specific contributors to vulnerability varied strongly among countries, municipalities and families making general trends difficult to identify. Flexible strategies for adaption are therefore needed. Families need the support of government and institutions specialized in impacts of

  14. Vulnerability assessment to frost disaster in dieng volcanic highland using spatial multi-criteria evaluation

    Science.gov (United States)

    Pradana, A.; Rahmanu, Y. A.; Prabaningrum, I.; Nurafifa, I.; Hizbaron, D. R.

    2018-04-01

    Dieng Volcanic Highland is one of frost disaster prone area which is very unique phenomenon in tropical region. Frost indicated by appearance of frozen dew or ice layer on the ground or vegetation surface due air inversion and cold temperatures during midnight in dry season. Appearance of frost significantly causes plant damage and losses on agricultural land, while the impacts were strongly influenced by level of vulnerability within agricultural communities. This study aims to analyze the impact of frost on agricultural land in Dieng, to identify characteristics of physical, social, economic vulnerability and coping capacity of agricultural communities to frost disaster in Dieng, and to estimate total vulnerability of frost disasters in Dieng through SMCE scenario. Research was conducted in Dieng Village, Wonosobo and Dieng Kulon Village, Banjarnegara. Method to assess vulnerability level is performed by Spatial Multi Criteria Evaluation (SMCE) method using ILWIS software through a combination of physical, social, and economic vulnerability regarding frost hazard, as well as coping capacity of farmers. Data collected by interview within different agricultural plots using questionnaire and in-depth interview method on frost affected agricultural land. Impact of frost mostly causes damage on potato agricultural land than any other types of commodities, such as carrot, leek or cabbage. Losses varies in range of 0 million to 55 million rupiah, at most events in range of 10 million to 15 million rupiah during frost season on July-August-September. Main factors determining vulnerability comes from crop losses, preparedness effort, and type of commodity. Agricultural land dominated by high level physical vulnerability (95.37 percent), high level social vulnerability (70.79 percent), moderate level economic vulnerability (79.23 percent) and moderate level coping capacity (73.18 percent). All five scenarios indicated that level of total vulnerability vary only from

  15. Vulnerability and livelihoods before and after the Haiti earthquake

    OpenAIRE

    Echevin, Damien

    2011-01-01

    This paper examines the dynamics of poverty and vulnerability in Haiti using various data sets. As living conditions survey data are not comparable in this country, we first propose to use the three rounds of the Demographic Health Survey (DHS) available before the earthquake. Decomposing household assets changes into age and cohort effects, we use repeated cross-section data to identify a...

  16. Assessment of vulnerability zones for ground water pollution using GIS-DRASTIC-EC model: A field-based approach

    Science.gov (United States)

    Anantha Rao, D.; Naik, Pradeep K.; Jain, Sunil K.; Vinod Kumar, K.; Dhanamjaya Rao, E. N.

    2018-06-01

    Assessment of groundwater vulnerability to pollution is an essential pre-requisite for better planning of an area. We present the groundwater vulnerability assessment in parts of the Yamuna Nagar District, Haryana State, India in an area of about 800 km2, considered to be a freshwater zone in the foothills of the Siwalik Hill Ranges. Such areas in the Lower Himalayas form good groundwater recharge zones, and should always be free from contamination. But, the administration has been trying to promote industrialization along these foothill zones without actually assessing the environmental consequences such activities may invite in the future. GIS-DRASTIC model has been used with field based data inputs for studying the vulnerability assessment. But, we find that inclusion electrical conductivity (EC) as a model parameter makes it more robust. Therefore, we rename it as GIS-DRASTIC-EC model. The model identifies three vulnerability zones such as low, moderate and high with an areal extent of 5%, 80% and 15%, respectively. On the basis of major chemical parameters alone, the groundwater in the foothill zones apparently looks safe, but analysis with the help of GIS-DRASTIC-EC model gives a better perspective of the groundwater quality in terms of identifying the vulnerable areas.

  17. Late diagnosis and vulnerabilities of the elderly living with HIV/AIDS

    Directory of Open Access Journals (Sweden)

    Rúbia Aguiar Alencar

    2015-04-01

    Full Text Available OBJECTIVE To identify vulnerabilities of elderly people with HIV/AIDS and the trajectory that they follow until reaching the diagnosis of the disease. METHOD Qualitative research conducted in specialized clinics in the state of São Paulo, from January to June 2011. Semi-structured interviews were conducted with 11 elderly people who were found to be infected with the virus at the age of 60 years or older. The interviews were analyzed using content analysis. RESULTS In this process four categories emerged, then analyzed with reference to the theoretical framework of vulnerability. CONCLUSION Late diagnosis of HIV infection or AIDS among the elderly happens in the secondary or tertiary service. Issues related to sexual life of the elderly are only questioned by health professionals after the diagnosis, also the time that condom use becomes absolute. It is believed that the investigation of the vulnerability of the elderly to HIV/AIDS allows for carrying out appropriate interventions for this population.

  18. Equipment Reliability Program in NPP Krsko

    International Nuclear Information System (INIS)

    Skaler, F.; Djetelic, N.

    2006-01-01

    Operation that is safe, reliable, effective and acceptable to public is the common message in a mission statement of commercial nuclear power plants (NPPs). To fulfill these goals, nuclear industry, among other areas, has to focus on: 1 Human Performance (HU) and 2 Equipment Reliability (EQ). The performance objective of HU is as follows: The behaviors of all personnel result in safe and reliable station operation. While unwanted human behaviors in operations mostly result directly in the event, the behavior flaws either in the area of maintenance or engineering usually cause decreased equipment reliability. Unsatisfied Human performance leads even the best designed power plants into significant operating events, which can be found as well-known examples in nuclear industry. Equipment reliability is today recognized as the key to success. While the human performance at most NPPs has been improving since the start of WANO / INPO / IAEA evaluations, the open energy market has forced the nuclear plants to reduce production costs and operate more reliably and effectively. The balance between these two (opposite) goals has made equipment reliability even more important for safe, reliable and efficient production. Insisting on on-line operation by ignoring some principles of safety could nowadays in a well-developed safety culture and human performance environment exceed the cost of electricity losses. In last decade the leading USA nuclear companies put a lot of effort to improve equipment reliability primarily based on INPO Equipment Reliability Program AP-913 at their NPP stations. The Equipment Reliability Program is the key program not only for safe and reliable operation, but also for the Life Cycle Management and Aging Management on the way to the nuclear power plant life extension. The purpose of Equipment Reliability process is to identify, organize, integrate and coordinate equipment reliability activities (preventive and predictive maintenance, maintenance

  19. Social vulnerability to heat in Greater Atlanta, USA: spatial pattern of heat, NDVI, socioeconomics and household composition

    Science.gov (United States)

    Sim, Sunhui

    2017-10-01

    The purpose of the article is evaluating spatial patterns of social vulnerability to heat in Greater Atlanta in 2015. The social vulnerability to heat is an index of socioeconomic status, household composition, land surface temperature and normalized differential vegetation index (NDVI). Land surface temperature and NDVI were derived from the red, NIR and thermal infrared (TIR) of a Landsat OLI/TIRS images collected on September 14, 2015. The research focus is on the variation of heat vulnerability in Greater Atlanta. The study found that heat vulnerability is highly clustered spatially, resulting in "hot spots" and "cool spots". The results show significant health disparities. The hotspots of social vulnerability to heat occurred in neighborhoods with lower socioeconomic status as measured by low education, low income and more poverty, greater proportion of elderly people and young children. The findings of this study are important for identifying clusters of heat vulnerability and the relationships with social factors. These significant results provide a basis for heat intervention services.

  20. Development of augmented reality system for servicing electromechanical equipment

    Science.gov (United States)

    Zhukovskiy, Y.; Koteleva, N.

    2018-05-01

    Electromechanical equipment is widely used. It is used in industrial enterprises, in the spheres of public services, in everyday life, etc. Maintenance servicing of electromechanical equipment is an important part of its life cycle. High-quality and timely service can extend the life of the electromechanical equipment. The creation of special systems that simplify the process of servicing electromechanical equipment is an urgent task. Such systems can shorten the time for maintenance of electrical equipment, and, therefore, reduce the cost of maintenance in general. This article presents an analysis of information on the operation of service services for maintenance and repair of electromechanical equipment, identifies the list of services, and estimates the time required to perform basic service operations. The structure of the augmented reality system is presented, the ways of interaction of the augmented reality system with the automated control systems working at the enterprise are presented.

  1. Vulnerability analysis methods for road networks

    Science.gov (United States)

    Bíl, Michal; Vodák, Rostislav; Kubeček, Jan; Rebok, Tomáš; Svoboda, Tomáš

    2014-05-01

    steps can be taken in order to make it more resilient. Performing such an analysis of network break-ups requires consideration of the network as a whole, ideally identifying all the cases generated by simultaneous closure of multiple links and evaluating them using various criteria. The spatial distribution of settlements, important companies and the overall population in the nodes of the network are several factors, apart from the topology of the network which could be taken into account when computing vulnerability indices and identifying the weakest links and/or weakest link combinations. However, even for small networks (i.e., hundreds of nodes and links), the problem of break-up identification becomes extremely difficult to resolve. The naive approaches of the brute force examination consequently fail and more elaborated algorithms have to be applied. We address the problem of evaluating the vulnerability of road networks in our work by simulating the impacts of the simultaneous closure of multiple roads/links. We present an ongoing work on a sophisticated algorithm focused on the identification of network break-ups and evaluating them by various criteria.

  2. A vulnerability-centric requirements engineering framework : Analyzing security attacks, countermeasures, and requirements based on vulnerabilities

    NARCIS (Netherlands)

    Elahi, G.; Yu, E.; Zannone, N.

    2010-01-01

    Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a methodological framework for security requirements

  3. Chemical Safety Vulnerability Working Group report. Volume 3

    Energy Technology Data Exchange (ETDEWEB)

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

  4. Chemical Safety Vulnerability Working Group report. Volume 3

    International Nuclear Information System (INIS)

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports

  5. After-hours Power Status of Office Equipment and Inventory of Miscellaneous Plug-load Equipment

    Energy Technology Data Exchange (ETDEWEB)

    Roberson, Judy A.; Webber, Carrie A.; McWhinney, Marla C.; Brown, Richard E.; Pinckard, Margaret J.; Busch, John F.

    2004-01-22

    This research was conducted in support of two branches of the EPA ENERGY STAR program, whose overall goal is to reduce, through voluntary market-based means, the amount of carbon dioxide emitted in the U.S. The primary objective was to collect data for the ENERGY STAR Office Equipment program on the after-hours power state of computers, monitors, printers, copiers, scanners, fax machines, and multi-function devices. We also collected data for the ENERGY STAR Commercial Buildings branch on the types and amounts of ''miscellaneous'' plug-load equipment, a significant and growing end use that is not usually accounted for by building energy managers. This data set is the first of its kind that we know of, and is an important first step in characterizing miscellaneous plug loads in commercial buildings. The main purpose of this study is to supplement and update previous data we collected on the extent to which electronic office equipment is turned off or automatically enters a low power state when not in active use. In addition, it provides data on numbers and types of office equipment, and helps identify trends in office equipment usage patterns. These data improve our estimates of typical unit energy consumption and savings for each equipment type, and enables the ENERGY STAR Office Equipment program to focus future effort on products with the highest energy savings potential. This study expands our previous sample of office buildings in California and Washington DC to include education and health care facilities, and buildings in other states. We report data from twelve commercial buildings in California, Georgia, and Pennsylvania: two health care buildings, two large offices (> 500 employees each), three medium offices (50-500 employees), four education buildings, and one ''small office'' that is actually an aggregate of five small businesses. Two buildings are in the San Francisco Bay area of California, five are in

  6. [Vulnerability to depression in children and adolescents: update and perspectives].

    Science.gov (United States)

    Purper-Ouakil, D; Michel, G; Mouren-Siméoni, M-C

    2002-01-01

    Depression in children and adolescents is associated with poor psychosocial functioning, high psychiatric comorbidity, risk of recurrent episodes or onset of bipolar disorder. These findings emphasize the importance of early identification of children and adolescents having elevated risk for future depression and further development, evaluation and greater availability of prevention strategies. Our review aims an update about depressive vulnerability in children and adolescents in the perspective of better identification of at-risk populations and targeting of prevention programs. Psychopathology, in particular anxiety and disruptive disorders are well identified risk-factors for later depression. Subclinical depressive symptomatology, also termed "demoralization", also identifies high-risk populations, likely to become incident cases of depression. It is still unclear whether this condition is prodromal depression, a specific clinical entity or the expression of biological and/or cognitive vulnerability. Familial risk for depressive disorders involves both genetic and psychosocial factors. Marital discord, poor communication and dysfunctional parenting practices are often present in families with affective disorders and can be implicated in increased depressive vulnerability in the offspring. Research on individual vulnerability in children and adolescents has focused on temperamental and cognitive characteristics. Temperament traits describe individual differences in reactivity and behavior. High emotionality, defined as the tendency to become upset easily and intensely has been associated with an increased risk for subsequent major depression. However, as the majority of high scorers will not become depressive cases, emotionality should not be the only criterion for selection of at-risk populations. Cognitive style including poor self esteem, low social competence and negative attributions are also associated with increased likelihood of depressive symptoms, but

  7. Temporal trends in human vulnerability to excessive heat

    Science.gov (United States)

    Sheridan, Scott C.; Allen, Michael J.

    2018-04-01

    Over recent decades, studies have examined various morbidity and mortality outcomes associated with heat exposure. This review explores the collective knowledge of the temporal trends of heat on human health, with regard to the hypothesis that humans are less vulnerable to heat events presently than in the past. Using Web of Science and Scopus, the authors identified all peer-reviewed articles that contained keywords on human impact (e.g. mortality, morbidity) and meteorological component (e.g. heat, heatwave). After sorting, a total of 71 articles, both case studies and epidemiological studies, contained explicit assessments of temporal trends in human vulnerability, and thus were used in this review. Most of the studies utilized mortality data, focused on the developed world, and showed a general decrease in heat sensitivity. Factors such as the implementation of a heat warning system, increased awareness, and improved quality of life were cited as contributing factors that led to the decreased impact of heat. Despite the overall recent decreases in heat vulnerability, spatial variability was shown, and differences with respect to health outcomes were also discussed. Several papers noted increases in heat’s impact on human health, particularly when unprecedented conditions occurred. Further, many populations, from outdoor workers to rural residents, in addition to the populations in much of the developing world, have been significantly underrepresented in research to date, and temporal changes in their vulnerability should be assessed in future studies. Moreover, continued monitoring and improvement of heat intervention is needed; with projected changes in the frequency, duration, and intensity of heat events combined with shifts in demographics, heat will remain a major public health issue moving forward.

  8. Seismic qualification of equipment by means of probabilistic risk assessment

    International Nuclear Information System (INIS)

    Azarm, M.A.; Farahzad, P.; Boccio, J.L.

    1982-01-01

    Upon the sponsorship of the Equipment Qualification Branch (EQB) of NRC, Brookhaven National Laboratory (BNL) has utilized a risk-based approach for identifying, in a generic fashion, seismically risk-sensitive equipment. It is anticipated that the conclusions drawn therefrom and the methodology employed will, in part, reconcile some of the concerns dealing with the seismic qualification of equipment in operating plants. The approach taken augments an existing sensitivity analysis, based upon the WASH-1400 Reactor Safety Study (RSS), by accounting for seismicity and component fragility with the Kennedy model and by essentially including the requisite seismic data presented in the Zion Probabilistic Safety Study (ZPSS). Parametrically adjusting the seismic-related variables and ascertaining their effects on overall plant risk, core-melt probability, accident sequence probability, etc., allows one to identify those seismically risk-sensitive systems and equipment. This paper describes the approach taken and highlights the results obtained thus far for a hypothetical pressurized water reactor

  9. Transplant recipients are vulnerable to coverage denial under Medicare Part D.

    Science.gov (United States)

    Potter, Lisa M; Maldonado, Angela Q; Lentine, Krista L; Schnitzler, Mark A; Zhang, Zidong; Hess, Gregory P; Garrity, Edward; Kasiske, Bertram L; Axelrod, David A

    2018-02-15

    Transplant immunosuppressants are often used off-label because of insufficient randomized prospective trial data to achieve organ-specific US Food and Drug Administration (FDA) approval. Transplant recipients who rely on Medicare Part D for immunosuppressant drug coverage are vulnerable to coverage denial for off-label prescriptions, unless use is supported by Centers for Medicare & Medicaid Services (CMS)-approved compendia. An integrated dataset including national transplant registry data and 3 years of dispensed pharmacy records was used to identify the prevalence of immunosuppression use that is both off-label and not supported by CMS-approved compendia. Numbers of potentially vulnerable transplant recipients were identified. Off-label and off-compendia immunosuppression regimens are frequently prescribed (3-year mean: lung 66.5%, intestine 34.2%, pancreas 33.4%, heart 21.8%, liver 16.5%, kidney 0%). The annual retail cost of these at-risk medications exceeds $30 million. This population-based study of transplant immunosuppressants vulnerable to claim denials under Medicare Part D coverage demonstrates a substantial gap between clinical practice, current FDA approval processes, and policy mandates for pharmaceutical coverage. This coverage barrier reduces access to life-saving medications for patients without alternative resources and may increase the risk of graft loss and death from medication nonadherence. © 2018 The American Society of Transplantation and the American Society of Transplant Surgeons.

  10. Groundwater vulnerability and risk mapping using GIS, modeling and a fuzzy logic tool.

    Science.gov (United States)

    Nobre, R C M; Rotunno Filho, O C; Mansur, W J; Nobre, M M M; Cosenza, C A N

    2007-12-07

    A groundwater vulnerability and risk mapping assessment, based on a source-pathway-receptor approach, is presented for an urban coastal aquifer in northeastern Brazil. A modified version of the DRASTIC methodology was used to map the intrinsic and specific groundwater vulnerability of a 292 km(2) study area. A fuzzy hierarchy methodology was adopted to evaluate the potential contaminant source index, including diffuse and point sources. Numerical modeling was performed for delineation of well capture zones, using MODFLOW and MODPATH. The integration of these elements provided the mechanism to assess groundwater pollution risks and identify areas that must be prioritized in terms of groundwater monitoring and restriction on use. A groundwater quality index based on nitrate and chloride concentrations was calculated, which had a positive correlation with the specific vulnerability index.

  11. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1

    International Nuclear Information System (INIS)

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation

  12. A measure of vulnerability and damage tolerance

    International Nuclear Information System (INIS)

    Lind, Niels C.

    1995-01-01

    The purpose of the paper is to present probabilistic definitions of 'vulnerability' and 'damage tolerance'. A new measure of damage is also proposed. Disastrous failures, such as of the Titanic or the Chernobyl reactor, have revealed that some systems can be highly vulnerable. A seemingly insignificant damage can reduce such a system's resistance severely. Attempts to write design code requirements for damage tolerance or structural integrity have not been successful so far. One reason is that these ideas have not been defined with the necessary precision. The suggested definitions aim to be general, applicable to all engineered systems, and readily specializable to particular system types. Vulnerability is defined as the ratio of the failure probability of the damaged system to the failure probability of the undamaged system. It is argued that 'vulnerability' and 'damage tolerance' are complementary concepts. Damage tolerance is defined as the reciprocal of vulnerability. Vulnerability and damage tolerance both concern hypothetical future damage. A damage factor, applicable for the analysis of an existing structure in an assessed state of damage, is defined analogous to vulnerability. Application is illustrated by examples

  13. Assessing the Security Vulnerabilities of Correctional Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Morrison, G.S.; Spencer, D.S.

    1998-10-27

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  14. Drug abuse: vulnerability and transition to addiction.

    Science.gov (United States)

    Le Moal, M

    2009-05-01

    Intrinsic vulnerability is central to the transition of recreational drug use to misuse. Several factors contribute to vulnerability, inherent or acquired, and they account for the huge individual differences observed concerning the propensity to enter in the addiction process. Some of the multifactional causes for a vulnerable phenotype will be examined: genetic factors, age and gender influences, various comorbidities and epidemiological observations. Stress-induced vulnerability will be particularly reviewed because it provides a good model for a pathophysiological research and for relating environmental events to biological consequences of drug vulnerability, namely through the striato-cortical dopamine system. Experimental studies are generally blind concerning these historical factors that contribute vulnerability and a critical evaluation of current animal models is needed. The transition of the last stage of the process, addiction, is conceptualized as a progression from homeostasis to allostasis and then, to pathology.

