WorldWideScience

Sample records for placa vulnerable solitaria

  1. A role for archaeal organisms in development of atherosclerotic vulnerable plaques and myxoid matrices Um papel para organismos de arqueia no desenvolvimento de placas ateroscleróticas vulner��veis e matriz mixomatosa

    Directory of Open Access Journals (Sweden)

    Maria L Higuchi

    2006-10-01

    Full Text Available PURPOSE: Vulnerable plaques are characterized by a myxoid matrix, necrotic lipidic core, reactive oxygen species, and high levels of microorganisms. Aerobic microbes such as Chlamydophila pneumoniae and Mycoplasma pneumoniae usually do not survive in oxidative stress media. Archaea are anaerobic microbes with powerful anti-oxidative enzymes that allow detoxification of free radicals whose presence might favor the survival of aerobic microorganisms. We searched for archaeal organisms in vulnerable plaques, and possible associations with myxoid matrix, chlamydia, and mycoplasma bodies. METHODS: Twenty-nine tissue samples from 13 coronary artherectomies from large excentric ostial or bifurcational lesions were studied using optical and electron microscopy. Infectious agents compatible with archaea, chlamydia, and mycoplasma were semiquantified using electron micrographs and correlated with the amounts of fibromuscular tissue, myxoid matrix, and foam cells, as determined from semi-thin sections. Six of the cases were also submitted to polymerase chain reaction with archaeal primers. RESULTS: All 13 specimens showed archaeal-compatible structures and chlamydial and mycoplasmal bodies in at least 1 sample. There was a positive correlation between extent of the of myxoid matrix and archaeal bodies (r = 0.44, P = 0.02; between archaeal and mycoplasmal bodies (r = 0.41, P = 0.03, and between chlamydial bodies and foam cells (r = 0.42; P = 0.03. The PCR test was positive for archaeal DNA in 4 of the 6 fragments. DISCUSSION: DNA and forms suggestive of archaea are present in vulnerable plaques and may have a fundamental role in the proliferation of mycoplasma and chlamydia. This seems to be the first description of apparently pathogenic archaea in human internal organ lesions.PROPOSTA: Placas vulneráveis são caracterizadas por matriz mixomatosa, centro lipídico necrótico, espécies reativas de oxigênio e alto níveis de microorganismos. Micróbios aer

  2. Vulnerability

    Science.gov (United States)

    Taback, I.

    1979-01-01

    The discussion of vulnerability begins with a description of some of the electrical characteristics of fibers before definiting how vulnerability calculations are done. The vulnerability results secured to date are presented. The discussion touches on post exposure vulnerability. After a description of some shock hazard work now underway, the discussion leads into a description of the planned effort and some preliminary conclusions are presented.

  3. "Candidatus Fokinia solitaria", a Novel "Stand-Alone" Symbiotic Lineage of Midichloriaceae (Rickettsiales.

    Directory of Open Access Journals (Sweden)

    Franziska Szokoli

    Full Text Available Recently, the family Midichloriaceae has been described within the bacterial order Rickettsiales. It includes a variety of bacterial endosymbionts detected in different metazoan host species belonging to Placozoa, Cnidaria, Arthropoda and Vertebrata. Representatives of Midichloriaceae are also considered possible etiological agents of certain animal diseases. Midichloriaceae have been found also in protists like ciliates and amoebae. The present work describes a new bacterial endosymbiont, "Candidatus Fokinia solitaria", retrieved from three different strains of a novel Paramecium species isolated from a wastewater treatment plant in Rio de Janeiro (Brazil. Symbionts were characterized through the full-cycle rRNA approach: SSU rRNA gene sequencing and fluorescence in situ hybridization (FISH with three species-specific oligonucleotide probes. In electron micrographs, the tiny rod-shaped endosymbionts (1.2 x 0.25-0.35 μm in size were not surrounded by a symbiontophorous vacuole and were located in the peripheral host cytoplasm, stratified in the host cortex in between the trichocysts or just below them. Frequently, they occurred inside autolysosomes. Phylogenetic analyses of Midichloriaceae apparently show different evolutionary pathways within the family. Some genera, such as "Ca. Midichloria" and "Ca. Lariskella", have been retrieved frequently and independently in different hosts and environmental surveys. On the contrary, others, such as Lyticum, "Ca. Anadelfobacter", "Ca. Defluviella" and the presently described "Ca. Fokinia solitaria", have been found only occasionally and associated to specific host species. These last are the only representatives in their own branches thus far. Present data do not allow to infer whether these genera, which we named "stand-alone lineages", are an indication of poorly sampled organisms, thus underrepresented in GenBank, or represent fast evolving, highly adapted evolutionary lineages.

  4. Vulnerability

    NARCIS (Netherlands)

    Issa, Sahar; van der Molen, Irna; Stel, Nora

    2015-01-01

    This chapter reviews the literature on vulnerability. Together with Chapter 3, that offers a literature review specifically focused on resilience, it lays the conceptual foundations for the empirical chapters in this edited volume. Vulnerability symbolizes the susceptibility of a certain system to

  5. Modelo de propagación de ondas solitarias en el corazón

    Directory of Open Access Journals (Sweden)

    Ivonne Domínguez

    2013-01-01

    Full Text Available En la actividad eléctrica cardiaca, distintos tipos de onda viajan a través del corazón. Presentamos un modelo de la actividad eléctrica del corazón, proponemos que los frentes de onda homogéneos que se propagan en el corazón son, de hecho, ondas solitarias, o “solitones”. Usamos un conjunto general de ecuaciones de reacción-difusión conocido como el modelo de Barrio-Varea-Aragón- Maini (BVAM[1], el cual presenta una abundancia de bifurcaciones no lineales, siendo capaces de encontrar la ruta al caos usando un mapeo de las ecuaciones de amplitud a la dinámica de la ecuación compleja de Ginzburg-Landau. Estudiamos numéricamente la dinámica de los frentes de onda en el modelo BVAM para describir los mecanismos que conducen a la fibrilación en el corazón y comparamos los resultados con datos experimentales.

  6. Actividad inflamatoria en múltiples placas ateroscleróticas en pacientes fallecidos por infarto agudo de miocardio

    Directory of Open Access Journals (Sweden)

    Alejandro García Escudero

    2009-01-01

    Full Text Available IntroducciónEstudios clínicos y anatomopatológicos sugieren que los procesos inflamatorios tienen un papel importante en la inestabilidad de la placa aterosclerótica, dado que en pacientes con síndromes coronarios agudos se observan infiltrados inflamatorios difusos en las arterias coronarias.ObjetivosEvaluar y localizar la distribución de placas vulnerables e infiltrados inflamatorios en pacientes fallecidos por infarto agudo de miocardio.Material y métodosMediante microscopia óptica se estudiaron las arterias coronarias de 58 pacientes fallecidos por infarto de miocardio. En las arterias coronarias relacionadas con el infarto y en las no relacionadas se registraron las siguientes variables: presencia de trombo, rotura de placa, hemorragia intraplaca y presencia de infiltrado inflamatorio.ResultadosAl analizar las diferencias existentes entre las arterias responsables del infarto y en las no responsables se encontraron diferencias significativas con respecto a la presencia de trombo (69% versus 38%; p < 0,008 y de hemorragia intraplaca (69% versus 50%; p < 0,03. No se encontró una diferencia significativa entre la arteria responsable y la no responsable al evaluar la presencia de infiltrado inflamatorio en las placas ateroscleróticas (77% versus 71%; p = ns.ConclusiónEn el infarto agudo de miocardio se comprobó la presencia de actividad inflamatoria que afectaba a más de un vaso, con compromiso de otras arterias además de la responsable del infarto. Se detectó también accidente agudo de placa en más de una arteria coronaria.REV ARGENT CARDIOL 2009;77:81-87.

  7. Inestabilidad en múltiples placas ateroescleróticas en pacientes fallecidos por infarto agudo de miocardio

    Directory of Open Access Journals (Sweden)

    Ricardo A. Sarmiento

    2011-08-01

    Full Text Available Los procesos inflamatorios en los síndromes coronarios agudos juegan un rol importante en la inestabilidad de la placa ateroesclerótica. Nuestro objetivo fue evaluar la presencia y distribución de placas vulnerables e infiltrados inflamatorios en pacientes fallecidos por infarto agudo de miocardio y su comparación con los hallazgos en pacientes fallecidos por cuadros no coronarios. Se analizaron los estudios anatomopatológicos de corazón de 68 pacientes fallecidos por infarto agudo de miocardio y 15 fallecidos por causa no coronaria. Se registró la presencia de trombo, hemorragia intraplaca, ruptura endotelial e infiltrado inflamatorio. Al evaluar los pacientes fallecidos por IAM, encontramos trombo en 73.5% de las arterias responsables del IAM y en 28.7% de las no responsables (p < 0.0001. La hemorragia intraplaca se halló en el 70.5% de las arterias responsables y en 39.7% de las no responsables, p < 0.0001; ruptura endotelial en el 29.4% de las arterias responsables y en 3.7% de las no responsables, p < 0.0001. No encontramos diferencias en la presencia de infiltrado inflamatorio (76.5% versus 68.4%. Comparando con los fallecidos por causas no coronarias, la presencia de trombo fue significativamente superior (73.5% vs. 13.3%; p < 0.0001, así como la de hemorragia intraplaca (70.5% vs. 0%; p < 0.0001 y de infiltrado inflamatorio en las placas ateroescleroticas (76.5% vs. 46.6%; p = 0.021. En los pacientes fallecidos por infarto agudo de miocardio se observa inestabilidad de placa y actividad inflamatoria, no sólo en la arteria responsable del infarto sino también en las arterias no responsables del infarto.

  8. Fisiopatología de la placa de ateroma

    OpenAIRE

    Jesús Gómez, Mª Teresa de; San Román Montero, Jesús Mª

    2013-01-01

    La aterosclerosis ha pasado de ser considerada una enfermedad de depósito y degenerativa a ser entendida como una enfermedad inflamatoria crónica que da lugar a un episodio clínico agudo como resultado de la complicación de una placa de ateroma. La inflamación actúa en todas las fases de la aterosclerosis, desde su inicio hasta sus últimas complicaciones como la trombosis. Medicina y Cirugía

  9. Archivo de placas astrométricas del Observatorio de La Plata

    Science.gov (United States)

    di Sisto, R.; Orellana, R. B.

    Se ha realizado una base de datos con las placas fotográficas obtenidas con el Astrográfico del Observatorio de La Plata. Se han clasificado un total de 3000 placas obtenidas para asteroides y cometas. El acceso a la base de datos se hará por FTP y la misma contendrá la siguiente información: fecha y tiempo de exposición, coordenadas del centro de placa, tipo de emulsión fotográfica, estado de la placa, objeto fotografiado.

  10. Congelador de placas: diseño y modelado

    OpenAIRE

    Orrego Alzate, Carlos Eduardo

    1996-01-01

    La congelación de alimentos es uno de los métodos de preservación mas utilizados y aceptados porque, bien ejecutada, no involucra alteraciones importantes en las características organolépticas y nutricionales de los productos, utilizando solamente un procedimiento físico. Este documento presenta la memoria del diseño y construcción de un congelador de placas para planta piloto. Hará parte de los elementos necesarios para disponer de una miniplanta para ensayos de congelación y liofiliz...

  11. PLACAS CERÂMICAS - UMA INTRODUÇÃO

    Directory of Open Access Journals (Sweden)

    Carlos Maurício F. Vieira

    2010-05-01

    Full Text Available Este trabalho tem por objetivo apresentar uma revisão geral sobre as principais características exigidas para a obtenção de placas cerâmicas (pisos e revestimentos. As principais rotas de processamento são discutidas. Dados de mercado são apresentados com a finalidade de mostrar a importância e a situação atual da indústria cerâmica nacional no setor de pisos e revestimentos.

  12. Vulnerable Genders, Vulnerable Loves

    DEFF Research Database (Denmark)

    Schleicher, Marianne

    2015-01-01

    This chapter analyses religious reflections on vulnerable genders and vulnerable loves from the Hebrew Bible to early Rabbinic literature. It is based on theories by inter alia Donna Haraway on complex identities, Turner and Maryanski on love as a prerequisite for survival, Michel Foucault...... on gathering knowledge and its often unpremeditated effect of recognition and inclusion, and Judith Butler on cultural intelligibility and subversion from within. With these theories as a departing point for the analysis, the chapter links the vulnerability of complex identities with the vulnerability...... of cultures which leads to the overall understanding that culture can accommodate complex identities associated with individual and cultural vulnerability as long as the overall survival of the culture is not threatened. This understanding questions the feasibility of the ethical position of thinkers...

  13. Viabilidade do uso de placas de granito como lajes em edificações

    OpenAIRE

    Moreiras,Sérgio Trajano Franco; Paraguassú,Antenor Braga

    2012-01-01

    Placas de granitos são amplamente empregadas no revestimento de pisos na forma de ladrilhos assentados com argamassa industrializada. Recentemente, tem crescido o interesse no uso de sistemas não aderentes (sem argamassa) com placas de rocha. Porém, na literatura muito pouco foi publicado a respeito. O presente trabalho avaliou as propriedades físico-mecânicas de três granitos com grande aceitação comercial, e determinou as espessuras necessárias para estas das placas serem usadas como lajes ...

  14. La placa bacteriana: conceptos básicos para el higienista bucodental

    OpenAIRE

    Poyato Ferrera, Manuel María; Segura-Egea, Juan J; Ríos-Santos, J.V.; Bullon, Pedro

    2001-01-01

    La placa bacteriana es el factor etiológico principal de las dos enfermedades bucodentales de mayor prevalencia, la caries y la enfermedad periodontal. El higienista bucodental y colaborador del odontoestomatólogo en la aplicación del programa de control de placa, debe conocer en profundidad la microbiología de la placa bacteriana dental, así como los mecanismos implicados en su patogenicidad cariogénica y periodontal, aspectos que se revisan a continuación. Dental plaque is the main etiol...

  15. Correlação da composição de placas à histologia virtual com proteína C-reativa

    Directory of Open Access Journals (Sweden)

    Dimytri Alexandre de Alvim Siqueira

    2013-07-01

    Full Text Available FUNDAMENTOS: Estudos prévios demonstram que o principal determinante de vulnerabilidade da placa aterosclerótica é a sua composição. Recentemente, diversos métodos de imagens e marcadores laboratoriais têm sido investigados visando identificar lesões vulneráveis. O ultrassom com Histologia Virtual® (HV permite a diferenciação e quantificação dos componentes da placa. Por sua vez, a proteína C-reativa (PCR é apontada como importante preditor de eventos adversos. A correlação entre este marcador e as características da placa não é bem estabelecida. OBJETIVOS: Avaliar a constituição da lesão culpada em pacientes com síndrome coronária aguda (SCA - conforme caracterizada pela HV - e investigar a relação dos componentes da placa com o marcador inflamatório PCR. MÉTODOS: Cinquenta e dois pacientes com SCA e com indicação de intervenção coronária percutânea foram submetidos a dosagens de PCR de alta sensibilidade antes e 24 horas após a ICP. Análise por ultrassom HV da lesão-alvo foi realizada antes da ICP. RESULTADOS: A média de idade foi de 55,3 ± 4,9 anos, sendo 76,9% homens, 67,3% hipertensos e 30,8% diabéticos. A área luminal mínima foi de 3,9 ± 1,3 mm², e a carga de placa de 69 ± 11,3%. Os componentes da placa foram assim identificados: fibrótico (59,6 ± 15,8%, fibrolipídico (7,6 ± 8,2%, cálcio (12,1 ± 9,2%, necrótico (20,7 ± 12,7%. Não observamos correlação entre os níveis basais de PCR ou a variação dentre os valores pré e pós-ICP com os componentes da placa. CONCLUSÃO: Neste estudo, a composição das placas pela HV foi predominantemente fibrótica, com alto conteúdo necrótico. Não foi encontrada correlação entre a PCR e os componentes da lesão culpada em pacientes com SCA.

  16. Consideraciones prácticas sobre la placa distalizadora Benac

    Directory of Open Access Journals (Sweden)

    Mariela González Fernández

    2003-12-01

    Full Text Available Existen muchas modalidades de tratamiento sin extracciones de la maloclusión de clase II. Una de ellas consiste en convertir la relación molar de clase II en una de clase I mediante el desplazamiento de los molares superiores hacia distal en las etapas iniciales del tratamiento. Este procedimiento resulta interesante y controvertido, ya que desplaza los dientes en contra de la tendencia normal de movimiento mesial que muestran durante toda la vida, y en la actualidad ha ganado interés. Prestigiosos investigadores han comenzado a profundizar en ella y han aparecido técnicas intraorales, en su mayoría fijas, muy novedosas, con materiales cada vez más efectivos. Todos estos aparatos son efectivos distalizadores, pero crean incomodidad al paciente, dificultan la higiene bucal y, lo más importante, son muy costosos. Por lo antes expuesto, se decidió realizar este trabajo, con el objetivo de ampliar los conocimientos que se tiene sobre la placa distalizadora Benac, un aparato intraoral removible, su modo de construcción y las ventajas de su uso. Se concluye que esta placa no solo resulta de muy bajo costo, sino que además permite una higiene bucal correcta, es más aceptada por el paciente y logra resultados similares a los alcanzados con técnicas más modernas.There are many variants of non-extraction treatment of class II malocclusion. One of these variants consists of turning class II into class I molar relation through the displacement of upper molar to distal position at the initial stages of the treatment. This procedure is interesting but controversial since it moves teeth contrary to the normal mesial movement that they show during the whole life. However, this method has aroused the interest of prestigious researchers who have begun to delve into its application, so novel and mostly fixed intraoral techniques that use increasingly effective materials have emerged. All these appliances are effective distalizers but bother the

  17. Placa cerámica fotovoltaica para fachadas ventiladas

    Directory of Open Access Journals (Sweden)

    Pastrana, A.

    2012-04-01

    Full Text Available Gres de la Mancha, in response to the increasing demand for friendly with the environment products, and realizing towards the use of renewable energies and the energy efficiency in the construction, has developed his new ceramic ecological photovoltaic panel ECOCERAVOLT developed for its use in systems of Ventilated Façade. ECOCERAVOLT joins the benefits of the ventilated façade (energy saving, thermal - acoustic isolation, increase of the comfort in the buildings, reduction of the emission of CO2, etc. and the generation of electrical energy without compromising neither the aesthetics of the frontage, not of the building. This way, it puts itself in value on the direct and indirect exhibition to the sun of the frontages, which happen of being passive elements of closing and decoration, to be generators of a clean energy for proper or commercial use. ECOCERAVOLT, due to its design, does not need to be hidden, as it happens with other photovoltaic generators. These technical and innovative merits imply the entire optimization of the installed revetment in addition to creating a criterion of sustainability and energy efficiency.

    Gres de La Mancha, en respuesta a la demanda creciente por productos medioambientalmente amigables, y su concienciación hacia el uso de energías renovables y la eficiencia energética en la construcción, ha lanzado su nueva placa cerámica ecológica fotovoltaica ECOCERAVOLT concebida para su uso en sistemas de fachada ventilada. ECOCERAVOLT aúna los beneficios de la fachada ventilada (ahorro energético, asilamiento térmico-acústico, aumento del confort en los edificios, reducción de las emisiones de CO2, etc. y la generación de energía eléctrica sin comprometer la estética de la fachada, ni del edificio. De este modo, se pone en valor la exposición directa e indirecta al sol de las fachadas, que pasan de ser elementos pasivos de cerramiento y decoración, a ser generadores de una

  18. Conceção e produção de placas de gesso laminado

    OpenAIRE

    Lopes, Susana Maria de Oliveira

    2012-01-01

    O presente relatório tem como objetivo descrever o trabalho desenvolvido durante o período de estágio realizado na Fibroplac que tem como atividade a produção de placas de gesso laminado. As placas de gesso laminado têm-se destacado na indústria da construção civil por serem um produto leve e de rápida instalação, atendendo à atual procura de racionalizar a construção, evitando desperdícios e otimizando etapas. O relatório descreve de forma sucinta os conhecimentos adquirido...

  19. Pistas dermatoscópicas para diferenciar a tricotilomania da alopecia areata em placa

    OpenAIRE

    Abraham,Leonardo Spagnol; Torres,Fernanda Nogueira; Azulay-Abulafia,Luna

    2010-01-01

    INTRODUÇÃO: Tricotilomania e alopecia areata em placa possuem características clínicas e dermatoscópicas semelhantes. OBSERVAÇÕES: O exame dermatoscópico da tricotilomania revela densidade capilar diminuída, cabelos fraturados em diferentes tamanhos, enovelados e vellus, tricoptilose, pontos amarelos com ou sem pontos pretos e ausência de cabelos em "ponto de exclamação". CONCLUSÃO: No contexto de alopecia em placa e cabelos fraturados, a ausência de "pontos de exclamação" sugere o diagnóstic...

  20. Evolución de la sociabilidad en Hymenoptera: Rasgos conductuales vinculados a niveles sociales y precursores de sociabilidad en especies solitarias Evolution of sociality in Hymenoptera: Behavioural traits linked to social levels and precursors of sociality in solitary species

    Directory of Open Access Journals (Sweden)

    LUIS FLORES-PRADO

    2012-09-01

    Full Text Available En Hymenoptera, los niveles de sociabilidad han sido asociados a rasgos conductuales, tales como los comportamientos de nidificación y agonísticos, y la capacidad de reconocimiento entre conespecíficos. El reconocimiento de compañeros de nido es un fenómeno de amplia difusión entre especies eusociales, y puede ser inferido por el resultado de las interacciones agonísticas entre hembras; estas son más tolerantes hacia compañeras de nido que hacia no compañeras de nido. Contrariamente, en la mayor parte de las especies solitarias las hembras son agresivas hacia otras hembras conespecíficas. En especies eusociales, la descendencia inmadura es alimentada directamente por la madre, o por obreras; así, el contacto frecuente entre progenie y hembras adultas puede contribuir a entender el reconocimiento social. En el extremo opuesto, las especies solitarias construyen nidos que no permiten interacciones entre adultos e inmaduros. A pesar de esto, estudios recientes sugieren que el aprendizaje del fenotipo propio podría explicar la capacidad de reconocimiento y, tal vez, corresponde al punto de partida en el desarrollo y evolución de la sociabilidad. La subfamilia Xylocopinae (Apidae ha emergido como un valioso modelo para estudiar la evolución de la sociabilidad pues contiene especies que presentan un amplio rango de sociabilidad. En particular, la tribu Manueliini representa un taxón interesante desde el punto de vista de la evolución de la sociabilidad en Xylocopinae pues ha sido propuesto como el grupo hermano de todos los demás Xylocopinae, es un taxón relicto que retiene rasgos morfológicos ancestrales, contiene solo especies fundamentalmente solitarias (aunque en una de estas se ha demostrado recientemente reconocimiento de compañeras de nido y de parientes y algunas especies exhiben rasgos conductuales precursores de vida social. En este trabajo se revisa en Hymenoptera los grados de sociabilidad asociados con rasgos

  1. Farmacos orales para el control quimico de las biopeliculas dentales (placa bacteriana

    Directory of Open Access Journals (Sweden)

    Rodrigo Abello Moreno

    2013-12-01

    Full Text Available La placa dentobacteriana o biopelicula es la responsable de patologias clinicas como la caries dental, gingivitis y enfermedad periodontal, por lo tanto productos con agentes germicidas actuan en la prevencion de la biopelicula dental cuando las medidas de higiene oral no son las mas apropiadas.