  15. Seismic verification of nuclear plant equipment anchorage

    International Nuclear Information System (INIS)

    Lepiece, M.; Van Vyve, J.

    1991-01-01

    More than 60% of the electrical power of Belgium is generated by seven PWR nuclear power plants. For three of them, the electro-mechanical equipment had to be reassessed after ten years of operation, because the seismic requirements were upgraded from 0.1 g to 0.17 g free field ground acceleration. The seismic requalification of the active equipment was a critical problem as the classical methods were too conservative. The approach based on the use of the past experience on the seismic behavior of nonnuclear equipment, chosen and developed by the SQUG, had to be transposed to the Belgian N.P.P. The decision of the accept-ability of equipment relies heavily on the aseismatic capacity of anchorage. The Electrical Power Research Institute (EPRI) developed the procedure and guideline for the demonstration of the aseismatic adequacy of equipment anchorage in a cost-effective and consistent manner, to support the decision by Seismic Review Team. The field inspection procedure to identify the type of fasteners and detect their possible defects and the verification procedure developed to calculate the aseismatic capacity of equipment anchorage on the strength of fasteners, the aseismatic capacity of anchorage and the comparison of the capacity with the demand are reported. (K.I.)

  16. Vulnerability to asset-poverty in Sub-Saharan Africa

    OpenAIRE

    Echevin, Damien

    2011-01-01

    This paper presents a methodology to measure vulnerability to asset-poverty. Using repeated cross-section data, age cohort decomposition techniques focusing on second-order moments can be used to identify and estimate the variance of shocks on assets and, therefore, the probability of being poor in the future. Estimates from the Ghana Living Standard Surveys show that expected asset-poverty is a reliable proxy for expected consumption-poverty. Applying the methodology to nine Demographic Heal...

  17. Machine learning algorithm accurately detects fMRI signature of vulnerability to major depression.

    Science.gov (United States)

    Sato, João R; Moll, Jorge; Green, Sophie; Deakin, John F W; Thomaz, Carlos E; Zahn, Roland

    2015-08-30

    Standard functional magnetic resonance imaging (fMRI) analyses cannot assess the potential of a neuroimaging signature as a biomarker to predict individual vulnerability to major depression (MD). Here, we use machine learning for the first time to address this question. Using a recently identified neural signature of guilt-selective functional disconnection, the classification algorithm was able to distinguish remitted MD from control participants with 78.3% accuracy. This demonstrates the high potential of our fMRI signature as a biomarker of MD vulnerability. Crown Copyright © 2015. Published by Elsevier Ireland Ltd. All rights reserved.

  18. Safeguard Vulnerability Analysis Program (SVAP)

    International Nuclear Information System (INIS)

    Gilman, F.M.; Dittmore, M.H.; Orvis, W.J.; Wahler, P.S.

    1980-01-01

    This report gives an overview of the Safeguard Vulnerability Analysis Program (SVAP) developed at Lawrence Livermore National Laboratory. SVAP was designed as an automated method of analyzing the safeguard systems at nuclear facilities for vulnerabilities relating to the theft or diversion of nuclear materials. SVAP addresses one class of safeguard threat: theft or diversion of nuclear materials by nonviolent insiders, acting individually or in collusion. SVAP is a user-oriented tool which uses an interactive input medium for preprocessing the large amounts of safeguards data. Its output includes concise summary data as well as detailed vulnerability information

  19. Vulnerability of multiple-barrier systems

    International Nuclear Information System (INIS)

    Lind, N.C.

    1996-01-01

    'Vulnerability' is defined as the ratio of the probability of failure of a damaged system to the probability of failure of the undamaged system. This definition applies to all engineered systems and can be specialized to particular system types. Some disastrous failures (e.g., Chernobyl) have shown that systems can be highly vulnerable. open-quotes Defense in depthclose quotes is a powerful design principle, reducing vulnerability when the consequences of failure can be catastrophic. In the nuclear industry, defense in depth is widely used in radiation protection, reactor control, and shutdown systems. A multiple-barrier system is a simple example of a system that has defense in depth. The idea is that the system is not vulnerable. It cannot fail if one barrier fails because there is another to take its place. This idea is untenable in waste management, but a quantified vulnerability of a system can help owners, designers, and regulators decide how much defense in depth is desirable or enough. Many multiple-barrier systems can be modeled as systems of components physically in a series, each individually able to prevent failure. Components typically have bimodal distributions of the service time to failure, as illustrated by an example of application to a hypothetical nuclear fuel waste repository

  20. Developing new methodology for nuclear power plants vulnerability assessment

    International Nuclear Information System (INIS)

    Kostadinov, Venceslav

    2011-01-01

    new methodology and solution methods for vulnerability assessment can help the overall national energy sector to identify and understand the terrorist threats to and vulnerabilities of its critical infrastructure. Moreover, adopted methodology could help national regulators and agencies to develop and implement a vulnerability awareness and education programs for their critical assets to enhance the security and a safe operation of the entire energy infrastructure. New methods can also assist nuclear power plants to develop, validate, and disseminate assessment and surveys of new efficient countermeasures. Consequently, concise description of developed new quantitative method and adapted new methodology for nuclear regulatory vulnerability assessment of nuclear power plants are presented.

  1. Generation of equipment response spectrum considering equipment-structure interaction

    International Nuclear Information System (INIS)

    Lee, Sang Hoon; Yoo, Kwang Hoon

    2005-01-01

    Floor response spectra for dynamic response of subsystem such as equipment, or piping in nuclear power plant are usually generated without considering dynamic interaction between main structure and subsystem. Since the dynamic structural response generally has the narrow-banded shapes, the resulting floor response spectra developed for various locations in the structure usually have high spectral peak amplitudes in the narrow frequency bands corresponding to the natural frequencies of the structural system. The application of such spectra for design of subsystems often leads to excessive design conservatisms, especially when the equipment frequency and structure are at resonance condition. Thus, in order to provide a rational and realistic design input for dynamic analysis and design of equipment, dynamic equipment-structure interaction (ESI) should be considered in developing equipment response spectrum which is particularly important for equipment at the resonance condition. Many analytical methods have been proposed in the past for developing equipment response spectra considering ESI. However, most of these methods have not been adapted to the practical applications because of either the complexities or the lack of rigorousness of the methods. At one hand, mass ratio among the equipment and structure was used as an important parameter to obtain equipment response spectra. Similarly, Tseng has also proposed the analytical method for developing equipment response spectra using mass ratio in the frequency domain. This method is analytically rigorous and can be easily validated. It is based on the dynamic substructuring method as applied to the dynamic soil-structure interaction (SSI) analysis, and can relatively easily be implemented for practical applications without to change the current dynamic analysis and design practice for subsystems. The equipment response spectra derived in this study are also based on Tseng's proposed method

  2. Application of Fuzzy Cognitive Mapping in Livelihood Vulnerability Analysis

    Directory of Open Access Journals (Sweden)

    Chrispen Murungweni

    2011-12-01

    Full Text Available Feedback mechanisms are important in the analysis of vulnerability and resilience of social-ecological systems, as well as in the analysis of livelihoods, but how to evaluate systems with direct feedbacks has been a great challenge. We applied fuzzy cognitive mapping, a tool that allows analysis of both direct and indirect feedbacks and can be used to explore the vulnerabilities of livelihoods to identified hazards. We studied characteristics and drivers of rural livelihoods in the Great Limpopo Transfrontier Conservation Area in southern Africa to assess the vulnerability of inhabitants to the different hazards they face. The process involved four steps: (1 surveys and interviews to identify the major livelihood types; (2 description of specific livelihood types in a system format using fuzzy cognitive maps (FCMs, a semi-quantitative tool that models systems based on people's knowledge; (3 linking variables and drivers in FCMs by attaching weights; and (4 defining and applying scenarios to visualize the effects of drought and changing park boundaries on cash and household food security. FCMs successfully gave information concerning the nature (increase or decrease and magnitude by which a livelihood system changed under different scenarios. However, they did not explain the recovery path in relation to time and pattern (e.g., how long it takes for cattle to return to desired numbers after a drought. Using FCMs revealed that issues of policy, such as changing situations at borders, can strongly aggravate effects of climate change such as drought. FCMs revealed hidden knowledge and gave insights that improved the understanding of the complexity of livelihood systems in a way that is better appreciated by stakeholders.

  3. Climate Vulnerability and Human Migration in Global Perspective

    Science.gov (United States)

    Grecequet, Martina; DeWaard, Jack; Hellmann, Jessica J.; Abel, Guy J.

    2018-01-01

    The relationship between climate change and human migration is not homogenous and depends critically on the differential vulnerability of population and places. If places and populations are not vulnerable, or susceptible, to climate change, then the climate–migration relationship may not materialize. The key to understanding and, from a policy perspective, planning for whether and how climate change will impact future migration patterns is therefore knowledge of the link between climate vulnerability and migration. However, beyond specific case studies, little is known about this association in global perspective. We therefore provide a descriptive, country-level portrait of this relationship. We show that the negative association between climate vulnerability and international migration holds only for countries least vulnerable to climate change, which suggests the potential for trapped populations in more vulnerable countries. However, when analyzed separately by life supporting sector (food, water, health, ecosystem services, human habitat, and infrastructure) and vulnerability dimension (exposure, sensitivity, and adaptive capacity), we detect evidence of a relationship among more, but not the most, vulnerable countries. The bilateral (i.e., country-to-country) migration show that, on average, people move from countries of higher vulnerability to lower vulnerability, reducing global risk by 15%. This finding is consistent with the idea that migration is a climate adaptation strategy. Still, ~6% of bilateral migration is maladaptive with respect to climate change, with some movement toward countries with greater climate change vulnerability. PMID:29707262

  4. Climate Vulnerability and Human Migration in Global Perspective.

    Science.gov (United States)

    Grecequet, Martina; DeWaard, Jack; Hellmann, Jessica J; Abel, Guy J

    2017-05-01

    The relationship between climate change and human migration is not homogenous and depends critically on the differential vulnerability of population and places. If places and populations are not vulnerable, or susceptible, to climate change, then the climate-migration relationship may not materialize. The key to understanding and, from a policy perspective, planning for whether and how climate change will impact future migration patterns is therefore knowledge of the link between climate vulnerability and migration. However, beyond specific case studies, little is known about this association in global perspective. We therefore provide a descriptive, country-level portrait of this relationship. We show that the negative association between climate vulnerability and international migration holds only for countries least vulnerable to climate change, which suggests the potential for trapped populations in more vulnerable countries. However, when analyzed separately by life supporting sector (food, water, health, ecosystem services, human habitat, and infrastructure) and vulnerability dimension (exposure, sensitivity, and adaptive capacity), we detect evidence of a relationship among more, but not the most, vulnerable countries. The bilateral (i.e., country-to-country) migration show that, on average, people move from countries of higher vulnerability to lower vulnerability, reducing global risk by 15%. This finding is consistent with the idea that migration is a climate adaptation strategy. Still, ~6% of bilateral migration is maladaptive with respect to climate change, with some movement toward countries with greater climate change vulnerability.

  5. Climate Change and Coastal Zones. An Overview of the State-of-the-Art on Regional and Local Vulnerability Assessment

    International Nuclear Information System (INIS)

    Sterr, H.; Klein, R.J.T.; Reese, S.

    2000-06-01

    This paper provides an overview of the latest developments in methodologies for assessing the vulnerability of coastal zones to climate change at regional and local scales. The focus of vulnerability assessment in coastal zones used to be on erosion and land loss due to sea-level rise. Methodologies now increasingly consider the wide range of climate and impact variables that play a part in determining coastal vulnerability, as well as non-climatic developments. The paper presents a conceptual framework for vulnerability assessment that identifies a number of system components that can be considered determinants of vulnerability. It then goes on to outline a number of steps that are required for the actual assessment of coastal vulnerability, such as scenario development, data collection and impact assessment. The approach is illustrated using a regional and local case study in Germany

  6. Methods to Secure Databases Against Vulnerabilities

    Science.gov (United States)

    2015-12-01

    for several languages such as C, C++, PHP, Java and Python [16]. MySQL will work well with very large databases. The documentation references...using Eclipse and connected to each database management system using Python and Java drivers provided by MySQL , MongoDB, and Datastax (for Cassandra...tiers in Python and Java . Problem MySQL MongoDB Cassandra 1. Injection a. Tautologies Vulnerable Vulnerable Not Vulnerable b. Illegal query

  7. Vulnerability to temperature-related mortality in Seoul, Korea

    International Nuclear Information System (INIS)

    Son, Ji-Young; Anderson, G Brooke; Bell, Michelle L; Lee, Jong-Tae

    2011-01-01

    Studies indicate that the mortality effects of temperature may vary by population and region, although little is known about the vulnerability of subgroups to these risks in Korea. This study examined the relationship between temperature and cause-specific mortality for Seoul, Korea, for the period 2000-7, including whether some subgroups are particularly vulnerable with respect to sex, age, education and place of death. The authors applied time-series models allowing nonlinear relationships for heat- and cold-related mortality, and generated exposure-response curves. Both high and low ambient temperatures were associated with increased risk for daily mortality. Mortality risk was 10.2% (95% confidence interval 7.43, 13.0%) higher at the 90th percentile of daily mean temperatures (25 deg. C) compared to the 50th percentile (15 deg. C). Mortality risk was 12.2% (3.69, 21.3%) comparing the 10th (-1 deg. C) and 50th percentiles of temperature. Cardiovascular deaths showed a higher risk to cold, whereas respiratory deaths showed a higher risk to heat effect, although the differences were not statistically significant. Susceptible populations were identified such as females, the elderly, those with no education, and deaths occurring outside of a hospital for heat- and cold-related total mortality. Our findings provide supportive evidence of a temperature-mortality relationship in Korea and indicate that some subpopulations are particularly vulnerable.

  8. Determining Vulnerability Importance in Environmental Impact Assessment

    International Nuclear Information System (INIS)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-01

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: ► The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. ► The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. ► A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. ► Results in Colombia highlight the usefulness and objectivity of this method.

  9. A qualitative study into the perceived barriers of accessing healthcare among a vulnerable population involved with a community centre in Romania.

    Science.gov (United States)

    George, Siân; Daniels, Katy; Fioratou, Evridiki

    2018-04-03

    Minority vulnerable communities, such as the European Roma, often face numerous barriers to accessing healthcare services, resulting in negative health outcomes. Both these barriers and outcomes have been reported extensively in the literature. However, reports on barriers faced by European non-Roma native communities are limited. The "Health Care Access Barriers" (HCAB) model identifies pertinent financial, structural and cognitive barriers that can be measured and potentially modified. The present study thus aims to explore the barriers to accessing healthcare for a vulnerable population of mixed ethnicity from a charity community centre in Romania, as perceived by the centre's family users and staff members, and assess whether these reflect the barriers identified from the HCAB model. Eleven community members whose children attend the centre and seven staff members working at the centre participated in face-to-face semi-structured interviews, exploring personal experiences and views on accessing healthcare. The interviews were transcribed and analysed using an initial deductive and secondary inductive approach to identify HCAB themes and other emerging themes and subthemes. Identified themes from both groups aligned with HCAB's themes of financial, structural and cognitive barriers and emergent subthemes important to the specific population were identified. Specifically, financial barriers related mostly to health insurance and bribery issues, structural barriers related mostly to service availability and accessibility, and cognitive barriers related mostly to healthcare professionals' attitudes and discrimination and the vulnerable population's lack of education and health literacy. A unique theme of psychological barriers emerged from both groups with associated subthemes of mistrust, hopelessness, fear and anxiety of this vulnerable population. The current study highlights healthcare access barriers to a vulnerable non-Roma native population involved with a

  10. Effectiveness of medical equipment donations to improve health systems: how much medical equipment is broken in the developing world?

    Science.gov (United States)

    Perry, Lora; Malkin, Robert

    2011-07-01

    It is often said that most of the medical equipment in the developing world is broken with estimates ranging up to 96% out of service. But there is little documented evidence to support these statements. We wanted to quantify the amount of medical equipment that was out of service in resource poor health settings and identify possible causes. Inventory reports were analyzed from 1986 to 2010, from hospitals in sixteen countries across four continents. The UN Human Development Index was used to determine which countries should be considered developing nations. Non-medical hospital equipment was excluded. This study examined 112,040 pieces of equipment. An average of 38.3% (42,925, range across countries: 0.83-47%) in developing countries was out of service. The three main causes were lack of training, health technology management, and infrastructure. We hope that the findings will help biomedical engineers with their efforts toward effective designs for the developing world and NGO's with efforts to design effective healthcare interventions.

  11. Spatial-temporal eco-environmental vulnerability assessment and its influential factors based on Landsat data

    Science.gov (United States)

    Anh, N. K.; Liou, Y. A.; Ming-Hsu, L.

    2016-12-01

    Regional land use/land cover (LULC) changes lead to various changes in ecological processes and, in turn, alter regional micro-climate. To understand eco-environmental responses to LULC changes, eco-environmental evaluation is thus required with aims to identify vulnerable regions and influential factors, so that practical measures for environmental protection and management may be proposed. The Thua Thien - Hue Province has been experiencing urbanization at a rapid rate in both population and physical size. The urban land, agricultural land, and aquaculture activities have been invasively into natural space and caused eco-environment deterioration by land desertification, soil erosion, shrinking forest resources,…etc. In this study, an assessment framework that is composed by 11 variables with 9 of them constructed from Landsat time series is proposed to serve as basis to examine eco-environmental vulnerability in the Thua Thien - Hue Province in years 1989, 2003, and 2014. An eco-environmental vulnerability map is assorted into six vulnerability levels consisting of potential, slight, light, medium, heavy, and very heavy vulnerabilities. Result shows that there is an increasing trend in eco-environmental vulnerability in general with expected evolving distributions in heavy and very heavy vulnerability levels, which mainly lying on developed land, bare land, semi bare land, agricultural land, and poor and recovery forests. In contrast, there is a significant decline in potential vulnerability level. The contributing factors of an upward trend in medium, heavy, and very heavy levels include: (i) a large natural forest converted to plantation forest and agriculture land; and (ii) significant expansion of developed land leading to difference in thermal signatures in urban areas as compared with those of the surrounding areas. It is concluded that anthropogenic processes with transformation on LULC has amplified the vulnerability of eco-environment in the study

  12. 9 CFR 590.502 - Equipment and utensils; PCB-containing equipment.

    Science.gov (United States)

    2010-01-01

    ... Sanitary Standards and accepted practices currently in effect for such equipment. (c) New or replacement equipment or machinery (including any replacement parts) brought onto the premises of any official plant... equipment and machinery, and any replacement parts for such equipment and machinery. Totally enclosed...

  13. Classifying vulnerability to sleep deprivation using baseline measures of psychomotor vigilance.

    Science.gov (United States)

    Patanaik, Amiya; Kwoh, Chee Keong; Chua, Eric C P; Gooley, Joshua J; Chee, Michael W L

    2015-05-01

    To identify measures derived from baseline psychomotor vigilance task (PVT) performance that can reliably predict vulnerability to sleep deprivation. Subjects underwent total sleep deprivation and completed a 10-min PVT every 1-2 h in a controlled laboratory setting. Participants were categorized as vulnerable or resistant to sleep deprivation, based on a median split of lapses that occurred following sleep deprivation. Standard reaction time, drift diffusion model (DDM), and wavelet metrics were derived from PVT response times collected at baseline. A support vector machine model that incorporated maximum relevance and minimum redundancy feature selection and wrapper-based heuristics was used to classify subjects as vulnerable or resistant using rested data. Two academic sleep laboratories. Independent samples of 135 (69 women, age 18 to 25 y), and 45 (3 women, age 22 to 32 y) healthy adults. In both datasets, DDM measures, number of consecutive reaction times that differ by more than 250 ms, and two wavelet features were selected by the model as features predictive of vulnerability to sleep deprivation. Using the best set of features selected in each dataset, classification accuracy was 77% and 82% using fivefold stratified cross-validation, respectively. In both datasets, DDM measures, number of consecutive reaction times that differ by more than 250 ms, and two wavelet features were selected by the model as features predictive of vulnerability to sleep deprivation. Using the best set of features selected in each dataset, classification accuracy was 77% and 82% using fivefold stratified cross-validation, respectively. Despite differences in experimental conditions across studies, drift diffusion model parameters associated reliably with individual differences in performance during total sleep deprivation. These results demonstrate the utility of drift diffusion modeling of baseline performance in estimating vulnerability to psychomotor vigilance decline

  14. Medical equipment in government health facilities: missed opportunities.

    Science.gov (United States)

    Pardeshi, Geeta S

    2005-01-01

    The availability and optimal utilization of medical equipment is important for improving the quality of health services. Significant investments are made for the purchase, maintenance and repair of medical equipment. Inadequate management of these equipment will result in financial losses and deprive the public of the intended benefits. This analysis is based on the conceptual framework drawn from the WHO recommended- lifecycle of medical equipment. (1) To identify the problems in different stages of the life cycle. (2) To assess its financial implications and effect on service delivery. Analysis of secondary data from the latest Comptroller and Auditor General (CAG) Reports for the states in India. The study variables were category of equipment, financial implications and problems in the stages of life cycle. Calculation of proportions. A total of forty instances mentioning problems in the first phase of the life cycle of medical equipment were noted in 12 state reports. The equipment from the radiology department (15), equipment in the wards (5), laboratory (3) and operation theatres (4) were the ones most frequently implicated. In a majority of cases the financial implications amounted to twenty-five lakhs. The financial implications were in the form of extra expenditure, unfruitful expenditure or locking of funds. In 25 cases the equipment could not be put to use because of non-availability of trained staff and inadequate infrastructural support. Careful procurement, incoming inspection, successful installation and synchronization of qualified trained staff and infrastructural support will ensure timely onset of use of the equipment.

  15. Assessing environmental vulnerability in EIA-The content and context of the vulnerability concept in an alternative approach to standard EIA procedure

    International Nuclear Information System (INIS)

    Kvaerner, Jens; Swensen, Grete; Erikstad, Lars

    2006-01-01

    In the traditional EIA procedure environmental vulnerability is only considered to a minor extent in the early stages when project alternatives are worked out. In Norway, an alternative approach to EIA, an integrated vulnerability model (IVM), emphasising environmental vulnerability and alternatives development in the early stages of EIA, has been tried out in a few pilot cases. This paper examines the content and use of the vulnerability concept in the IVM approach, and discusses the concept in an EIA context. The vulnerability concept is best suited to overview analyses and large scale spatial considerations. The concept is particularly useful in the early stages of EIA when alternatives are designed and screened. By introducing analyses of environmental vulnerability at the start of the EIA process, the environment can be a more decisive issue for the creation of project alternatives as well as improving the basis for scoping. Vulnerability and value aspects should be considered as separate dimensions. There is a need to operate with a specification between general and specific vulnerability. The concept of environmental vulnerability has proven useful in a wide range of disciplines. Different disciplines have different lengths of experience regarding vulnerability. In disciplines such as landscape planning and hydrogeology we find elements suitable as cornerstones in the further development of an interdisciplinary methodology. Further development of vulnerability criteria in different disciplines and increased public involvement in the early stages of EIA are recommended

  16. Drawing evaluation report for sampling equipment drawings; TOPICAL

    International Nuclear Information System (INIS)

    WILSON, G.W.

    1999-01-01

    This document presents the results of a task to evaluate Tank Waste Remediation System (TWRS) sampling equipment drawings and identifies drawings category as either essential, support, or general drawings. This report completes the drawing evaluation task as outlined in Engineering Task Plan For Truck 3 and 4 Drawing Compliance and Evaluation (Wilson, 1997). The scope of this report is limited to an evaluation and identification of drawing category for drawings of certain tank waste sampling equipment for which the TRWS Characterization Project has been assigned custody, including: vapor sampling, grab sampling, auger sampling, and all core sampling equipment (see LMHC Task Order 304). This report does not address drawings for other waste tank deployed equipment systems having similar assigned custody, such as, Light Duty Utility Arm (LDUA), Cone Penetrometer system, or Long Length Contaminated Equipment (LLCE). The LDUA drawings are addressed in the Characterization Equipment Essential Drawings (HNF 1998). The Cone Penetrometer system drawings which are vendor drawings (not H- series) is not currently turned over to operations for deployment. The LLCE equipment was just recently assigned to Characterization Project and were not included in the original scope for this evaluation and will be addressed in the evaluation update scheduled for fiscal year 1999

  17. Social vulnerability indicators as a sustainable planning tool

    International Nuclear Information System (INIS)

    Lee, Yung-Jaan

    2014-01-01

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts

  18. Social vulnerability indicators as a sustainable planning tool

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Yung-Jaan, E-mail: yungjaanlee@gmail.com

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study

  19. Coupled Vulnerability and Resilience: the Dynamics of Cross-Scale Interactions in Post-Katrina New Orleans

    Directory of Open Access Journals (Sweden)

    Kevin F. Gotham

    2011-09-01

    Full Text Available We investigate the impact of trauma on cross-scale interactions in order to identify the major social-ecological factors affecting the pace and trajectory of post-Katrina rebuilding in New Orleans, Louisiana, USA. Disaster and traumatic events create and activate networks and linkages at different spatial and institutional levels to provide information and resources related to post-trauma recovery and rebuilding. The extension, intensification, and acceleration of cross-scale linkages and interactions in response to trauma alter organizational couplings, which then contribute to the vulnerability and resilience of social-ecological systems. Rather than viewing urban ecosystems as either resilient or vulnerable, we conceptualize them as embodying both resilient and vulnerable components. This integrated approach directs analytical attention to the impact of socio-legal regulations, government policies, and institutional actions on resilience and vulnerability, which are also systemic properties of urban ecosystems.

  20. Responses to Novelty and Vulnerability to Cocaine Addiction: Contribution of a Multi-Symptomatic Animal Model

    Science.gov (United States)

    Belin, David; Deroche-Gamonet, Véronique

    2012-01-01

    Epidemiological studies have revealed striking associations between several distinct behavioral/personality traits and drug addiction, with a large emphasis on the sensation-seeking trait and the associated impulsive dimension of personality. However, in human studies, it is difficult to identify whether personality/behavioral traits actually contribute to increased vulnerability to drug addiction or reflect psychobiological adaptations to chronic drug exposure. Here we show how animal models, including the first multi-symptomatic model of addiction in the rat, have contributed to a better understanding of the relationships between different subdimensions of the sensation-seeking trait and different stages of the development of cocaine addiction, from vulnerability to initiation of cocaine self-administration to the transition to compulsive drug intake. We argue that sensation seeking predicts vulnerability to use cocaine, whereas novelty seeking, akin to high impulsivity, predicts instead vulnerability to shift from controlled to compulsive cocaine use, that is, addiction. PMID:23125204

  1. Equipment considerations

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    Trace or ultratrace analyses require that the HPLC equipment used, including the detector, be optimal for such determinations. HPLC detectors are discussed at length in Chapter 4; discussion here is limited to the rest of the equipment. In general, commercial equipment is adequate for trace analysis; however, as the authors approach ultratrace analysis, it becomes very important to examine the equipment thoroughly and optimize it, where possible. For this reason they will review the equipment commonly used in HPLC and discuss the optimization steps. Detectability in HPLC is influenced by two factors (1): (a) baseline noise or other interferences that lead to errors in assigning the baseline absorbance; (b) peak width. 87 refs

  2. Resourceful masculinities: exploring heterosexual Black men's vulnerability to HIV in Ontario, Canada.

    Science.gov (United States)

    Husbands, Winston; Oakes, Wesley; Mbulaheni, Tola; Ongoïba, Fanta; Pierre-Pierre, Valérie; Luyombya, Henry

    2017-10-29

    Heterosexually active Black men are alleged to endorse masculine norms that increase their and their female partners' vulnerability to HIV. These norms include Black men's inability or reluctance to productively engage their own health-related personal and interpersonal vulnerabilities. We draw on data from the iSpeak research study in Ontario, Canada, to assess whether and how heterosexual Black men cope with personal and inter-personal vulnerability, namely that heterosexual Black men: avoid emotionally supportive relationships with other men (and women), which diminishes their capacity to productively acknowledge and resolve their health-related challenges; are reticent to productively acknowledge and address HIV and health on a personal level; and are pathologically secretive about their health, which compounds their vulnerability and precipitates poor health outcomes. iSpeak was implemented in 2011 to 2013, and included two focus groups with HIV-positive and HIV-negative self-identified heterosexual men (N = 14) in Toronto and London, a focus group with community-based health promotion practitioners who provide HIV-related services to Black communities in Ontario (N = 6), and one-on-one interviews with four researchers distinguished for their scholarship with/among Black communities in Toronto. Participants in the men's focus group were recruited discretely through word-of-mouth. Focus groups were audiotaped and transcribed verbatim. Team members independently read the transcripts, and then met to identify, discuss and agree on the emerging themes. We demonstrate that iSpeak participants (a) engage their personal and interpersonal vulnerabilities creatively and strategically, (b) complicate and challenge familiar interpretations of Black men's allegedly transgressive masculinity through their emotional and practical investment in their health, and (c) demonstrate a form of resourceful masculinity that ambiguously aligns with patriarchy. We conclude

  3. Quantifying Pollutant Emissions from Office Equipment Phase IReport

    Energy Technology Data Exchange (ETDEWEB)

    Maddalena, R.L.; Destaillats, H.; Hodgson, A.T.; McKone, T.E.; Perino, C.

    2006-12-01

    Although office equipment has been a focal point for governmental efforts to promote energy efficiency through programs such as Energy Star, little is known about the relationship between office equipment use and indoor air quality. This report provides results of the first phase (Phase I) of a study in which the primary objective is to measure emissions of organic pollutants and particulate matter from a selected set of office equipment typically used in residential and office environments. The specific aims of the overall research effort are: (1) use screening-level measurements to identify and quantify the concentrations of air pollutants of interest emitted by major categories of distributed office equipment in a controlled environment; (2) quantify the emissions of air pollutants from generally representative, individual machines within each of the major categories in a controlled chamber environment using well defined protocols; (3) characterize the effects of ageing and use on emissions for individual machines spanning several categories; (4) evaluate the importance of operational factors that can be manipulated to reduce pollutant emissions from office machines; and (5) explore the potential relationship between energy consumption and pollutant emissions for machines performing equivalent tasks. The study includes desktop computers (CPU units), computer monitors, and three categories of desktop printing devices. The printer categories are: (1) printers and multipurpose devices using color inkjet technology; (2) low- to medium output printers and multipurpose devices employing monochrome or color laser technology; and (3) high-output monochrome and color laser printers. The literature review and screening level experiments in Phase 1 were designed to identify substances of toxicological significance for more detailed study. In addition, these screening level measurements indicate the potential relative importance of different categories of office equipment

  4. Qualification of Programmable Electronic System (PES) equipment based on international nuclear I and C standards

    International Nuclear Information System (INIS)

    De Grosbois, J.; Hepburn, G. A.; Olmstead, R.; Goble, W.; Kumar, V.

    2006-01-01

    Nuclear power plants (NPPs) are increasingly faced with the challenge of qualifying procured equipment, sub-components, and systems that contain digital programmed electronics for use in safety-related applications. Referred to as a 'programmable electronic system' (PES), such equipment typically contains both complex logic that is vulnerable to systematic design faults, and low voltage electronics hardware that is subject to random faults. Procured PES products or components are often only commercial grade, yet can offer reliable cost effective alternatives to custom-designed or nuclear qualified equipment, provided they can be shown to meet the quality assurance, functional safety, environmental, and reliability requirements of a particular application. The process of confirming this is referred to as application-specific product qualification (ASPQ) and can be challenging and costly. This paper provides an overview of an approach that has been developed at Atomic Energy Canada Limited (AECL) and successfully applied to PES equipment intended for use in domestic Candu R 6 nuclear power plants and special purpose reactors at Chalk River Laboratories. The approach has evolved over the past decade and has recently been adapted to be consistent with, and take advantage of new standards that are applicable to nuclear safety-related I and C systems. Also discussed are how recognized third-party safety-certifications of PES equipment to International Electrotechnical Commission (IEC) standards, and the assessment methods employed, may be used to reduce ASPQ effort. (authors)

  5. Medical Issues: Equipment

    Science.gov (United States)

    ... Information Packets Equipment Pool Living With SMA Medical Issues Palliative Breathing Orthopedics Nutrition Equipment Daily Life At ... curesma.org > support & care > living with sma > medical issues > equipment Equipment Individuals with SMA often require a ...

  6. Global analysis of urban surface water supply vulnerability

    International Nuclear Information System (INIS)

    Padowski, Julie C; Gorelick, Steven M

    2014-01-01

    This study presents a global analysis of urban water supply vulnerability in 71 surface-water supplied cities, with populations exceeding 750 000 and lacking source water diversity. Vulnerability represents the failure of an urban supply-basin to simultaneously meet demands from human, environmental and agricultural users. We assess a baseline (2010) condition and a future scenario (2040) that considers increased demand from urban population growth and projected agricultural demand. We do not account for climate change, which can potentially exacerbate or reduce urban supply vulnerability. In 2010, 35% of large cities are vulnerable as they compete with agricultural users. By 2040, without additional measures 45% of cities are vulnerable due to increased agricultural and urban demands. Of the vulnerable cities in 2040, the majority are river-supplied with mean flows so low (1200 liters per person per day, l/p/d) that the cities experience ‘chronic water scarcity’ (1370 l/p/d). Reservoirs supply the majority of cities facing individual future threats, revealing that constructed storage potentially provides tenuous water security. In 2040, of the 32 vulnerable cities, 14 would reduce their vulnerability via reallocating water by reducing environmental flows, and 16 would similarly benefit by transferring water from irrigated agriculture. Approximately half remain vulnerable under either potential remedy. (letter)

  7. After-hours power status of office equipment and energy use of miscellaneous plug-load equipment

    Energy Technology Data Exchange (ETDEWEB)

    Roberson, Judy A.; Webber, Carrie A.; McWhinney, Marla C.; Brown, Richard E.; Pinckard, Marageret J.; Busch, John F.

    2004-05-27

    This research was conducted in support of two branches of the EPA ENERGY STAR program, whose overall goal is to reduce, through voluntary market-based means, the amount of carbon dioxide emitted in the U.S. The primary objective was to collect data for the ENERGY STAR Office Equipment program on the after-hours power state of computers, monitors, printers, copiers, scanners, fax machines, and multi-function devices. We also collected data for the ENERGY STAR Commercial Buildings branch on the types and amounts of miscellaneous plug-load equipment, a significant and growing end use that is not usually accounted for by building energy managers. For most types of miscellaneous equipment, we also estimated typical unit energy consumption in order to estimate total energy consumption of the miscellaneous devices within our sample. This data set is the first of its kind that we know of, and is an important first step in characterizing miscellaneous plug loads in commercial buildings. The main purpose of this study is to supplement and update previous data we collected on the extent to which electronic office equipment is turned off or automatically enters a low power state when not in active use. In addition, it provides data on numbers and types of office equipment, and helps identify trends in office equipment usage patterns. These data improve our estimates of typical unit energy consumption and savings for each equipment type, and enables the ENERGY STAR Office Equipment program to focus future effort on products with the highest energy savings potential. This study expands our previous sample of office buildings in California and Washington DC to include education and health care facilities, and buildings in other states. We report data from sixteen commercial buildings in California, Georgia, and Pennsylvania: four education buildings, two medical buildings, two large offices (> 500 employees each), three medium offices (50-500 employees each), and five small

  8. Dynamic vulnerability assessment and intelligent control for sustainable power systems

    CERN Document Server

    Gonzalez-Longatt, Francisco

    2018-01-01

    Identifying, assessing, and mitigating electric power grid vulnerabilities is a growing focus in short-term operational planning of power systems. Through illustrated application, this important guide surveys state-of-the-art methodologies for the assessment and enhancement of power system security in short-term operational planning and real-time operation. The methodologies employ advanced methods from probabilistic theory, data mining, artificial intelligence, and optimization, to provide knowledge-based support for monitoring, control (preventive and corrective), and decision making tasks. Key features: Introduces behavioural recognition in wide-area monitoring and security constrained optimal power flow for intelligent control and protection and optimal grid management. Provides in-depth understanding of risk-based reliability and security assessment, dynamic vulnerability as essment methods, supported by the underpinning mathematics. Develops expertise in mitigation techniques using intelligent protect...

  9. Vulnerabilities to climate change of Massachusetts animal species of greatest conservation need

    Science.gov (United States)

    Galbraith, Hector; Morelli, Toni L.

    2017-01-01

    Over the last decade, the Commonwealth of Massachusetts has addressed the potential and actual impacts of climate change on state flora and fauna. The state’s involvement began in 2007 when, led by the Division of Fisheries and Wildlife (DFW) and assisted by Manomet Center for Con-servation Research, it carried out one of the first habitat vulnerability assessments in North America (Manomet, 2010). The new methods and processes that resulted were later applied to vulnerability assessments in North America and elsewhere. In 2011, the state assisted the North-eastern Association of Fish and Wildlife Agencies (NEAFWA) in organizing and leading a pio-neering three-year, thirteen-state research effort to evaluate the vulnerabilities of fish and wild-life habitats to climate change in the northeast, from Maine south to West Virginia (NEAFWA, 2012). This focus on climate change vulnerabilities led to three important early realizations: (1) simply categorizing and scoring vulnerabilities might not lead to better conservation outcomes. It was vital to also understand why some resources were more or less vulnerable to climate change in order to identify potential intervention points on which conservation actions and strategies could be based. (2) simply producing research results was not enough; these results had to be cast as specific conservation actions. Moreover (3), these actions needed to be communicated in a useful form to conservation “actors”, such as state agencies, land trusts, land managers, etc. These real-izations led to the next step on the Commonwealth’s journey to effective conservation in an age of climate change - the Massachusetts Wildlife Climate Action Tool (CAT).

  10. Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures

    Directory of Open Access Journals (Sweden)

    John Patrick Barrowclough

    2018-01-01

    Full Text Available The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a ‘hypervisor’ that may be attacked and user data can be compromised or hacked. In order to better define these threats to which a cloud hypervisor is exposed, we conducted an in-depth analysis and highlighted the security concerns of the cloud. We basically focused on the two particular issues, i.e., (a data breaches and (b weak authentication. For in-depth analysis, we have successfully demonstrated a fully functional private cloud infrastructure running on CloudStack for the software management and orchestrated a valid hack. We analyzed the popular open-source hypervisors, followed by an extensive study of the vulnerability reports associated with them. Based on our findings, we propose the characterization and countermeasures of hypervisor’s vulnerabilities. These investigations can be used to understand the potential attack paths on cloud computing and Cloud-of-Things (CoT applications and identify the vulnerabilities that enabled them.

  11. Vulnerability of cattle production to climate change on U.S. rangelands

    Science.gov (United States)

    Matt C. Reeves; Karen E. Bagne

    2016-01-01

    We examined multiple climate change effects on cattle production for U.S. rangelands to estimate relative change and identify sources of vulnerability among seven regions. Climate change effects to 2100 were projected from published models for four elements: forage quantity, vegetation type trajectory, heat stress, and forage variability. Departure of projections from...

  12. Studies and research concerning BNFP: cask handling equipment standardization

    International Nuclear Information System (INIS)

    McCreery, P.N.

    1980-10-01

    This report covers the activities of one of the sub-tasks within the Spent LWR Fuel Transportation Receiving, Handling, and Storage program. The sub-task is identified as Cask Handling Equipment Standardization. The objective of the sub-task specifies: investigate and identify opportunities for standardization of cask interface equipment. This study will examine the potential benefits of standardized yokes, decontamination barriers and special tools, and, to the extent feasible, standardized methods and software for handling the variety of casks presently available in the US fleet. The result of the investigations is a compilation of reports that are related by their common goal of reducing cask turnaround time

  13. Vulnerability assessment of the Toluca Valley aquifer combining a parametric approach and advective transport

    International Nuclear Information System (INIS)

    Gárfias, J.; Llanos, H.; Franco, R.; Martel, R.

    2017-01-01

    Groundwater vulnerability assessment is an important task in water resources and land management. Depending on the availability of data and the complexity of the hydrogeological conditions, different approaches can be adopted. As an alternative, this study involves the use of a combined approach based on vulnerability methods and advective particle tracking to better understand the susceptibility to contamination in the Toluca valley aquifer. An intrinsic vulnerability map (DRASTIC) was used to identify areas that are more susceptible to ground water contamination. To estimate advective particle tracking, we developed a 3D flow model using VisualModflow and MODPATH to describe the regional flow of groundwater. The vulnerability map demonstrates the problematic application and interpretation of qualitative the vulnerability method of the parametric system group, which indicates a difference of approximately 23% when compared with the modified vulnerability map. Potential contamination sources based on landfill sites were comparatively high; approximately 76% are located in areas that could be susceptible to contamination through vertical infiltration, especially those that are located along the Lerma system of wells. Industrial parks located in the centre of the valley (83%), where continuous extraction of groundwater and land subsidence occurs, have been classified as high vulnerability zones, increasing the risk of contaminants from surface sources reaching the groundwater. In order to understand the susceptibility to contamination in the aquifer, various delineation approaches should be adopted and all the results that validate each other should be considered, thus making a good strategy for implementing different degrees of protection measures. [es

  14. Groundwater vulnerability map for South Africa

    African Journals Online (AJOL)

    Chiedza Musekiwa

    Coastal vulnerability is the degree to which a coastal system is susceptible to, ... methods, indicator-based approaches, GIS-based decision support systems and ..... E 2005, 'Coastal Vulnerability and Risk Parameters', European Water, vol.