  2. Viabilidade do uso de placas de granito como lajes em edificações

    Directory of Open Access Journals (Sweden)

    Sérgio Trajano Franco Moreiras

    Full Text Available Placas de granitos são amplamente empregadas no revestimento de pisos na forma de ladrilhos assentados com argamassa industrializada. Recentemente, tem crescido o interesse no uso de sistemas não aderentes (sem argamassa com placas de rocha. Porém, na literatura muito pouco foi publicado a respeito. O presente trabalho avaliou as propriedades físico-mecânicas de três granitos com grande aceitação comercial, e determinou as espessuras necessárias para estas das placas serem usadas como lajes de 200 cm de largura por 300 cm de comprimento, apoiadas pelas quatro extremidades em vigas de concreto. As propriedades testadas para o projeto estrutural das placas de granito foram: resistência à compressão, resistência à flexão por três pontos, módulo de elasticidade e coeficiente de Poisson. Foram também determinados o coeficiente de atrito e a resistência à abrasão profunda para a avaliação do desempenho do piso, de acordo com o uso e o ambiente de exposição,. Os resultados indicaram que o charnockito Verde Labrador deve ser usado com espessura de 30 mm, restrita a ambientes internos. O sienogranito e o monzogranito podem ser empregados em ambientes internos e externos. As placas do monzogranito Cinza Castelo devem possuir espessura de 20 mm, e as do sienogranito Vermelho Brasília devem possuir 30 mm de espessura.

  3. Modelagem do movimento da placa tectônica sul-americana por meio de dados VLBI e GNSS.

    OpenAIRE

    de Oliveira Souza, Wanessa

    2013-01-01

    Há cerca de 220 milhões de anos os continentes vêm afastando-se uns dos outros. Esse fenômeno se explica a partir da teoria da deriva continental, complementada pela teoria da tectônica de placas, onde se acreditava que estruturas rígidas como as placas litosféricas, eram capazes de transmitir tensões em longas distâncias sem causar deformações internas. Desta forma, devido ao movimento das placas e como consequência a deriva dos continentes, as estações a eles pertencentes também vêm se move...

  4. Desarrollo de un sistema basado en la visión artificial para el reconocimiento de placas vehiculares

    OpenAIRE

    Suárez Pino, José Antonio; Suárez Pino, José Antonio; Suárez Pino, José Antonio

    2011-01-01

    El presente trabajo describe el desarrollo del sistema de reconocimiento de placas vehiculares basado en visión artificial. En primer lugar, la placa es detectada dentro de la imagen digital usando las características de ancho, altura y área de los objetos que hay en la imagen. Después de ubicar la placa, los caracteres son extraídos de la imagen uno a uno. Finalmente, cada carácter es reconocido usando el algoritmo de redes neuronales artificial. Las pruebas de reconocimiento se realizaron t...

  5. Um experimento simples usado na produção de placas de zonas de Fresnel

    OpenAIRE

    Muller,Márcia; Silva,Jean Carlos Cardozo da; Fabris,José Luís

    2005-01-01

    Neste trabalho propomos um experimento simples que tem por finalidade auxiliar no aprendizado dos fenômenos de interferência e difração da luz. Após uma análise pertinente da teoria de Fresnel da difração, os conhecimentos são aplicados na compreensão do funcionamento das placas de zonas de Fresnel. Apresentamos uma descrição detalhada dos processos usados para a fabricação e caracterização destas placas zonais, o que possibilita a produção de lentes difrativas com a distância focal desejada ...

  6. Placa bacteriana dentária em cães

    OpenAIRE

    Eurides,Duvaldo; Gonçalves,Gentil Ferreira; Mazzanti,Alexandre; Buso,Antônio Mário

    1996-01-01

    Com objetivo de avaliar a incidência de placa bacteriana dentária, foram utilizados 30 cães, sem raça definida, distribuídos em três grupos iguais, de acordo com a faixa etária, sendo o grupo I de 0 a 2 anos, o grupo II de 3 a 5 anos e o grupo III acima de 6 anos. Os animais foram submetidos a anestesia geral e sobre os dentes foi aplicado cloreto de metilrosanilina, para evidenciar acúmulos bacterianos. As placas encontravam-se distribuídas em 80,99% no grupo I, 71,45% no grupo II e 83,96% n...

  7. Orogenias: das margens continentais ao interior remoto das placas, uma revisão no tema

    Directory of Open Access Journals (Sweden)

    Benjamim Bley de Brito Neves

    2016-05-01

    Full Text Available Esta síntese do conceito de orogenias abrange desde a Tectônica de Placas dos anos 1970, adendos e modelos "alternativos", que buscam explicar orogenias distantes das zonas de interação de placas. A análise crítica dos modelos originais resultou em adendos que incluem domínios proterozoicos e paleozoicos e observações sobre reologia e história termo-tectônica da litosfera. Os modelos alternativos explicam a orogênese por subdução local de litosfera continental, sem envolver litosfera oceânica. Nos anos 1990, houve notável avanço no estudo das causas da subsidência (tectônica formadora de bacias e estudos que contestam a rigidez das placas e propõem modelos de enfraquecimento devido à ação termal. Orogenias intracontinentais, entendidas como caso extremo da inversão de bacias, ocorrem em praticamente todos os continentes. Esforços gerados em zonas de interação de placas podem ser transmitidas continente adentro por milhares de quilômetros e gerar tectônica deformadora longe de suturas. Embora esteja ainda em estágio de fluxo, o conceito de orogenias intracontinentais ("telessuturais" vem se consolidando, embora não tenha sido incorporado a livros-texto. O histórico e o reexame do tema possibilitam classificar os orógenos segundo três variáveis principais: posição em relação às zonas de sutura, organização geométrico-geológica (em planta e nível de exumação.

  8. Redistributing vulnerabilities

    DEFF Research Database (Denmark)

    Seeberg, Jens; Padmawati, Retna Siwi

    2015-01-01

    It is widely accepted that the social distribution of vulnerability in a given society may turn hazardous events into disasters. This distributional approach draws attention to continuities that explain catastrophes by virtue of the workings of society prior to the event. In this paper, we draw...... attention to the social processes whereby vulnerability is modified and renegotiated during the post-disaster period where resources for disaster alleviation and reconstruction enter local communities. Specifically, we explore the social dynamics of house damage classification in the wake of the 2006...... Central Java earthquake, and we explore relations between citizens and the state during post-disaster house reconstruction. We argue that disastrous outcomes of catastrophic events do not follow pre-existing fault lines of vulnerability in a simple or predictable manner, and that the social process...

  9. Corte de placas solares con láser. Estudio de modificaciones microestructurales

    Directory of Open Access Journals (Sweden)

    Ramírez Del Valle, A. J.

    2003-06-01

    Full Text Available In photovoltaic solar cells manufacturing process, system breaks are produced. Recycling improves the material profitability. In this sense, manufacturing of components with non-straight shapes is not feasible using traditional methods. The processing of these materials through Nd-YAG laser, allows manufacturing with any geometric shape. This work shows a study of solar cells cutting process with laser. First of all, it is necessary to carry out a parameter optimization in order to make an accurate material cutting. The microstructure of the cutting area and possible microcompositional changes were studied by scanning electronic miscroscopy (SEM and X-ray analysis (EDX.

    En el proceso de fabricación de placas fotovoltaicas se producen roturas de las células solares, por tanto, el reciclaje es necesario para mejorar la rentabilidad de este proceso, además, la fabricación de piezas de formas curvas no es factible por los métodos tradicionales. El procesado de estos materiales mediante un láser de Nd-YAG, permitirá la fabricación en cualquier forma geométrica además del mejor aprovechamiento de las placas desechadas por estar rotas. El presente trabajo muestra un estudio del proceso de corte de placas solares con láser. En primer lugar se procede a la optimización de los parámetros necesarios para realizar el corte de este material. La microestructura de la zona de corte y los posibles cambios microcomposicionales que se hayan podido producir, se estudian mediante microscopía electrónica de barrido, con microanálisis de energías dispersivas de Rayos X.

  10. Placa bacteriana dentária em cães Dental bacterial plaque in dogs

    Directory of Open Access Journals (Sweden)

    Duvaldo Eurides

    1996-12-01

    Full Text Available Com objetivo de avaliar a incidência de placa bacteriana dentária, foram utilizados 30 cães, sem raça definida, distribuídos em três grupos iguais, de acordo com a faixa etária, sendo o grupo I de 0 a 2 anos, o grupo II de 3 a 5 anos e o grupo III acima de 6 anos. Os animais foram submetidos a anestesia geral e sobre os dentes foi aplicado cloreto de metilrosanilina, para evidenciar acúmulos bacterianos. As placas encontravam-se distribuídas em 80,99% no grupo I, 71,45% no grupo II e 83,96% no grupo III. Os grupos dentários foram considerados separadamente, apresentando índices de 64,84% nos dentes incisivos, 84,80% nos caninos, 87,23% nos pré-molares e 78,34% nos molares. Nos três grupos de cães observou-se índices semelhantes de placa bacteriana nos diferentes grupos dentários. Os animais do grupo II e o grupo de dentes incisivos apresentaram menores índices de placa bacteriana.To avaliate the incidence of bacterial plaque 30 mogreal dogs were utilizated, distributed among three equal groups. According to age, group I was composed of 0 to 2 years-old dogs, group II was 3 to 5 years-old, and group III over 6 years-old. The animals underwent a general anesthesia and metilrosanilin cloret was applied over the tooth, to evidence the bacterial mass. The plaques were distributed to 80.99% in group I, 71.42% in group II and 83.96% in group III. The dental groups were considerated apart, showing index of 64.84% on the incisar tooth, 84.80% on the canine tooth, 87.23% on the premolar tooth, and 78.34% on the molar tooth. At the dogs groups, similar Índex of bacterial plaque were observed on the diffèrent dental groups. The dogs from group II and the incisive tooth group showed minar bacterial plaque index.

  11. Implantación de placas solares para mejorar el consumo en calderas marinas

    OpenAIRE

    Rodríguez Ramos, Miguel Daniel

    2017-01-01

    En el presente trabajo se realizarán cálculos a partir de un ciclo de vapor obtenido de una instalación de vapor marina. A partir de estos datos, se calculará el consumo de combustible. Al mismo tiempo se procederá a realizar los cambios oportunos en los valores de partida del ciclo debido a la instalación de las placas solares, y en consecuencia se calcularán nuevamente los valores de consumo, rendimiento, etc. Además, se tendrán en cuenta 3 disposiciones diferentes en l...

  12. Interação entre computadores e placas baseadas em FPGA

    OpenAIRE

    Soares, Pedro Miguel dos Santos

    2012-01-01

    Esta Dissertação é dedicada ao projeto, implementação e avaliação de ferramentas que permitem a transferência de dados entre FPGA presentes em placas de prototipagem Digilent (no caso a Nexys 2 e a Atlys) e um computador de uso geral. Esta problemática é relevante para diversos propósitos, tais como: 1) a verificação expedita de projetos para aplicações de processamento intensivo de dados; 2) para possibilitar a separação do projeto num núcleo hardware de elevado desempenho, que cumpra os obj...

  13. Análise de Tensões em Placas, Cascas e Reservatórios

    OpenAIRE

    J. F. Silva Gomes

    2007-01-01

    Placas e Cascas são elementos estruturais de utilização frequente nas mais diversas áreas tecnológicas de engenharia civil, mecânica, química, naval, aeronáutica e aeroespacial. Pelas suas propriedades intrínsecas de leveza e resistência, são utilizadas na construção de pontes, coberturas de pavilhões industriais e grandes superfícies, aeronaves, veículos aeroespaciais e muitos outros tipos de equipamentos onde o reduzido peso da estrutura é essencial.O livro está escrito duma forma simples e...

  14. Fratura distal do rádio em pacientes com mais de 60 anos: placas ortogonais versus placa volar Distal radial fractures in patients over 60 years old: orthogonal plates versus volar plate

    Directory of Open Access Journals (Sweden)

    Edgard Novaes de França Bisneto

    2010-01-01

    Full Text Available OBJETIVO: Comparar os resultados do tratamento cirúrgico entre placa volar com estabilidade angular e placas ortogonais em fraturas instáveis de rádio distal em pacientes com mais de 60 anos. MÉTODOS: Pacientes foram divididos em dois grupos tratados com placa volar ou placas ortogonais. Resultados clínicos e radiográficos foram analisados prospectivamente. RESULTADOS: Os grupos de estudo apresentaram resultados clínicos e radiográficos semelhantes seis meses após a operação. No entanto três meses após a cirurgia, o grupo onde foi utilizada a placa volar obteve resultados superiores. CONCLUSÃO: Ambos os grupos apresentaram bons resultados funcionais. O tratamento cirúrgico facilita a reabilitação precoce. A técnica das placas ortogonais requer uma curva de aprendizado maior e apresentou mais complicações e piores resultados iniciais.OBJECTIVE: To compare the results from surgical treatment between volar plates with angular stability and orthogonal plates of unstable distal radius fractures in patients aged over 60 years. METHODS: Selected patients were randomized in two groups treated with volar plates or orthogonal plates. Clinic al and radiographic results were analyzed prospectively. RESULTS: The study groups presented similar clinical and radiographic results six months after the operation. However three months after surgery the volar plate group obtained superior results considering most of the parameters studied. CONCLUSION: Both the volar plates and the orthogonal plates presented good functional results. Surgical treatment enabled early rehabilitation for these patients. Orthogonal plate technique required a longer learning curve, presented more complications and worst early results.

  15. Assessing vulnerability

    NARCIS (Netherlands)

    Hellmuth, M.; Kabat, P.

    2003-01-01

    It is in the shantytowns and rural villages of the Third World that floods and droughts strike hardest and deepest. Vulnerability to the vagaries of climate depends not only on location, but, crucially, on the capacity of the victims to cope with the impacts of extreme weather. So, where are the

  16. Escova dental e dedeira na remoção da placa bacteriana dental em cães

    OpenAIRE

    Lima,Tânia Berbert Ferreira; Eurides,Duvaldo; Rezende,Renata Junqueira; Milken,Vanessa Martins Fayad; Silva,Luiz Antonio Franco da; Fioravanti,Maria Clorinda Soares

    2004-01-01

    A placa bacteriana é fator primário na formação de gengivite, cálculo dentário, halitose e doença periodontal. Objetivou-se avaliar a quantidade de placa bacteriana dental removida pela escova dental e dedeira. Foram utilizados 60 cães machos e fêmeas de diferentes raças, idade e peso, divididos em dois grupos. O índice Logan & Boyce foi utilizados para quantificar a placa bacteriana antes e após a escovação. Observou-se diferença estatística (p0,05) entre a utilização da escova dental e ...

  17. Caracterización del comportamiento en fractura de paneles sandwich de placas de yeso laminado y lana de roca

    OpenAIRE

    Alonso Vera, Juan Antonio; Reyes Pozo, Encarnación; Gálvez Ruíz, Jaime

    2011-01-01

    En esta comunicación se presenta el trabajo realizado para la caracterización experimental de un panel sándwich de yeso laminado y lana de roca, así como de cada uno de sus componentes: placa de yeso laminado, placa de yeso, lana de roca y papel. Para ello se diseñó una campaña de ensayos destinados a obtener las propiedades resistentes de los materiales estudiados, así como la energía específica de fractura, GF, y las curvas completas de carga aplicada frente a desplazamientos. A partir de l...

  18. Evolución geológica del margen Norte de la Placa del Caribe, República Dominicana

    OpenAIRE

    Pérez-Estaun, Andrés; Tavares, I.; García-Cortés, Ángel; Hernaiz Huerta, P. P.

    2002-01-01

    La Isla La Española se encuentra situada en la actualidad en la parte septentrional de la Placa del Caribe. Conjuntamente con Puerto Rico, constituye una unidad que puede interpretarse como una microplaca, limitada al Norte por una zona de subducción oblicua, con una fuerte componente de salto en dirección, y al Sur por otra zona de subducción incipiente a la que se asocia la Fosa de los Muertos. El margen Norte de la Placa del Caribe ha evolucionado desde constituir un límite contro...

  19. Empleo de placas filtrantes cubanas en el proceso de producción de melagenina loción

    OpenAIRE

    Guillermo Lago Mendoza; Patricia Melgares Hernández; Gabriel Coto Valdés; Loida Oruña Sánchez; María de los Ángeles Jiménez Gómez

    1999-01-01

    La melagenina loción es un medicamento extraído de la placenta humana e identificado como una lipoproteína de bajo peso molecular, que ha demostrado su eficacia en la cura del vitiligo. Durante el proceso productivo de obtención de dicho extracto se emplea un sistema de placas de celulosa en la estación de filtración del Centro de Histoterapia Placentaria, Planta. El presente trabajo tiene como objetivo el empleo y evaluación de placas de producción nacional modelo Filtec 00 producidas en la ...

  20. Vulnerable Hunter

    OpenAIRE

    Md.Asha Begum; Y.VishnuPriya; V.ManoranjanBabu; ,O.Srinivasu

    2016-01-01

    This project "VULNERABLE HUNTER" application main aim is to detect risk in our mobile applications. This application contains modules like Fetch Application, Generate Score, Uninstall and Display Graph. Through this application it detects risk so that this application is very useful to smart phone users Now-a-days so many people are using smart phones and people are crazy about new apps. But by installing all the applications into our mobile may reduce its performance. Some apps c...

  1. Obtención de una placa fotosensible como material de registro holográfico

    Directory of Open Access Journals (Sweden)

    García, C.

    2000-08-01

    Full Text Available In this article was showed the procedure of obtaining and depositing of photosensitive dry films uses as holographic recording materials. We compare the thickness and the uniformity of plates obtained with two different depositing method, with a manual depositor and an automatic depositor. The influence of the thickness on the behaviour of the material as holographic recording material has been studied.

    En este artículo se presenta, en primer lugar, el procedimiento de obtención y depositado de películas fotosensibles secas utilizadas como material de registro holográfico, comparando el espesor y uniformidad de las placas obtenidas con dos métodos de depositado distinto, con un depositador manual y con un depositador automático. En segundo lugar se analiza la influencia del espesor en el comportamiento del material como material de registro holográfico.

  2. Placa funerária nos Armazéns Sommer (Lisboa) (Conventus Scallabitanus)

    OpenAIRE

    Encarnação, José d'; Neto, Nuno; Rebelo, Paulo; Ribeiro, Ricardo

    2018-01-01

    Ficheiro Epigráfico é um suplemento da revista «Conimbriga» do referido Instituto de Arqueologia. Criado em 1982, destina-se a dar a conhecer as inscrições romanas inéditas da Península Ibérica. Dá-se a conhecer uma placa funerária com inscrição, achada num significativo lugar da Lisboa Romana. A invulgar «interpunctio» sugeriu aos investigadores que a letra Y isolada poderá estar por Hy (com a habitual aférese do H), o que denunciaria um antropónimo grego, cuja identificação oferece dúvi...

  3. Emprego experimental da placa de compósito poli-hidroxibutirado/hidroxiapatita na fixação femoral em gatos

    Directory of Open Access Journals (Sweden)

    E.G.L. Alves

    2010-10-01

    Full Text Available Avaliou-se o compósito de poli-hidroxibutirado (PHB 70% e hidroxiapatita (HA 30% na forma de placas para fixação óssea em gatos. Foram usadas placas do compósito com 60mm de comprimento por 10mm de largura e espessura variando de 3mm no centro a 5mm nas extremidades, com seis orifícios. A placa do compósito foi empregada na fixação de osteotomia de fêmur em quatro gatos, totalizando seis intervenções. Verificou-se a ruptura de cinco placas (83,3% até o quarto dia e de uma placa (16,7% aos 21 dias, quando se observou um calo ósseo exuberante. O resultado da implantação da placa no gato mostrou que o compósito não possui resistência suficiente para ser empregado como placas de fixação de fêmur em gatos.

  4. Transforming vulnerability.

    Science.gov (United States)

    Jones, Patricia S; Zhang, Xinwei Esther; Meleis, Afaf I

    2003-11-01

    Asian American immigrant women engaged in filial caregiving are at special risk for health problems due to complex contextual factors related to immigration, cultural traditions, and role transition. This study examines the experience of two groups of immigrant Asian American women who are caring for older parents. A total of 41 women (22 Chinese American and 19 Filipino American) were interviewed in a study based on Strauss and Corbin's grounded theory methodology. The women were determined to be loyal to their traditional culture, which included strong filial values, while adapting to a new culture. Through the struggle of meeting role expectations and coping with paradox, the women mobilized personal and family resources to transform vulnerability into strength and well-being.

  5. Caracterización de la mezcla de yeso grueso con adición de residuos tratados de placas de yeso laminado

    OpenAIRE

    Rodríguez-Orejón, A.; Del Río-Merino, M.; Fernández-Martínez, F.

    2014-01-01

    La protección del medio ambiente implica la reutilización de los residuos de construcción y demolición. Los residuos de placas de yeso laminado se utilizan en la fabricación de cemento y de placas de yeso laminado. En este artículo se ha estudiado la utilización deresiduos de placa de yeso laminado cocido (YLC) mezclado con yeso grueso (YG), realizándose la caracterización físico-mecánica de dureza superficial y resistencias mecánicas, para determinar su idoneidad formando materiales de ye...

  6. Placa de Castillo Morales: uso precoce e qualidade de vida da criança com Síndrome de Down

    OpenAIRE

    Santana, Ana Luísa Rato

    2015-01-01

    Dissertação para obtenção do grau de Mestre no Instituto Superior de Ciências da Saúde Egas Moniz Com este trabalho pretende-se, mostrar a importância da terapia precoce da regulação orofacial com o uso de Placa Palatina Castillo-Morales, em pacientes com Síndrome de Down, e avaliar as alterações e benefícios do uso desta placa para uma melhor Qualidade de Vida. A Placa de Castillo-Morales é utilizada como um complemento para a estimulação orofacial, sendo, especialmente usada em pacien...

  7. Utilización de la placa palatina de memoria y desarrollo orofacial en infante con Síndrome de Down

    OpenAIRE

    Vera Lúcia Carneiro; Judith Angélica Gonzales Sullcahuamán; Fabián Calixto Fraiz

    2012-01-01

    Los infantes con Síndrome de Down presentan en general, hipotonía de la muscular, cierre labial incompetente, lengua flácida y protruida. La placa palatina de memoria, propuesta por Castillo Morales, induce el cierre bilabial y posicionamiento correcto de la lengua. Este trabajo tuvo por objetivo evaluar el desarrollo orofacial, de una niña con Síndrome de Down, a través de terapia de estimulación precoz y utilización de placa palatina de memoria. Recibió tratamiento con placa palatina de mem...

  8. Normalización de imágenes de placas vehiculares a través de corrección geométrica

    OpenAIRE

    Choez Álvarez, Carlos Leonardo; Salas Guerrero, Steve Fernando; Vintimilla, Boris X.

    2013-01-01

    El proyecto en general consiste en implementar un sistema de control de acceso vehicular mediante el reconocimiento del número de placa de manera automática usando una cámara y algoritmos de procesamiento de imágenes incluyendo Reconocimiento Óptico de Caracteres (OCR). Para el reconocimiento de las placas se tomara una imagen al vehículo al momento de entrar a un parqueadero específico. Este proyecto consta de cinco partes: 1. Detección y extracción de placas. 2. Normalización de imágenes...

  9. Reciclado de placas de yeso laminado aligeradas con residuos de poliuretano = Recycling of gypsum plasterboard lightened with polyurethane waste

    Directory of Open Access Journals (Sweden)

    Lourdes Alameda

    2015-05-01

    Full Text Available Este trabajo presenta los resultados de un proceso experimental de reutilización de residuos obtenidos de desechos de placas de yeso laminado elaboradas con residuos poliméricos de origen industrial (espuma de poliuretano y reforzadas con fibras de polipropileno, para la fabricación de nuevas placas de yeso laminado. Para ello, se expone la metodología de reciclado de placas prefabricadas buscando de esta forma aumentar el ciclo de vida del yeso y de los residuos de poliuretano empleados. Para ello se detalla el proceso de fabricación las nuevas placas así como su caracterización mediante ensayos físicos y mecánicos a través de ensayos normalizados para placas de yeso laminado (densidad aparente, resistencia a flexión, absorción total en agua y dureza superficial. Los resultados obtenidos indican que es posible reciclar este tipo de prefabricados de una manera sencilla. De la misma forma se ha demostrado que las nuevas placas fabricadas con el residuo recuperado, presentan un buen comportamiento mecánico, a la par que se reduce su capacidad de absorción de agua y se aumenta su dureza su superficial. Abstract This paper presents the results of an experimental process of reusing waste obtained from waste gypsum plasterboard made from polymeric industrial waste (polyurethane foam and polypropylene fibers whit the aim to manufacturer new gypsum plasterboards. Therefore, a methodology to recycle is presented to increase the life cycle of waste gypsum. The manufacturing process of the plates is detailed as well as their physical and mechanical characterization by means of standardized for gypsum plasterboard (bulk density, flexion strength, total water absorption and surface hardness. The results indicate that it is possible to recycle this type of prefabricated in a simple way. Likewise it has been demonstrated that new plates made with the residue reusing, have good mechanical strength, at the same time reduce the capacity of water

  10. Applicability of vulnerability maps

    International Nuclear Information System (INIS)

    Andersen, L.J.; Gosk, E.

    1989-01-01

    A number of aspects to vulnerability maps are discussed: the vulnerability concept, mapping purposes, possible users, and applicability of vulnerability maps. Problems associated with general-type vulnerability mapping, including large-scale maps, universal pollutant, and universal pollution scenario are also discussed. An alternative approach to vulnerability assessment - specific vulnerability mapping for limited areas, specific pollutant, and predefined pollution scenario - is suggested. A simplification of the vulnerability concept is proposed in order to make vulnerability mapping more objective and by this means more comparable. An extension of the vulnerability concept to the rest of the hydrogeological cycle (lakes, rivers, and the sea) is proposed. Some recommendations regarding future activities are given

  11. Armado con familias de armaduras en direcciones arbitrarias. Parte II. Placas y láminas

    Directory of Open Access Journals (Sweden)

    Samartín, Avelino

    2003-02-01

    Full Text Available This paper is an extension of a previous one, what was dedicated to the study of the problem of design/verification of reinforcement in two-dimensional concrete structures subjected to in plane forces. Here, the verification of the reinforcement of two-dimensional concrete structures subjected to out-of-plan actions (plates and shells is reviewed. The presented verification procedure allow us to handle important situations that often appear in reinforced concrete structures. such as reinforcement at plate cornes. combination of in-plane forces and bending stresses occurring at function of cantilever and webs in continuous bridge box sections. The usual alternatives to treat these cases are based oo heuristic procedures or semi-empirical formulae as the Wood. The analysis can be carried out by the use of a simple computer program. The output of this program includes the diagrams of stresses and strains for each of the bar reinforcement families and the principal stresses in the as function of the load amplification factor: Iii this way it is possible to find the safety factor at a point of the reinforced concrete strutctureEste artículo corresponde a la extensión de uno anterior dedicado al estudio del problema de la comprobación y el dimensionamiento de las armaduras de acero en estructuras bidimensionales de hormigón armado tipo laja, cuyos esfuerzos están contenidos en su plano medio. Aquí se consideran las estructuras con cargas normales a su plano medio (placas y láminas, es decir. sometidas a esfuerzos de flexión. El procedimiento de comprobación y dimensionamiento que se propone, permite tratar situaciones importantes como el armado en las esquinas de placa, la combinación de tensiones axiles, rasantes y de flexión que aparecen en los arranques de 10s voladizos en las estructuras de los tableros continuos de puentes, particularmente las zonas sobre apoyos. En estos casos las alternativas actuales son procedimientos heur

  12. Medición de placas astrométricas obtenidas con el telescopio Astrográfico de La Plata

    Science.gov (United States)

    di Sisto, R. P.; Orellana, R.

    El Observatorio de La Plata cuenta con un gran número de placas de asteroides y cometas obtenidas con el telescopio astrográfico, que cubren gran parte del cielo del hemisferio sur. En 1996 se recopilaron y clasificaron 2187 placas (Beca para estudiantes de la AAA 1996) de las cuales 2031 corresponden a asteroides. Los datos de cada placa se volcaron en una base de datos creada para facilitar su manejo y preservar la información. A partir de este trabajo se revisaron los MPC electrónicos y se identificaron aquellas placas de asteroides pertenecientes a nuestra base de datos cuyos resultados no fueron publicados en los mismos. De un total de 400 placas que no aparecían publicadas sobresalía un paquete constituído por 40 placas obtenidas en 1977. Estas últimas fueron reducidas utilizando las posiciones y movimientos propios de las estrellas de referencia obtenidas del catálogo SAO 2000 dadas para el sistema FK5. Las posiciones calculadas fueron enviadas y publicadas en los Minor Planet Circulars (MPC).

  13. Osteosíntesis con placa puente en fracturas diafisiarias conminutas de húmero.

    Directory of Open Access Journals (Sweden)

    Luis Mancilla Mancilla

    2007-10-01

    Full Text Available Objetivo: Describir y evaluar la técnica de osteosíntesis percutánea mínimamente invasiva en fracturas disfisiarias conminutas de húmero. Material y Métodos: Estudio descriptivo longitudinal de tres pacientes con diagnóstico de fractura de húmero clasificación AO 12C3 tratado quirúrgicamente en el Hospital Nacional Cayetano Heredia, evaluándose pérdida sanguínea intraoperatoria, tiempo quirúrgico, movilidad de articulaciones vecinas y callo óseo. Resultados: La perdida promedio de sangre fue de 180cc y el tiempo operatorio promedio 60 minutos. Los pacientes presentaron dolor leve tolerable desde el primer día post operatorio, movilidad del hombro y del codo sin limitación, formación del callo óseo a partir de la cuarta semana y consolidación ósea a las 12 semanas promedio. No hubo lesión del nervio radial. Conclusiones: La placa puente es una alternativa de tratamiento en fracturas conminutas diafisiarias del húmero tanto por su bajo costo como por la rehabilitación funcional precoz de las articulaciones vecinas, asimismo recomendamos la visualización intra operatoria del nervio radial.

  14. Consensus on melanonychia nail plate dermoscopy Consenso sobre dermatoscopia da placa ungueal em melanoniquias

    Directory of Open Access Journals (Sweden)

    Nilton Di Chiacchio

    2013-04-01

    Full Text Available This statement, focused on melanonychia and nail plate dermoscopy, is intended to guide medical professionals working with melanonychia and to assist choosing appropriate management for melanonychia patients. The International Study Group on Melanonychia was founded in 2007 and currently has 30 members, including nail experts and dermatopathologists with special expertise in nails. The need for common definitions of nail plate dermoscopy was addressed during the Second Meeting of this Group held in February 2008. Prior to this meeting and to date (2010 there have been no evidence-based guidelines on the use of dermoscopy in the management of nail pigmentation.Este consenso, com foco em melanoníquia e dermatoscopia da lâmina ungueal, se destina a orientar os médicos que trabalham com melanoníquia e auxiliar no manejo destes pacientes. O grupo internacional de estudos sobre melanoníquia foi fundada em 2007 e tem agora 30 membros, incluindo dermatologistas e dermatopatologistas com conhecimento especializado em unhas. A necessidade de definições comuns de dermatoscopia da lâmina ungueal foi abordada durante a segunda reunião deste grupo, realizada em fevereiro de 2008. Antes desta reunião e até a presente, não existem orientações com base em evidências sobre a utilização de dermatoscopia da placa ungueal.

  15. Tratamiento de agrandamiento gingival inducido por fenitoina asociado a placa bacteriana

    Directory of Open Access Journals (Sweden)

    Carmen Julia Rovira

    2013-10-01

    Full Text Available ResumenLa ingesta de algunos medicamentos puede producir un sobre crecimiento de las encías. Se reportan medicamentos tales como los bloqueadores de los canales de calcio, inmunosupresores, anticonvulsivantes que producen estos efectos adversos. Múltiples casos de agrandamientos gingivales están asociados a la ingesta de Fenitoína. El tratamiento de los agrandamientos gingivales inducidos por drogas por lo general es quirúrgico, pero mantener un buen control de placa bacteriana puede evitar en muchos casos que se presente un exagerado aumento de volumen gingival. Se presenta un caso de agrandamiento gingival en paciente masculino de 22 años de edad, bajo tratamiento antiepiléptico con fenitoína. Al examen clínico se observó aumento del volumen gingival de forma generalizada, en maxilar superior e inferior, predominante en sector anterior, produciendo ardor y sangrado durante el cepillado y la ingestión de alimentos. Al sondaje presenta múltiples pseudobolsas en los diferentes cuadrantes. La radiografía panorámica reveló pérdida ósea moderada horizontal, predominante en el sector posterosuperior, posteroinferior y anteroinferior. El plan de tratamiento consistió en fase higiénica, instrucción y motivación en higiene oral a la madre, gingivectomía y gingivoplastía en ambos maxilares. (DUAZARY 2011 No. 2, 226 - 231Abstract The importance of endodontic treatment is to achieve a complete filling and sealing of the root canal to prevent the transport of contaminants to and from root canal, with materials compatible with the surrounding tissues. Occasionally a situation may arise in which the purpose of the maintenance of working length is compromised such as overenlargement. This situation allows the extrusion of filling materials, mainly sealer cements, causing post treatment complications such as inflammatory reactions, injury to adjacent structures (orbital pain, inferior alveolar nerve injury, headache, etc., and infections

  16. El cálculo de placas de anclaje de soportes metálicos

    Directory of Open Access Journals (Sweden)

    Soto Pardo, M.

    1971-05-01

    Full Text Available This paper aims to contribute to the design calculation of anchorage plates, whose detailed behaviour is not well known. Due to the briefness of this investigation, readers are invited to amplify and complete it, and if necessary to correct it, since it is probable that a new investigation may include errors of method. The contents can be summarised as follows: 1. The classical design calculation of anchorage plates should be revised since it is based on an inaccurate idea on the actual behaviour and strength potential of mass concrete. Designers should know that this method implies a safety factor of the order of 10. This knowledge should give him confidence in cases of possible error, or when base reinforcements have been omitted, or placed after loading the structure. 2. The new calculation criterion is given in art. 54 of Code IEH-68, which authorises stresses to be increased, though still keeping them within fairly conservative limits. Since currently IEH-68 is the standard calculation code, it is advised that is should be strictly followed, and this paper should not be an invitation to anyone to go beyond the authorised limits given in this code. The purpose of this paper is not to offer a more economic formula, but to clarify ideas. 3. A metal column directly welded to a baseplate, without cross reinforcements, is always outside Code IEH-68, for normal slenderness values. However, this design can be regarded as fairly acceptable in the case of compound columns with separable extrusions (II, ] [, [ ], acceptable for simple or joined extrusions ([ ], I as can be inferred from tables 1, 2 and 3 (see the value of ɣb- 4. As a practical guidance, design calculations can generally be based on a stress of 120 kp/cm2El presente estudio intenta aportar algo al cálculo de placas de anclaje, colaborando en el enfoque de un fenómeno, en general, mal conocido. Consciente de la exigua extensión de este trabajo, impuesta por la falta de tiempo

  17. spatially identifying vulnerable areas

    African Journals Online (AJOL)

    The model structure is aimed at understanding the critical vulnerable factors that ... This paper incorporates multiple criteria and rank risk factors. ..... In terms of quantifying vulnerable areas within the country, the analysis is done based on 9 ...

  18. Fuzzing and Vulnerabilities Search

    OpenAIRE

    Stanislav Evgenyevich Kirillov; Nikolai Petrovich Lavrentiev

    2013-01-01

    Fuzzing for vulnerabilities can be very effective if we know the input data format. This work contains description of network message format recovery algorithm and the usage of restored data model in fuzzing and vulnerabilities search.

  19. Fuzzing and Vulnerabilities Search

    Directory of Open Access Journals (Sweden)

    Stanislav Evgenyevich Kirillov

    2013-02-01

    Full Text Available Fuzzing for vulnerabilities can be very effective if we know the input data format. This work contains description of network message format recovery algorithm and the usage of restored data model in fuzzing and vulnerabilities search.

  20. What Does Vulnerability Mean?

    Science.gov (United States)

    Parley, Fiona F

    2011-01-01

    Protection of those deemed vulnerable has received increasing attention since 2000. This article reports on care staff views of vulnerability using original data from a research study (Parley. "Vulnerability and abuse: an exploration of views of care staff working with people who have learning disabilities," PhD Thesis, 2007) in which care staff…

  1. Sensibilización de placas para ensayos inmunoenzimáticos con antígenos vacunales

    Directory of Open Access Journals (Sweden)

    Rolando Ochoa

    2001-12-01

    Full Text Available Se describe un procedimiento de sensibilización de placas para ensayos inmunoenzimáticos (ELISA con antígenos vacunales. Se define como concentración óptima de sensibilización aquella donde se alcanza la mayor densidad óptica con los sueros estándares y la menor con los sueros negativos y el blanco reactivo. Como modelo se emplean ensayos indirectos correspondientes a los antígenos de captura: toxoide tetánico, diftérico y la vesícula de membrana externa de meningococo B, materia prima activa de la vacuna antimeningocócica VA-MENGOC-BC. Esta metodología permite alcanzar un mayor recubrimiento de la fase sólida, lo cual incrementa la sensibilidad de los ensayos. La ocupación de espacios libres en la placa se hizo más evidente con antígenos de menor peso molecular, como los toxoides diftérico y tetánico.

  2. termodinámico en placas de acero AISI 4140 y pistas de rodamiento utilizando adhesivos anaeróbicos

    Directory of Open Access Journals (Sweden)

    Germán García

    2006-01-01

    Full Text Available Se evaluó el trabajo de adhesión termodinámico de placas planas de acero (AISI 4140 y AISI 52100 en contacto con dos adhesivos anaeróbicos de uso comercial, mediante la medición de los ángulos de contacto termodinámico de avance y retroceso obtenidos por el método de inmersión y emersión. Se utilizó el método de van Oss para calcular las componentes polares y no polares de adhesión para cada par metal-adhesivo. Se analizó también el efecto de la aplicación de un activador de superficie sobre el trabajo de adhesión en húmedo y se relacionaron los resultados con las características químicas y físicas de las placas. Los resultados indicaron que la aplicación del activador tuvo un efecto importante sobre la mojabilidad de los adhesivos, pero pequeña influencia en el trabajo de adhesión medido. Por otro lado, se encontraron diferencias importantes en la respuesta de los dos adhesivos estudiados, fundamentalmente en virtud de su composición química y propiedades reológicas.

  3. Prevalencia y grado de gingivitis asociada a placa dentobacteriana en niños

    Directory of Open Access Journals (Sweden)

    Miriam Lucía Rocha Navarro

    2014-01-01

    Full Text Available Introducción: Las enfermedades periodontales (EPs son comunes en niños y adolescentes, y algunas son rápidamente destructivas. El consenso internacional de Periodontología de 1999, vigente hasta hoy día, incluyó a la gingivitis como parte de las EPs. Este estudio se enfocó en la gingivitis inducida por placa dentobacteriana (PDB. Estudios previos reportan porcentajes similares de prevalencia en niños Nigerianos, Polacos y Tanzaneses de alrededor del 54.4%. Sin embargo Oh TJ y col. encontró una presencia del 70% en niños Estadounidenses. En México, hay una amplia discrepacia en su prevalencia que oscila entre el 20.6% - 91.3%. Método: Estudio observacional, transversal y descriptivo de niños que acudieron al Departamento de Odontopediatría de la Universidad de La Salle Bajío, A. C. Se revisó un total de 545 niños, y de ellos se reclutaron 350 niños con gingivitis de entre 3-14 años de edad, ambos sexos, clasificados sistémicamente como tipo I y II y sin capacidades diferentes. El protocolo de investigación fue revisado y aprobado por el Comité Ético Institucional. Los padres de los niños incluidos firmaron una Carta de Consentimiento Informado. A los niños se les aplicó un cuestionario de salud sistémica y uno de higiene dental, así como evaluación clínica, periodontal y de control de PDB. A los padres se les aplicó un cuestionario de hábitos higiénicos y preventivos. Se utilizó estadística descriptiva, X2 y correlación múltiple. Resultados: Los niños presentaron una prevalencia de 64.2%, con una mediana grado I de gingivitis, sin embargo, se observó una tendencia a incrementarse el grado de ésta, conforme el niño tenía más edad, así como un incremento en la presencia de PDB de acuerdo con el índice de O’Leary. No se observaron diferencias en el grado de gingivitis entre sexos. Conclusión: El índice gingival en los niños estudiados es grado I, que es considerado leve y éste es independiente del

  4. Evaluación de la efectividad de un desinfectante mediante el método de placas de contacto

    Directory of Open Access Journals (Sweden)

    Nancy Burguet Lago

    Full Text Available Objetivo: evaluar la efectividad del desinfectante LopHene ST mediante el método de placas de contacto. Métodos: se tomó 1 mL de la suspensión de los microorganismos de referencia (bacterias, levadura y un hongo filamentoso y se esparció sobre una superficie de material análogo al material donde se aplica el desinfectante. En posiciones aleatorias en réplicas de tres, se realizó el muestreo de superficie con placas de contacto que contenían agar triptona soya y sabouraud dextrosa agar, más neutralizante. Se incubaron a 32 ± 2 ºC de 3 a 5 días y 22 ± 2 ºC de 5 a 7 días, según tipo de microorganismo a ensayar. Se contaron las unidades formadoras de colonias en las placas (control positivo. Sobre una superficie de igual dimensión, se aplicó el desinfectante preparado (concentración: 4 % con 10 min de exposición. Se procedió de igual manera que con el control positivo, se tomó como criterio de aceptación una reducción del número de microorganismos en al menos 3 logaritmos. Resultados: los tres lotes evaluados mostraron que el desinfectante redujo la concentración de las bacterias en un rango de 4,60 a 7,20 logaritmos. Para la levadura la reducción fue de 4,70 a 5,40 logaritmos y para el hongo filamentoso ensayado los valores estuvieron entre 4,10 y 5,50 logaritmos. Conclusiones: el desinfectante LopHene ST es eficaz frente a las cepas de microorganismos ensayadas en el tiempo evaluado y a la concentración probada; con esto se confirma su capacidad bactericida y fungicida bajo las condiciones estudiadas. Además se demuestra que el método empleado resulta válido para el análisis de la efectividad de los lotes de desinfectante evaluados, al mostrar la reducción de las colonias.

  5. Utilización de la placa palatina de memoria y desarrollo orofacial en infante con Síndrome de Down

    Directory of Open Access Journals (Sweden)

    Vera Lúcia Carneiro

    2012-12-01

    Full Text Available Los infantes con Síndrome de Down presentan en general, hipotonía de la muscular, cierre labial incompetente, lengua flácida y protruida. La placa palatina de memoria, propuesta por Castillo Morales, induce el cierre bilabial y posicionamiento correcto de la lengua. Este trabajo tuvo por objetivo evaluar el desarrollo orofacial, de una niña con Síndrome de Down, a través de terapia de estimulación precoz y utilización de placa palatina de memoria. Recibió tratamiento con placa palatina de memoria desde los 5 hasta los 15 meses y fue acompañada por un equipo multidisciplinario hasta los 6 años de edad. En el caso presentado, la terapia empleada permitió un desarrollo bucofacial adecuado, armónico y funcional. La utilización precoz de placa palatina de memoria demostró ser un complemento valioso en el programa multidisciplinario de atención a pacientes con Síndrome de Down.

  6. VULNERABILITY OF COMPANIES

    Directory of Open Access Journals (Sweden)

    ARMEAN ANDREEA

    2013-06-01

    Full Text Available In present, the study of vulnerability of companies is increasing in every field due to the unstable economic environment influences. The object of this research is to define and identify vulnerabilities of companies and the establishment of evaluation methods at their level. This article emphasizes the importance and usefulness of one of the best known model in this way, from our point of view, namely Băileşteanu, Negrila Pattern. This pattern covers both external factors and internal ones, that increase vulnerabilities of companies, and fit the companies in which the state of vulnerability are (vitality, viability, vulnerability, high vulnerability, difficulty and high difficulty, with a matrix. The result of the research is that any company belonging to any field, can be analyzed using this model, and assigned to one of the conditions defined within.

  7. Automated Software Vulnerability Analysis

    Science.gov (United States)

    Sezer, Emre C.; Kil, Chongkyung; Ning, Peng

    Despite decades of research, software continues to have vulnerabilities. Successful exploitations of these vulnerabilities by attackers cost millions of dollars to businesses and individuals. Unfortunately, most effective defensive measures, such as patching and intrusion prevention systems, require an intimate knowledge of the vulnerabilities. Many systems for detecting attacks have been proposed. However, the analysis of the exploited vulnerabilities is left to security experts and programmers. Both the human effortinvolved and the slow analysis process are unfavorable for timely defensive measure to be deployed. The problem is exacerbated by zero-day attacks.

  8. Análisis de falla en evaporadores de placas de aluminio de sistemas de acondicionamiento de aire automotriz

    Directory of Open Access Journals (Sweden)

    Santiago Mendoza Hurtado

    2011-01-01

    Full Text Available Se caracterizaron los tipos de fallas a partir del estudio de tres perfiles de evaporadores de placas de aleación de aluminio, puestos fuera de servicio por fugas del refrigerante y obtenidos en talleres de refrigeración automotriz en la ciudad de Barranquilla. Luego se aplicaron las pruebas de la metodología del análisis de falla. Se comprobó que los mecanismos de falla fueron principalmente corrosión con algunas situaciones tendientes a fractura frágil; además, las condiciones ambientales de la ciudad de Barranquilla son factores influyentes en los mecanismos de corrosión.

  9. Sistema de supervisión y control para los enfriadores de placas y los tanques de contactos.

    Directory of Open Access Journals (Sweden)

    Eliecer Méndez Méndez

    2011-01-01

    Full Text Available Se realizó la sustitución del equipamiento obsoleto de automatización de las áreas de Enfriadores de Placas y Tanques de Contactos, por un Sistema de Supervisión y Control, formado por un PLC y el sistema SCADA. Para esto se estudió el lenguaje de programación existente en los equipos anteriores, se interpretaron los códigos, se identificó la programación de los lazos de medición y regulación existentes y se adicionaron nuevas mediciones. Se realizó el proyecto, la compra, el montaje, la programación y la puesta en marcha. El nuevo sistema mejoró el control y la supervisión y contribuyó a elevar la eficiencia tecnológica.