  15. [Using the notion of vulnerability in the production of knowledge about tuberculosis: integrative review].

    Science.gov (United States)

    Maffacciolli, Rosana; Hahn, Giselda Veronice; Rossetto, Maíra; Almeida, Carlos Podalirio Borges de; Manica, Silvia Troyahn; Paiva, Tiago Sousa; Oliveira, Dora Lucia Leidens Correa de

    2015-01-01

    to identify how the notion of vulnerability is used in national and international scientific publications that address the problem of tuberculosis. an integrative review of literature published in the databases of the Biblioteca Virtual em Saúde, the United States National Library of Medicine and the Biblioteca Digital Brasileira de Teses e Dissertações, considering the descriptors Tuberculosis and Vulnerability in Portuguese and English. we selected fifty-eight studies published between 1992 and February 2014, which resulted in three categories of analysis. CONCLUSION the link between tuberculosis and the notion of vulnerability has not been sufficiently consolidated in national and international literature. This creates an obstacle for the achievement of the epistemological transformations and pragmatic measures that are required to obtain better results from interventions in the field.

  16. Vulnerability and floor spectra of seismically isolated structures

    International Nuclear Information System (INIS)

    Pham, K.H.

    2010-09-01

    This thesis was motivated by issues that arise regarding the use of the method of seismic isolation in the nuclear industry. Despite the research conducted during the last decades in the field of seismic isolation, many questions about the behavior of isolated structures remain. These questions concern, on the one hand, the vulnerability of these structures, due to an excursion (unexpected) in the post-linear domain, and on the other hand, phenomena that can lead to a significant excitation of none isolated modes. Furthermore, unlike previous work studying the seismic behavior of buildings, an important part of this thesis is devoted to the behavior of equipment through the study of floor spectra. Firstly, the probability of failure, in the case of nonlinear response of the superstructure, was studied with simple models, for different laws of nonlinear behavior and different types of support. Then, the effects of heavy damping were investigated and the mechanism of amplification of the response of non-isolated modes has been explained. To resolve the amplification problem of none isolated modes, the mixed isolated systems, combining passive isolation with semi-active devices, have been considered. The numerical analyses confirm the effectiveness of this approach. Finally, a series of shaking table tests on a simple model with two degrees of freedom was conducted. The model is equipped with a magneto-rheological damper which is controlled as a semi-active device. The comparison of the experimental results with those of numerical simulations shows that the models developed are able to represent satisfactorily the essential physical phenomena. (author)

  17. Future Extreme Event Vulnerability in the Rural Northeastern United States

    Science.gov (United States)

    Winter, J.; Bowen, F. L.; Partridge, T.; Chipman, J. W.

    2017-12-01

    Future climate change impacts on humans will be determined by the convergence of evolving physical climate and socioeconomic systems. Of particular concern is the intersection of extreme events and vulnerable populations. Rural areas of the Northeastern United States have experienced increased temperature and precipitation extremes, especially over the past three decades, and face unique challenges due to their physical isolation, natural resources dependent economies, and high poverty rates. To explore the impacts of future extreme events on vulnerable, rural populations in the Northeast, we project extreme events and vulnerability indicators to identify where changes in extreme events and vulnerable populations coincide. Specifically, we analyze future (2046-2075) maximum annual daily temperature, minimum annual daily temperature, maximum annual daily precipitation, and maximum consecutive dry day length for Representative Concentration Pathways (RCP) 4.5 and 8.5 using four global climate models (GCM) and a gridded observational dataset. We then overlay those projections with estimates of county-level population and relative income for 2060 to calculate changes in person-events from historical (1976-2005), with a focus on Northeast counties that have less than 250,000 people and are in the bottom income quartile. We find that across the rural Northeast for RCP4.5, heat person-events per year increase tenfold, far exceeding decreases in cold person-events and relatively small changes in precipitation and drought person-events. Counties in the bottom income quartile have historically (1976-2005) experienced a disproportionate number of heat events, and counties in the bottom two income quartiles are projected to experience a greater heat event increase by 2046-2075 than counties in the top two income quartiles. We further explore the relative contributions of event frequency, population, and income changes to the total and geographic distribution of climate change

  18. Individualized performance prediction during total sleep deprivation: accounting for trait vulnerability to sleep loss.

    Science.gov (United States)

    Ramakrishnan, Sridhar; Laxminarayan, Srinivas; Thorsley, David; Wesensten, Nancy J; Balkin, Thomas J; Reifman, Jaques

    2012-01-01

    Individual differences in vulnerability to sleep loss can be considerable, and thus, recent efforts have focused on developing individualized models for predicting the effects of sleep loss on performance. Individualized models constructed using a Bayesian formulation, which combines an individual's available performance data with a priori performance predictions from a group-average model, typically need at least 40 h of individual data before showing significant improvement over the group-average model predictions. Here, we improve upon the basic Bayesian formulation for developing individualized models by observing that individuals may be classified into three sleep-loss phenotypes: resilient, average, and vulnerable. For each phenotype, we developed a phenotype-specific group-average model and used these models to identify each individual's phenotype. We then used the phenotype-specific models within the Bayesian formulation to make individualized predictions. Results on psychomotor vigilance test data from 48 individuals indicated that, on average, ∼85% of individual phenotypes were accurately identified within 30 h of wakefulness. The percentage improvement of the proposed approach in 10-h-ahead predictions was 16% for resilient subjects and 6% for vulnerable subjects. The trade-off for these improvements was a slight decrease in prediction accuracy for average subjects.

  19. Vulnerability and adaptation of US shellfisheries to ocean acidification

    Science.gov (United States)

    Ekstrom, Julia A.; Suatoni, Lisa; Cooley, Sarah R.; Pendleton, Linwood H.; Waldbusser, George G.; Cinner, Josh E.; Ritter, Jessica; Langdon, Chris; van Hooidonk, Ruben; Gledhill, Dwight; Wellman, Katharine; Beck, Michael W.; Brander, Luke M.; Rittschof, Dan; Doherty, Carolyn; Edwards, Peter E. T.; Portela, Rosimeiry

    2015-03-01

    Ocean acidification is a global, long-term problem whose ultimate solution requires carbon dioxide reduction at a scope and scale that will take decades to accomplish successfully. Until that is achieved, feasible and locally relevant adaptation and mitigation measures are needed. To help to prioritize societal responses to ocean acidification, we present a spatially explicit, multidisciplinary vulnerability analysis of coastal human communities in the United States. We focus our analysis on shelled mollusc harvests, which are likely to be harmed by ocean acidification. Our results highlight US regions most vulnerable to ocean acidification (and why), important knowledge and information gaps, and opportunities to adapt through local actions. The research illustrates the benefits of integrating natural and social sciences to identify actions and other opportunities while policy, stakeholders and scientists are still in relatively early stages of developing research plans and responses to ocean acidification.

  20. Neonatal resuscitation equipment: A hidden risk for our babies?

    Science.gov (United States)

    Winckworth, Lucinda C; McLaren, Emma; Lingeswaran, Arvin; Kelsey, Michael

    2016-05-01

    Neonatal infections carry a heavy burden of morbidity and mortality. Poor practice can result in unintentional colonisation of medical equipment with potentially pathogenic organisms. This study will determine the prevalence and type of bacterial contamination on exposed neonatal resuscitation equipment in different clinical settings and explore simple measures to reduce contamination risk. A survey determined the rates of resuscitation equipment usage. All environmentally exposed items were identified on resuscitaires hospital-wide and swabbed for bacterial contamination. A new cleaning and storage policy was implemented and the prevalence of environmentally exposed equipment re-measured post-intervention. Resuscitation equipment was used in 28% of neonatal deliveries. Bacterial colony forming units were present on 44% of the 236 exposed equipment pieces swabbed. There was no significant difference in contamination rates between equipment types. Coagulase negative staphylococcus was the most prevalent species (59 pieces, 25%) followed by Escherichia coli and Enterobacter cloacae (20 pieces, 9% each). Opened items stored inside plastic remained sterile, whilst those in low-use areas had significantly less contamination than those in high-use areas (22% vs. 51%, P reducing microbial colonisation opportunities. © 2016 Paediatrics and Child Health Division (The Royal Australasian College of Physicians).

  1. Exploring spatial patterns of vulnerability for diverse biodiversity descriptors in regional conservation planning.

    Science.gov (United States)

    Vimal, Ruppert; Pluvinet, Pascal; Sacca, Céline; Mazagol, Pierre-Olivier; Etlicher, Bernard; Thompson, John D

    2012-03-01

    In this study, we developed a multi-criteria assessment of spatial variability of the vulnerability of three different biodiversity descriptors: sites of high conservation interest by virtue of the presence of rare or remarkable species, extensive areas of high ecological integrity, and landscape diversity in grid cells across an entire region. We assessed vulnerability in relation to (a) direct threats in and around sites to a distance of 2 km associated with intensive agriculture, building and road infrastructure and (b) indirect effects of human population density on a wider scale (50 km). The different combinations of biodiversity and threat indicators allowed us to set differential priorities for biodiversity conservation and assess their spatial variation. For example, with this method we identified sites and grid cells which combined high biodiversity with either high threat values or low threat values for the three different biodiversity indicators. In these two classes the priorities for conservation planning will be different, reduce threat values in the former and restrain any increase in the latter. We also identified low priority sites (low biodiversity with either high or low threats). This procedure thus allows for the integration of a spatial ranking of vulnerability into priority setting for regional conservation planning. Copyright © 2011 Elsevier Ltd. All rights reserved.

  2. Using graph theory to analyze the vulnerability of process plants in the context of cascading effects

    International Nuclear Information System (INIS)

    Khakzad, Nima; Reniers, Genserik

    2015-01-01

    Dealing with large quantities of flammable and explosive materials, usually at high-pressure high-temperature conditions, makes process plants very vulnerable to cascading effects compared with other infrastructures. The combination of the extremely low frequency of cascading effects and the high complexity and interdependencies of process plants makes risk assessment and vulnerability analysis of process plants very challenging in the context of such events. In the present study, cascading effects were represented as a directed graph; accordingly, the efficacy of a set of graph metrics and measurements was examined in both unit and plant-wide vulnerability analysis of process plants. We demonstrated that vertex-level closeness and betweenness can be used in the unit vulnerability analysis of process plants for the identification of critical units within a process plant. Furthermore, the graph-level closeness metric can be used in the plant-wide vulnerability analysis for the identification of the most vulnerable plant layout with respect to the escalation of cascading effects. Furthermore, the results from the application of the graph metrics have been verified using a Bayesian network methodology. - Highlights: • Graph metrics can effectively be employed to identify vulnerable units and layouts in process plants. • Units with larger vertex-level closeness result in more probable and severe cascading effects. • Units with larger vertex-level betweenness contribute more to the escalation of cascading effects. • Layouts with larger graph-level closeness are more vulnerable to the escalation of cascading effects

  3. Detecting C Program Vulnerabilities

    OpenAIRE

    Anton, Ermakov; Natalia, Kushik

    2011-01-01

    C/C++ language is widely used for developing tools in various applications, in particular, software tools for critical systems are often written in C language. Therefore, the security of such software should be thoroughly tested, i.e., the absence of vulnerabilities has to be confirmed. When detecting C program vulnerabilities static source code analysis can be used. In this paper, we present a short survey of existing software tools for such analysis and show that for some kinds of C code vu...

  4. Land tenure insecurity, vulnerability to climate-induced disaster and opportunities for redress in southern Africa

    Directory of Open Access Journals (Sweden)

    Tigere Chagutah

    2013-02-01

    Full Text Available Land tenure is an important variable impacting on vulnerability to climate-related disaster. Land tenure insecurity is widespread in southern Africa and manifests itself in a number of ways that accentuate vulnerability to climate change impacts. Insecure tenure is seen to heighten vulnerability against growing demand for land for residential purposes and working space in urban areas while in the rural areas insecure tenure militates against diversified livelihoods and hinders investment in appropriate technologies and uptake of sound environmental management practices. Using the focused synthesis method, this article (1 maps the intersections between land tenure insecurity and vulnerability to climate-induced disaster in southern Africa; and (2 identifies the opportunities tenure reforms hold for vulnerability reduction in a region predicted to suffer widespread impacts from climate change. The paper contends that land tenure is a critical component of the milieu of factors – economic, social, cultural, institutional, political and even psychological – that are known to shape vulnerability and determine the environment that people live in. The study finds that land tenure reforms can help to reduce vulnerability and enhance community resilience to climate change. In this regard, the article outlines how tenure reforms can help build diverse household livelihoods, improve environmental management, particularly in the rural areas, and encourage investment in robust housing and safe neighbourhoods among the urban poor – all of which are integral to the region’s response to climate change.

  5. Mental vulnerability as a risk factor for depression

    DEFF Research Database (Denmark)

    Østergaard, Ditte; Dalton, Susanne Oksbjerg; Bidstrup, Pernille Envold

    2012-01-01

    Mental vulnerability (i.e. a tendency to experience psychosomatic symptoms, mental symptoms or interpersonal problems) is associated with various diseases. This study investigated whether mental vulnerability is associated with hospitalization for depression.......Mental vulnerability (i.e. a tendency to experience psychosomatic symptoms, mental symptoms or interpersonal problems) is associated with various diseases. This study investigated whether mental vulnerability is associated with hospitalization for depression....

  6. Exposing asymmetric gray matter vulnerability in amyotrophic lateral sclerosis.

    Science.gov (United States)

    Devine, Matthew S; Pannek, Kerstin; Coulthard, Alan; McCombe, Pamela A; Rose, Stephen E; Henderson, Robert D

    2015-01-01

    Limb weakness in amyotrophic lateral sclerosis (ALS) is typically asymmetric. Previous studies have identified an effect of limb dominance on onset and spread of weakness, however relative atrophy of dominant and non-dominant brain regions has not been investigated. Our objective was to use voxel-based morphometry (VBM) to explore gray matter (GM) asymmetry in ALS, in the context of limb dominance. 30 ALS subjects were matched with 17 healthy controls. All subjects were right-handed. Each underwent a structural MRI sequence, from which GM segmentations were generated. Patterns of GM atrophy were assessed in ALS subjects with first weakness in a right-sided limb (n = 15) or left-sided limb (n = 15). Within each group, a voxelwise comparison was also performed between native and mirror GM images, to identify regions of hemispheric GM asymmetry. Subjects with ALS showed disproportionate atrophy of the dominant (left) motor cortex hand area, irrespective of the side of first limb weakness (p protocol, contrasting native and mirror images, was able to more sensitively detect asymmetric GM pathology in a small cohort, compared with standard methods. These findings indicate particular vulnerability of dominant upper limb representation in ALS, supporting previous clinical studies, and with implications for cortical organisation and selective vulnerability.

  7. Threat and vulnerability analysis and conceptual design of countermeasures for a computer center under construction

    International Nuclear Information System (INIS)

    Rozen, A.; Musacchio, J.M.

    1988-01-01

    This project involved the assessment of a new computer center to be used as the main national data processing facility of a large European bank. This building serves as the principal facility in the country with all other branches utilizing the data processing center. As such, the building is a crucial target which may attract terrorist attacks. Threat and vulnerability assessments were performed as a basis to define and overall fully-integrated security system of passive and active countermeasures for the facility. After separately assessing the range of threats and vulnerabilities, a combined matrix of threats and vulnerabilities was used to identify the crucial combinations. A set of architectural-structural passive measures was added to the active components of the security system

  8. Vulnerability analysis in terms of food insecurity and poverty using GIS and remote sensing technology applied to Sri Lanka

    Science.gov (United States)

    Shahriar, Pervez M.; Ramachandran, Mahadevan; Mutuwatte, Lal

    2003-03-01

    It is becoming increasingly recognized that computer methods such as models and Geographic Information Systems (GIS) can be valuable tools for analyzing a geographical area in terms of it's hazards vulnerability, Vulnerability is an important aspect of households' experience of poverty. The measurement and analysis of poverty, inequality and vulnerability are crucial for cognitive purposes (to know what the situation is), for analytical purposes (to understand the factors determining this situation), for policy making purposes (to design interventions best adapted to the issues), and for monitoring and evaluation purposes (to assess whether current policies are effective, and whether the situation is changing). Here vulnerability defined as the probability or risk today of being in poverty - or falling deeper into poverty - in the future. Vulnerability is a key dimension of well being since it affects individuals' behavior (in terms of investment, production patterns, coping strategies) and their perception of their own situation. This study has been conducted with the joint collaboration of World Food Programme (WFP) and International Water Management Institute (IWMI) in Sri Lanka for identifying regions and population which are food insecure, for analyzing the reasons for vulnerability to food insecurity in order to provide decision-makers with information to identify possible sectors of intervention and for identifying where and for whom food aid can be best utilized in Sri Lanka. This new approach integrates GIS and Remote sensing with other statistical packages to allow consideration of more spatial/physical parameters like accessibility to economic resources, particularly land and the assets of the built environment, creating employment, and attracting investment in order to improve the quality and quantity of goods and services for the analysis which leads the analysis to represent the real scenario. For this study a detailed topographic data are being used

  9. The manager and equipment decisions: is that in the capital budget?

    Science.gov (United States)

    McConnell, C R

    2001-06-01

    Although any decision to purchase a piece of capital equipment involves a number of the organization's functions, the department manager has some significant responsibilities in the selection and acquisition of capital equipment. Except for unavoidable replacement of essential equipment that fails unexpectedly, capital purchases must ordinarily be planned in advance through the annual budgeting process. The department manager is ordinarily the organization's primary source of information in major capital expenditure projects; therefore, it is essential that the manager follow a logical process for identifying and evaluating alternative equipment choices and perform a consistent economic analysis of the alternatives.

  10. Plutonium working group report on environmental, safety and health vulnerabilities associated with the Department's plutonium storage. Volume II, Part 5: Argonne National Laboratory - west working group assessment team report

    International Nuclear Information System (INIS)

    1994-09-01

    Based on the site visit and walkdowns, the Working Group Assessment Team (WGAT) considers the Site Assessment Team (SAT) report and question sets to be a factual assessment of the facilities. As a result of the Site and WGAT's reviews, six vulnerabilities were identified for further consideration by the Department of Energy (DOE) Plutonium Vulnerability Working Group preparing the final report. All six vulnerabilities were discussed among the respective site teams members and facility experts and agreement was reached. The vulnerabilities by facility identified by the SAT and WGAT are described below. No ranking or priority is implied by the order in which they are listed. In addition the WGAT identified and included issues for the Argonne National Laboratory-West (ANL-W) and DOE line management organizations that are not explicit Environment Safety ampersand Health (ES ampersand H) vulnerabilities

  11. THE DETERMINANTS OF BANKING SYSTEM VULNERABILITY IN THE REPUBLIC OF MOLDOVA

    Directory of Open Access Journals (Sweden)

    Dorina CLICHICI

    2013-12-01

    Full Text Available A banking system is more vulnerable when there are felt more negative effects on this as a consequence of the global financial crisis events. In the context of the objective of enhancing financial stability and, in particular, limiting the likelihood of failure of the banking system it is useful to verify how the main characteristics which play a role for banking system vulnerability behaved in the case of the Republic of Moldova: system’s liquidity, capitalization, competition, diversification, presence of foreign banks, and wholesale funding. In order to determine how hard was hit the banking system of Moldova by the recent financial crisis in the article are analyzed quantitative and qualitative the above mentioned characteristics and identified the crisis effects on them.

  12. Interdependency control : compensation strategies for the inherent vulnerability of critical infrastructure networks

    International Nuclear Information System (INIS)

    Mao, D.; Sotoodeh, M.; Monu, K.; Marti, J.R.; Srivastava, K.D.