  10. Simulación y experimentación de laminación plana de placas de aluminio 6063

    Directory of Open Access Journals (Sweden)

    Teresa Robert

    2011-06-01

    Full Text Available An experimental methodology was generated for understanding the theoretical and practical concepts inherent to cold flat rolling. Aluminium slabs about 100 mm length, 9 mm thickness with different widths: 10 and 30 mm were rolled. A constant 0.3 mm thickness reduction step was performed in order to achieve a thickness reduction greater than 80 %. In the Abaqus® commercial software, a mathematical model was implemented in order to obtain a greater understanding concerning how the process variables affect the fields of stresses and strains that are not observed experimentally. It was found, by mathematical simulation, that a superficial hardening in the plates was produced and the deformation obtained is heterogeneous, which is corroborated physically. Keywords: Flat rolling; 6063 Aluminium; Data acquisition system; Simulation Se generó una metodología experimental para el entendimiento teórico-práctico de los conceptos del proceso de laminación plana en frío. Se laminaron placas de aluminio de aproximadamente 100 mm de longitud y 9 mm de espesor, a diferentes anchos: 10 y 30 mm. Se seleccionó una razón de reducción constante de 0.3 mm para cada paso de laminación, hasta lograr una reducción superior al 80 % en espesor. Se implementó un modelo matemático en el paquete comercial Abaqus® con el fin de obtener un mayor entendimiento sobre la influencia de las variables del proceso (fuerza aplicada y dimensiones de las probetas en los campos de esfuerzos y deformaciones que, experimentalmente, no se pueden observar. Se encontró, mediante la simulación matemática, que se produce un endurecimiento superficial en las placas y que la deformación obtenida es heterogénea, lo cual se corrobora físicamente.

  11. Empleo de placas filtrantes cubanas en el proceso de producción de melagenina loción

    Directory of Open Access Journals (Sweden)

    Guillermo Lago Mendoza

    1999-12-01

    Full Text Available La melagenina loción es un medicamento extraído de la placenta humana e identificado como una lipoproteína de bajo peso molecular, que ha demostrado su eficacia en la cura del vitiligo. Durante el proceso productivo de obtención de dicho extracto se emplea un sistema de placas de celulosa en la estación de filtración del Centro de Histoterapia Placentaria, Planta. El presente trabajo tiene como objetivo el empleo y evaluación de placas de producción nacional modelo Filtec 00 producidas en la Unión Investigación Producción Cuba 9 para la obtención del producto, para ello se evaluó el filtro teniendo en cuenta algunos criterios de operación además de los parámetros de control de la calidad del medicamento.Melagenine lotion is a drug extracted from human placenta. It is identified as a low molecular weight lipoprotein that has proven its efficiency to cure vitiligo. A system of cellulose plates is used during the productive process of obtention of this extract at the station of filtration of the Center of Placental Histotherapy. The present paper is aimed at studying the use and evaluation of plates of national production model Filtec 00 made at the Cuban 9 Union of Research and Production for obtaining the product. To this end, the filtre was evaluated taking into account some operational criteria in addition to drug quality control parameters.

  12. Vulnerability of complex networks

    Science.gov (United States)

    Mishkovski, Igor; Biey, Mario; Kocarev, Ljupco

    2011-01-01

    We consider normalized average edge betweenness of a network as a metric of network vulnerability. We suggest that normalized average edge betweenness together with is relative difference when certain number of nodes and/or edges are removed from the network is a measure of network vulnerability, called vulnerability index. Vulnerability index is calculated for four synthetic networks: Erdős-Rényi (ER) random networks, Barabási-Albert (BA) model of scale-free networks, Watts-Strogatz (WS) model of small-world networks, and geometric random networks. Real-world networks for which vulnerability index is calculated include: two human brain networks, three urban networks, one collaboration network, and two power grid networks. We find that WS model of small-world networks and biological networks (human brain networks) are the most robust networks among all networks studied in the paper.

  13. Caracterización térmica de placas de yeso con material de cambio de fase incorporado

    Directory of Open Access Journals (Sweden)

    García, A.

    2010-09-01

    Full Text Available In this research the suitability of including PCM in gypsum boards to multiply their thermal energy storage capacity is demonstrated. So the thermal storage capacity of several constructive materials is evaluated and compared, whose use and application is similar to the gypsum boards: paneling of a wall and partition wall. An experimental facility has been designed and operated for the study of the new compound material, exchanging heat with air. It has been studied the influence of different parameters and system variables (working temperature, air velocity, display of the phase change materials, and location in the building…, to establish a latent heat storage system which –complemented with passive strategies (solar gains, natural ventilation– reduces the acclimatization energy consumption in buildings. So, here we demonstrate that a gypsum board including a 44.5% in weight of phase change materials (PCM is able to store –in a 1.5 cm thick- 5 times the thermal energy of a current gypsum board –with the same thickness–, and the same amount to 11.5 cm brick layer, in the comfort temperature range (20-30 ºC, maintaining the mechanical and physical properties required by the regulations in force.

    En este trabajo se demuestra la idoneidad de incorporar materiales de cambio de fase en placas de yeso para incrementar su capacidad de almacenamiento térmico. Para ello se evalúa y se compara la capacidad de almacenamiento térmico, de diferentes elementos constructivos cuyo uso y aplicación es similar a la de las placas de yeso: trasdosado y tabique separador. Se ha disenado y puesto en funcionamiento una instalación experimental que simula las condiciones de contorno que se producen en una estancia donde estén instalados los diferentes materiales y sistemas constructivos. Se ha estudiado la influencia de diferentes para´metros y variables del sistema (temperatura de trabajo, velocidad del aire, presentación de los

  14. County Population Vulnerability

    Data.gov (United States)

    City and County of Durham, North Carolina — This layer summarizes the social vulnerability index for populations within each county in the United States at scales 1:3m and below. It answers the question...

  15. Web Application Vulnerabilities

    OpenAIRE

    Yadav, Bhanu

    2014-01-01

    Web application security has been a major issue in information technology since the evolvement of dynamic web application. The main objective of this project was to carry out a detailed study on the top three web application vulnerabilities such as injection, cross site scripting, broken authentication and session management, present the situation where an application can be vulnerable to these web threats and finally provide preventative measures against them. ...

  16. Selective vulnerability in brain hypoxia

    DEFF Research Database (Denmark)

    Cervos-Navarro, J.; Diemer, Nils Henrik

    1991-01-01

    Neuropathology, selective vulnerability, brain hypoxia, vascular factors, excitotoxicity, ion homeostasis......Neuropathology, selective vulnerability, brain hypoxia, vascular factors, excitotoxicity, ion homeostasis...

  17. Arduino Tricorder : Aplicació Android per a la supervisió, control i adquisició de dades d'una placa Arduino

    OpenAIRE

    Sánchez Morato, Sergi

    2015-01-01

    Aplicació Android per a la supervisió, control i adquisició de dades d'una placa Arduino que disposi de comuninació Ethernet i/o Wi-Fi. Creació d'interfícies dinàmiques amb diferents modalitats d'interacció: tàctil, reconeixement de veu i síntesi de veu. Aplicación Android para la supervisión, control y adquisición de datos de una placa Arduino que disponga de comuninació Ethernet y/o Wi-Fi. Creación de interfaces dinámicas con diferentes modalidades de interacción: táctil, reconocimiento ...

  18. Distribución de los genotipos de fimA en cepas de Porphyromonas gingivalis aisladas de placas subgingivales y de sangre durante bacteriemias

    Directory of Open Access Journals (Sweden)

    Martine Bonnaure-Mallet

    2009-06-01

    Conclusión. En los aislamientos de sangre y de placa subgingival de pacientes con periodontitis el fimA más frecuente fue el tipo II; no fue posible correlacionar el tipo de fimA con la bacteriemia inducida por el alisado radicular. Los resultados de la secuenciación del gen fimA no concuerdan con los obtenidos por PCR.

  19. Melqart-Herakles matando al Toro Celeste en una placa ebúrnea de Medellín

    Directory of Open Access Journals (Sweden)

    Almagro-Gorbea, Martín

    2002-12-01

    Full Text Available An ivory plaque found in the Tartessian necropolis from Medellin (Badajoz, Spain, dated about 600 B.C., shows a hero with a Phygian helmet killing a bull. The iconography of this scene can be interpreted a Phoenician-Tartessian myth of «Melqart killing de Heaven's Bull», which could be a precedent of the well-known Greek myth of «Herakles and the Cretan Bull». This ivory plaque is interesting not only for classical iconography but also to show the deep relation between the Phoenician and the Tartessian mythology.En la necrópolis tartésica orientalizante de Medellín ha aparecido una placa con una escena de tauromaquia fechada hacia el 600 a.C. con un personaje con gorro frigio que apuntilla a un toro. Su análisis iconográfico permite interpretarla como un posible mito de «Melqart dando muerte al Toro Celeste», probable precedente del mito griego de Heracles y el Toro de Creta. Además de su interés para la mitología clásica, este marfil confirma la profunda interrelación entre la mitología y las creencias tartésicas y fenicias.

  20. PLACA/DPLACA: a code to simulate the behavior of a monolithic/dispersed plate type fuel

    International Nuclear Information System (INIS)

    Denis, Alicia; Soba, Alejandro

    2005-01-01

    The PLACA code was originally built to simulate monolithic plate fuels contained in a metallic cladding, with a gap in between. The international program of high density fuels was recently oriented to the development of a plate-type fuel of a uranium rich alloy with a molybdenum content between 6 to 10 w %, without gap and with a Zircaloy cladding. To give account of these fuels, the DPLACA code was elaborated as a modification of the original code. The extension of the calculation tool to disperse fuels involves a detailed study of the properties and models (still in progress). Of special interest is the material formed by U Mo particles dispersed in an Al matrix. This material has appeared as a candidate fuel for high flux research reactors. However, the interaction layer that grows around the particles has a deleterious effect on the material performance in operation conditions and may represent a limit for its applicability. A number of recent experiments carried out on this material provide abundant information that allows testing of the numerical models. (author)

  1. Caracterização e Beneficiamento Primário de Placas de Circuito Impresso (PCI de Telefones Celulares

    Directory of Open Access Journals (Sweden)

    Theo Antonio de Jesus

    2015-12-01

    Full Text Available Devido ao constante avanço tecnológico, uma grande quantidade de aparelhos é descartada por obsolescência tecnológica ou defeitos. Isto acarreta a contaminação do solo e do lençol freático, além de representar perda econômica pois as PCI (placas de circuito impresso dos telefones celulares são ricas em metais pesados e alguns metais valiosos. Com o objetivo de conhecer melhor a composição e concentração destas PCI de modo a otimizar os processos de reciclagem, foi realizada a caracterização das PCI através da digestão em água régia e da utilização das técnicas de DRx (difração de raios x e FRx (espectrometria de fluorescência de raios x. Os resultados proporcionaram conhecimento suficiente a respeito da composição e concentração dos principais metais das PCI. A presença de ouro, prata e cobre chama a atenção para o potencial econômico destes resíduos. Estudos são necessários para desenvolver os processos mais adequados com vistas a concentrar estes metais e viabilizar sua reciclagem.

  2. Energy vulnerability relationships

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  3. Plutonium Vulnerability Management Plan

    International Nuclear Information System (INIS)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy's response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department's Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B

  4. Detecting C Program Vulnerabilities

    OpenAIRE

    Anton, Ermakov; Natalia, Kushik

    2011-01-01

    C/C++ language is widely used for developing tools in various applications, in particular, software tools for critical systems are often written in C language. Therefore, the security of such software should be thoroughly tested, i.e., the absence of vulnerabilities has to be confirmed. When detecting C program vulnerabilities static source code analysis can be used. In this paper, we present a short survey of existing software tools for such analysis and show that for some kinds of C code vu...

  5. Maintaining dignity in vulnerability

    DEFF Research Database (Denmark)

    Høy, Bente

    2016-01-01

    to understand the meaning of the narrated text. Results. The meaning of maintaining dignity was constituted in a sense of vulnerability to the self, and elucidated in three major interrelated themes: Being involved as a human being, being involved as the person one is and strives to become, and being involved...

  6. Anaphylaxis vulnerable groups

    African Journals Online (AJOL)

    Ehab

    Age groups vulnerable to serious attacks of anaphylaxis include infants, teenagers, pregnant women, and the elderly. Concomitant diseases, such as severe or uncontrolled asthma, cardiovascular disease, mastocytosis or clonal mast cell disorders and the concurrent use of some medications such as beta adrenergic ...

  7. Estabilidad de ciertas ondas solitarias sometidas a perturbaciones estocasticas

    Science.gov (United States)

    Rodriguez Plaza, Maria Jesus

    The rampant success of quantum theory is the result of applications of the 'new' quantum mechanics of Schrodinger and Heisenberg (1926-7), the Feynman-Schwinger-Tomonaga Quantum Electro-dynamics (1946-51), the electro-weak theory of Salaam, Weinberg, and Glashow (1967-9), and Quantum Chromodynamics (1973-); in fact, this success of 'the' quantum theory has depended on a continuous stream of brilliant and quite disparate mathematical formulations. In this carefully concealed ferment there lie plenty of unresolved difficulties, simply because in churning out fabulously accurate calculational tools there has been no sensible explanation of all that is going on. It is even argued that such an understanding is nothing to do with physics. A long-standing and famous illustration of this is the paradoxical thought-experiment of Einstein, Podolsky and Rosen (1935). Fundamental to all quantum theories, and also their paradoxes, is the location of sub-microscopic objects; or, rather, that the specification of such a location is fraught with mathematical inconsistency. This project encompasses a detailed, critical survey of the tangled history of Position within quantum theories. The first step is to show that, contrary to appearances, canonical quantum mechanics has only a vague notion of locality. After analysing a number of previous attempts at a 'relativistic quantum mechanics', two lines of thought are considered in detail. The first is the work of Wan and students, which is shown to be no real improvement on the iisu.al 'nonrelativistic' theory. The second is based on an idea of Dirac's - using backwards-in-time light-cones as the hypersurface in space-time. There remain considerable difficulties in the way of producing a consistent scheme here. To keep things nicely stirred up, the author then proposes his own approach - an adaptation of Feynman's QED propagators. This new approach is distinguished from Feynman's since the propagator or Green's function is not obtained by Feynman's rule. The type of equation solved is also different: instead of an initial-value problem, a solution that obeys a time-symmetric causality criterion is found for an inhomogeneous partial differential equation with homogeneous boundary conditions. To make the consideration of locality more precise, some results of Fourier transform theory are presented in a form that is directly applicable. Somewhat away from the main thrust of the thesis, there is also an attempt to explain, the manner in which quantum effects disappear as the number of particles increases in such things as experimental realisations of the EPR and de Broglie thought experiments.

  8. O uso de placas de tetrapak como uma alternativa sustentável na construção civil

    Directory of Open Access Journals (Sweden)

    Luiz Antonio Perrone Ferreira Brito

    2009-01-01

    Full Text Available A indústria da construção civil, devido a sua grande influência nas atividades econômicas, é responsável pelo consumo dematéria-prima não renovável em grande escala sendo, portanto parte fundamental para que se consiga um desenvolvimentosustentável. Os materiais reciclados surgem como opção para a preservação destes recursos. O sistema modular também se adapta asnecessidades da construção sustentável já que seu processo construtivo resulta na racionalização da obra reduzindo perdas, custosfacilitando a inserção do material no mercado. O objetivo deste trabalho é desenvolver um sistema construtivo modular produzido complacas de argamassa de cimento, areia e caixas recicladas tetrapak. Foi desenvolvida uma proposta de planta padrão para umaresidência com 45m2 onde as vedações e divisórias internas são moduladas e construídas por placas pré-fabricadas de dimensõespadronizadas. Estas placas foram produzidas com duas espessuras diferentes de maneira que se pudesse avaliar sua massa final eresistência a compressão. Os resultados obtidos foram comparados com NBR 6136 (2008 Blocos vazados de concreto simples paraalvenaria - Requisitos. Um modelo de edificação foi construído neste sistema de maneira que se pudesse avaliar sua durabilidade,resistência as intempéries e conforto ambiental.Abstract Due to its strong influence over the economicactivities, the civil construction industry is responsible for thelarge-scale consumption of non-renewable raw materials and byconsequence being an important part of any sustainabledevelopment model. The recycled materials appear as an optionfor preservation of resources. The modular system also fits thenecessities of the sustainable construction since its operativeprocess results in a rationalization of needed man power,reducing losses, costs and facilitating the insertion of the recycledmaterials into the market. The objective of this work is todevelop a modular constructive

  9. Diseño de un colector solar de placa plana; Design of a Solar Flat Plate Collector

    Directory of Open Access Journals (Sweden)

    Jeovany Rafael Rodríguez Mejía

    2015-12-01

    Full Text Available En el presente artículo se integra el uso de un software de diseño mecánico y un algoritmo de simulación de la operación de un colector solar de placa plana, con el objetivo de simplificar el proceso de diseño y manufactura de este último. Se exponen los resultados de la simulación de la operación del colector solar considerando diferentes combinaciones en los parámetros de los materiales utilizados, tales como sus propiedades y características físico químicas, además de la variación de las dimensiones del sistema adiseñar. Finalmente en el artículo se evalúa la operación de un colector solar para las condiciones climatológicas típicas de la irradiancia, velocidad de viento y temperatura ambiente a partir de una serie de curvas sinusoidales, típicas de Cuba, validándose la viabilidad del algoritmo como apoyo en la etapa de diseño y selección de materiales.In this article the use of mechanical design software and an algorithm for simulating the operation of a flat plate solar collector, with the objective of simplifying the process of design and manufacture of the latter isintegrated. The simulation results of the operation of the solar collector considering different combinations in the parameters of the materials used, such as its physicochemical properties and features in addition to thevariation of the dimensions of the system design are set. The article finally evaluates the operation of a solar collector for typical climatic conditions of irradiance, wind speed and ambient temperature from a series ofsinusoidal, typical Cuba curves is evaluated, validating the feasibility of the algorithm as support in step design and material selection.

  10. CARACTERIZACIÓN BIOLÓGICA DE VARIANTES DE PLACA DE LA CEPA VACUNAL 17D CONTRA LA FIEBRE AMARILLA

    Directory of Open Access Journals (Sweden)

    María Rojas

    2009-09-01

    Full Text Available La vacuna colombiana 17D, contiene por lo menos cuatro fenotipos, denominados pequeño (0.3 – 1.2 mm, mediano (1.3 – 2.1 mm, grande (2.2 – 3.0 mm y extragrande (>3.1 mm. La composición y distribución porcentual de esos fenotipos, varió entre lotes y entre ampolletas de un mismo lote. Cada variante fue clonada por dilución de la vacuna y su efecto virulento fue analizado en ratones; el fenotipo de placa pequeño estuvo ligeramente sub representado en los lotes analizados y mostró una virulencia similar a la de la cepa silvestre neurotrópica Francesa (LD50 > 10-6, mientras que el fenotipo predominante y mas atenuado fue el mediano (LD50: 10-4. Los fenotipos grande y extragrande mostraron una virulencia intermedia (LD 50: 10 – 5  con relación a los anteriores. Los análisis de secuencia de las variantes sobre una región comprendida entre el extremo 3´NS5 y el inicio de 3´NCR, mostró la cercanía entre aquellas variantes con algún grado de virulencia, y entre la variante atenuada y la vacuna colombiana. La heterogeneidad de la vacuna 17D, constituye una evidencia de la estructura de quasiespecies propia de los virus RNA y señala cómo los casos de reacciones post vacunales  adversas pueden estar asociados con la aplicación de vacunas fabricadas a partir de cepas virales atenuadas.  

  11. Mangrove vulnerability index using GIS

    Science.gov (United States)

    Yunus, Mohd Zulkifli Mohd; Ahmad, Fatimah Shafinaz; Ibrahim, Nuremira

    2018-02-01

    Climate change, particularly its associated sea level rise, is major threat to mangrove coastal areas, and it is essential to develop ways to reduce vulnerability through strategic management planning. Environmental vulnerability can be understood as a function of exposure to impacts and the sensitivity and adaptive capacity of ecological systems towards environmental tensors. Mangrove vulnerability ranking using up to 14 parameters found in study area, which is in Pulau Kukup and Sg Pulai, where 1 is low vulnerability and 5 is very high vulnerability. Mangrove Vulnerability Index (MVI) is divided into 3 main categories Physical Mangrove Index (PMI), Biological Mangrove Index (BMI) and Hazard Mangrove Index (HMI).

  12. Placas ósseas confeccionadas a partir de diáfise cortical equina na osteossíntese femoral em coelhos

    Directory of Open Access Journals (Sweden)

    Fernando Pinheiro Milori

    2013-10-01

    Full Text Available A evolução tecnológica tem possibilitado o desenvolvimento e o aperfeiçoamento de novos materiais para implantes. Apesar dos fundamentais benefícios providos pelos dispositivos ortopédicos, complicações decorrentes de corrosão, degradação, infecção, além de outras podem ocorrer. O entendimento das características dos biomateriais é fundamental para a previsibilidade do seu comportamento in vivo, fornecendo subsídios para que o composto mais adequado seja escolhido na reconstrução do defeito ósseo. As placas de origem metálica são as mais utilizadas para o reparo de fraturas de ossos longos, sendo mecanicamente resistentes e biocompatíveis. No entanto, a necessidade de remoção e o enfraquecimento do osso são suas principais desvantagens. Neste trabalho, placas produzidas a partir de osso cortical equino foram empregadas experimentalmente em fêmur osteotomizado de coelhos (Grupo osso-GO, num estudo comparativo com placas de metal (Grupo metal-GM. A avaliação radiográfica foi realizada a cada 30 dias, durante 120 dias, momento em que foi então realizada análise histológica do material em estudo. Não houve diferença estatisticamente significante entre os dois grupos com relação à morfometria do calo ósseo e consolidação óssea em todos os momentos avaliados, sendo que ambas as placas permitiram a consolidação em todos os animais. Entretanto, observou-se que o calo ósseo foi menor no GO, em relação ao GM, em todos os momentos do estudo. Por outro lado, a maior parte dos animais do GO apresentou consolidação completa da fratura aos 90 dias, enquanto que no GM isto ocorreu aos 60 dias. Não foram evidenciadas células do tipo corpo estranho na histopatologia dos animais do GO, mas maior quantidade de tecido fibroso foi identificada, envolvendo este biomaterial. A placa confeccionada com osso equino representa uma alternativa de baixo custo e muito viável, uma vez que permitiu estabilização adequada

  13. The space of vulnerability

    Directory of Open Access Journals (Sweden)

    Claudio Sgarbi

    2015-11-01

    Full Text Available Archi-tecture has lost the reference to its prop “Archi” to develop mostly its “Tecture”: a deceitful form of nihilism, which has given full credit to a hurricane of instruments for which we know no purpose. Any distinction between city and architecture is purely contingent. Contingency is relevant but only in so far as it makes one lose any sense of scale. Many of our cities do not work because our style of life eradicates the sense of hospitality. The city becomes the place where we un-learn how to live together. Hospitality is vulnerability – the construction of vulnerability is the true beauty, the only deterrent against stupidity. Learn to live with the others, to approximate the alterity and its unpredictability. The basic tools of conviviality are the common goods of inter-disciplinarity. Learn to cultivate and educate yourself to phenomenal incompleteness.

  14. Fuzzy vulnerability matrix

    International Nuclear Information System (INIS)

    Baron, Jorge H.; Rivera, S.S.

    2000-01-01

    The so-called vulnerability matrix is used in the evaluation part of the probabilistic safety assessment for a nuclear power plant, during the containment event trees calculations. This matrix is established from what is knows as Numerical Categories for Engineering Judgement. This matrix is usually established with numerical values obtained with traditional arithmetic using the set theory. The representation of this matrix with fuzzy numbers is much more adequate, due to the fact that the Numerical Categories for Engineering Judgement are better represented with linguistic variables, such as 'highly probable', 'probable', 'impossible', etc. In the present paper a methodology to obtain a Fuzzy Vulnerability Matrix is presented, starting from the recommendations on the Numerical Categories for Engineering Judgement. (author)

  15. VT - Vermont Social Vulnerability Index

    Data.gov (United States)

    Vermont Center for Geographic Information — Social vulnerability refers to the resilience of communities when responding to or recovering from threats to public health. The Vermont Social Vulnerability Index...

  16. Desenvolvimento de compósitos poliméricos baseados em polipropileno reciclado visando o uso como placas absorvedoras de energia solar

    Directory of Open Access Journals (Sweden)

    Leonardo Azevedo Massulo

    2016-06-01

    Full Text Available Devido à crescente demanda por energias sustentáveis, gestão de resíduos e o uso de materiais recicláveis, o presente trabalho objetivou o desenvolvimento de compósitos poliméricos de matriz de polipropileno reciclado visando o uso como placas absorvedoras de energia solar. Nessa matriz polimérica adicionou-se como fase dispersa um resíduo do tabaco (pó de fumo empregando teores de 10%, 15%, 20%, 25% e 30%, em massa. Além disso, estudou-se a adição de negro de fumo junto ao pó de fumo, utilizando teores de 6% e 10% de cada fase dispersa. As formulações foram misturadas em homogeneizador de laboratório, moídas em moinhos de facas e processadas por moldagem por compressão a 180°C, obtendo-se placas com dimensões de 400x400mm e espessura de 4 mm, as quais, foram caracterizadas e avaliadas em testes de absorção de calor, tração, flexão, dureza e densidade. Os resultados indicaram potencial de aplicação no sistema de aquecimento solar de água devido aos resultados de absorção térmica. Também, a utilização do negro de fumo como fase dispersa mostrou-se uma grande contribuição para as características mecânicas do material. Outro importante resultado diz respeito a possibilidade de se estar usando um polímero reciclado e um resíduo industrial gerado em grande quantidade, tal como é o pó de fumo, na produção das placas caracterizando assim um ganho ambiental.

  17. Acelerômetro eletrônico e a placa Arduino para ensino de física em tempo real

    OpenAIRE

    Fábio Saraiva da Rocha; Guilherme Frederico Maranghello; Márcia Maria Lucchese

    2013-01-01

    http://dx.doi.org/10.5007/2175-7941.2014v31n1p98 Apresenta-se o projeto de um acelerômetro eletrônico triaxial voltado ao ensino de física experimental. Este dispositivo, quando acoplado adequadamente a um corpo, permite a leitura da aceleração imprimida ao conjunto. O acelerômetro funciona conectado eletronicamente à placa Arduíno sendo capaz de fornecer dados numéricos de aceleração que atualizam no decorrer de uma experiência. Tais dados podem ser disponibilizados através de tabelas e ...

  18. Módulo instruccional y modelo de conocimiento de la tectónica de placas basado en el aprendizaje significativo

    OpenAIRE

    Pascual Bonel, Lara

    2013-01-01

    El objetivo de este proyecto es el aprendizaje significativo de la tectónica de placas y la elaboración de un material conceptualmente transparente acerca de la misma, es decir, la realización, basada en los conocimientos previos y errores conceptuales del alumnado, de un modelo de conocimiento y módulo instruccional que permitan la construcción significativa del conocimiento acerca de esta teoría Máster Universitario en Formación del Profesorado de Educación Secundaria Unibertsitate Ma...

  19. Aggregation of plaque disclosing agent in a dentifrice Incorporação de evidenciador de placa bacteriana a um dentifrício

    Directory of Open Access Journals (Sweden)

    Débora Dias da Silva

    2004-06-01

    Full Text Available Dental plaque removal is an important issue in health promotion. Toothbrushing is one of the main methods employed for such purpose, since it can prevent dental caries by means of the fluoride present in the dentifrice. Dentifrices might contain plaque disclosing agents and thus allow dental plaque observation. The aim of this study was to assess whether utilization of a plaque disclosing agent interfered with plaque removal among adolescents, as well as the difference between utilization of erythrosine tablets and dentifrices containing plaque disclosing agent. The sample was composed of 62 students from Piracicaba, SP, Brazil, aged 12 to 14 years old, divided into 3 groups: G1 or control group (toothbrushing without plaque disclosure; G2 (plaque disclosing with an erythrosine tablet and toothbrushing and G3 (toothbrushing with dentifrice containing plaque disclosing agent. After toothbrushing, disclosure of the remaining dental plaque was performed in all groups with a fuchsin tablet and measured through the Simplified Oral Health Assessment Index (OHI-S, in two stages with a 2-month interval between them. The analysis of variance (ANOVA showed that there was no difference in the OHI-S index between the groups (p>0.05, however the G3 displayed a higher proportion of students with plaque reduction (23% than G2 (21%, besides the smallest difference in the mean remaining dental plaque. There was no difference between groups; however, it was suggested that the dentifrice with plaque disclosing agent had positive results in relation to the erythrosine tablet, even though the small sample size may have interfered with the results, indicating the need of complementary studies.Na promoção de saúde, a remoção da placa bacteriana é um fator importante e um dos métodos que incentivam sua remoção, é a escovação dentária, podendo-se prevenir a cárie dental através do íon flúor dos dentifrícios. Estes podem conter evidenciadores

  20. Distribución de los genotipos de fimA en cepas de Porphyromonas gingivalis aisladas de placas subgingivales y de sangre durante bacteriemias

    OpenAIRE

    Martine Bonnaure-Mallet; Paula Juliana Pérez-Chaparro; Patrice Gracieux; Vincent Meuric; Zohreh Tamanai-Shacoori; Jaime Eduardo Castellanos

    2009-01-01

    Introducción. Porphyromonas gingivalis es el principal agente etiológico de la periodontitis. El gen fimA ha sido relacionado con la virulencia del microorganismo, lo cual sugiere la participación de dicho gen en la capacidad del microorganismo para alcanzar el torrente sanguíneo. Objetivo. Estudiar la distribución de los tipos de fimA de P. gingivalis en muestras de placa subgingival y de sangre obtenidas durante bacteriemias después de raspaje y alisado radicular. Materiales y métodos...

  1. Diseño de un colector solar de placa plana; Design of a solar fl at plate collector

    Directory of Open Access Journals (Sweden)

    Jeovany Rafael Rodríguez Mejía

    2016-02-01

    Full Text Available En el presente artículo se integra el uso de un software de dis eño mecánico y un algoritmo de simulación de la operación de un colector solar de placa plana, con el objeti vo de simplificar el proceso de diseño y manufactura de este último. Se exponen los resultados de la sim ulación de la operación del colector solar considerando diferentes combinaciones en los parámetros de los materiales utilizados, tales como sus propiedades y características físico químicas, además de la var iación de las dimensiones del sistema a diseñar. Finalmente en el artículo se evalúa la operación de un colector solar para las condiciones climatológicas típicas de la irradiancia, velocidad de viento y temperatura ambiente a partir de una serie de curvas sinusoidales, típicas de Cuba, validándose la viabilidad del algoritmo como apoyo en la etapa de diseño y selección de materiales. In this article the use of mechanical design software and an al gorithm for simulating the operation of a flat plate solar collector, with the objective of simplifying the pr ocess of design and manufacture of the latter is integrated. The simulation results of the operation of the sola r collector considering different combinations in the parameters of the materials used, such as its physicochemic al properties and features in addition to the variation of the dimensions of the system design are set. The a rticle finally evaluates the operation of a solar collector for typical climatic conditions of irradiance, wind s peed and ambient temperature from a series of sinusoidal, typical Cuba curves is evaluated, validating the fe asibility of the algorithm as support in step design and material selection.

  2. HEPA Filter Vulnerability Assessment

    International Nuclear Information System (INIS)

    GUSTAVSON, R.D.

    2000-01-01

    This assessment of High Efficiency Particulate Air (HEPA) filter vulnerability was requested by the USDOE Office of River Protection (ORP) to satisfy a DOE-HQ directive to evaluate the effect of filter degradation on the facility authorization basis assumptions. Within the scope of this assessment are ventilation system HEPA filters that are classified as Safety-Class (SC) or Safety-Significant (SS) components that perform an accident mitigation function. The objective of the assessment is to verify whether HEPA filters that perform a safety function during an accident are likely to perform as intended to limit release of hazardous or radioactive materials, considering factors that could degrade the filters. Filter degradation factors considered include aging, wetting of filters, exposure to high temperature, exposure to corrosive or reactive chemicals, and exposure to radiation. Screening and evaluation criteria were developed by a site-wide group of HVAC engineers and HEPA filter experts from published empirical data. For River Protection Project (RPP) filters, the only degradation factor that exceeded the screening threshold was for filter aging. Subsequent evaluation of the effect of filter aging on the filter strength was conducted, and the results were compared with required performance to meet the conditions assumed in the RPP Authorization Basis (AB). It was found that the reduction in filter strength due to aging does not affect the filter performance requirements as specified in the AB. A portion of the HEPA filter vulnerability assessment is being conducted by the ORP and is not part of the scope of this study. The ORP is conducting an assessment of the existing policies and programs relating to maintenance, testing, and change-out of HEPA filters used for SC/SS service. This document presents the results of a HEPA filter vulnerability assessment conducted for the River protection project as requested by the DOE Office of River Protection

  3. [Adolescent vulnerabilities and radicalisation].

    Science.gov (United States)

    Lenjalley, Adrien; Radjack, Rahmeth; Ludot, Maude; Touhami, Fatima; Moro, Marie Rose

    2017-10-01

    Radicalisation resonates with the psychological vulnerabilities of adolescents. The ups and downs encountered as they attempt to construct their identity and their need to dominate favour the destructive nature of young people lacking a sense of filiation and belonging. An adolescent's engagement corresponds to a search for limits, with an adherence to religious values and to a group to establish self-esteem. Subjectification, authorising the adolescent to separate themselves from their parents and their values through a period of crisis must be supported. Copyright © 2017. Published by Elsevier Masson SAS.

  4. Classification of vulnerability information

    International Nuclear Information System (INIS)

    Gibson, W.G.

    1984-01-01

    The current upgrading of security measures at sensitive Department of Energy (DOE) facilities reflects the continuing concern over possible terrorist and other criminal acts against these facilities. Security reviews are periodically conducted at DOE facilities, deficiencies are identified, and corrective actions are recommended. While security upgrades are initiated as soon as possible, the process of securing funding and the construction or other activities necessary to complete upgrades can cause delays in correcting security vulnerabilities. Details of security weaknesses at important DOE facilities are classified in order to deny valuable information to terrorists and other malefactors

  5. Avaliação comparativa da efetividade das placas oclusais confeccionadas em relação central ou máxima intercuspidação em pacientes com DTM

    OpenAIRE

    Hamata, Marcelo Matida [UNESP

    2006-01-01

    A posição de relação central (RC) para a confecção de placas oclusais é muito discutível. Dessa forma, quando existe estabilidade oclusal, a máxima intercuspidação (MI) poderia ser utilizada como ponto de referência, eliminando a necessidade de registro interoclusal. O presente trabalho tem por objetivo comparar a efetividade de placas oclusais confeccionadas a partir de modelos articulados nessas duas posições. Para isso, 20 pacientes com desordens temporomandibulares (DTM) e dor de origem m...

  6. Prevalencia de Helicobacter pylori en muestras de placa dental de un grupo de pacientes venezolanos, mediante la técnica de reacción en cadena de la polimerasa

    OpenAIRE

    Berroteran, Alejandra; Perrone, Marianella; Correnti, María; Cavazza, María Eugenia; Tombazzi, Claudio; Lecuna, Vicente; Goncalvez, Rosa

    2002-01-01

    La placa dental ha sido propuesta como un reservorio para Helicobacter pylori, pero la hipótesis de que la microflora bucal pueda ser un nicho permanente para la bacteria es muy controversial. El presente estudio tuvo como objetivos:1.- Detectar la presencia de H. pylori en la placa dental de un grupo de pacientes de la población Venezolana mediante la Reacción en cadena de la Polimerasa (RCP), y 2.- Investigar la relación existente entre la infección por este microorganismo y algunos índices...

  7. Una secuencia didáctica de modelización, indagación y creación del conocimiento científico en torno a la deriva continental y la tectónica de placas

    OpenAIRE

    Domènech Casal, Jordi

    2014-01-01

    Se describe una actividad de indagación sobre la Tectónica de placas. En ella, el alumnado debe reconstruir la historia geológica de un planeta imaginario integrando distintos tipos de datos (distribución geográfica de fósiles, antigüedad de orógenos, regiones sísmicas) para construir un modelo de la ubicación de los límites de placa tectónica y los cambios que han sufrido los distintos continentes. A lo largo de la actividad se suceden distintas organizaciones de aula y andamios ...

  8. Um laboratório portátil de baixo custo: medição de g utilizando um pêndulo e a placa Raspberry Pi

    Directory of Open Access Journals (Sweden)

    Thiago Corrêa Almeida

    2017-08-01

    Full Text Available Neste artigo apresentaremos a placa Raspberry Pi como solução de baixo custo para um laboratório portátil com múltiplas aplicações, podendo ser utilizado tanto no ensino básico quanto no ensino superior. Utilizaremos a placa com um LDR (Light Dependent Resistor para medir o período de um pêndulo e obter a aceleração da gravidade. Apesar de simples, o experimento possui excelente acordo com valor encontrado na literatura, diferindo em apenas 0,07%.

  9. Pistas dermatoscópicas para diferenciar a tricotilomania da alopecia areata em placa Dermoscopic clues to distinguish trichotillomania from patchy alopecia areata

    Directory of Open Access Journals (Sweden)

    Leonardo Spagnol Abraham

    2010-10-01

    Full Text Available INTRODUÇÃO: Tricotilomania e alopecia areata em placa possuem características clínicas e dermatoscópicas semelhantes. OBSERVAÇÕES: O exame dermatoscópico da tricotilomania revela densidade capilar diminuída, cabelos fraturados em diferentes tamanhos, enovelados e vellus, tricoptilose, pontos amarelos com ou sem pontos pretos e ausência de cabelos em "ponto de exclamação". CONCLUSÃO: No contexto de alopecia em placa e cabelos fraturados, a ausência de "pontos de exclamação" sugere o diagnóstico de tricotilomania. Por outro lado, o achado de pontos amarelos sem pontos pretos não afasta o mesmo.BACKGROUND: Trichotillomania and patchy alopecia areata have similar clinical and dermoscopic features. OBSERVATIONS: In trichotillomania, dermoscopy shows decreased hair density, short vellus hair, broken hairs with different shaft lengths, coiled hairs, short vellus hair, trichoptilosis, sparse yellow dots, which may or may not contain black dots and no exclamation mark hairs. CONCLUSIONS: In the case of patchy alopecia and broken hairs, the absence of exclamation mark hairs suggests a diagnosis of trichotillomania. On the other hand, the finding of yellow dots without black dots does not exclude it.

  10. Compactadoras de placas

    Directory of Open Access Journals (Sweden)

    Chinchilla, M.

    1962-12-01

    Full Text Available Los rendimientos logrados mediante el empleo de la vibración en la compactación de suelos, han inducido a los fabricantes de maquinaria auxiliar (ver la compactación de suelos en el número 138 al estudio, experimentación y fabricación de nuevos tipos de máquinas compactadoras por vibración, de rendimientos óptimos, con las que se consigan ángulos de influencia menores de las presiones transmitidas y en las que la relación compactación/potencia empleada sea mayor.

  11. Assessing flash flood vulnerability using a multi-vulnerability approach

    Directory of Open Access Journals (Sweden)

    Karagiorgos Konstantinos

    2016-01-01

    Full Text Available In the framework of flood risk assessment, while the understanding of hazard and exposure has significantly improved over the last years, knowledge on vulnerability remains one of the challenges. Current approaches in vulnerability research are characterised by a division between social scientists and natural scientists. In order to close this gap, we present an approach that combines information on physical and social vulnerability in order to merge information on the susceptibility of elements at risk and society. With respect to physical vulnerability, the study is based on local-scale vulnerability models using nonlinear regression approaches. Modified Weibull distributions were fit to the data in order to represent the relationship between process magnitude and degree of loss. With respect to social vulnerability we conducted a door-to-door survey which resulted in particular insights on flood risk awareness and resilience strategies of exposed communities. In general, both physical and social vulnerability were low in comparison with other European studies, which may result from (a specific building regulations in the four Mediterranean test sites as well as general design principles leading to low structural susceptibility of elements at risk, and (b relatively low social vulnerability of citizens exposed. As a result it is shown that a combination of different perspectives of vulnerability will lead to a better understanding of exposure and capacities in flood risk management.

  12. Open Source Vulnerability Database Project

    Directory of Open Access Journals (Sweden)

    Jake Kouns

    2008-06-01

    Full Text Available This article introduces the Open Source Vulnerability Database (OSVDB project which manages a global collection of computer security vulnerabilities, available for free use by the information security community. This collection contains information on known security weaknesses in operating systems, software products, protocols, hardware devices, and other infrastructure elements of information technology. The OSVDB project is intended to be the centralized global open source vulnerability collection on the Internet.

  13. Motherhood, Marketization, and Consumer Vulnerability

    DEFF Research Database (Denmark)

    Davies, Andrea; Prothero, Andrea; Sørensen, Elin

    2010-01-01

    This article explores consumer vulnerability and the role of public policy by focusing on new mothers. Developing the consumer vulnerability model of Baker, Gentry, and Rittenburg, the authors consider how medical contexts, political and legal factors, economic resources, societal prescriptions...... a time of physical and psychological changes in mothers-to-be. This article illustrates that the extended market logic dominating contemporary mothering environments both contributes to and has the potential to exacerbate new mothers’ vulnerability, raising important challenges for public policy, both...

  14. Network Vulnerability and Risk Assessment

    National Research Council Canada - National Science Library

    Alward, Randy G; Carley, Kathleen M; Madsen, Fredrik; Taylor, Vincent K; Vandenberghe, Grant

    2006-01-01

    .... The break out group discussed vulnerability presentation needs common across various application domains, particularly in support of network discovery and network analysis tasks in those domains...

  15. Placas de identificación de combatientes de la Guerra Civil española (1936-1937, recuperadas en exhumaciones de escenarios bélicos en el País Vasco

    Directory of Open Access Journals (Sweden)

    HERRASTI, L., SAMPEDRO, A.J., DIÉGUEZ, J., ETXEZARRAGA, J., IRUSTA, A., JIMÉNEZ, J., REBOLLEDO, I., SARDÓN, A., SARDÓN, E. ...

    2014-01-01

    ayuda desde la perspectiva forense. Se presentan varios ejemplos en los que las placas de identificación, recuperadas en las exhumaciones realizadas en el País Vasco, han facilitado determinar la identidad de los soldados allí enterrados.

  16. “VALORACIÓN DE PLACA BACTERIANA Y GINGIVITIS, MEDIANTE EL ÍNDICE DE PLACA DE O ́LEARY E ÍNDICE GINGIVAL DE LOE-SILNESS, POSTERIOR AL USO DE CLORHEXIDINA AL 0.12%, EN PACIENTES CON APARATOLOGIA FIJA”

    OpenAIRE

    Bucio Hernández, María Sugey

    2012-01-01

    Antecedentes: La búsqueda de agentes para el control de la placa bacteriana ha sido amplia, más teniendo en cuenta la importancia que ha adquirido la enfermedad periodontal en los últimos años; esto ha llevado a diversas industrias farmaceuticas a investigar en este campo. En el presente estudio se utilizo el índice Gingival de Löe y Silness (1963), por ser sencillo y valorar todas las áreas del diente, el más utilizado actualmente para medir el estado de inflamación y de salud...

  17. Utilização de código aberto de dinâmica de fluidos computacional para estudo de placas de orifício

    OpenAIRE

    Thiago Teixeira Kunz

    2014-01-01

    Este trabalho apresenta simulações numéricas de escoamento de fluidos através de placas de orifício, elementos primários de medição de vazão, em comparação aos resultados esperados por normas internacionais. O coeficiente de descarga usado para a determinação da vazão de um escoamento em uma tubulação foi obtido numericamente através da aplicação do modelo de turbulência de baixo Reynolds proposto por Launder-Sharma, resolvido através de um código aberto de Dinâmica de Fluidos Computacional. ...

  18. Correção de falhas ósseas diafisárias: trasnporte ósseo fixado com placa

    OpenAIRE

    Picado,Celso Hermínio Ferraz; Garcia,Flávio Luís

    2007-01-01

    O objetivo deste estudo é descrever um novo sistema de transporte ósseo que dispensa o uso de fios transfixantes. O sistema, constituído por uma placa, um carro móvel e por um dispositivo tracionador, foi instalado na tíbia direita de 17 ovelhas para preencher um defeito ósseo de 1 cm. O transporte ósseo foi iniciado 7 dias após a cirurgia numa taxa de 0,8 mm/dia, dividido em 0,2 mm a cada 6 horas. Radiografias em ântero-posterior e perfil foram realizadas imediatamente após a cirurgia e sema...

  19. Determinación de la temperatura óptima de neutralización en vía en placa

    OpenAIRE

    Palomar Gutiérrez, Ivan

    2011-01-01

    El trabajo presenta inicialmente una descripción de los dos tipos de vía que se utilizan para el diseño de las infraestructuras ferroviarias (Tranvías, Vías Convencionales y en vías de Alta Velocidad); los dos tipos de vía se denominan vía en placa y vía en balasto. También se comparan ambos sistemas, pudiendo conocer las ventajas y desventajas de cada uno. Posteriormente, se detalla el punto teórico más importante de la tesina; el cual es la neutralización de tensiones en carriles contin...

  20. Caracterización biológica de variantes de placa de la cepa vacunal 17d contra la fiebre amarilla

    OpenAIRE

    Rojas, María; Camacho, Marcela; Grosso, María

    2009-01-01

    La vacuna colombiana 17D, contiene por lo menos cuatro fenotipos, denominados pequeño (0.3 – 1.2 mm), mediano (1.3 – 2.1 mm), grande (2.2 – 3.0 mm) y extragrande (>3.1 mm). La composición y distribución porcentual de esos fenotipos, varió entre lotes y entre ampolletas de un mismo lote. Cada variante fue clonada por dilución de la vacuna y su efecto virulento fue analizado en ratones; el fenotipo de placa pequeño estuvo ligeramente sub representado en los lotes analizados y mostró una viru...

  1. Estudio comparativo de flujo de fluido a través de una placa de orificio usando las ecuaciones de Stokes y de Navier-Stokes

    Directory of Open Access Journals (Sweden)

    Miryam Lucía Guerra-Mazo

    2016-05-01

    Full Text Available Presenta los resultados de la comparación entre las ecuaciones de Stokes y de Navier-Stokes para la simulación del flujo de agua líquida, a condiciones atmosféricas, a través de una placa orificio concéntrica. A partir de los datos experimentales que fueron tomados en el banco de fluidos, se evaluaron las simulaciones de ambas ecuaciones, usando el software libre Freefem++cs, que se basa en el método de los elementos finitos; las variables evaluadas son velocidad y presión en un intervalo de tiempo. Al analizar los resultados obtenidos con las simulaciones y comparar con los datos experimentales se encontró que las ecuaciones de Navier-Stokes representan mejor el sistema que la ecuación de Stokes.