    2009-01-01

    Today's increasingly interacting national critical infrastructures (NCIs) can tolerate most stochastic local disturbances. However, they are extremely fragile under global disturbances, as the latter may either push the whole system into a critical state or reveal many unexpected hidden interdependencies, inducing or triggering cascading failures among all possible layers. This robust yet fragile duality is an inherent vulnerability of modern infrastructures. It is therefore expected that weather-related disasters will be more frequent under a changing climate. This paper proposed an interdependency control strategy (ICS) that would maintain the survival of the most critical services, and compensate for this inherent vulnerability during emergency states. The paper also proposed a generalized adjacency matrix (GAM) to represent the physical interdependencies intra/inter of various infrastructure networks. The vulnerable section in the network can be identified, based on computed results of GAM, number of islands in the network, and influence domain(s) of each component. These features render ICS more effective and convincing. Last, the paper proposed a survivability index for isolated sub-networks and described relevant measures for improving this index during the four phases of emergency management. It was concluded that the proposed strategy is an effective means to reduce the inherent vulnerability and increase the resiliency of these critical infrastructures networks. 20 refs., 5 figs

  13. An assessment the severe accident equipment survivability for the Korean Next Generation Reactor

    International Nuclear Information System (INIS)

    Lee, B. C.; Moon, Y. T.; Park, J. W.; Kho, H. J.; Lee, S. W.

    1999-01-01

    One of the prominent design approaches to cope with the severe accident challenges in the Korean Next Generation Reactor is an assessment of equipment survivability in the severe accident environment at early design stage. In compliance with 10CFR50.34(f) and SECY-93-087, this work addresses that a reasonable level of assurance be provided to demonstrate that sufficient instrumentation and equipment will survive the consequences of a severe accident and will be available so that the operator may recover from and trend severe core damage sequences, including those scenarios which result in 100 percent oxidation of the active fuel cladding. An analytical and systematic approach was used to identify the equipment and instrumentation of safety-function and define severe accident environments including temperature, pressure, humidity, and radiation before and after the reactor vessel breach. As a result, it was concluded that with minor exceptions, existing design basis equipment qualification methods are sufficient to provide a reasonable level of assurance that this equipment will function during a severe accident. Furthermore, supplemental severe accident equipment and instrument procurement requirements were identified. (author)

  14. Identification of protective actions to reduce the vulnerability of safety-critical systems to malevolent acts: A sensitivity-based decision-making approach

    International Nuclear Information System (INIS)

    Wang, Tai-Ran; Pedroni, Nicola; Zio, Enrico

    2016-01-01

    A classification model based on the Majority Rule Sorting method has been previously proposed by the authors to evaluate the vulnerability of safety-critical systems (e.g., nuclear power plants) with respect to malevolent intentional acts. In this paper, we consider a classification model previously proposed by the authors based on the Majority Rule Sorting method to evaluate the vulnerability of safety-critical systems (e.g., nuclear power plants) with respect to malevolent intentional acts. The model is here used as the basis for solving an inverse classification problem aimed at determining a set of protective actions to reduce the level of vulnerability of the safety-critical system under consideration. To guide the choice of the set of protective actions, sensitivity indicators are originally introduced as measures of the variation in the vulnerability class that a safety-critical system is expected to undergo after the application of a given set of protective actions. These indicators form the basis of an algorithm to rank different combinations of actions according to their effectiveness in reducing the safety-critical systems vulnerability. Results obtained using these indicators are presented with regard to the application of: (i) one identified action at a time, (ii) all identified actions at the same time or (iii) a random combination of identified actions. The results are presented with reference to a fictitious example considering nuclear power plants as the safety-critical systems object of the analysis. - Highlights: • We use a hierarchical framework to represent the vulnerability. • We use an empirical classification model to evaluate vulnerability. • Sensitivity indicators are introduced to rank protective actions. • Constraints (e.g., budget limitations) are accounted for. • Method is applied to fictitious Nuclear Power Plants.

  15. Electrical and control equipment in nuclear power plants. Problems when replacing aging equipment

    International Nuclear Information System (INIS)

    Nordling, Anna; Haakansson, Goeran

    2012-01-01

    Interoperability between different technical systems is more complicated when old and new technology meet, such as between analog and digital technology. New electrical and I and C equipment is selected with consideration to simplify and improve the compatibility and interoperability. The original construction of nuclear power plants with electricity and I and C equipment had more natural interfaces. Generally experienced guidance, to the management of interoperability and interfaces, feels insufficient. Skills transfer programs are identified as a major need, as more and more important personnel are retiring and important information is lost with them. Lack of appropriate skills directly affects the ability to produce accurate and complete requirements specification. Failure modes of newer electrical and I and C equipment are perceived as more complex than the older equipment. When choosing equipment, attempts are made to minimize unnecessary features, to reduce the number of potential failure modes. There is a lack of consistent understanding of the meaning of robustness in electrical technology and I and C technology, in the nuclear plant engineering departments. The overall picture is that the robustness has worsened since the facilities were built. The Swedish nuclear power plants have an internal organizational structure with separated client and support organization. This splits the nuclear organization into two distinct parts which threaten to separate the two entities focus. Engineering departments at the Swedish nuclear power plants express a need for increased expertise in the client organization (blocks). Competence requested is for example, system knowledge to facilitate and enhance the quality of the initial analysis performed in the blocks. Suppliers receive more recently larger turnkey projects, both to minimize costs but also to minimize the interfaces and co-function problems. This, however, heightens demands for knowledge transfer between

  16. Fuzzy vulnerability matrix

    International Nuclear Information System (INIS)

    Baron, Jorge H.; Rivera, S.S.

    2000-01-01

    The so-called vulnerability matrix is used in the evaluation part of the probabilistic safety assessment for a nuclear power plant, during the containment event trees calculations. This matrix is established from what is knows as Numerical Categories for Engineering Judgement. This matrix is usually established with numerical values obtained with traditional arithmetic using the set theory. The representation of this matrix with fuzzy numbers is much more adequate, due to the fact that the Numerical Categories for Engineering Judgement are better represented with linguistic variables, such as 'highly probable', 'probable', 'impossible', etc. In the present paper a methodology to obtain a Fuzzy Vulnerability Matrix is presented, starting from the recommendations on the Numerical Categories for Engineering Judgement. (author)

  17. Vulnerability, Health Agency and Capability to Health.

    Science.gov (United States)

    Straehle, Christine

    2016-01-01

    One of the defining features of the capability approach (CA) to health, as developed in Venkatapuram's book Health Justice, is its aim to enable individual health agency. Furthermore, the CA to health hopes to provide a strong guideline for assessing the health-enabling content of social and political conditions. In this article, I employ the recent literature on the liberal concept of vulnerability to assess the CA. I distinguish two kinds of vulnerability. Considering circumstantial vulnerability, I argue that liberal accounts of vulnerability concerned with individual autonomy, align with the CA to health. Individuals should, as far as possible, be able to make health-enabling decisions about their lives, and their capability to do so should certainly not be hindered by public policy. The CA to health and a vulnerability-based analysis then work alongside to define moral responsibilities and designate those who hold them. Both approaches demand social policy to address circumstances that hinder individuals from taking health-enabling decisions. A background condition of vulnerability, on the other hand, even though it hampers the capability for health, does not warrant the strong moral claim proposed by the CA to health to define health as a meta-capability that should guide social policy. Nothing in our designing social policy could change the challenge to health agency when we deal with background conditions of vulnerability. © 2016 John Wiley & Sons Ltd.

  18. Depressive vulnerabilities predict depression status and trajectories of depression over 1 year in persons with acute coronary syndrome.

    Science.gov (United States)

    Doyle, Frank; McGee, Hannah; Delaney, Mary; Motterlini, Nicola; Conroy, Ronán

    2011-01-01

    Depression is prevalent in patients hospitalized with acute coronary syndrome (ACS). We determined whether theoretical vulnerabilities for depression (interpersonal life events, reinforcing events, cognitive distortions, Type D personality) predicted depression, or depression trajectories, post-hospitalization. We followed 375 ACS patients who completed depression scales during hospital admission and at least once during three follow-up intervals over 1 year (949 observations). Questionnaires assessing vulnerabilities were completed at baseline. Logistic regression for panel/longitudinal data predicted depression status during follow-up. Latent class analysis determined depression trajectories. Multinomial logistic regression modeled the relationship between vulnerabilities and trajectories. Vulnerabilities predicted depression status over time in univariate and multivariate analysis, even when controlling for baseline depression. Proportions in each depression trajectory category were as follows: persistent (15%), subthreshold (37%), never depressed (48%). Vulnerabilities independently predicted each of these trajectories, with effect sizes significantly highest for the persistent depression group. Self-reported vulnerabilities - stressful life events, reduced reinforcing events, cognitive distortions, personality - measured during hospitalization can identify those at risk for depression post-ACS and especially those with persistent depressive episodes. Interventions should focus on these vulnerabilities. Copyright © 2011 Elsevier Inc. All rights reserved.

  19. Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning

    Directory of Open Access Journals (Sweden)

    Jingsha He

    2016-11-01

    Full Text Available As the Internet becomes larger in scale, more complex in structure and more diversified in traffic, the number of crimes that utilize computer technologies is also increasing at a phenomenal rate. To react to the increasing number of computer crimes, the field of computer and network forensics has emerged. The general purpose of network forensics is to find malicious users or activities by gathering and dissecting firm evidences about computer crimes, e.g., hacking. However, due to the large volume of Internet traffic, not all the traffic captured and analyzed is valuable for investigation or confirmation. After analyzing some existing network forensics methods to identify common shortcomings, we propose in this paper a new network forensics method that uses a combination of network vulnerability and network evidence graph. In our proposed method, we use vulnerability evidence and reasoning algorithm to reconstruct attack scenarios and then backtrack the network packets to find the original evidences. Our proposed method can reconstruct attack scenarios effectively and then identify multi-staged attacks through evidential reasoning. Results of experiments show that the evidence graph constructed using our method is more complete and credible while possessing the reasoning capability.

  20. Geospatial approach for assessment of biophysical vulnerability to agricultural drought and its intra-seasonal variations.

    Science.gov (United States)

    Sehgal, Vinay Kumar; Dhakar, Rajkumar

    2016-03-01

    The study presents a methodology to assess and map agricultural drought vulnerability during main kharif crop season at local scale and compare its intra-seasonal variations. A conceptual model of vulnerability based on variables of exposure, sensitivity, and adaptive capacity was adopted, and spatial datasets of key biophysical factors contributing to vulnerability were generated using remote sensing and GIS for Rajasthan State of India. Hazard exposure was based on frequency and intensity of gridded standardized precipitation index (SPI). Agricultural sensitivity was based on soil water holding capacity as well as on frequency and intensity of normalized difference vegetation index (NDVI)-derived trend adjusted vegetation condition index (VCITadj). Percent irrigated area was used as a measure of adaptive capacity. Agricultural drought vulnerability was derived separately for early, mid, late, and whole kharif seasons by composting rating of factors using linear weighting scheme and pairwise comparison of multi-criteria evaluation. The regions showing very low to extreme rating of hazard exposure, drought sensitivity, and agricultural vulnerability were identified at all four time scales. The results indicate that high to extreme vulnerability occurs in more than 50% of net sown area in the state and such areas mostly occur in western, central, and southern parts. The higher vulnerability is on account of non-irrigated croplands, moderate to low water holding capacity of sandy soils, resulting in higher sensitivity, and located in regions with high probability of rainfall deficiency. The mid and late season vulnerability has been found to be much higher than that during early and whole season. Significant correlation of vulnerability rating with food grain productivity, drought recurrence period, crop area damaged in year 2009 and socioeconomic indicator of human development index (HDI) proves the general soundness of methodology. Replication of this methodology

  1. Vulnerability of Forests in India: A National Scale Assessment.

    Science.gov (United States)

    Sharma, Jagmohan; Upgupta, Sujata; Jayaraman, Mathangi; Chaturvedi, Rajiv Kumar; Bala, Govindswamy; Ravindranath, N H

    2017-09-01

    Forests are subjected to stress from climatic and non-climatic sources. In this study, we have reported the results of inherent, as well as climate change driven vulnerability assessments for Indian forests. To assess inherent vulnerability of forests under current climate, we have used four indicators, namely biological richness, disturbance index, canopy cover, and slope. The assessment is presented as spatial profile of inherent vulnerability in low, medium, high and very high vulnerability classes. Fourty percent forest grid points in India show high or very high inherent vulnerability. Plantation forests show higher inherent vulnerability than natural forests. We assess the climate change driven vulnerability by combining the results of inherent vulnerability assessment with the climate change impact projections simulated by the Integrated Biosphere Simulator dynamic global vegetation model. While 46% forest grid points show high, very high, or extremely high vulnerability under future climate in the short term (2030s) under both representative concentration pathways 4.5 and 8.5, such grid points are 49 and 54%, respectively, in the long term (2080s). Generally, forests in the higher rainfall zones show lower vulnerability as compared to drier forests under future climate. Minimizing anthropogenic disturbance and conserving biodiversity can potentially reduce forest vulnerability under climate change. For disturbed forests and plantations, adaptive management aimed at forest restoration is necessary to build long-term resilience.

  2. Semiconductor Manufacturing equipment introduction

    International Nuclear Information System (INIS)

    Im, Jong Sun

    2001-02-01

    This book deals with semiconductor manufacturing equipment. It is comprised of nine chapters, which are manufacturing process of semiconductor device, history of semiconductor manufacturing equipment, kinds and role of semiconductor manufacturing equipment, construction and method of semiconductor manufacturing equipment, introduction of various semiconductor manufacturing equipment, spots of semiconductor manufacturing, technical elements of semiconductor manufacturing equipment, road map of technology of semiconductor manufacturing equipment and semiconductor manufacturing equipment in the 21st century.

  3. Buildings vs. ballistics: Quantifying the vulnerability of buildings to volcanic ballistic impacts using field studies and pneumatic cannon experiments

    Science.gov (United States)

    Williams, G. T.; Kennedy, B. M.; Wilson, T. M.; Fitzgerald, R. H.; Tsunematsu, K.; Teissier, A.

    2017-09-01

    Recent casualties in volcanic eruptions due to trauma from blocks and bombs necessitate more rigorous, ballistic specific risk assessment. Quantitative assessments are limited by a lack of experimental and field data on the vulnerability of buildings to ballistic hazards. An improved, quantitative understanding of building vulnerability to ballistic impacts is required for informing appropriate life safety actions and other risk reduction strategies. We assessed ballistic impacts to buildings from eruptions at Usu Volcano and Mt. Ontake in Japan and compiled available impact data from eruptions elsewhere to identify common damage patterns from ballistic impacts to buildings. We additionally completed a series of cannon experiments which simulate ballistic block impacts to building claddings to investigate their performance over a range of ballistic projectile velocities, masses and energies. Our experiments provide new insights by quantifying (1) the hazard associated with post-impact shrapnel from building and rock fragments; (2) the effect of impact obliquity on damage; and (3) the additional impact resistance buildings possess when claddings are struck in areas directly supported by framing components. This was not well identified in previous work which may have underestimated building vulnerability to ballistic hazards. To improve assessment of building vulnerability to ballistics, we use our experimental and field data to develop quantitative vulnerability models known as fragility functions. Our fragility functions and field studies show that although unreinforced buildings are highly vulnerable to large ballistics (> 20 cm diameter), they can still provide shelter, preventing death during eruptions.

  4. Stream vulnerability to widespread and emergent stressors: a focus on unconventional oil and gas

    Science.gov (United States)

    Entrekin, Sally; Maloney, Kelly O.; Katherine E. Kapo,; Walters, Annika W.; Evans-White, Michelle A.; Klemow, Kenneth M.

    2015-01-01

    Multiple stressors threaten stream physical and biological quality, including elevated nutrients and other contaminants, riparian and in-stream habitat degradation and altered natural flow regime. Unconventional oil and gas (UOG) development is one emerging stressor that spans the U.S. UOG development could alter stream sedimentation, riparian extent and composition, in-stream flow, and water quality. We developed indices to describe the watershed sensitivity and exposure to natural and anthropogenic disturbances and computed a vulnerability index from these two scores across stream catchments in six productive shale plays. We predicted that catchment vulnerability scores would vary across plays due to climatic, geologic and anthropogenic differences. Across-shale averages supported this prediction revealing differences in catchment sensitivity, exposure, and vulnerability scores that resulted from different natural and anthropogenic environmental conditions. For example, semi-arid Western shale play catchments (Mowry, Hilliard, and Bakken) tended to be more sensitive to stressors due to low annual average precipitation and extensive grassland. Catchments in the Barnett and Marcellus-Utica were naturally sensitive from more erosive soils and steeper catchment slopes, but these catchments also experienced areas with greater UOG densities and urbanization. Our analysis suggested Fayetteville and Barnett catchments were vulnerable due to existing anthropogenic exposure. However, all shale plays had catchments that spanned a wide vulnerability gradient. Our results identify vulnerable catchments that can help prioritize stream protection and monitoring efforts. Resource managers can also use these findings to guide local development activities to help reduce possible environmental effects.

  5. A method proposal for cumulative environmental impact assessment based on the landscape vulnerability evaluation

    International Nuclear Information System (INIS)

    Pavlickova, Katarina; Vyskupova, Monika

    2015-01-01

    Cumulative environmental impact assessment deals with the occasional use in practical application of environmental impact assessment process. The main reasons are the difficulty of cumulative impact identification caused by lack of data, inability to measure the intensity and spatial effect of all types of impacts and the uncertainty of their future evolution. This work presents a method proposal to predict cumulative impacts on the basis of landscape vulnerability evaluation. For this purpose, qualitative assessment of landscape ecological stability is conducted and major vulnerability indicators of environmental and socio-economic receptors are specified and valuated. Potential cumulative impacts and the overall impact significance are predicted quantitatively in modified Argonne multiple matrixes while considering the vulnerability of affected landscape receptors and the significance of impacts identified individually. The method was employed in the concrete environmental impact assessment process conducted in Slovakia. The results obtained in this case study reflect that this methodology is simple to apply, valid for all types of impacts and projects, inexpensive and not time-consuming. The objectivity of the partial methods used in this procedure is improved by quantitative landscape ecological stability evaluation, assignment of weights to vulnerability indicators based on the detailed characteristics of affected factors, and grading impact significance. - Highlights: • This paper suggests a method proposal for cumulative impact prediction. • The method includes landscape vulnerability evaluation. • The vulnerability of affected receptors is determined by their sensitivity. • This method can increase the objectivity of impact prediction in the EIA process

  6. Stream Vulnerability to Widespread and Emergent Stressors: A Focus on Unconventional Oil and Gas.

    Science.gov (United States)

    Entrekin, Sally A; Maloney, Kelly O; Kapo, Katherine E; Walters, Annika W; Evans-White, Michelle A; Klemow, Kenneth M

    2015-01-01

    Multiple stressors threaten stream physical and biological quality, including elevated nutrients and other contaminants, riparian and in-stream habitat degradation and altered natural flow regime. Unconventional oil and gas (UOG) development is one emerging stressor that spans the U.S. UOG development could alter stream sedimentation, riparian extent and composition, in-stream flow, and water quality. We developed indices to describe the watershed sensitivity and exposure to natural and anthropogenic disturbances and computed a vulnerability index from these two scores across stream catchments in six productive shale plays. We predicted that catchment vulnerability scores would vary across plays due to climatic, geologic and anthropogenic differences. Across-shale averages supported this prediction revealing differences in catchment sensitivity, exposure, and vulnerability scores that resulted from different natural and anthropogenic environmental conditions. For example, semi-arid Western shale play catchments (Mowry, Hilliard, and Bakken) tended to be more sensitive to stressors due to low annual average precipitation and extensive grassland. Catchments in the Barnett and Marcellus-Utica were naturally sensitive from more erosive soils and steeper catchment slopes, but these catchments also experienced areas with greater UOG densities and urbanization. Our analysis suggested Fayetteville and Barnett catchments were vulnerable due to existing anthropogenic exposure. However, all shale plays had catchments that spanned a wide vulnerability gradient. Our results identify vulnerable catchments that can help prioritize stream protection and monitoring efforts. Resource managers can also use these findings to guide local development activities to help reduce possible environmental effects.

  7. Identification of lightning vulnerability points on complex grounded structures

    OpenAIRE

    Becerra Garcia, Marley; Cooray, Vernon; Hartono, Z.A

    2007-01-01

    The identification of the most vulnerable points on a given structure to be struck by lightning is an important issue on the design of areliable lightning protection system. Traditionally, these lightning strike points are identified using the rolling sphere method, through anempirical correlation with the prospective peak return stroke current. However, field observations in Kuala Lumpur and Singapore haveshown that the points where lightning flashes strike buildings also depend on the heigh...