  2. Coeficientes de transferencia de calor y pérdida de eficiencia en intercambiadores de calor de placas durante el enfriamiento del licor amoniacal

    Directory of Open Access Journals (Sweden)

    Enrique Torres-Tamayo

    2011-10-01

    Full Text Available En la planta de Recuperación de Amoniaco de la empresa niquelera Ernesto Che Guevara la pérdida de eficiencia del proceso de enfriamiento del licor amoniacal, mediante el uso de intercambiadores de calor de placas, se asocia a la incorrecta estimación de los coeficientes de transferencia de calor y la acumulación de incrustaciones en la superficie de intercambio; lo anterior incrementa el consumo de agua, la energía disponible en el sistema y los costos de mantenimiento. Se realizó una investigación en un intercambiador de calor de placas, con el objetivo de determinar los coeficientes de transferencia y la influencia de las incrustaciones en la pérdida de eficiencia de la instalación. Mediante un procedimiento iterativo se determinó la ecuación del número de Nusselt y su dependencia con el Reynolds y Prandtl, para ello se utilizó un diseño experimental multifactorial y mediciones de los parámetros de trabajo de la instalación en función del tiempo. Los resultados predicen el conocimiento de los coeficientes para el cálculo del número de Nusselt, con los valores de Reynolds y Prandtl, para ambos fluidos (licor amoniacal y agua. Los valores de los coeficientes del licor son inferiores, ello se debe a la presencia de componentes gaseosos. La comparación con resultados de otros autores muestra correspondencia con los de Thonon. Se recomienda la limpieza y mantenimiento de la instalación en un período de 27 días debido a la reducción de la eficiencia térmica hasta valores inferiores al 70 %.

  3. Efeito de ondas de choque na placa de crescimento de coelhos Effect of shock waves upon the growth plate in rabbits

    Directory of Open Access Journals (Sweden)

    Guilherme Giusti

    2005-01-01

    Full Text Available OBJETIVO: Avaliar os efeitos da aplicação de ondas de choque na placa de crescimento de coelhos, variando a energia e o número de ondas aplicadas. MATERIAL E MÉTODOS: Foram estudados 30 coelhos com idade de cinco semanas divididos em seis grupos. O aparelho gerador de ondas de choque foi o OSSATRON (HMT. Os animais foram submetidos a aplicações na placa de crescimento proximal da tíbia esquerda, variando a intensidade (14, 21,28kV e o número de ondas (1000 e 4000. A tíbia direita foi usada como controle. Os animais foram sacrificados após seis semanas e sua avaliação foi feita por meio da mensuração do comprimento das tíbias e pela análise microscópica da placa de crescimento. Os resultados de mensuração da área da placa e do comprimento das tíbias foram comparados com o grupo controle e entre os grupos, utilizando-se estudos estatísticos. RESULTADOS: Neste estudo não ocorreram alterações estatisticamente significantes nas medidas da área da placa ou do comprimento da tíbia após a aplicação de ondas de choque em nenhum dos grupos. Foi observada tendência de ocorrer uma diferença de crescimento das tíbias entre os grupos submetidos a 1.000 impulsos e os grupos submetidos a 4.000 impulsos, mas esta diferença não foi considerada significante. Foi observada também a formação de hematoma no local da aplicação nos grupos que receberam ondas com maior energia, evoluindo com regressão espontânea sem necessidade de cuidados especiais. CONCLUSÕES: A aplicação de ondas de choque na região proximal da tíbia de coelhos imaturos, nas formas descritas, não teve nenhum efeito na placa de crescimento, de acordo com os métodos de avaliação usados neste estudo.OBJECTIVE: To evaluate the effects of shock waves upon the growth plate in rabbits by varying the energy and number of applied waves. MATERIAL AND METHODS: Six groups of five rabbits aged 5 weeks (Total: 30 were studied. OSSATRON (HMT was used to generate

  4. Mini-placa como ancoragem ortodôntica: relato de caso Mini screw as orthodontic anchorage: case report

    Directory of Open Access Journals (Sweden)

    André Luiz Zétola

    2005-08-01

    Full Text Available Seria dispensável afirmar que o controle da ancoragem é fundamental para o sucesso do tratamento ortodôntico, sem ela seria impossível a obtenção de uma oclusão ideal através de uma mecânica ortodôntica. O advento da utilização de dispositivos rígidos, originários dos princípios da traumatologia de face e da implantodontia, para a ancoragem rígida na Ortodontia, principalmente nos casos da dificuldade ou impossibilidade da sua obtenção, revolucionou a forma de tratar casos que tinham um prognóstico insatisfatório. O objetivo desse artigo foi revisar a literatura em relação ao uso dos pinos de ancoragem ortodôntica, relatar um caso com a sua utilização e discutir alguns aspectos em relação à ancoragem rígida na Ortodontia. A ancoragem rígida foi utilizada em uma paciente do gênero feminino, com 39 anos de idade que possuía os elementos 26 e 27 com extrusão importante devido à ausência dos antagonistas. Foi instalado um aparelho fixo superior, utilizando uma barra transpalatina nos elementos dentários 15 e 25 para ancoragem com objetivo de intruir os molares superiores esquerdos e o dispositivo quadri-hélice para auxiliar no descruzamento do dente 18. Como a intrusão ortodôntica com apenas ancoragem dentária não havia tido um resultado muito satisfatório até então, foi instalada uma placa de titânio em forma de "L" na região apical dos elementos 26 e 27 com o objetivo de obter uma ancoragem ortodôntica rígida para a intrusão desses elementos. O tempo de força intrusiva através de elásticos verticais foi de cinco meses e a intrusão obtida foi de 6 mm. Após a remoção do aparelho ortodôntico, fez-se a clareação dentária superior e inferior, instalação de prótese definitiva sobre os implantes e reabilitação estética dentária. Através dos relatos anteriores e da presente experiência, além de outros casos ainda não concluídos, pode-se sugerir que a utilização da ancoragem r

  5. Safeguard Vulnerability Analysis Program (SVAP)

    International Nuclear Information System (INIS)

    Gilman, F.M.; Dittmore, M.H.; Orvis, W.J.; Wahler, P.S.

    1980-01-01

    This report gives an overview of the Safeguard Vulnerability Analysis Program (SVAP) developed at Lawrence Livermore National Laboratory. SVAP was designed as an automated method of analyzing the safeguard systems at nuclear facilities for vulnerabilities relating to the theft or diversion of nuclear materials. SVAP addresses one class of safeguard threat: theft or diversion of nuclear materials by nonviolent insiders, acting individually or in collusion. SVAP is a user-oriented tool which uses an interactive input medium for preprocessing the large amounts of safeguards data. Its output includes concise summary data as well as detailed vulnerability information

  6. Vulnerability Identification Errors in Security Risk Assessments

    OpenAIRE

    Taubenberger, Stefan

    2014-01-01

    At present, companies rely on information technology systems to achieve their business objectives, making them vulnerable to cybersecurity threats. Information security risk assessments help organisations to identify their risks and vulnerabilities. An accurate identification of risks and vulnerabilities is a challenge, because the input data is uncertain. So-called ’vulnerability identification errors‘ can occur if false positive vulnerabilities are identified, or if vulnerabilities remain u...

  7. Poverty and Vulnerability - An Interdisciplinary Approach

    OpenAIRE

    Makoka, Donald; Kaplan, Marcus

    2005-01-01

    This paper describes the concepts of poverty and vulnerability as well as the interconnections and differences between them using an interdisciplinary approach. While poverty is a static concept, vulnerability has a forward-looking dimension. We, therefore, review the methodologies that different disciplines use to measure poverty and vulnerability. In particular, the differences between vulnerability to natural disasters, vulnerability to climate change, as well as vulnerability to poverty a...

  8. CDC's Social Vulnerability Index (SVI)

    Data.gov (United States)

    U.S. Department of Health & Human Services — Social vulnerability refers to the resilience of communities when confronted by external stresses on human health, stresses such as natural or human-caused...

  9. Southern African Coastal vulnerability assessment

    CSIR Research Space (South Africa)

    Rautenbach, C

    2015-10-01

    Full Text Available or business. The CSIR coastal systems group uses specialist skills in coastal engineering, geographic engineering systems and numerical modelling to assess and map vulnerable coastal ecosystems to develop specific adaptation measures and coastal protection...

  10. CALTRANS CLIMATE CHANGE VULNERABILITY ASSESSMENTS

    Science.gov (United States)

    2018-01-01

    The following report was developed for the California Department of Transportation (Caltrans) to summarize a vulnerability assessment conducted for assets in Caltrans District 4. The assessment was developed to specifically identify the potential eff...

  11. Network Vulnerability and Risk Assessment

    National Research Council Canada - National Science Library

    Alward, Randy G; Carley, Kathleen M; Madsen, Fredrik; Taylor, Vincent K; Vandenberghe, Grant

    2006-01-01

    To help understand a network and its ability to continue operating when under attack, the break out group discussed issues that need to be considered when presenting network vulnerability information...

  12. Vulnerability Assessments in Ethical Hacking

    OpenAIRE

    Ashiqur Rahman ,; Md. SarwarAlam Rasel; Asaduzzaman Noman; Shakh Md. Alimuzjaman Alim

    2016-01-01

    Ethical hackers use the same methods and techniques to test and bypass a system's defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found, they document them and provide actionable advice on how to fix them so the organization can improve its overall security. The purpose of ethical hacking is to evaluate the security of a network or system's infrastructure. It entails finding and attempting to exploit any vulnerabilities to de...

  13. Software Design Level Security Vulnerabilities

    OpenAIRE

    S. Rehman; K. Mustafa

    2011-01-01

    Several thousand software design vulnerabilities have been reported through established databases. But they need to be structured and classified to be optimally usable in the pursuit of minimal and effective mitigation mechanism. In order we developed a criterion set for a communicative description of the same to serve the purpose as a taxonomic description of security vulnerabilities, arising in the design phase of Software development lifecycle. This description is a part of an effort to id...

  14. Plaque removal by manual and electric toothbrushing among children Remoção de placa bacteriana pela escovação elétrica e manual em crianças

    Directory of Open Access Journals (Sweden)

    Carolina Covolo da COSTA

    2001-12-01

    Full Text Available The purpose of this study was to compare the effectiveness of plaque control performed with electric and manual toothbrushes. Fifteen children with primary dentition and 14 children with mixed dentition were divided in two groups and randomly assigned to utilize a manual or an electric toothbrush. In the first session, professional plaque removal was performed, and the children spent 24 hours without brushing their teeth. In the second session, plaque was disclosed and assessed on all facial and lingual surfaces. After that, all children brushed their teeth with the predetermined toothbrush. The next procedure was the disclosure and measurement of residual plaque. After a period of 7 days, the children switched the kind of toothbrush, and the same procedures were repeated. According to the statistical analysis of the results, there were no significant differences concerning plaque removal when the toothbrushes were utilized by children with mixed dentition. On the other hand, the electric toothbrush promoted significantly greater plaque removal on the lingual surfaces of teeth from children with primary dentition.A proposta deste estudo foi comparar a eficácia da remoção de placa bacteriana pelas escovações elétrica e manual. Quinze crianças portadoras de dentadura decídua e 14 crianças portadoras de dentadura mista foram divididas em dois grupos e, aleatoriamente, designadas a utilizar a escova manual ou a escova elétrica. Na primeira sessão, foi realizada completa remoção de placa bacteriana e após, as crianças permaneceram 24 horas sem escovar os dentes. Na segunda sessão, foi feita revelação de placa bacteriana e computação de seu índice para todas as faces vestibulares e linguais dos dentes. Depois, todos os participantes escovaram os dentes com a escova predeterminada. A próxima etapa foi a revelação e medição da placa residual. Decorridos 7 dias, as crianças trocaram para a outra escova dental e os mesmos

  15. Placas de refratários aluminosos do sistema de válvula gaveta de panelas de aciaria: análise post mortem da degradação química

    Directory of Open Access Journals (Sweden)

    B. B. de Sousa

    Full Text Available Resumo Em uma aciaria, os recipientes que comportam o aço líquido, tais como o forno e a panela de aciaria, são revestidos com materiais refratários especiais para alta temperatura e elevada resistência ao desgaste. O custo desses materiais é alto e, portanto, almeja-se aumentar sua vida útil sem afetar seu desempenho. Este trabalho teve o objetivo de investigar as transformações que ocorrem no material refratário aluminoso de placas de válvula gaveta de panela de aciaria. Para tanto, a região das placas post mortem que entraram em contato com o material líquido a alta temperatura foi caracterizada por meio de análise visual e análises de composição e estrutura através das técnicas de fluorescência de raios X, difração de raios X e análise de microestrutura por microscopia eletrônica de varredura com espectroscopia por dispersão em energia. Como resultado, têm-se contribuições sobre o processo de corrosão química proporcionada pelo contato de escórias residuais com o canal das placas da válvula gaveta. Constatou-se a presença de materiais com alto teor de Ca e compostos por fases como mervinita e guelenita, características de escória, aderidos às placas. Ao mesmo tempo, foi possível estabelecer que a espessura de interação entre o material aderido e a superfície da placa variou entre 0,4 e 1,2 mm. Assim, quando associada à erosão pelo fluxo de aço, a corrosão química decorrente do contato com a escória tem o potencial de intensificar o desgaste da placa refratária.

  16. Detección de Clamydia pneumoniae en placas ateroscleróticas de pacientes sometidos a procedimientos de revascularización

    Directory of Open Access Journals (Sweden)

    Willmar D. Patiño

    2000-02-01

    Full Text Available

    Introducción: El reconocimiento de factores de riesgo cardiovascular ha impactado el manejo médico de la arteriosclerosis. Sin embargo, éstos sólo explican entre el 50% al 70% de la distribución mundial. Por lo que investigaciones en búsqueda de nuevos factores de riesgo han dado importancia a los agentes infecciosos en la etiología de la arteriosclerosis y en especial al papel que tiene la Clamydia pneumoniae.

    Objetivos: 1. Detectar la presencia de Clamydia pneumoniae en personas sometidas a procesos de revascularización percutánea o quirúrgico mediante la reacción en cadena de la polimerasa. 2. Determinar los factores de riesgo cardiovasculares asociados a la presencia de C. pneumoniae.

    Metodología: Se seleccionarán todos los pacientes que sean sometidos a revascularización percutánea o quirúrgica en las unidades de hemodinamia y cirugía de la Universidad de Antioquia o de la Clínica Medellín, durante doce meses, a partir de agosto de 1999. Las muestras se almacenarán a –800 C hasta su procesamiento.

    Resultados parciales: Hasta el momento se han procesado 27 muestras de las cuales 11 (40.7% son positivas para C. pneumoniae, del total de muestras 13 corresponden a placas de ateroma coronario y de ellas 6 (46% son positivas. Tres muestras de placas carot

  17. Avalliação da eficacia de colutorios antiplaca, com e sem a adição de cloreto de zinco, sobre o metabolismo da placa dentaria "in vitro"

    OpenAIRE

    Luis Antonio de Filippi Chaim

    1992-01-01

    Resumo: A eficácia de colutórios antiplaca, çem como de seus princípios ativos, foi determinada utilizando-se a inibição do metabolismo da placa dentária IN VITRO, como parâmetrode avaliaçãoo. A fermentação foi realizada incubando-se a suspensão de placa recente (lOmg/ml de tampão fosfato pH 6,8) em meio contendo glicose, com ou sem a adição de colutório, durante 2 horas, à 372C, com e sem a adição de Cloreto de Zinco o Os ácidos de fermentação foram tituladoscom NaOH O,OlNo A síntese de poli...

  18. Convergencia en el margen occidental de América del Sur durante el Cenozoico: subducción de las placas de Nazca, Farallón y Aluk

    OpenAIRE

    R. Somoza; M.E. Ghidella

    2005-01-01

    En este trabajo se presentan nuevos parámetros de la convergencia cretácica tardía - reciente en el margen occidental de América del Sur. La historia de la convergencia puede describirse en tres etapas: 26-0 Ma, con subducción dominante de la placa Nazca; 47-28 Ma, con subducción dominante de la placa Farallón; y 72-47 Ma, cuando habrían entrado en subducción Farallón (parte norte de la trinchera) y Aluk (parte sur). Las reconstrucciones para la etapa 72-47 Ma son compatibles con una migració...

  19. Una secuencia didáctica de modelización, indagación y creación del conocimiento científico en torno a la deriva continental y la tectónica de placas

    OpenAIRE

    Jordi Domènech Casal

    2015-01-01

    Se describe una actividad de indagación sobre la Tectónica de placas. En ella, el alumnado debe reconstruir la historia geológica de un planeta imaginario integrando distintos tipos de datos (distribución geográfica de fósiles, antigüedad de orógenos, regiones sísmicas) para construir un modelo de la ubicación de los límites de placa tectónica y los cambios que han sufrido los distintos continentes. A lo largo de la actividad se suceden distintas organizaciones de aula y andamios didácticos, ...

  20. Coeficientes de transferencia de calor experimental para el enfriamiento de licor en intercambiadores de placas//Experimental heat transfer coefficients for the liquor cooling in plate heat exchanger

    Directory of Open Access Journals (Sweden)

    Enrique Torres‐Tamayo

    2014-01-01

    Full Text Available La pérdida de eficiencia del proceso de enfriamiento del licor amoniacal, mediante el uso de intercambiadores de calor de placas, está asociada a imprecisiones en la estimación de los coeficientes de transferencia de calor y la acumulación de incrustaciones en la superficie de intercambio. El objetivo de la investigación es determinar los coeficientes de transferencia de calor y la influencia de lasincrustaciones en la pérdida de eficiencia de la instalación. Mediante un procedimiento iterativo se estableció la ecuación del número de Nusselt y su relación con el número de Reynolds y Prandtl. Se utilizó un diseño experimental multifactorial. Los resultados predicen el conocimiento de los coeficientespara el cálculo del número de Nusselt en ambos fluidos. Los valores de los coeficientes del licor amoniacal son inferiores, ello se debe a la presencia de componentes gaseosos. La ecuación obtenida muestra correspondencia con el modelo de Buonapane, el error comparativo es del 3,55 %.Palabras claves: intercambiador de calor de placas, coeficientes de transferencia de calor, eficiencia térmica.______________________________________________________________________________AbstractThe loss of efficiency of the ammonia liquor cooling process, by means of the plate heat exchanger, is associated to the incorrect estimate of the heat transfer coefficients and the accumulation of inlays in the exchange surface. The objective of the investigation is to determine the transfer coefficients and the influence of the inlays in the efficiency loss of the installation. By means of an iterative procedure was obtained the Nusselt number equation and the relationship with the Reynolds and Prandtl number, for it was used it a design experimental multifactorial. The results predict the knowledge of the coefficients forthe calculation of the Nusselt number for both fluids. The ammonia liquor coefficients values are inferior, due to the presence of gassy

  1. Utilización de la placa palatina de memoria y desarrollo orofacial en infante con Síndrome de Down Use of palatal plate and orofacial development in a child with Down's syndrome

    Directory of Open Access Journals (Sweden)

    Vera Lúcia Carneiro

    2012-12-01

    Full Text Available Los infantes con Síndrome de Down presentan en general, hipotonía de la muscular, cierre labial incompetente, lengua flácida y protruida. La placa palatina de memoria, propuesta por Castillo Morales, induce el cierre bilabial y posicionamiento correcto de la lengua. Este trabajo tuvo por objetivo evaluar el desarrollo orofacial, de una niña con Síndrome de Down, a través de terapia de estimulación precoz y utilización de placa palatina de memoria. Recibió tratamiento con placa palatina de memoria desde los 5 hasta los 15 meses y fue acompañada por un equipo multidisciplinario hasta los 6 años de edad. En el caso presentado, la terapia empleada permitió un desarrollo bucofacial adecuado, armónico y funcional. La utilización precoz de placa palatina de memoria demostró ser un complemento valioso en el programa multidisciplinario de atención a pacientes con Síndrome de Down.Babies with Down Syndrome (DS present, in general, muscle hypotonia, insufficient mouth closure and protrusion of the tongue. The palatal plate therapy, submitted by Castillo Morales, induces the lip closure and the correct position of the tongue. The objective of this research was to evaluate the oral development in a girl with DS through early stimulation and use of palatal plate. She was treated with the palatal plate method from 5 to 15 months of age. She was followed-up by a multidisciplinary team until he was six years of age. In this case report, the palatal therapy allowed adequate, harmonic and functional oral development. The early treatment with palatal plate has shown to be a valuable supplement to the multidisciplinary program of care to Down's syndrome patients.

  2. Escova dental e dedeira na remoção da placa bacteriana dental em cães The dental brush and thumb-stall in the removal of the dental plaque in dogs

    Directory of Open Access Journals (Sweden)

    Tânia Berbert Ferreira Lima

    2004-02-01

    Full Text Available A placa bacteriana é fator primário na formação de gengivite, cálculo dentário, halitose e doença periodontal. Objetivou-se avaliar a quantidade de placa bacteriana dental removida pela escova dental e dedeira. Foram utilizados 60 cães machos e fêmeas de diferentes raças, idade e peso, divididos em dois grupos. O índice Logan & Boyce foi utilizados para quantificar a placa bacteriana antes e após a escovação. Observou-se diferença estatística (p0,05 entre a utilização da escova dental e a dedeira.The dental plaque is the primary factor for gingivitis formation, dental calculus, oral malodor and periodontal disease. To evaluate the amount of dental plaque removed by the dental brush and thumb-stall, 60 male and female dogs of different races, age and weight were divided in two groups and studies. The index of Logan & Boyce was used to quantify the dental plaque before and after the toothbrush. Statistical difference was observed (p 0.05 between the use of the dental brush and the thumb-stall.

  3. The SAVI vulnerability assessment model

    International Nuclear Information System (INIS)

    Winblad, A.E.

    1987-01-01

    The assessment model ''Systematic Analysis of Vulnerability to Intrusion'' (SAVI) presented in this report is a PC-based path analysis model. It can provide estimates of protection system effectiveness (or vulnerability) against a spectrum of outsider threats including collusion with an insider adversary. It calculates one measure of system effectiveness, the probability of interruption P(I), for all potential adversary paths. SAVI can perform both theft and sabotage vulnerability analyses. For theft, the analysis is based on the assumption that adversaries should be interrupted either before they can accomplish removal of the target material from its normal location or removal from the site boundary. For sabotage, the analysis is based on the assumption that adversaries should be interrupted before completion of their sabotage task

  4. New approach to analyzing vulnerability

    International Nuclear Information System (INIS)

    O'Callaghan, P.B.; Carlson, R.L.; Riedeman, G.W.

    1986-01-01

    The Westinghouse Hanford Company (WHC) has recently completed construction of the Fuel Cycle Plant (FCP) at Richland, Washington. At start-up the facility will fabricate driver fuel for the Fast Flux Test Facility in the Secure Automated Fabrication line. After construction completion, but before facility certification, the Department of Energy (DOE) Richland Operation Office requested that a vulnerability analysis be performed which assumed multiple insiders as a threat to the security system. A unique method of analyzing facility vulnerabilities was developed at the Security Applications Center (SAC), which is managed by WHC for DOE. The method that was developed verifies a previous vulnerability assessment, as well as introducing a modeling technique which analyzes security alarms in relation to delaying factors and possible insider activities. With this information it is possible to assess the relative strength or weakness of various possible routes to and from a target within a facility

  5. Europe's vulnerability to energy crises

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2008-01-15

    The growing dependency of Europe as a whole on energy imports and anticipated further increases in energy prices reinforce the concerns about meeting the energy demand in the future. The objective of the Study is to identify the threats leading to potential energy crises and suggest solutions for facing, in an appropriate way, the related key challenges. In addition, the Study intends to develop a number of indicators effective enough to assess the level of different types of vulnerability, as well the overall vulnerability of a country or region, including threats to physical disruption, higher energy prices etc. The use of vulnerability indicators is highly recommended for all WEC-European countries, as well as to policy makers and market players.

  6. Vulnerability in north- central Vietnam

    DEFF Research Database (Denmark)

    Casse, Thorkil; Milhøj, Anders; Nguyen, Thao Phuong

    2015-01-01

    This article examines changes in livelihood strategies in response to flooding. It does so on the basis of a household survey which was undertaken in three provinces in north central Vietnam. All households in the survey were regularly affected by flooding, but only poor households experience a l...... the impact of flooding in the provinces. The article ends by looking at the vulnerability-resilience debate concluding that the poorer households could enter a vulnerability loop, unless new strategies to cope with natural hazards are suggested....

  7. Managing a network vulnerability assessment

    CERN Document Server

    Peltier, Thomas R; Blackley, John A

    2003-01-01

    Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.

  8. Determinação de dose absorvida em feixes de elétrons utilizado câmara de ionizacão de placas paralelas

    Directory of Open Access Journals (Sweden)

    Bulla Roseli T.

    2004-01-01

    Full Text Available OBJETIVO: O objetivo deste trabalho foi estabelecer um procedimento para a determinação dos fatores de calibração e de doses absorvidas em feixes de elétrons. MATERIAIS E MÉTODOS: Foram utilizados um irradiador de 60Co e um acelerador linear Varian, modelo Clinac 2100C, com feixes de fótons e de elétrons. Foram estudadas câmaras de ionização do tipo dedal e de placas paralelas. RESULTADOS: Os sistemas de medidas foram submetidos aos testes preliminares (estabilidade de resposta e corrente de fuga, com resultados muito bons. Quatro métodos de calibração de câmaras de ionização para utilização em feixes de elétrons foram testados. Para a determinação da dose absorvida em feixes de elétrons foram aplicadas três metodologias propostas pela Agência Internacional de Energia Atômica, com a obtenção de resultados concordantes em quase todos os casos. CONCLUSÃO: A maior parte das câmaras de ionização estudadas mostrou-se viável, com desempenho dentro dos limites internacionais estabelecidos.

  9. Arteria carótida y placa "carótida un órgano" Carotid artery and plaque. "carotid: an organ"

    Directory of Open Access Journals (Sweden)

    Juan G Barrera

    2006-10-01

    Full Text Available En estos momentos es posible hacer recomendaciones sobre las indicaciones de la endarterectomía carotídea, basadas en los ensayos clínicos publicados y en la revisión de grandes series quirúrgicas. Las indicaciones para la cirugía dependerán del grado de estenosis y de la morfología de la placa, así como del estado clínico del paciente y de la morbi-mortalidad del equipo quirúrgico. Este al igual que otros estudios con grandes series de casos, evidencia que la endarterectomía carotídea y/o el manejo endovascular, realizado por equipos expertos, es un procedimiento seguro en pacientes con indicación quirúrgica.It is now possible to recommend indications for aortic endarterectomy, based on published clinical essays and revision of large surgical series. Surgery indications will depend on the stenosis degree and the plaque morphology, as well as on the patient's clinical state and the morbid-mortality in this surgical team. As other studies with large case series, evidences that carotid endarterectomy and/or endovascular management, when realized by expert teams, is a safe procedure in patients with surgical indication.

  10. Cálculo de desplazamientos en placas de vidrio laminado sometidas a carga estática mediante el concepto de módulo de elasticidad efectivo

    Directory of Open Access Journals (Sweden)

    Ismael García García

    2015-03-01

    Full Text Available En los últimos años, el uso de vidrio laminado como elemento estructural se ha incrementado considerablemente en construcciones arquitectónicas, sobre todo en fachadas, cubiertas, escaleras o ventanas de seguridad. El cálculo de estos elementos tipo sándwich no es sencillo debido a la combinación de las propiedades mecánicas del vidrio (elástico-lineales con las del polímero interior (viscoelástico-lineales. Recientemente, algunos autores han propuesto el concepto de espesor efectivo para el cálculo simplificado de elementos de vidrio laminado bajo carga estática, utilizando un modelo monolítico con una rigidez equivalente igual a la del elemento laminado. Debido a la variación de propiedades del laminado con la temperatura, introducidas por el polímero viscoelástico, para cada cambio de temperatura se tiene un espesor efectivo diferente, lo que conlleva un mayor número de evaluaciones para cada una de las situaciones de trabajo del elemento laminado. En este trabajo se propone el concepto de módulo de elasticidad efectivo como una alternativa más eficiente para el cálculo con modelos de elementos finitos. La metodología propuesta se valida mediante ensayos experimentales realizados en placas de vidrio laminado sometidas a una carga uniformemente distribuida.

  11. TRATAMIENTO DE AGUAS RESIDUALES MEDIANTE REACTORES ANAERÓBICOS DE PLACAS VERTICALES PARALELAS EN ACRÍLICO TRATAMENTO DE ÁGUAS RESIDUÁRIAS POR REATORES ANAERÓBIOS DE PLACAS VERTICAIS PARALELAS EM ACRÍLICO WASTEWATER TREATMENT BY ANAEROBIC REACTORS OF VERTICAL PARALLEL PLATES IN ACRYLIC

    Directory of Open Access Journals (Sweden)

    Guillermo Chaux F

    2011-12-01

    Full Text Available Algunos filtros anaeróbicos con lecho de piedra construidos en el departamento del Cauca (Colombia, están presentando problemas de colmatación. Si se reemplaza la piedra por placas verticales paralelas, se elimina el problema de obstrucción. Este documento presenta el desarrollo y resultados de una investigación que evaluó a escala de laboratorio el potencial de los reactores anaeróbicos de placas verticales paralelas en acrílico para remover contaminantes (materia orgánica y sólidos suspendidos. El reactor anaeróbico de placas paralelas en acrílico se desempeñó como tratamiento secundario; se alimentó con agua residual efluente de un Tanque Imhoff con concentraciones medias de 156 ± 14 mg/L de DB05, 438 ± 32 mg/L de DQO y 98 ±22 mg/L de sólidos suspendidos totales. Las remociones de DQO y DB05 en el reactor sobrepasan el 50% y la remoción de sólidos suspendidos sobrepasó el 60% para tiempos de detención de 24 horas. La facilidad en la operación del reactor lo hace viable como tratamiento biológico anaeróbico de aguas residuales previamente decantadasAlguns filtros anaeróbios com recheio de pedras construída no departamento de Cauca (Colombia estão apresentando problemas de obstrução. Se a pedra é substituída por placas verticais paralelas, evita o problema da obstrução. Este artigo apresenta o desenvolvimento e os resultados e no estudo realizado em escala de laboratório que avaliaram o potencial de reatores anaeróbios de placas verticais paralelas em acrílico para remover os contaminantes (sólidos suspensos e matéria orgânica. 0 reator anaeróbio de placas paralelas de acrílico serviu como tratamento secundário; foi alimentado com água residuária do efluente de um tanque Imhoff com concentrações médias de 156 ± 14 mg/L DB05, 438 ± 32 mg/L de DQO e 98 ±22 mg/L de sólidos suspensos totais. A remoção de DQO e DB05 no reator são mais de 50% ea remoção de sólidos em suspensão superior a 60

  12. Municipal vulnerability to climate change

    CSIR Research Space (South Africa)

    Mambo, Julia

    2017-12-01

    Full Text Available South Africa, like the rest of Africa, is considered highly vulnerable to climate change and variability as well as to global change. Climate change is and will continue to be an issue of concern in the development of the country. South Africa faces...

  13. Autonomy, Vulnerability, Recognition, and Justice

    NARCIS (Netherlands)

    Anderson, J.H.; Honneth, A.

    2005-01-01

    One of liberalism’s core commitments is to safeguarding individuals’ autonomy. And a central aspect of liberal social justice is the commitment to protecting the vulnerable. Taken together, and combined with an understanding of autonomy as an acquired set of capacities to lead one’s own life,

  14. Decision Vulnerability Analysis (DVA) Program

    Science.gov (United States)

    2014-05-01

    31 14 Graphical Representation of the Summary Judgments of the Effectiveness, Vulnerability, and Understanding of the Subsystems’ as Judged by...posed several challenges. Numerous organizational typologies have been suggested over the years ( Robbins , 1994), and these typologies are often based...structure and functioning from a typology perspective ( Robbins , 1994), excerpts from a task analysis that described how the analysts currently performed

  15. 1C software vulnerabilities description

    Directory of Open Access Journals (Sweden)

    Ivanov Oleg

    2017-01-01

    Full Text Available This article is devoted to the vulnerability of the application solution based on the “1C: Enterprise 8” platform, which can be used by only built-in tools of the platform. Possible threats and attack algorithm are described.

  16. Underground Economics for Vulnerability Risk

    NARCIS (Netherlands)

    Allodi, L.

    The estimation of vulnerability risk is at the core of any IT security management strategy. Among technical and infrastructural metrics of risk, attacker economics represent an emerging new aspect that several risk assessment methodologies propose to consider (e.g., based on game theory). Yet the

  17. Trust, Endangerment and Divine Vulnerability

    DEFF Research Database (Denmark)

    Christoffersen, Mikkel Gabriel

    2017-01-01

    Faith is trusting God in the midst of endangerment. Yet, human experience of excessive suffering has challenged any spontaneous trust in God. In this article, I reconsider the idea of faith as trust in God, adding an emphasis on the divine vulnerability in the incarnation, and I develop a more...

  18. Vulnerability of damage-accumulating systems

    International Nuclear Information System (INIS)

    Lind, Niels C.

    1996-01-01

    Disastrous failures have shown that systems can be highly vulnerable. Quantified vulnerability can help designers and regulators to decide how much vulnerability is tolerable. Vulnerability of a system to a specified disturbance is defined as the ratio of the probability of failure of the disturbed system to the probability of failure of the undisturbed system. This vulnerability can be specialized to particular system types. It is adapted here to systems that are expected to deteriorate while in service due to processes such as fatigue, creep, corrosion, aging, neglect or insufficient maintenance. Application is illustrated by vulnerability to fatigue under constant and variable stress

  19. Assessing European wild fire vulnerability

    Science.gov (United States)

    Oehler, F.; Oliveira, S.; Barredo, J. I.; Camia, A.; Ayanz, J. San Miguel; Pettenella, D.; Mavsar, R.

    2012-04-01

    Wild fire vulnerability is a measure of potential socio-economic damage caused by a fire in a specific area. As such it is an important component of long-term fire risk management, helping policy-makers take informed decisions about adequate expenditures for fire prevention and suppression, and to target those regions at highest risk. This paper presents a first approach to assess wild fire vulnerability at the European level. A conservative approach was chosen that assesses the cost of restoring the previous land cover after a potential fire. Based on the CORINE Land Cover, a restoration cost was established for each land cover class at country level, and an average restoration time was assigned according to the recovery capacity of the land cover. The damage caused by fire was then assessed by discounting the cost of restoring the previous land cover over the restoration period. Three different vulnerability scenarios were considered assuming low, medium and high fire severity causing different levels of damage. Over Europe, the potential damage of wild land fires ranges from 10 - 13, 732 Euro*ha-1*yr-1 for low fire severity, 32 - 45,772 Euro*ha-1*yr-1 for medium fire severity and 54 - 77,812 Euro*ha-1*yr-1 for high fire severity. The least vulnerable are natural grasslands, moors and heathland and sclerophyllous vegetation, while the highest cost occurs for restoring broad-leaved forest. Preliminary validation comparing these estimates with official damage assessments for past fires shows reasonable results. The restoration cost approach allows for a straightforward, data extensive assessment of fire vulnerability at European level. A disadvantage is the inherent simplification of the evaluation procedure with the underestimation of non-markets goods and services. Thus, a second approach has been developed, valuing individual wild land goods and services and assessing their annual flow which is lost for a certain period of time in case of a fire event. However

  20. Vulnerabilities

    Science.gov (United States)

    2009-05-04

    May 1, 2006)”, http://www.mod.go.jp/e/d_policy/dp13.html (accessed 1 April 2009). 6 ibid 7 Hongo , Jun. “Japan, U.S. sign accord on forces,” The...Jacobs, G. Keith. "Guam Becoming US Pacific Linchpin." Asia-Pacific Defence Reporter 29 (2003): 38-39. Jun, Hongo . "Japan, U.S. sign accord on forces

  1. Vulnerable participants in health research

    DEFF Research Database (Denmark)

    Nordentoft, Helle Merete; Nanna, Kappel

    2011-01-01

    Ethical guidelines for conducting research are embedded in the Helsinki declaration of 1964. We contend that these abstract and intentionally universal guidelines need to be appropriated for social and health care research in which purpose and methods often deviate from medical research. The guid......Ethical guidelines for conducting research are embedded in the Helsinki declaration of 1964. We contend that these abstract and intentionally universal guidelines need to be appropriated for social and health care research in which purpose and methods often deviate from medical research...... and problems of vulnerable patients and - at the same time - respect their integrity without exposing them unnecessarily? The article illuminates the interactional construction of roles and relationships and how they affect the contextual construction of vulnerability. In this respect we demonstrate...

  2. VULNERABILITY OF PART TIME EMPLOYEES

    Directory of Open Access Journals (Sweden)

    Raluca Dimitriu

    2015-11-01

    Full Text Available The employee who concluded a part-time contract is the employee whose normal working hours, calculated weekly or as monthly average, is lower than the number of normal working hours of a comparable full-time employee. Part-time workers generally have the same legal status as full time workers. In fact, the vulnerability of this category of workers is not necessarily legal but rather economic: income - in proportion to the work performed, may be insufficient to cover the needs of living. However, such vulnerability may also have a certain cultural component: in some societies, professional identity is determined by the length of working hours. Also, part time work may hide many types of indirect discrimination.As a result, the part-time contract requires more than a protective legislation: it requires a strategy. This paper proposes a number of milestones of such a strategy, as well as some concrete de lege ferenda proposals.

  3. Groundwater vulnerability map for South Africa

    African Journals Online (AJOL)

    Chiedza Musekiwa

    Coastal vulnerability is the degree to which a coastal system is susceptible to, ... methods, indicator-based approaches, GIS-based decision support systems and ..... E 2005, 'Coastal Vulnerability and Risk Parameters', European Water, vol.

  4. Climate change & extreme weather vulnerability assessment framework.

    Science.gov (United States)

    2012-12-01

    The Federal Highway Administrations (FHWAs) Climate Change and Extreme Weather Vulnerability : Assessment Framework is a guide for transportation agencies interested in assessing their vulnerability : to climate change and extreme weather event...

  5. Aircraft vulnerability analysis by modelling and simulation

    CSIR Research Space (South Africa)

    Willers, CJ

    2014-09-01

    Full Text Available attributable to misuse of the weapon or to missile performance restrictions. This paper analyses some of the factors affecting aircraft vulnerability and demonstrates a structured analysis of the risk and aircraft vulnerability problem. The aircraft...

  6. Helping air quality managers identify vulnerable communities

    CSIR Research Space (South Africa)

    Wright, C

    2008-10-01

    Full Text Available population exposure and vulnerability risk prioritisation model is proposed for potential use by air quality managers in conjunction with their air quality management plans. The model includes factors such as vulnerability caused by poverty, respiratory...

  7. Spatial differences in drought vulnerability

    Science.gov (United States)

    Perčec Tadić, M.; Cindić, K.; Gajić-Čapka, M.; Zaninović, K.

    2012-04-01

    Drought causes the highest economic losses among all hydro-meteorological events in Croatia. It is the most frequent hazard, which produces the highest damages in the agricultural sector. The climate assessment in Croatia according to the aridity index (defined as the ratio of precipitation and potential evapotranspiration) shows that the susceptibility to desertification is present in the warm part of the year and it is mostly pronounced in the Adriatic region and the eastern Croatia lowland. The evidence of more frequent extreme drought events in the last decade is apparent. These facts were motivation to study the drought risk assessment in Croatia. One step in this issue is the construction of the vulnerability map. This map is a complex combination of the geomorphologic and climatological inputs (maps) that are presumed to be natural factors which modify the amount of moisture in the soil. In this study, the first version of the vulnerability map is followed by the updated one that additionally includes the soil types and the land use classes. The first input considered is the geomorphologic slope angle calculated from the digital elevation model (DEM). The SRTM DEM of 100 m resolution is used. The steeper slopes are more likely to lose water and to become dryer. The second climatological parameter, the solar irradiation map, gives for the territory of Croatia the maximum irradiation on the coast. The next meteorological parameter that influences the drought vulnerability is precipitation which is in this assessment included through the precipitation variability expressed by the coefficient of variation. Larger precipitation variability is related with the higher drought vulnerability. The preliminary results for Croatia, according to the recommended procedure in the framework of Drought Management Centre for Southeastern Europe (DMCSEE project), show the most sensitive areas to drought in the southern Adriatic coast and eastern continental lowland.

  8. Virtuous aging and existential vulnerability.

    Science.gov (United States)

    Laceulle, Hanne

    2017-12-01

    In its efforts to overcome problematic views that associate aging with inevitable decline, contemporary gerontology shows a tendency to focus predominantly on age-related vulnerabilities that science may try to remedy and control. However, gerontology should also offer languages to address vulnerabilities that cannot be remedied because they intrinsically belong to the human condition. After all, these are increasingly radically encountered in later life and should therefore be reflected upon in the study of aging. Humanistic gerontology seems to be the most promising field to look for languages capable of contemplating such existential vulnerabilities. The potential contribution of philosophy in this field remains underdeveloped so far, however. This article therefore aims to introduce insights from the philosophical tradition to (humanistic) gerontology. More specifically, it focuses on the tradition of virtue ethics, arguing that virtue is a particularly relevant notion to explore in dealing with existential vulnerability in later life. The notion of virtue is clarified by discussing a selection of philosophical perspectives on this topic, by Aristotle, MacIntyre and Swanton. Next a brief overview will be given of some of the ways the notion of virtue has found its way into gerontological discourse so far. The article ends with an analysis of the merits of virtue-ethical discourse for the study of aging and later life, and pleads for more inclusion of philosophical ideas such as virtue in gerontology, as these can enrich our conceptual frameworks and help us relate to deep existential questions regarding the experience of aging. Copyright © 2017 Elsevier Inc. All rights reserved.

  9. Estrutura florestal em projeto de assentamento, comunidade São Mateus, município de Placas, Pará, Brasil

    Directory of Open Access Journals (Sweden)

    Renato Bezerra da Silva Ribeiro

    2013-10-01

    Full Text Available Este estudo teve por objetivo avaliar o potencial e a estrutura florestal de uma Floresta Ombrófila Densa de terra firme, da Comunidade São Mateus, município de Placas, Pará. A avaliação foi realizada em dois tipos de ambiente, sendo, um, em Floresta Manejada (FM e, outro, em Floresta Não Manejada (FNM. Foram alocadas 20 unidades amostrais, sendo nove em FM e 11 em FNM. Em cada unidade amostral, os indivíduos foram inventariados em três classes de tamanho (CT: CT1 - 10 cm 50 cm (50 m x 200 m. As formas de utilização de todas as espécies arbóreas registradas foram verificadas por meio de entrevistas com assentados, no comércio, nas feiras livres e no mercado municipal de Santarém. Foram amostrados 472,6 árvores/ha na FM, distribuídas em 134 espécies e, na FNM, 508,0 árvores/ha, distribuídas em 146 espécies. As espécies de maior valor de importância nos dois tipos florestais foram: Licania kunthianamm Hook. f. (Chrysobalanaceae e Mezilaurus itauba Taubert ex Mez (Lauraceae. As espécies que mais se destacaram com diferentes possibilidades de uso foram: Protium cf. heptaphyllum (Aubl. Marchand (Burseraceae, Hymenaea courbaril L. (Fabaceae e Caryocar villosum (Aubl. Pers (Caryocaraceae. Após quatro anos de colheitas, não ocorreu diferenciação estrutural entre FM e FNM.

  10. Urban Vulnerability Assessment Using AHP

    Directory of Open Access Journals (Sweden)

    Alireza Rezaei

    2018-01-01

    Full Text Available Purpose. Physical expansion of urban areas and cities is of great importance nowadays. Irreparable damages will thus be caused by lack of proper planning against natural disasters. Crisis management will therefore guide through prevention, preparedness, disaster relief, and recovery by planning an appropriate program. Methodology. Principal processes of crisis management against earthquake in Iran were evaluated and discussed. Multicriteria earthquake crisis management was then proposed by means of Analytic Hierarchy Process (AHP. Vulnerability of 19 urban areas in Qazvin city was studied and analyzed as a case study. Three main criteria were considered as “physical dimensions and physical vulnerability texture,” “the amount of urban texture responsibility to aid after crisis,” and “possibility of city reversibility after the crisis.” These criteria were divided into 20 subcriteria which were prioritized by a questionnaire survey. Findings. “High population density,” “urban texture of old and repairable buildings,” “lack of relief and medical services,” “a few organic texture areas,” “sidewalks with less than 6 meters width in the region,” and “lack of open spaces in the area” were concluded to be the most important reasons causing high vulnerability of urban texture in Qazvin city.

  11. Enhancing protection for vulnerable waters

    Science.gov (United States)

    Creed, Irena F.; Lane, Charles R.; Serran, Jacqueline N.; Alexander, Laurie C.; Basu, Nandita B.; Calhoun, Aram J. K.; Christensen, Jay R.; Cohen, Matthew J.; Craft, Christopher; D'Amico, Ellen; Dekeyser, Edward; Fowler, Laurie; Golden, Heather E.; Jawitz, James W.; Kalla, Peter; Kirkman, L. Katherine; Lang, Megan; Leibowitz, Scott G.; Lewis, David B.; Marton, John; McLaughlin, Daniel L.; Raanan-Kiperwas, Hadas; Rains, Mark C.; Rains, Kai C.; Smith, Lora

    2017-11-01

    Governments worldwide do not adequately protect their limited freshwater systems and therefore place freshwater functions and attendant ecosystem services at risk. The best available scientific evidence compels enhanced protections for freshwater systems, especially for impermanent streams and wetlands outside of floodplains that are particularly vulnerable to alteration or destruction. New approaches to freshwater sustainability -- implemented through scientifically informed adaptive management -- are required to protect freshwater systems through periods of changing societal needs. One such approach introduced in the US in 2015 is the Clean Water Rule, which clarified the jurisdictional scope for federally protected waters. However, within hours of its implementation litigants convinced the US Court of Appeals for the Sixth Circuit to stay the rule, and the subsequently elected administration has now placed it under review for potential revision or rescission. Regardless of its outcome at the federal level, policy and management discussions initiated by the propagation of this rare rulemaking event have potential far-reaching implications at all levels of government across the US and worldwide. At this timely juncture, we provide a scientific rationale and three policy options for all levels of government to meaningfully enhance protection of these vulnerable waters. A fourth option, a 'do-nothing' approach, is wholly inconsistent with the well-established scientific evidence of the importance of these vulnerable waters.

  12. Legislative vulnerability of minority groups.

    Science.gov (United States)

    Paula, Carlos Eduardo Artiaga; Silva, Ana Paula da; Bittar, Cléria Maria Lôbo

    2017-12-01

    Minorities are in an inferior position in society and therefore vulnerable in many aspects. This study analyzes legislative vulnerability and aims to categorize as "weak" or "strong" the protection conferred by law to the following minorities: elderly, disabled, LGBT, Indians, women, children/ adolescents and black people. In order to do so, it was developed a documental research in 30 federal laws in which legal provisions were searched to protect minorities. Next, the articles were organized in the following categories: civil, criminal, administrative, labor and procedural, to be analyzed afterwards. Legal protection was considered "strong" when there were legal provisions that observed the five categories and "weak" when it did not meet this criterion. It was noted that six groups have "strong" legislative protection, which elides the assertion that minorities are outside the law. The exception is the LGBT group, whose legislative protection is weak. In addition, consecrating rights through laws strengthens the institutional channels for minorities to demand their rights. Finally, it was observed that the legislative protection granted tominorities is not homogeneous but rather discriminatory, and there is an interference by the majority group in the rights regulation of vulnerable groups.