  8. Vulnerabilities to misinformation in online pharmaceutical marketing.

    Science.gov (United States)

    De Freitas, Julian; Falls, Brian A; Haque, Omar S; Bursztajn, Harold J

    2013-05-01

    Given the large percentage of Internet users who search for health information online, pharmaceutical companies have invested significantly in online marketing of their products. Although online pharmaceutical marketing can potentially benefit both physicians and patients, it can also harm these groups by misleading them. Indeed, some pharmaceutical companies have been guilty of undue influence, which has threatened public health and trust. We conducted a review of the available literature on online pharmaceutical marketing, undue influence and the psychology of decision-making, in order to identify factors that contribute to Internet users' vulnerability to online pharmaceutical misinformation. We find five converging factors: Internet dependence, excessive trust in the veracity of online information, unawareness of pharmaceutical company influence, social isolation and detail fixation. As the Internet continues to change, it is important that regulators keep in mind not only misinformation that surrounds new web technologies and their contents, but also the factors that make Internet users vulnerable to misinformation in the first place. Psychological components are a critical, although often neglected, risk factor for Internet users becoming misinformed upon exposure to online pharmaceutical marketing. Awareness of these psychological factors may help Internet users attentively and safely navigate an evolving web terrain.

  9. Mobile population dynamics and malaria vulnerability: a modelling study in the China-Myanmar border region of Yunnan Province, China.

    Science.gov (United States)

    Chen, Tian-Mu; Zhang, Shao-Sen; Feng, Jun; Xia, Zhi-Gui; Luo, Chun-Hai; Zeng, Xu-Can; Guo, Xiang-Rui; Lin, Zu-Rui; Zhou, Hong-Ning; Zhou, Shui-Sen

    2018-04-29

    The China-Myanmar border region presents a great challenge in malaria elimination in China, and it is essential to understand the relationship between malaria vulnerability and population mobility in this region. A community-based, cross-sectional survey was performed in five villages of Yingjiang county during September 2016. Finger-prick blood samples were obtained to identify asymptomatic infections, and imported cases were identified in each village (between January 2013 and September 2016). A stochastic simulation model (SSM) was used to test the relationship between population mobility and malaria vulnerability, according to the mechanisms of malaria importation. Thirty-two imported cases were identified in the five villages, with a 4-year average of 1 case/year (range: 0-5 cases/year). No parasites were detected in the 353 blood samples from 2016. The median density of malaria vulnerability was 0.012 (range: 0.000-0.033). The average proportion of mobile members of the study population was 32.56% (range: 28.38-71.95%). Most mobile individuals lived indoors at night with mosquito protection. The SSM model fit the investigated data (χ 2  = 0.487, P = 0.485). The average probability of infection in the members of the population that moved to Myanmar was 0.011 (range: 0.0048-0.1585). The values for simulated vulnerability increased with greater population mobility in each village. A high proportion of population mobility was associated with greater malaria vulnerability in the China-Myanmar border region. Mobile population-specific measures should be used to decrease the risk of malaria re-establishment in China.

  10. Building capacity and wellbeing in vulnerable/marginalised mothers: A qualitative study.

    Science.gov (United States)

    Balaam, Marie-Clare; Thomson, Gill

    2018-01-19

    The persistence of health inequalities in pregnancy and infancy amongst vulnerable/marginalised groups in the UK. During pregnancy and early motherhood some women experience severe and multiple psychosocial and economic disadvantages that negatively affect their wellbeing and make them at increased risk of poor maternal and infant health outcomes. To explore vulnerable/marginalised women's views and experiences of receiving targeted support from a specialist midwifery service and/or a charity. A mixed-methods study was undertaken that involved analysis of routinely collected birth-related/outcome data and interviews with a sample of vulnerable/marginalised women who had/had not received targeted support from a specialist midwifery service and/or a charity. In this paper we present in-depth insights from the 11 women who had received targeted support. Four key themes were identified; 'enabling needs-led care and support', 'empowering through knowledge, trust and acceptance', 'the value of a supportive presence' and 'developing capabilities, motivation and confidence'. Support provided by a specialist midwifery service and/or charity improved the maternity and parenting experiences of vulnerable/marginalised women. This was primarily achieved by developing a provider-woman relationship built on mutual trust and understanding and through which needs-led care and support was provided - leading to improved confidence, skills and capacities for positive parenting and health. The collaborative, multiagency, targeted intervention provides a useful model for further research and development. It offers a creative, salutogenic and health promoting approach to provide support for the most vulnerable/marginalised women as they make the journey into parenthood. Copyright © 2017 Australian College of Midwives. Published by Elsevier Ltd. All rights reserved.

  11. Climate Change Vulnerability Analysis of Baluran National Park

    Directory of Open Access Journals (Sweden)

    Beny Harjadi

    2016-12-01

    Full Text Available Every ecosystem has a different level of susceptibility to environmental disturbances it receives, both from natural factors or anthropogenic disturbance. National Park (NP Baluran is one national park that has a representation of a complete ecosystem that includes upland forest ecosystems, lowland forests, coastal forests, mangroves, savanna and evergreen forest. The objective of this study is to get a formula calculation of vulnerability analysis of constant and dynamic factors. Baluran NP vulnerability assessment to climate change done by looking at the dynamic and fixed factors. Vulnerability remains a vulnerability factor to the condition of the original (control, whereas vulnerability is the vulnerability of the dynamic change factors which affected the condition from the outside. Constant Vulnerability (CV in  Baluran NP dominated resistant conditions (61%, meaning that the geomorphology and other fixed factors (slope and slope direction/aspect, then the condition in Baluran NP sufficiently resilient to climate change. Dynamic Vulnerability (DV is the vulnerability of an area or areas that change because of pressure from external factors. DV is influenced by climatic factors (WI = Wetness Index, soil (SBI = Soil Brightness Index, and vegetation (GI = Greenness Index. DV in  Baluran NP from 1999 to 2010 shifted from the original category of being (84.76% and shifted to the susceptible (59.88%.  The role of remote sensing for the analysis of raster digital system, while the geographic information system to display the results of cartographic maps.

  12. The SAVI vulnerability assessment model

    International Nuclear Information System (INIS)

    Winblad, A.E.

    1987-01-01

    The assessment model ''Systematic Analysis of Vulnerability to Intrusion'' (SAVI) presented in this report is a PC-based path analysis model. It can provide estimates of protection system effectiveness (or vulnerability) against a spectrum of outsider threats including collusion with an insider adversary. It calculates one measure of system effectiveness, the probability of interruption P(I), for all potential adversary paths. SAVI can perform both theft and sabotage vulnerability analyses. For theft, the analysis is based on the assumption that adversaries should be interrupted either before they can accomplish removal of the target material from its normal location or removal from the site boundary. For sabotage, the analysis is based on the assumption that adversaries should be interrupted before completion of their sabotage task

  13. The Unfair Commercial Practices Directive and Vulnerable Consumers

    DEFF Research Database (Denmark)

    Trzaskowski, Jan

    the economic behaviour of consumers ‘below 1 average’ even though the practice does not meet the requirements of professional diligence. The Directive’s adoption of the European Court of Justice’s ‘average consumer’ entails that protection is generally provided only for those who are far from vulnerable......Consumer protection is deeply anchored in EU law, including the Treaty and the Charter of Fundamental Rights. This article discusses the concept of consumer vulnerability and how vulnerable consumers are protected in the context of commercial practices which is fully harmonised by the Unfair....... The Directive’s Article 5(3) concerning vulnerable consumers protects only—and to a limited extent—groups who are vulnerable due to mental or physical infirmity, age or credulity. Even though consumers make many good choices, all consumers are vulnerable in certain situations—often due to time constraints...

  14. GIS based Hydrogeological Vulnerability Mapping of Groundwater Resources in Jerash Area-Jordan

    Energy Technology Data Exchange (ETDEWEB)

    Hammouri, N [Department of Earth and Environmental Sciences, Faculty of Natural Resources and Environment, Hashemite University, Zarqa (Jordan); El-Naqa, A [Department of Water Management and Environment, Faculty of Natural Resources and Environment, Hashemite University, Zarqa (Jordan)

    2008-04-15

    This paper presents groundwater vulnerability mapping for Jerash area, north Jordan generated using EPIK and DRASTIC models. These models have been implemented using GIS to delineate groundwater protection zones and to suggest a protection plan to improve groundwater quality of the major springs and wells. Most of the groundwater resources in the study area are polluted and bacteria and nitrate levels are high. Different sources of groundwater pollution have been identified. Domestic wastewater is considered as a major source of pollution. Urban runoff, fertilizers from agricultural return flows and solid waste disposal appear to be secondary sources. The most relevant vulnerability class of EPIK map is very high which accounts for about 41 % of the total area. While in the DRASTIC vulnerability map, areas with high vulnerability were only about 23 % of the total area. There is a good correlation between vulnerability maps obtained from both models with microbiological and chemical pollution evidences. There is also a good agreement between the areas classified as highly vulnerable and those that have high levels of pollution. [Spanish] El estudio de vulnerabilidad de aguas subterraneas en la region de Yerash, Jordania fue obtenido mediante las metodologias de EPIK y DRASTIC. Se uso GIS para mapear las zonas protegidas y para sugerir un plan de proteccion para mejorar la calidad del agua subterranea en los principales manantiales y pozos. Los niveles de contaminacion bacteriana y de nitratos son elevados. El efluente domestico es la fuente mas importante de contaminacion; vienen en segundo lugar la precipitacion en zonas urbanas, los fertilizantes agricolas y los desechos solidos. En el mapa de EPIK, la vulnerabilidad extrema abarca hasta 41% del area total; en cambio, en el mapa de DRASTIC las areas de alta vulnerabilidad ocupan solo un 23% del area. La correlacion de los datos de contaminacion microbiana y quimica con ambos mapas der vulnerabilidad es buena

  15. Energy Vulnerability and EU-Russia Energy Relations

    Directory of Open Access Journals (Sweden)

    Edward Hunter Christie

    2009-08-01

    Full Text Available The concept of energy vulnerability is reviewed and discussed with a focus on Russia’s foreign energy relations, in particular those with European countries. A definition and a conceptual framework for quantifying energy vulnerability are proposed in the context of a review of recent research on energy vulnerability indices. In particular it is suggested that source country diversification should be reflected using the expected shortfall measure used in financial economics, rather than the Herfindahl-Hirschman or Shannon-Wiener indices, and that the former should then enter a calibrated function in order to yield expected economic loss. The issues of asymmetric failure probabilities and accidental versus intentional supply disruptions are then discussed with examples of recent Russian actions. Energy vulnerability measurement and modelling should ultimately inform policy. In particular, member states should legislate that no energy infrastructure project by one or more member states may increase the energy vulnerability of another member state. Additionally, European environmental policies, notably the EU ETS, should be amended so as to account for induced changes in energy vulnerability. Finally, member states should increase the level of transparency and disclosure with respect to gas import statistics and gas supply contracts.

  16. Syndemic vulnerability and the right to health.

    Science.gov (United States)

    Willen, Sarah S; Knipper, Michael; Abadía-Barrero, César E; Davidovitch, Nadav

    2017-03-04

    Investigators working both in syndemics, a field of applied health research with roots in medical anthropology, and in the field of health and human rights recognise that upstream social, political, and structural determinants contribute more to health inequities than do biological factors or personal choices. Syndemics investigates synergistic, often deleterious interactions among comorbid health conditions, especially under circumstances of structural and political adversity. Health and human rights research draws on international law to argue that all people deserve access not only to health care, but also to the underlying determinants of good health. Taking the urgent matter of migrant health as an empirical focus, we juxtapose the fields of syndemics and health and human rights, identify their complementarities, and advocate for a combined approach. By melding insights from these fields, the combined syndemics/health and human rights approach advanced here can provide clinicians and other key stakeholders with concrete insights, tools, and strategies to tackle the health inequities that affect migrants and other vulnerable groups by: (1) mapping the effect of social, political, and structural determinants on health; (2) identifying opportunities for upstream intervention; and (3) working collaboratively to tackle the structures, institutions, and processes that cause and exacerbate health inequities. Undergirding this approach is an egalitarian interpretation of the right to health that differs from narrow legalistic and individual interpretations by insisting that all people are equal in worth and, as a result, equally deserving of protection from syndemic vulnerability. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. Assessing socioeconomic vulnerability to dengue fever in Cali, Colombia: statistical vs expert-based modeling.

    Science.gov (United States)

    Hagenlocher, Michael; Delmelle, Eric; Casas, Irene; Kienberger, Stefan

    2013-08-14

    As a result of changes in climatic conditions and greater resistance to insecticides, many regions across the globe, including Colombia, have been facing a resurgence of vector-borne diseases, and dengue fever in particular. Timely information on both (1) the spatial distribution of the disease, and (2) prevailing vulnerabilities of the population are needed to adequately plan targeted preventive intervention. We propose a methodology for the spatial assessment of current socioeconomic vulnerabilities to dengue fever in Cali, a tropical urban environment of Colombia. Based on a set of socioeconomic and demographic indicators derived from census data and ancillary geospatial datasets, we develop a spatial approach for both expert-based and purely statistical-based modeling of current vulnerability levels across 340 neighborhoods of the city using a Geographic Information System (GIS). The results of both approaches are comparatively evaluated by means of spatial statistics. A web-based approach is proposed to facilitate the visualization and the dissemination of the output vulnerability index to the community. The statistical and the expert-based modeling approach exhibit a high concordance, globally, and spatially. The expert-based approach indicates a slightly higher vulnerability mean (0.53) and vulnerability median (0.56) across all neighborhoods, compared to the purely statistical approach (mean = 0.48; median = 0.49). Both approaches reveal that high values of vulnerability tend to cluster in the eastern, north-eastern, and western part of the city. These are poor neighborhoods with high percentages of young (i.e., local expertise, statistical approaches could be used, with caution. By decomposing identified vulnerability "hotspots" into their underlying factors, our approach provides valuable information on both (1) the location of neighborhoods, and (2) vulnerability factors that should be given priority in the context of targeted intervention

  18. Vulnerability maps for Druzba crude oil pipeline

    International Nuclear Information System (INIS)

    Hladik, P.; Hosnedl, P.; Buresova, H.; Corbet, J.

    2012-01-01

    Maps of risk for individual environmental aspects within the protection zone of the Czech part of the Druzba crude oil pipeline (505.7 km) were developed based on a modified 'H and V index' method. Risk data were added into a GIS of the Druzba pipeline so that the system could be used as conceptual material in the field of environmental protection (a base for the new SCADA system). Considered environmental aspects were assessed in terms of their vulnerability. The criteria were defined as the vulnerability of the aquatic environment (surface waters and ground waters), the vulnerability of soil environment and the vulnerability of biotic components of the environment. (authors)

  19. Binational climate change vulnerability assessment of migratory birds in the Great Lakes Basins: Tools and impediments.

    Directory of Open Access Journals (Sweden)

    Robert S Rempel

    Full Text Available Climate change is a global concern, requiring international strategies to reduce emissions, however, climate change vulnerability assessments are often local in scope with assessment areas restricted to jurisdictional boundaries. In our study we explored tools and impediments to understanding and responding to the effects of climate change on vulnerability of migratory birds from a binational perspective. We apply and assess the utility of a Climate Change Vulnerability Index on 3 focal species using distribution or niche modeling frameworks. We use the distributional forecasts to explore possible changes to jurisdictional conservation responsibilities resulting from shifting distributions for: eastern meadowlark (Sturnella magna, wood thrush (Hylocichla mustelina, and hooded warbler (Setophaga citrina. We found the Climate Change Vulnerability Index to be a well-organized approach to integrating numerous lines of evidence concerning effects of climate change, and provided transparency to the final assessment of vulnerability. Under this framework, we identified that eastern meadowlark and wood thrush are highly vulnerable to climate change, but hooded warbler is less vulnerable. Our study revealed impediments to assessing and modeling vulnerability to climate change from a binational perspective, including gaps in data or modeling for climate exposure parameters. We recommend increased cross-border collaboration to enhance the availability and resources needed to improve vulnerability assessments and development of conservation strategies. We did not find evidence to suggest major shifts in jurisdictional responsibility for the 3 focal species, but results do indicate increasing responsibility for these birds in the Canadian Provinces. These Provinces should consider conservation planning to help ensure a future supply of necessary habitat for these species.

  20. Security proof of counterfactual quantum cryptography against general intercept-resend attacks and its vulnerability

    International Nuclear Information System (INIS)

    Zhang Sheng; Wang Jian; Tang Chao-Jing

    2012-01-01

    Counterfactual quantum cryptography, recently proposed by Noh, is featured with no transmission of signal particles. This exhibits evident security advantages, such as its immunity to the well-known photon-number-splitting attack. In this paper, the theoretical security of counterfactual quantum cryptography protocol against the general intercept-resend attacks is proved by bounding the information of an eavesdropper Eve more tightly than in Yin's proposal [Phys. Rev. A 82 042335 (2010)]. It is also shown that practical counterfactual quantum cryptography implementations may be vulnerable when equipped with imperfect apparatuses, by proving that a negative key rate can be achieved when Eve launches a time-shift attack based on imperfect detector efficiency. (general)

  1. Benefits Of Vibration Analysis For Development Of Equipment In HLW Tanks - 12341

    International Nuclear Information System (INIS)

    Stefanko, D.; Herbert, J.

    2012-01-01

    Vibration analyses of equipment intended for use in the Savannah River Site (SRS) radioactive liquid waste storage tanks are performed during pre-deployment testing and has been demonstrated to be effective in reducing the life-cycle costs of the equipment. Benefits of using vibration analysis to identify rotating machinery problems prior to deployment in radioactive service will be presented in this paper. Problems encountered at SRS and actions to correct or lessen the severity of the problem are discussed. In short, multi-million dollar cost saving have been realized at SRS as a direct result of vibration analysis on existing equipment. Vibration analysis of equipment prior to installation can potentially reduce inservice failures, and increases reliability. High-level radioactive waste is currently stored in underground carbon steel waste tanks at the United States Department of Energy (DOE) Savannah River Site and at the Hanford Site, WA. Various types of rotating machinery (pumps and separations equipment) are used to manage and retrieve the tank contents. Installation, maintenance, and repair of these pumps and other equipment are expensive. In fact, costs to remove and replace a single pump can be as high as a half million dollars due to requirements for radioactive containment. Problems that lead to in-service maintenance and/or equipment replacement can quickly exceed the initial investment, increase radiological exposure, generate additional waste, and risk contamination of personnel and the work environment. Several different types of equipment are considered in this paper, but pumps provide an initial example for the use of vibration analysis. Long-shaft (45 foot long) and short-shaft (5-10 feet long) equipment arrangements are used for 25-350 horsepower slurry mixing and transfer pumps in the SRS HLW tanks. Each pump has a unique design, operating characteristics and associated costs, sometimes exceeding a million dollars. Vibration data are routinely

  2. BENEFITS OF VIBRATION ANALYSIS FOR DEVELOPMENT OF EQUIPMENT IN HLW TANKS - 12341

    Energy Technology Data Exchange (ETDEWEB)

    Stefanko, D.; Herbert, J.

    2012-01-10

    Vibration analyses of equipment intended for use in the Savannah River Site (SRS) radioactive liquid waste storage tanks are performed during pre-deployment testing and has been demonstrated to be effective in reducing the life-cycle costs of the equipment. Benefits of using vibration analysis to identify rotating machinery problems prior to deployment in radioactive service will be presented in this paper. Problems encountered at SRS and actions to correct or lessen the severity of the problem are discussed. In short, multi-million dollar cost saving have been realized at SRS as a direct result of vibration analysis on existing equipment. Vibration analysis of equipment prior to installation can potentially reduce inservice failures, and increases reliability. High-level radioactive waste is currently stored in underground carbon steel waste tanks at the United States Department of Energy (DOE) Savannah River Site and at the Hanford Site, WA. Various types of rotating machinery (pumps and separations equipment) are used to manage and retrieve the tank contents. Installation, maintenance, and repair of these pumps and other equipment are expensive. In fact, costs to remove and replace a single pump can be as high as a half million dollars due to requirements for radioactive containment. Problems that lead to in-service maintenance and/or equipment replacement can quickly exceed the initial investment, increase radiological exposure, generate additional waste, and risk contamination of personnel and the work environment. Several different types of equipment are considered in this paper, but pumps provide an initial example for the use of vibration analysis. Long-shaft (45 foot long) and short-shaft (5-10 feet long) equipment arrangements are used for 25-350 horsepower slurry mixing and transfer pumps in the SRS HLW tanks. Each pump has a unique design, operating characteristics and associated costs, sometimes exceeding a million dollars. Vibration data are routinely

  3. Challenges in the vulnerability and risk analysis of critical infrastructures

    International Nuclear Information System (INIS)

    Zio, Enrico

    2016-01-01

    The objective of this paper is to provide a systematic view on the problem of vulnerability and risk analysis of critical infrastructures. Reflections are made on the inherent complexities of these systems, related challenges are identified and possible ways forward for their analysis and management are indicated. Specifically: the framework of vulnerability and risk analysis is examined in relation to its application for the protection and resilience of critical infrastructures; it is argued that the complexity of these systems is a challenging characteristic, which calls for the integration of different modeling perspectives and new approaches of analysis; examples of are given in relation to the Internet and, particularly, the electric power grid, as representative of critical infrastructures and the associated complexity; the integration of different types of analyses and methods of system modeling is put forward for capturing the inherent structural and dynamic complexities of critical infrastructures and eventually evaluating their vulnerability and risk characteristics, so that decisions on protections and resilience actions can be taken with the required confidence. - Highlights: • The problem of the protection and resilience of CIs is the focus of the work. • The vulnerability and risk analysis framework for this is critically examined. • The complexity of CIs is presented as a challenge for system modeling and analysis. • The integration of different modeling perspectives of analysis is put forward as a solution. • The extension of the analysis framework to new methods for dealing with surprises and black swans is advocated.

  4. Spatial vulnerability of Australian urban populations to extreme heat events

    Science.gov (United States)

    Loughnan, Margaret; Tapper, Nigel; Phan, Thu; Lynch, Kellie; McInnes, Judith

    2013-04-01

    Extreme heat events pose a risk to the health of all individuals, especially the elderly and the chronically ill, and are associated with an increased demand for healthcare services. In order to address this problem, policy makers' need information about temperatures above which mortality and morbidity of the exposed population is likely to increase, where the vulnerable groups in the community are located, and how the risks from extreme heat events are likely to change in the future. This study identified threshold temperatures for all Australian capital cities, developed a spatial index of population vulnerability, and used climate model output to predict changes in the number of days exceeding temperature thresholds in the future, as well as changes in risk related to changes in urban density and an ageing population. The study has shown that daily maximum and minimum temperatures from the Bureau of Meteorology forecasts can be used to calculate temperature thresholds for heat alert days. The key risk factors related to adverse health outcomes were found to be areas with intense urban heat islands, areas with higher proportions of older people, and areas with ethnic communities. Maps of spatial vulnerability have been developed to provide information to assist emergency managers, healthcare professionals, and ancillary services develop heatwave preparedness plans at a local scale that target vulnerable groups and address heat-related health risks. The numbers of days exceeding current heat thresholds are predicted to increase over the next 20 to 40 years in all Australian capital cities.

  5. Interventional suite and equipment management: cradle to grave

    Energy Technology Data Exchange (ETDEWEB)

    Strauss, Keith J. [Harvard Medical School, Radiology Physics and Engineering, Children' s Hospital Boston, Boston, MA (United States)

    2006-09-15

    The acquisition process for interventional equipment and the care that this equipment receives constitute a comprehensive quality improvement program. This program strives to (a) achieve the production of good image quality that meets clinical needs, (b) reduce radiation doses to the patient and personnel to their lowest possible levels, and (c) provide overall good patient care at reduced cost. Interventional imaging equipment is only as effective and efficient as its supporting facility. The acquisition process of interventional equipment and the development of its environment demand a clinical project leader who can effectively coordinate the efforts of the many professionals who must communicate and work effectively on this type of project. The clinical project leader needs to understand (a) clinical needs of the end users, (b) how to justify the cost of the project, (c) the technical needs of the imaging and all associated equipment, (d) building and construction limitations, (e) how to effectively read construction drawings, and (f) how to negotiate and contract the imaging equipment from the appropriate vendor. After the initial commissioning of the equipment, it must not be forgotten. The capabilities designed into the imaging device can be properly utilized only by well-trained operators and staff who were initially properly trained and receive ongoing training concerning the latest clinical techniques throughout the equipment's lifetime. A comprehensive, ongoing maintenance and repair program is paramount to reducing costly downtime of the imaging device. A planned periodic maintenance program can identify and eliminate problems with the imaging device before these problems negatively impact patient care. (orig.)

  6. Interventional suite and equipment management: cradle to grave

    International Nuclear Information System (INIS)

    Strauss, Keith J.

    2006-01-01

    The acquisition process for interventional equipment and the care that this equipment receives constitute a comprehensive quality improvement program. This program strives to (a) achieve the production of good image quality that meets clinical needs, (b) reduce radiation doses to the patient and personnel to their lowest possible levels, and (c) provide overall good patient care at reduced cost. Interventional imaging equipment is only as effective and efficient as its supporting facility. The acquisition process of interventional equipment and the development of its environment demand a clinical project leader who can effectively coordinate the efforts of the many professionals who must communicate and work effectively on this type of project. The clinical project leader needs to understand (a) clinical needs of the end users, (b) how to justify the cost of the project, (c) the technical needs of the imaging and all associated equipment, (d) building and construction limitations, (e) how to effectively read construction drawings, and (f) how to negotiate and contract the imaging equipment from the appropriate vendor. After the initial commissioning of the equipment, it must not be forgotten. The capabilities designed into the imaging device can be properly utilized only by well-trained operators and staff who were initially properly trained and receive ongoing training concerning the latest clinical techniques throughout the equipment's lifetime. A comprehensive, ongoing maintenance and repair program is paramount to reducing costly downtime of the imaging device. A planned periodic maintenance program can identify and eliminate problems with the imaging device before these problems negatively impact patient care. (orig.)

  7. Space Heating Equipment

    Energy Technology Data Exchange (ETDEWEB)

    Rafferty, Kevin D.

    1998-01-01

    The performance evaluation of space heating equipment for a geothermal application is generally considered from either of two perspectives: (a) selecting equipment for installation in new construction, or (b) evaluating the performance and retrofit requirements of an existing system. With regard to new construction, the procedure is relatively straightforward. Once the heating requirements are determined, the process need only involve the selection of appropriately sized hot water heating equipment based on the available water temperature. It is important to remember that space heating equipment for geothermal applications is the same equipment used in non-geothermal applications. What makes geothermal applications unique is that the equipment is generally applied at temperatures and flow rates that depart significantly from traditional heating system design. This chapter presents general considerations for the performance of heating equipment at non-standard temperature and flow conditions, retrofit of existing systems, and aspects of domestic hot water heating.

  8. Gender subordination in the vulnerability of women to domestic violence.

    Science.gov (United States)

    Macedo Piosiadlo, Laura Christina; Godoy Serpa da Fonseca, Rosa Maria

    2016-06-01

    To create and validate an instrument that identifies women's vulnerability to domestic violence through gender subordination indicators in the family. An instrument consisting on 61 phrases was created, that indicates gender subordination in the family. After the assessment from ten judges, 34 phrases were validated. The approved version was administered to 321 health service users of São José dos Pinhais (Estado de Paraná, Brasil), along with the validated Portuguese version of the Abuse Assessment Screen (AAS) (for purposes of separating the sample group - the ''YES'' group was composed of women who have suffered violence and the ''NO'' group consisted of women who had not suffered violence). Data were transferred into the Statistical Package for the Social Sciences (SPSS) software, version 22, and quantitatively analyzed using exploratory and factor analysis, and tests for internal consistency. After analysis (Kaiser-Meyer-Olkin (KMO) statistics, Monte Carlo Principal Components Analysis (PCA, and diagram segmentation), two factors were identified: F1 - consisting of phrases related to home maintenance and family structure; F2 - phrases intrinsic to the couple's relationship. For the statements that reinforce gender subordination, the mean of the factors were higher for the group that answered YES to one of the violence identifying issues. The created instrument was able to identify women who were vulnerable to domestic violence using gender subordination indicators. This could be an important tool for nurses and other professionals in multidisciplinary teams, in order to organize and plan actions to prevent violence against women.

  9. Gender subordination in the vulnerability of women to domestic violence

    Directory of Open Access Journals (Sweden)

    Laura Christina Macedo Piosiadlo

    Full Text Available Objective.To create and validate an instrument that identifies women's vulnerability to domestic violence through gender subordination indicators in the family. Methods. An instrument consisting on 61 phrases was created, that indicates gender subordination in the family. After the assessment from ten judges, 34 phrases were validated. The approved version was administered to 321 health service users of São José dos Pinhais (Estado de Paraná, Brasil, along with the validated Portuguese version of the Abuse Assessment Screen (AAS (for purposes of separating the sample group - the ''YES'' group was composed of women who have suffered violence and the ''NO'' group consisted of women who had not suffered violence. Data were transferred into the Statistical Package for the Social Sciences (SPSS software, version 22, and quantitatively analyzed using exploratory and factor analysis, and tests for internal consistency. Results. After analysis (Kaiser-Meyer-Olkin (KMO statistics, Monte Carlo Principal Components Analysis (PCA, and diagram segmentation, two factors were identified: F1 - consisting of phrases related to home maintenance and family structure; F2 - phrases intrinsic to the couple's relationship. For the statements that reinforce gender subordination, the mean of the factors were higher for the group that answered YES to one of the violence identifying issues. Conclusions. The created instrument was able to identify women who were vulnerable to domestic violence using gender subordination indicators. This could be an important tool for nurses and other professionals in multidisciplinary teams, in order to organize and plan actions to prevent violence against women.

  10. A New Unified Intrusion Anomaly Detection in Identifying Unseen Web Attacks

    Directory of Open Access Journals (Sweden)

    Muhammad Hilmi Kamarudin

    2017-01-01

    Full Text Available The global usage of more sophisticated web-based application systems is obviously growing very rapidly. Major usage includes the storing and transporting of sensitive data over the Internet. The growth has consequently opened up a serious need for more secured network and application security protection devices. Security experts normally equip their databases with a large number of signatures to help in the detection of known web-based threats. In reality, it is almost impossible to keep updating the database with the newly identified web vulnerabilities. As such, new attacks are invisible. This research presents a novel approach of Intrusion Detection System (IDS in detecting unknown attacks on web servers using the Unified Intrusion Anomaly Detection (UIAD approach. The unified approach consists of three components (preprocessing, statistical analysis, and classification. Initially, the process starts with the removal of irrelevant and redundant features using a novel hybrid feature selection method. Thereafter, the process continues with the application of a statistical approach to identifying traffic abnormality. We performed Relative Percentage Ratio (RPR coupled with Euclidean Distance Analysis (EDA and the Chebyshev Inequality Theorem (CIT to calculate the normality score and generate a finest threshold. Finally, Logitboost (LB is employed alongside Random Forest (RF as a weak classifier, with the aim of minimising the final false alarm rate. The experiment has demonstrated that our approach has successfully identified unknown attacks with greater than a 95% detection rate and less than a 1% false alarm rate for both the DARPA 1999 and the ISCX 2012 datasets.

  11. Childhood adversity, parental vulnerability and disorder: examining inter-generational transmission of risk.

    Science.gov (United States)

    Bifulco, A; Moran, P M; Ball, C; Jacobs, C; Baines, R; Bunn, A; Cavagin, J

    2002-11-01

    An investigation of intergenerational factors associated with psychiatric disorder in late adolescence/early adulthood was undertaken to differentiate influences from maternal disorder, maternal poor psychosocial functioning and poor parenting, on offspring. The sample comprised an intensively studied series of 276 mother-offspring pairs in a relatively deprived inner-city London area with high rates of lone parenthood and socio-economic disadvantage. The paired sample was collected over two time periods: first a consecutively screened series of mothers and offspring in 1985-90 (n = 172 pairs) and second a 'vulnerable' series of mothers and offspring in 1995-99 (n = 104 pairs). The vulnerable mothers were selected for poor interpersonal functioning and/or low self-esteem and the consecutive series were used for comparison. Rates of childhood adversity and disorder in the offspring were examined in the two groups. Maternal characteristics including psychosocial vulnerability and depression were then examined in relation to risk transmission. Offspring of vulnerable mothers had a fourfold higher rate of yearly disorder than those in the comparison series (43% vs. 11%, p maternal vulnerability and neglect/abuse of offspring provided the best model for offspring disorder. Maternal history of depression had no direct effect on offspring disorder; its effects were entirely mediated by offspring neglect/abuse. Maternal childhood adversity also had no direct effect. Results are discussed in relation to psychosocial models of risk transmission for disorder. Maternal poor psychosocial functioning needs to be identified as a factor requiring intervention in order to stem escalation of risk across generations.

  12. Challenges and Responses to the Vulnerability of Families in a Preschool Context

    Directory of Open Access Journals (Sweden)

    Nada Turnšek

    2016-12-01

    Full Text Available Problems in vulnerable families are multilayered and include the intersection of physical, psychosocial and other forms of distress. The multidimensional nature of the problems of these families is closely linked to the fact that there are many institutions in the field of education, social welfare, health care and others, in which treatment and support are not satisfactory or adapted to their needs. The article presents the partial results of a large-scale qualitative research study, results that refer to the position of vulnerable families in the context of preschool education. The study examined how vulnerability is experienced by parents of preschool children, how the expert workers in the preschools involved in the study responded to the parents’ vulnerability, and how they cooperated with experts from other services outside the preschool. A qualitative research method was used in the study. Data was collected partly through semi-structured interviews with various expert workers employed in two preschools, as well as with the parents of children in the preschools; the interviews were conducted individually and in focus groups. Using thematic analysis (Braun & Clarke, 2006, we have identified four representative themes: amongst parents, the two recurring themes can be subsumed under the headings “from door to door” and “adaptation/flexibility”, and amongst experts, under the headings “powerlessness/ incompetence/lack of information” and “power/innovation/ sensitivity”. The study finds that the ability to effectively contend with vulnerability presumes a reconceptualisation of the attitude of institutional preschool education towards the family, including a change in the professional role of preschool teachers.

  13. Vulnerability Situations associated with Flash Flood Casualties in the United States

    Science.gov (United States)

    Terti, G.; Ruin, I.; Anquetin, S.; Gourley, J. J.

    2015-12-01

    In the United States (U.S.) flash flooding (FF hereafter) is one of the leading cause of weather-related deaths. Because FF events can be distinguished from riverine floods by their fast response to rainfall and resulting impacts signature, analyzing FF-specific impact datasets seems a good way to identify the juxtaposition of social and physical circumstances leading to those impacts. This communication focuses on conceptual and methodological developments allowing testing hypotheses on FF-specific vulnerability factors through the analysis of human impact datasets. We hypothesize that the intersection of the spatio-temporal context of the FF phenomena with the distribution of people and their characteristics across space and time reveals various paths of vulnerability through the expression of different accidents' circumstances (i.e., vehicle-related, inside buildings, open-air, campsites). We argue that vulnerability and the resulting impacts vary dynamically throughout the day according to the location/situation under concern. In order to test FF-specific contextual vulnerability factors at the scale of the continental US, 1075 fatalities reported between 1996 and 2014 in the Storm Data publication of the U.S. National Climatic Data Center (NCDC) are analyzed to statistically explore the timing, the duration and the location of the FF event, and the age and gender of the victims and the circumstance (i.e. location/activity) of their death. In this objective, a re-classification of the individual fatality circumstances and a discretization of the time in qualitative time-steps are performed to obtain possible trends and patterns in the occurrence of fatalities in certain circumstances and time (e.g., day vs night). The findings highlight the importance of situation-specific assessment of FF fatalities to guide the development of FF-specific vulnerability and impacts prediction modeling. Such analysis can provide valuable knowledge when the National Weather

  14. Oil vulnerability index of oil-importing countries

    International Nuclear Information System (INIS)

    Gupta, Eshita

    2008-01-01

    This paper assesses the relative oil vulnerability of 26 net oil-importing countries for the year 2004 on the basis of various indicators - the ratio of value of oil imports to gross domestic product (GDP), oil consumption per unit of GDP, GDP per capita and oil share in total energy supply, ratio of domestic reserves to oil consumption, exposure to geopolitical oil market concentration risks as measured by net oil import dependence, diversification of supply sources, political risk in oil-supplying countries, and market liquidity. The approach using the principal component technique has been adopted to combine these individual indicators into a composite index of oil vulnerability. Such an index captures the relative sensitivity of various economies towards developments of the international oil market, with a higher index indicating higher vulnerability. The results show that there are considerable differences in the values of individual indicators of oil vulnerability and overall oil vulnerability index among the countries (both inter and intraregional). (author)

  15. Oil vulnerability index of oil-importing countries

    Energy Technology Data Exchange (ETDEWEB)

    Gupta, Eshita [The Energy and Resources Institute, Darbari Seth Block, Habitat Place, New Delhi 110 003 (India)

    2008-03-15

    This paper assesses the relative oil vulnerability of 26 net oil-importing countries for the year 2004 on the basis of various indicators - the ratio of value of oil imports to gross domestic product (GDP), oil consumption per unit of GDP, GDP per capita and oil share in total energy supply, ratio of domestic reserves to oil consumption, exposure to geopolitical oil market concentration risks as measured by net oil import dependence, diversification of supply sources, political risk in oil-supplying countries, and market liquidity. The approach using the principal component technique has been adopted to combine these individual indicators into a composite index of oil vulnerability. Such an index captures the relative sensitivity of various economies towards developments of the international oil market, with a higher index indicating higher vulnerability. The results show that there are considerable differences in the values of individual indicators of oil vulnerability and overall oil vulnerability index among the countries (both inter and intraregional). (author)

  16. Groundwater Vulnerability Map for South Africa | Musekiwa | South ...

    African Journals Online (AJOL)

    Vulnerability of groundwater is a relative, non-measurable and dimensionless property which is based on the concept that some land areas are more vulnerable to groundwater contamination than others. Maps showing groundwater vulnerability assist with the identification of areas more susceptible to contamination than ...

  17. 6 CFR 27.400 - Chemical-terrorism vulnerability information.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Chemical-terrorism vulnerability information. 27... FACILITY ANTI-TERRORISM STANDARDS Other § 27.400 Chemical-terrorism vulnerability information. (a... that constitute Chemical-terrorism Vulnerability Information (CVI), as defined in § 27.400(b). The...

  18. The development of special equipment amplitude detection instrument based on DSP

    International Nuclear Information System (INIS)

    Dai Sidan; Chen Ligang; Lan Peng; Wang Huiting; Zhang Liangxu; Wang Lin

    2014-01-01

    Development and industrial application of special equipment plays an important role in the development of nuclear energy process. Equipment development process need to do a lot of tests, amplitude detection is a key test,it can analysis the device's electromechanical and physical properties. In the industrial application, the amplitude detection can effectively reflect the operational status of the current equipment, the equipment can also be a certain degree of fault diagnosis, identify problems in a timely manner. The main development target in this article is amplitude detection of special equipment. This article describes the development of special equipment amplitude detection instrument. The instrument uses a digital signal processor (DSP) as the central processing unit, and uses the DSP + CPLD + high-speed AD technology to build a complete set of high-precision signal acquisition and analysis processing systems, rechargeable lithium battery as the powered device. It can do a online monitoring of special equipment amplitude, speed parameters by acquiring and analysing the tachometer signal in the special equipment, and locally display through the LCD screen. (authors)

  19. Vulnerability Assessment for a Complex Structure Using Vibration Response Induced by Impact Load

    International Nuclear Information System (INIS)

    Park, Jeongwon; Park, Junhong; Koo, Man Hoi

    2014-01-01

    This work presents a vulnerability assessment procedure for a complex structure using vibration characteristics. The structural behavior of a three-dimensional framed structure subjected to impact forces was predicted using the spectral element method. The Timoshenko beam function was applied to simulate the impact wave propagations induced by a high-velocity projectile at relatively high frequencies. The interactions at the joints were analyzed for both flexural and longitudinal wave propagations. Simulations of the impact energy transfer through the entire structure were performed using the transient displacement and acceleration responses obtained from the frequency analysis. The kill probabilities of the crucial components for an operating system were calculated as a function of the predicted acceleration amplitudes according to the acceptable vibration levels. Following the proposed vulnerability assessment procedure, the vulnerable positions of a three-dimensional combat vehicle with high possibilities of damage generation of components by impact loading were identified from the estimated vibration responses

  20. The influence of local mechanisms on large scale seismic vulnerability estimation of masonry building aggregates

    Science.gov (United States)

    Formisano, Antonio; Chieffo, Nicola; Milo, Bartolomeo; Fabbrocino, Francesco

    2016-12-01

    The current paper deals with the seismic vulnerability evaluation of masonry constructions grouped in aggregates through an "ad hoc" quick vulnerability form based on new assessment parameters considering local collapse mechanisms. First, a parametric kinematic analysis on masonry walls with different height (h) / thickness (t) ratios has been developed with the purpose of identifying the collapse load multiplier for activation of the main four first-order failure mechanisms. Subsequently, a form initially conceived for building aggregates suffering second-mode collapse mechanisms, has been expanded on the basis of the achieved results. Tre proposed quick vulnerability technique has been applied to one case study within the territory of Arsita (Teramo, Italy) and, finally, it has been also validated by the comparison of results with those deriving from application of the well-known FaMIVE procedure.

  1. Assessing vulnerability

    NARCIS (Netherlands)

    Hellmuth, M.; Kabat, P.

    2003-01-01

    It is in the shantytowns and rural villages of the Third World that floods and droughts strike hardest and deepest. Vulnerability to the vagaries of climate depends not only on location, but, crucially, on the capacity of the victims to cope with the impacts of extreme weather. So, where are the

  2. Comparison of independent screens on differentially vulnerable motor neurons reveals alpha-synuclein as a common modifier in motor neuron diseases.

    Science.gov (United States)

    Kline, Rachel A; Kaifer, Kevin A; Osman, Erkan Y; Carella, Francesco; Tiberi, Ariana; Ross, Jolill; Pennetta, Giuseppa; Lorson, Christian L; Murray, Lyndsay M

    2017-03-01

    The term "motor neuron disease" encompasses a spectrum of disorders in which motor neurons are the primary pathological target. However, in both patients and animal models of these diseases, not all motor neurons are equally vulnerable, in that while some motor neurons are lost very early in disease, others remain comparatively intact, even at late stages. This creates a valuable system to investigate the factors that regulate motor neuron vulnerability. In this study, we aim to use this experimental paradigm to identify potential transcriptional modifiers. We have compared the transcriptome of motor neurons from healthy wild-type mice, which are differentially vulnerable in the childhood motor neuron disease Spinal Muscular Atrophy (SMA), and have identified 910 transcriptional changes. We have compared this data set with published microarray data sets on other differentially vulnerable motor neurons. These neurons were differentially vulnerable in the adult onset motor neuron disease Amyotrophic Lateral Sclerosis (ALS), but the screen was performed on the equivalent population of neurons from neurologically normal human, rat and mouse. This cross species comparison has generated a refined list of differentially expressed genes, including CELF5, Col5a2, PGEMN1, SNCA, Stmn1 and HOXa5, alongside a further enrichment for synaptic and axonal transcripts. As an in vivo validation, we demonstrate that the manipulation of a significant number of these transcripts can modify the neurodegenerative phenotype observed in a Drosophila line carrying an ALS causing mutation. Finally, we demonstrate that vector-mediated expression of alpha-synuclein (SNCA), a transcript decreased in selectively vulnerable motor neurons in all four screens, can extend life span, increase weight and decrease neuromuscular junction pathology in a mouse model of SMA. In summary, we have combined multiple data sets to identify transcripts, which are strong candidates for being phenotypic modifiers

  3. Natural and environmental vulnerability analysis through remote sensing and GIS techniques: a case study of Indigirka River basin, Eastern Siberia, Russia

    Science.gov (United States)

    Boori, Mukesh S.; Choudhary, Komal; Kupriyanov, Alexander; Sugimoto, Atsuko; Evers, Mariele

    2016-10-01

    The aim of this research work is to understand natural and environmental vulnerability situation and its cause such as intensity, distribution and socio-economic effect in the Indigirka River basin, Eastern Siberia, Russia. This paper identifies, assess and classify natural and environmental vulnerability using landscape pattern from multidisciplinary approach, based on remote sensing and Geographical Information System (GIS) techniques. A model was developed by following thematic layers: land use/cover, vegetation, wetland, geology, geomorphology and soil in ArcGIS 10.2 software. According to numerical results vulnerability classified into five levels: low, sensible, moderate, high and extreme vulnerability by mean of cluster principal. Results are shows that in natural vulnerability maximum area covered by moderate (29.84%) and sensible (38.61%) vulnerability and environmental vulnerability concentrated by moderate (49.30%) vulnerability. So study area has at medial level vulnerability. The results found that the methodology applied was effective enough in the understanding of the current conservation circumstances of the river basin in relation to their environment with the help of remote sensing and GIS. This study is helpful for decision making for eco-environmental recovering and rebuilding as well as predicting the future development.

  4. Reconceptualizing Vulnerability in Personal Narrative Writing with Youths

    Science.gov (United States)

    Johnson, Elisabeth

    2014-01-01

    Through a student/teacher classroom conflict, the author explores ways adults produce student writers as vulnerable. Drawing on post-structural concepts of adolescence, identity production, interrogation, and vulnerability, the author details how an English teacher invited students to perform vulnerability in personal narratives about issues like…

  5. Working up a Debt: Students as Vulnerable Consumers

    Science.gov (United States)

    Robson, Julie; Farquhar, Jillian Dawes; Hindle, Christopher

    2017-01-01

    Students are recognized as vulnerable consumers where financial matters are concerned, particularly with reference to indebtedness. This study examines student indebtedness in order to initiate wider debate about student vulnerability. We consider vulnerability as dynamic and temporal, linked to an event that renders the consumer susceptible to…

  6. Internally readable identifying tag

    International Nuclear Information System (INIS)

    Jefferts, K.B.; Jefferts, E.R.

    1980-01-01

    A method of identifying non-metallic objects by means of X-ray equipment is described in detail. A small metal pin with a number of grooves cut in a pre-determined equi-spaced pattern is implanted into the non-metallic object and by decoding the groove patterns using X-ray equipment, the object is uniquely identified. A specific example of such an application is in studying the migratory habits of fish. The pin inserted into the snout of the fish is 0.010 inch in diameter, 0.040 inch in length with 8 possible positions for grooves if spaced 0.005 inch apart. With 6 of the groove positions available for data, the capacity is 2 6 or 64 combinations; clearly longer pins would increase the data capacity. This method of identification is a major advance over previous techniques which necessitated destruction of the fish in order to recover the identification tag. (UK)

  7. Behavioral Correlates of Primates Conservation Status: Intrinsic Vulnerability to Anthropogenic Threats.

    Directory of Open Access Journals (Sweden)

    Amélie Christelle Lootvoet

    Full Text Available Behavioral traits are likely to influence species vulnerability to anthropogenic threats and in consequence, their risk of extinction. Several studies have addressed this question and have highlighted a correlation between reproductive strategies and different viability proxies, such as introduction success and local extinction risk. Yet, very few studies have investigated the effective impact of social behaviour, and evidence regarding global extinction risk remains scant. Here we examined the effects of three main behavioral factors: the group size, the social and reproductive system, and the strength of sexual selection on global extinction risk. Using Primates as biological model, we performed comparative analysis on 93 species. The conservation status as described by the IUCN Red List was considered as a proxy for extinction risk. In addition, we added previously identified intrinsic factors of vulnerability to extinction, and a measure of the strength of the human impact for each species, described by the human footprint. Our analysis highlighted a significant effect of two of the three studied behavioral traits, group size and social and reproductive system. Extinction risk is negatively correlated with mean group size, which may be due to an Allee effect resulting from the difficulties for solitary and monogamous species to find a partner at low densities. Our results also indicate that species with a flexible mating system are less vulnerable. Taking into account these behavioral variables is thus of high importance when establishing conservation plans, particularly when assessing species relative vulnerability.

  8. Áreas vulnerables en el centro de Madrid

    Directory of Open Access Journals (Sweden)

    Agustín Hernández Aja

    2007-07-01

    This document shows an vulnerability analysis of the central area of Madrid taken it as the field of APE-00.01. Its objective is to delimit “vulnerable areas” so there can be evaluated the opportunities for interve trough them and then define the best tools in detriment of their vulnerability reasons. To determinate those areas we have developed a sociodemographic analysis where we have found those units of population with vulnerable values. Once determinated, we have synthetize them to define them as easy drafts that makes understandable the work area for later on establish a vulnerable areas catalogue with spatial homogeneity and significant size. The basic nucleus of the análisis has been the sociodemographic fact, based on homogeneus data sources for all the area so they could be referenced to specific spacial areas. In each case has been advised other possible indicators of vulnerability including a signifier selection of thrm on the fifth chapter.

  9. The Relationship between Grandiose and Vulnerable (Hypersensitive Narcissism

    Directory of Open Access Journals (Sweden)

    Emanuel Jauk

    2017-09-01

    Full Text Available Narcissistic grandiosity is characterized by overt expressions of feelings of superiority and entitlement, while narcissistic vulnerability reflects hypersensitivity and introversive self-absorbedness. Clinical evidence suggests that grandiosity is accompanied by vulnerable aspects, pointing to a common foundation. Subclinical personality research, however, views grandiose and vulnerable narcissism as independent traits. Grandiose narcissism displays substantial correlation with extraversion, while vulnerable narcissism correlates highly with introversion. We investigated if (1 controlling for intro-/extraversion might reveal a “common core” of grandiose and vulnerable narcissism, and if (2 the correlation between both aspects might be higher at higher levels of narcissism. Latent variable structural equation modeling and segmented regression analysis confirmed these hypotheses in a large non-clinical sample (N = 1,006. Interindividual differences in intro-/extraversion mask the common core of grandiose and vulnerable narcissism. The association between both aspects increases at high levels (upper 10% of grandiose narcissism, which suggests a possible transition to clinically relevant (pathological narcissism.

  10. The Relationship between Grandiose and Vulnerable (Hypersensitive) Narcissism

    Science.gov (United States)

    Jauk, Emanuel; Weigle, Elena; Lehmann, Konrad; Benedek, Mathias; Neubauer, Aljoscha C.

    2017-01-01

    Narcissistic grandiosity is characterized by overt expressions of feelings of superiority and entitlement, while narcissistic vulnerability reflects hypersensitivity and introversive self-absorbedness. Clinical evidence suggests that grandiosity is accompanied by vulnerable aspects, pointing to a common foundation. Subclinical personality research, however, views grandiose and vulnerable narcissism as independent traits. Grandiose narcissism displays substantial correlation with extraversion, while vulnerable narcissism correlates highly with introversion. We investigated if (1) controlling for intro-/extraversion might reveal a “common core” of grandiose and vulnerable narcissism, and if (2) the correlation between both aspects might be higher at higher levels of narcissism. Latent variable structural equation modeling and segmented regression analysis confirmed these hypotheses in a large non-clinical sample (N = 1,006). Interindividual differences in intro-/extraversion mask the common core of grandiose and vulnerable narcissism. The association between both aspects increases at high levels (upper 10%) of grandiose narcissism, which suggests a possible transition to clinically relevant (pathological) narcissism. PMID:28955288

  11. Assessing the vulnerability of infrastructure to climate change on the Islands of Samoa

    Science.gov (United States)

    Fakhruddin, S. H. M.; Babel, M. S.; Kawasaki, A.

    2015-06-01

    Pacific Islanders have been exposed to risks associated with climate change. Samoa, as one of the Pacific Islands, is prone to climatic hazards that will likely increase in the coming decades, affecting coastal communities and infrastructure around the islands. Climate models do not predict a reduction of such disaster events in the future in Samoa; indeed, most predict an increase. This paper identifies key infrastructure and their functions and status in order to provide an overall picture of relative vulnerability to climate-related stresses of such infrastructure on the island. By reviewing existing reports as well as holding a series of consultation meetings, a list of critical infrastructure was developed and shared with stakeholders for their consideration. An indicator-based vulnerability model (SIVM) was developed in collaboration with stakeholders to assess the vulnerability of selected infrastructure systems on the Samoan Islands. Damage costs were extracted from the Cyclone Evan recovery needs document. Additionally, data on criticality and capacity to repair damage were collected from stakeholders. Having stakeholder perspectives on these two issues was important because (a) criticality of a given infrastructure could be viewed differently among different stakeholders, and (b) stakeholders were the best available source (in this study) to estimate the capacity to repair non-physical damage to such infrastructure. Analysis of the results suggested a ranking of sectors from the most vulnerable to least vulnerable are: the transportation sector, the power sector, the water supply sector and the sewerage system.

  12. Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.

    Science.gov (United States)

    Ali, Bako; Awad, Ali Ismail

    2018-03-08

    The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or "things" to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.

  13. Vulnerability, Borderline Personality Disorders. Clinical and ...

    African Journals Online (AJOL)

    Borderline personality disorder and vulnerability are difficult to assess and are rather elusive to define. A case study material is presented from a cognitive analytical model. An attempt of the dominant features of cognitive analytical therapy and discussion of vulnerability in relation to personality disorder is provided.

  14. Bacteriological research for the contamination of equipment in chest radiography

    International Nuclear Information System (INIS)

    Choi, Seung Gu; Song, Woon Heung; Kweon, Dae Cheol

    2015-01-01

    The purpose is to determine the degree of contamination of the equipment for infection control in chest radiography of the radiology department. We confirmed by chemical and bacterial identification of bacteria of the equipment and established a preventive maintenance plan. Chest X-ray radiography contact area on the instrument patients shoulder, hand, chin, chest lateral radiography patient contact areas with a 70% isopropyl alcohol cotton swab were compared to identify the bacteria before and after sterilization on the patient contact area in the chest radiography equipment of the department. The gram positive Staphylococcus was isolated from side shoots handle before disinfection in the chest radiography equipment. For the final identification of antibiotic tested that it was determined by performing the nobobiocin to the sensitive Staphylococcus epidermidis. Chest radiography equipment before disinfecting the handle side of Staphylococcus epidermidis bacteria were detected using a disinfectant should be to prevent hospital infections

  15. Bacteriological research for the contamination of equipment in chest radiography

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Seung Gu; Song, Woon Heung; Kweon, Dae Cheol [Shinhan University, Uijeongbu (Korea, Republic of)

    2015-12-15

    The purpose is to determine the degree of contamination of the equipment for infection control in chest radiography of the radiology department. We confirmed by chemical and bacterial identification of bacteria of the equipment and established a preventive maintenance plan. Chest X-ray radiography contact area on the instrument patients shoulder, hand, chin, chest lateral radiography patient contact areas with a 70% isopropyl alcohol cotton swab were compared to identify the bacteria before and after sterilization on the patient contact area in the chest radiography equipment of the department. The gram positive Staphylococcus was isolated from side shoots handle before disinfection in the chest radiography equipment. For the final identification of antibiotic tested that it was determined by performing the nobobiocin to the sensitive Staphylococcus epidermidis. Chest radiography equipment before disinfecting the handle side of Staphylococcus epidermidis bacteria were detected using a disinfectant should be to prevent hospital infections.

  16. Vulnerability analysis and passenger source prediction in urban rail transit networks.

    Directory of Open Access Journals (Sweden)

    Junjie Wang

    Full Text Available Based on large-scale human mobility data collected in San Francisco and Boston, the morning peak urban rail transit (URT ODs (origin-destination matrix were estimated and the most vulnerable URT segments, those capable of causing the largest service interruptions, were identified. In both URT networks, a few highly vulnerable segments were observed. For this small group of vital segments, the impact of failure must be carefully evaluated. A bipartite URT usage network was developed and used to determine the inherent connections between urban rail transits and their passengers' travel demands. Although passengers' origins and destinations were easy to locate for a large number of URT segments, a few show very complicated spatial distributions. Based on the bipartite URT usage network, a new layer of the understanding of a URT segment's vulnerability can be achieved by taking the difficulty of addressing the failure of a given segment into account. Two proof-of-concept cases are described here: Possible transfer of passenger flow to the road network is here predicted in the cases of failures of two representative URT segments in San Francisco.

  17. [Aged woman's vulnerability related to AIDS].

    Science.gov (United States)

    Silva, Carla Marins; Lopes, Fernanda Maria do Valle Martins; Vargens, Octavio Muniz da Costa

    2010-09-01

    This article is a systhematic literature review including the period from 1994 to 2009, whose objective was to discuss the aged woman's vulnerability in relation to Acquired Imunodeficiency Syndrome (Aids). The search for scientific texts was accomplished in the following databases: Biblioteca Virtual em Saúde, Scientific Eletronic Library Online (SciELO), Literatura Latino-Americana e do Caribe em Ciências da Saúde (LILACS) and Medical Literature Analysis and Retrieval System Online (MEDLINE). The descriptors used were vulnerability, woman and Aids. Eighteen texts were analyzed, including articles in scientific journals, thesis and dissertations. As a conclusion, it was noted that aged women and vulnerability to Aids are directly related, through gender characteristics including submission and that were built historical and socially. We consider as fundamental the development of studies which may generate publications accessible to women, in order to help them see themselves as persons vulnerable to Aids contagion just for being women.

  18. The vulnerability of Australian rural communities to climate variability and change: Part I—Conceptualising and measuring vulnerability

    NARCIS (Netherlands)

    Nelson, R.; Kokic, P.; Crimp, S.; Meinke, H.B.; Howden, S.M.

    2010-01-01

    Vulnerability is a term frequently used to describe the potential threat to rural communities posed by climate variability and change. Despite growing use of the term, analytical measures of vulnerability that are useful for prioritising and evaluating policy responses are yet to evolve. Demand for

  19. Framework for mapping the drivers of coastal vulnerability and spatial decision making for climate-change adaptation: A case study from Maharashtra, India.

    Science.gov (United States)

    Krishnan, Pandian; Ananthan, Pachampalayam Shanmugam; Purvaja, Ramachandran; Joyson Joe Jeevamani, Jeyapaul; Amali Infantina, John; Srinivasa Rao, Cherukumalli; Anand, Arur; Mahendra, Ranganalli Somashekharappa; Sekar, Iyyapa; Kareemulla, Kalakada; Biswas, Amit; Kalpana Sastry, Regulagedda; Ramesh, Ramachandran

    2018-05-31

    The impacts of climate change are of particular concern to the coastal region of tropical countries like India, which are exposed to cyclones, floods, tsunami, seawater intrusion, etc. Climate-change adaptation presupposes comprehensive assessment of vulnerability status. Studies so far relied either on remote sensing-based spatial mapping of physical vulnerability or on certain socio-economic aspects with limited scope for upscaling or replication. The current study is an attempt to develop a holistic and robust framework to assess the vulnerability of coastal India at different levels. We propose and estimate cumulative vulnerability index (CVI) as a function of exposure, sensitivity and adaptive capacity, at the village level, using nationally comparable and credible datasets. The exposure index (EI) was determined at the village level by decomposing the spatial multi-hazard maps, while sensitivity (SI) and adaptive capacity indices (ACI) were estimated using 23 indicators, covering social and economic aspects. The indicators were identified through the literature review, expert consultations, opinion survey, and were further validated through statistical tests. The socio-economic vulnerability index (SEVI) was constructed as a function of sensitivity and adaptive capacity for planning grassroot-level interventions and adaptation strategies. The framework was piloted in Sindhudurg, a coastal district in Maharashtra, India. It comprises 317 villages, spread across three taluks viz., Devgad, Malvan and Vengurla. The villages in Sindhudurg were ranked based on this multi-criteria approach. Based on CVI values, 92 villages (30%) in Sindhudurg were identified as highly vulnerable. We propose a decision tool for identifying villages vulnerable to changing climate, based on their level of sensitivity and adaptive capacity in a two-dimensional matrix, thus aiding in planning location-specific interventions. Here, vulnerability indicators are classified and designated as

  20. Mental Vulnerability as a Predictor of Early Mortality

    DEFF Research Database (Denmark)

    Eplov, Lene F.; Jørgensen, Torben; Segel, S.

    2005-01-01

    BACKGROUND: Studies have demonstrated that mental vulnerability (ie, a tendency to experience psychosomatic symptoms or inadequate interpersonal interactions) is associated with various diseases. The objective of our study is to evaluate whether mental vulnerability is a risk factor for early...... mortality. METHODS: We conducted a prospective cohort study of 3 random samples of the population in Copenhagen County, Denmark selected in 1976, 1982-1984, and 1991 (n = 6435). Baseline data collection included measures of mental vulnerability, social factors, comorbidity, biologic risk markers (eg, blood...... of mortality as the result of natural causes. The association between mental vulnerability and survival was examined using Kaplan-Meir plots and Cox proportional-hazard models adjusting for possible confounding factors. RESULTS: With respect to mental vulnerability, 79% of the sample was classified...