  13. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  14. Cotton genetic resources and crop vulnerability

    Science.gov (United States)

    A report on the genetic vulnerability of cotton was provided to the National Genetic Resources Advisory Council. The report discussed crop vulnerabilities associated with emerging diseases, emerging pests, and a narrowing genetic base. To address these crop vulnerabilities, the report discussed the ...

  15. Animal models to study plaque vulnerability

    NARCIS (Netherlands)

    Schapira, K.; Heeneman, S.; Daemen, M. J. A. P.

    2007-01-01

    The need to identify and characterize vulnerable atherosclerotic lesions in humans has lead to the development of various animal models of plaque vulnerability. In this review, current concepts of the vulnerable plaque as it leads to an acute coronary event are described, such as plaque rupture,

  16. Measuring vulnerability to disaster displacement

    Science.gov (United States)

    Brink, Susan A.; Khazai, Bijan; Power, Christopher; Wenzel, Friedemann

    2015-04-01

    Large scale disasters can cause devastating impacts in terms of population displacement. Between 2008 and 2013, on average 27 million people were displaced annually by disasters (Yonetani 2014). After large events such as hurricane Katrina or the Port-au-Prince earthquake, images of inadequate public shelter and concerns about large scale and often inequitable migration have been broadcast around the world. Population displacement can often be one of the most devastating and visible impacts of a natural disaster. Despite the importance of population displacement in disaster events, measures to understand the socio-economic vulnerability of a community often use broad metrics to estimate the total socio-economic risk of an event rather than focusing on the specific impacts that a community faces in a disaster. Population displacement is complex and multi-causal with the physical impact of a disaster interacting with vulnerability arising from the response, environmental issues (e.g., weather), cultural concerns (e.g., expectations of adequate shelter), and many individual factors (e.g., mobility, risk perception). In addition to the complexity of the causes, population displacement is difficult to measure because of the wide variety of different terms and definitions and its multi-dimensional nature. When we speak of severe population displacement, we may refer to a large number of displaced people, an extended length of displacement or associated difficulties such as poor shelter quality, risk of violence and crime in shelter communities, discrimination in aid, a lack of access to employment or other difficulties that can be associated with large scale population displacement. We have completed a thorough review of the literature on disaster population displacement. Research has been conducted on historic events to understand the types of negative impacts associated with population displacement and also the vulnerability of different groups to these impacts. We

  17. In vitro bacterial plaque suppression and recolonization by S. mutans and S. sobrinus Supressão e recolonização de placa bacteriana por S. mutans e S. sobrinus in vitro

    Directory of Open Access Journals (Sweden)

    Cássio Vicente Pereira

    2006-03-01

    Full Text Available The in vitro study of the interactions between S. mutans and S. sobrinus is important to determine the role of these microorganisms in the formation of biofilms on dental structures and their potential to induce carious lesions. The objective of this research was to study the suppression of bacterial plaque formation and its recolonization by rifampycin-resistant S.mutans and streptomycin-resistant S. sobrinus. To study the competitive relationship between these species, previously standardized strains were incubated in media containing different fermentable carbohydrates. At determined time intervals, samples were collected from mixed cultures of S. mutans and S. sobrinus, diluted and plated on BHI-agar containing rifampycin or streptomycin to determine the number of viable cells of each species by counting colony-forming units. In order to study the bacterial colonization process and in vitro recolonization of bacterial plaque, three experiments were performed: I - co-cultivation of S. mutans and S. sobrinus; II - inoculation of bacterial plaque pre formed by S. sobrinus with S. mutans; and III - bacterial plaque pre formed by S. mutans dispersed and plated on BHI- agar containing streptomycin or rifampicin to determine the number of viable cells for each species. The results indicated a predominance of S. mutans in relation to S. sobrinus, demonstrating the capacity of S. mutans to inhibit plaque formation by S. sobrinus and recolonize the surfaces.O estudo in vitro das interações entre S. mutans e S. sobrinus pode ser importante na determinação do papel desses microrganismos na formação de biofilmes nas estruturas dentais e seu potencial em induzir lesões cariosas. O objetivo da presente pesquisa foi estudar a supressão da formação da placa dental e sua recolonização por S. mutans rifampicina-resistentes e S. sobrinus estreptomicina-resistentes in vitro. Para avaliar as relações de competitividade entre essas espécies, cepas

  18. Impacto do posicionamento da placa na osteotomia em cunha de fechamento lateral em cúbito varo Impact of plate positioning on the lateral closing wedge osteotomy for cubitus varus

    Directory of Open Access Journals (Sweden)

    Min Yu

    2011-01-01

    Full Text Available OBJETIVO: O cúbito varo é uma doença muito comum em crianças e adultos, ocasionada por fratura supracondilar. Existem vários procedimentos cirúrgicos e fixações internas para correção do cúbito varo, com diferentes desfechos, embora a fixação interna com placa e parafusos seja o mais comum. Contudo, o impacto do posicionamento da placa sobre a cirurgia raramente foi estudado até agora. MÉTODO: Em nosso estudo, 12 pacientes com cúbito varo foram divididos em dois grupos, operados pelo método de osteotomias em cunha com fechamento lateral e fixações internas com placa e parafusos. Em um grupo, as placas foram colocadas no lado póstero-lateral; no outro, as placas foram colocadas no lado lateral do úmero. RESULTADO: O período de acompanhamento foi 4,5 meses (faixa de 2 a 7 meses. Houve cinco resultados excelentes (83,3% e um bom (16,7% em cada grupo. Em todos os casos, a aparência é muito semelhante ao lado oposto; não há diferenças de amplitude de movimento (AM no cotovelo depois da cirurgia. Um paciente no grupo B teve paralisia nervosa transitória; não houve infecções nem osteomielite. CONCLUSÃO: A posição da placa de fixação interna não tem impacto sobre a osteotomia em cunha de fechamento lateral. Nivel de Evidência II, Prospectivo Comparativo.OBJECTIVE: To study the effects of low intensity ultrasound irradiation applied on the spinal cord, in the regeneration of the rat's sciatic nerve after a controlled crush injury, evaluating the functional results of the sciatic functional index as measured on video recorded images of the foot sole. METHODS: Eighteen rats were submitted to a controlled crush injury of the right sciatic nerve, and divided into two groups according to the treatment: Group 1 (n=9, simulated irradiation; Group 2 (n=9, effective irradiation. Low-intensity ultrasound irradiation was started on the 7th postoperative day and applied daily for 6 weeks. Images of the animals´ foot soles were

  19. Memory Vulnerability Diagnosis for Binary Program

    Directory of Open Access Journals (Sweden)

    Tang Feng-Yi

    2016-01-01

    Full Text Available Vulnerability diagnosis is important for program security analysis. It is a further step to understand the vulnerability after it is detected, as well as a preparatory step for vulnerability repair or exploitation. This paper mainly analyses the inner theories of major memory vulnerabilities and the threats of them. And then suggests some methods to diagnose several types of memory vulnerabilities for the binary programs, which is a difficult task due to the lack of source code. The diagnosis methods target at buffer overflow, use after free (UAF and format string vulnerabilities. We carried out some tests on the Linux platform to validate the effectiveness of the diagnosis methods. It is proved that the methods can judge the type of the vulnerability given a binary program.

  20. Efecto de la motivación sobre la higiene oral: valoración mediante el índice de placa de Quigley-Hein modificado por Turesky

    OpenAIRE

    Poyato Ferrera, Manuel María; Segura-Egea, Juan J; Bullon, Pedro

    2001-01-01

    Objetivo. Estudiar el efecto de una intensa motivación sobre la higiene oral de los pacientes. Pacientes. Cuarenta y seis alumnos del primer curso del ciclo superior “Higiene Bucodental” del IES Santa Aurelia de Sevilla, 10 hombres (21,73%) y 36 mujeres (78,26%), con edades comprendidas entre los 18 y 30 años.Material y métodos. Se ha utilizado como índice de higiene oral el índice de placa de Quigley-Hein modificado por Turesky (IPQHT). La motivación se mantuvo de forma muy intensa (al menos...

  1. Estandarización del método de centrifugación en placa para el aislamiento del virus dengue Rapid centrifugation assay standarization for dengue virus isolation

    Directory of Open Access Journals (Sweden)

    Miryam Palomino

    2010-03-01

    Full Text Available Se estandarizó el método de centrifugación en placa, para el aislamiento del virus dengue a partir de muestras de suero humano. Se utilizó la línea celular C6/36-HT determinándose los valores óptimos de velocidad de centrifugación, volumen de inóculo, dilución de suero y tiempo de incubación. Posteriormente, 22 muestras de suero con aislamiento viral positivo y cepas referenciales de los cuatro serotipos del virus dengue, fueron procesadas simultáneamente por el método de centrifugación en placa y el método convencional de cultivo en tubo, los aislamientos fueron tipificados mediante inmunofluorescencia indirecta empleando anticuerpos monoclonales. Se optimizó el método de centrifugación en placa inoculando 200 μL de diluciσn de suero 1/20, centrifugaciσn a 1600 rpm/30 min, presentando sensibilidad de 95,5% a cinco dνas postinoculación. Se concluye que el método de centrifugación en placa mejora el porcentaje de aislamiento, con significativa reducción en tiempo de aislamiento del virus dengue.The plate centrifugation assay was standardized for dengue virus isolation from serum samples. C6/36-HT cells were used determining the optimal values for centrifugation spin speed, inoculum, sera dilution, and incubation time. Then, 22 positive serum samples with viral isolation and viral strains of the four reference dengue virus serotypes were tested simultaneously by the standardized plate centrifugation method and the conventional tube culture. The isolations were typified by indirect immunofluorescent test using monoclonal antibodies. The plate centrifugation method was optimized to 200 μL of inoculum, dilution of sera 1/20, centrifugation speed at 1600 rpm/30 min, and sensitivity of 95,5% after 5 days post-inoculation. We concluded that the plate centrifugation method increased dengue virus isolation, with a significant reduction of the time of isolation for dengue virus.

  2. Efeito do ultra-som terapêutico contínuo em placas epifisárias de coelhos Efectos de la ultrasonografia terapéutica continua en placas epifisarias de conejos Effect of continuous therapeutic ultrasound in rabbit growth plates

    Directory of Open Access Journals (Sweden)

    Andersom Ricardo Fréz

    2006-06-01

    Full Text Available Devido aos efeitos terapêuticos, o ultra-som tem se tornado ferramenta indispensável no tratamento fisioterapêutico de alterações causadas por lesões e em diversas doenças, porém seu uso em pacientes pediátricos é controverso por possíveis distúrbios e danos à placa epifisária. O objetivo deste estudo é verificar se o ultra-som contínuo apresenta efeitos de alteração na placa de crescimento da tíbia de coelhas. Oito coelhas da raça Nova Zelândia com dois meses de idade foram submetidas a um tratamento usando ultra-som terapêutico de forma contínua com dose de 1W/cm² na região lateral da articulação do joelho direito por 5min, durante 10 dias com dois dias de intervalo após a 5ª aplicação. A articulação do joelho esquerdo foi utilizada como controle. A análise histológica mostrou uma alteração na espessura da cartilagem epifisária, sendo que no lado tratado o tamanho foi 24,40% maior do que no controle (p Debido a los efectos terapéuticos, la ultrasonografía se ha convertido en una herramienta indispensable al tratamiento fisioterapéutico de las alteraciones causadas por lesiones y en diversas enfermedades, a pesar de esto su uso en pacientes pediátricos es controversial por los posibles disturbios y daños a la placa epifisaria. El objetivo de este estudio es verificar si la ultrasonografía continua presenta efectos de alteración en la placa de crecimiento de al tibia de conejas. Ocho conejas de la raza Nueva Zelanda con 2 meses de edad fueron sometidas a un tratamiento usando ultrasonografía terapéutica de forma continua con dosis de 1W/cm² en la región lateral de la articulación de la rodilla derecha por 5 min, durante 10 días con 2 días de intervalo después de la 5ª aplicación. La articulación de la rodilla izquierda fue utilizada como control. El análisis histológico reportó una alteración en la espesura del cartílago epifisario, en el lado tratado el tamaño fue de 24,40% mayor del

  3. Dynamics of immune system vulnerabilities

    Science.gov (United States)

    Stromberg, Sean P.

    The adaptive immune system can be viewed as a complex system, which adapts, over time, to reflect the history of infections experienced by the organism. Understanding its operation requires viewing it in terms of tradeoffs under constraints and evolutionary history. It typically displays "robust, yet fragile" behavior, meaning common tasks are robust to small changes but novel threats or changes in environment can have dire consequences. In this dissertation we use mechanistic models to study several biological processes: the immune response, the homeostasis of cells in the lymphatic system, and the process that normally prevents autoreactive cells from entering the lymphatic system. Using these models we then study the effects of these processes interacting. We show that the mechanisms that regulate the numbers of cells in the immune system, in conjunction with the immune response, can act to suppress autoreactive cells from proliferating, thus showing quantitatively how pathogenic infections can suppress autoimmune disease. We also show that over long periods of time this same effect can thin the repertoire of cells that defend against novel threats, leading to an age correlated vulnerability. This vulnerability is shown to be a consequence of system dynamics, not due to degradation of immune system components with age. Finally, modeling a specific tolerance mechanism that normally prevents autoimmune disease, in conjunction with models of the immune response and homeostasis we look at the consequences of the immune system mistakenly incorporating pathogenic molecules into its tolerizing mechanisms. The signature of this dynamic matches closely that of the dengue virus system.

  4. Vulnerable to HIV / AIDS. Migration.

    Science.gov (United States)

    Fernandez, I

    1998-01-01

    This special report discusses the impact of globalization, patterns of migration in Southeast Asia, gender issues in migration, the links between migration and HIV/AIDS, and spatial mobility and social networks. Migrants are particularly marginalized in countries that blame migrants for transmission of infectious and communicable diseases and other social ills. Effective control of HIV/AIDS among migrant and native populations requires a multisectoral approach. Programs should critically review the privatization of health care services and challenge economic models that polarize the rich and the poor, men and women, North and South, and migrant and native. Programs should recognize the equality between locals and migrants in receipt of health services. Countermeasures should have input from migrants in order to reduce the conditions that increase vulnerability to HIV/AIDS. Gender-oriented research is needed to understand women's role in migration. Rapid assessment has obscured the human dimension of migrants' vulnerability to HIV. Condom promotion is not enough. Migration is a major consequence of globalization, which holds the promise, real or imagined, of prosperity for all. Mass migration can be fueled by explosive regional developments. In Southeast Asia, migration has been part of the process of economic development. The potential to emigrate increases with greater per capita income. "Tiger" economies have been labor importers. Safe sex is not practiced in many Asian countries because risk is not taken seriously. Migrants tend to be used as economic tools, without consideration of social adjustment and sex behavior among singles.

  5. Vulnerability of network of networks

    Science.gov (United States)

    Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.

    2014-10-01

    Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.

  6. La Bixa orellana L como posible sustancia reveladora de placa dentobacteriana: a potential substance for detection of dentobacterial plaque Bixa orellana L:

    Directory of Open Access Journals (Sweden)

    Gemma Lauzardo García del Prado

    2009-06-01

    Full Text Available En la actualidad las plantas naturales se han convertido en una importante fuente de elaboración de medicamentos, lo que nos ha motivado a realizar una revisión bibliográfica sobre la Bixa orellana L. Este es un producto natural fácilmente asequible en nuestro medio por encontrarse ampliamente distribuido en nuestro territorio, y apoyándonos en sus ya conocidas propiedades de tinción en alimentos, surge la idea de su posible uso estomatológico como sustancia reveladora de placa dentobacteriana. Objetivo: ampliar conocimientos sobre las propiedades y uso de Bixa orellana L en los seres humanos. Método: se revisaron artículos originales y de revisión localizados mediante Pub-Med, Google, revistas internacionales y nacionales reconocidas. Conclusiones: se ha demostrado que la Bixa no provoca alteraciones patológicas en el ser humano y tiene importantes propiedades: antifúngicas, antipiréticas, antibacterianas, antiinflamatorias y antigonorreicas, entre otras, y se utiliza en la tinción de alimentos como: mantequilla, quesos y aceites. Con esta propuesta pretendemos incrementar las actividades de promoción y prevención de la caries dental y las periodontopatías, elevar el nivel de educación para la salud dental en nuestra población, disminuir los tratamientos curativos, prolongando así la salud de los dientes remanentes.At the present time natural plants become a significant drug manufacture source, thus, we made a bibliographic review on Bixa orellana L. This is a natural product easily accessible since it is fully distributed in our country, and due to its known dyeing properties in foods, arise the idea of its potential Stomatology use as a revealing substance of dentobacterial plaque. Objective: To expand our knowledges on the properties and use of Bixa orellana L in human being. Methods: We reviewed the original papers retrieved by Pub-Med, Google, and recognized international and national journals. Conclusions: It has been

  7. VALIDACIÓN DE LA PLACA BRUXCHECKER COMO MEDIO DIAGNÓSTICO DE BRUXISMO, COMPARADA CON MODELOS DE ESTUDIO EN LA CLÍNICA DE LA UNIVERSIDAD COOPERATIVA DE COLOMBIA, SEDE BOGOTÁ, DURANTE EL PERIODO COMPRENDIDO ENTRE FEBRERO Y MAYO DEL 2011

    Directory of Open Access Journals (Sweden)

    Claudia Liliana Cabrera Bello

    2012-12-01

    Full Text Available Introducción: El bruxismo es un trastorno del movimiento del sistema masticatorio, caracterizado por apriete,rechinamiento y golpeteo dentario. La ausencia de un elemento diagnóstico para evaluar el patrón de contactos oclusales y diagnosticar el grado de bruxismo llevó a realizar un estudio investigativo para validar la placa bruxchecker. Objetivos: En este estudio se validó la placa bruxchecker como medio diagnóstico para valorar la presencia y ubicación de las interferencias oclusales durante los episodios de bruxismo. Materiales y métodos: Se realizó un estudio de evaluación de pruebas diagnósticas, en una población de 35 pacientes mayores de 18 años que asistieron por primera vez a la clínica de ortodoncia correctiva de la Universidad Cooperativa de Colombia sede Bogotá entre febrero y mayo de  2011, se compararon las marcas en las placas Bruxchecker con los desgastes de las caras oclusales encontrados en los modelos de estudio para determinar la concordancia entre los diagnósticos. Resultados: La placa bruxchecker clasificó correctamente de cada 100 enfermos a 96 y de cada 100 sanos a 57. El valor predictivo positivo es del 96% y del 57% el valor predictivo negativo. La prevalencia de bruxismo medida con la placa  fue de 80% en la población. Conclusiones: Se concluye que la placa es una adecuada herramienta para diagnosticar bruxismo.

  8. VALIDACIÓN DE LA PLACA BRUXCHECKER COMO MEDIO DIAGNÓSTICO DE BRUXISMO, COMPARADA CON MODELOS DE ESTUDIO EN LA CLÍNICA DE LA UNIVERSIDAD COOPERATIVA DE COLOMBIA, SEDE BOGOTÁ, DURANTE EL PERIODO COMPRENDIDO ENTRE FEBRERO Y MAYO DEL 2011

    Directory of Open Access Journals (Sweden)

    Claudia Liliana Cabrera Bello

    2012-07-01

    Full Text Available Introducción: El bruxismo es un trastorno del movimiento del sistema masticatorio, caracterizado por apriete,rechinamiento y golpeteo dentario. La ausencia de un elemento diagnóstico para evaluar el patrón de contactos oclusales y diagnosticar el grado de bruxismo llevó a realizar un estudio investigativo para validar la placa bruxchecker. Objetivos: En este estudio se validó la placa bruxchecker como medio diagnóstico para valorar la presencia y ubicación de las interferencias oclusales durante los episodios de bruxismo. Materiales y métodos: Se realizó un estudio de evaluación de pruebas diagnósticas, en una población de 35 pacientes mayores de 18 años que asistieron por primera vez a la clínica de ortodoncia correctiva de la Universidad Cooperativa de Colombia sede Bogotá entre febrero y mayo de  2011, se compararon las marcas en las placas Bruxchecker con los desgastes de las caras oclusales encontrados en los modelos de estudio para determinar la concordancia entre los diagnósticos. Resultados: La placa bruxchecker clasificó correctamente de cada 100 enfermos a 96 y de cada 100 sanos a 57. El valor predictivo positivo es del 96% y del 57% el valor predictivo negativo. La prevalencia de bruxismo medida con la placa  fue de 80% en la población. Conclusiones: Se concluye que la placa es una adecuada herramienta para diagnosticar bruxismo.

  9. An holistic view on aquifer vulnerability based on a distinction of different types of vulnerability

    Science.gov (United States)

    De Luca, Domenico Antonio; Lasagna, Manuela; Franchino, Elisa

    2016-04-01

    AN HOLISTIC VIEW ON AQUIFER VULNERABILITY BASED ON A DISTINCTION OF DIFFERENT TYPES OF VULNERABILITY D.A. De Luca1 , M. Lasagna1, E. Franchino1 1Department of Earth Sciences, University of Turin The concept of vulnerability is certainly useful in the field of groundwater protection. Nevertheless, within the scientific community, the definition of groundwater vulnerability is still debatable and not clear and conclusive. This is probably due to the fact that researchers often have very different experiences and education. A positive effect of it is a constant exchange of ideas, but there are also negative consequences and difficulties in deepening the issue. The different approaches are very important but they are usable only if the concept of vulnerability is standardized: thus, for the sake of clarity, a number of definitions should be laid down, based on the different types of vulnerability. These definitions can then provide the necessary holistic view for the aquifer vulnerability assessment. Nowadays vulnerability methods focus on the degree of vulnerability and the parameters needed for its evaluation, often neglecting to clarify what is the type of vulnerability the proposed methods are referred. The type of vulnerability, indeed, is both logically and hierarchically superior to the degree of vulnerability. More specifically the type of vulnerability represents the evaluation of the hydrogeological conditions considered in the vulnerability assessment and able to influence the way in which the contamination can take place. Currently the only distinction, based on of the type of vulnerability, is referred to intrinsic and specific vulnerability. Intrinsic vulnerability assesses the susceptibility of the receptor based on the natural properties of the land and subsurface; specific vulnerability also includes properties of the analyzed contaminant. This distinction is useful but not exhaustive. In addition to this, e.g., a distinction of vertical vulnerability

  10. Assessing the Security Vulnerabilities of Correctional Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Morrison, G.S.; Spencer, D.S.

    1998-10-27

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  11. Drug abuse: vulnerability and transition to addiction.

    Science.gov (United States)

    Le Moal, M

    2009-05-01

    Intrinsic vulnerability is central to the transition of recreational drug use to misuse. Several factors contribute to vulnerability, inherent or acquired, and they account for the huge individual differences observed concerning the propensity to enter in the addiction process. Some of the multifactional causes for a vulnerable phenotype will be examined: genetic factors, age and gender influences, various comorbidities and epidemiological observations. Stress-induced vulnerability will be particularly reviewed because it provides a good model for a pathophysiological research and for relating environmental events to biological consequences of drug vulnerability, namely through the striato-cortical dopamine system. Experimental studies are generally blind concerning these historical factors that contribute vulnerability and a critical evaluation of current animal models is needed. The transition of the last stage of the process, addiction, is conceptualized as a progression from homeostasis to allostasis and then, to pathology.

  12. Vulnerability and resilience: a critical nexus.

    Science.gov (United States)

    Lotz, Mianna

    2016-02-01

    Not all forms of human fragility or vulnerability are unavoidable. Sometimes we knowingly and intentionally impose conditions of vulnerability on others; and sometimes we knowingly and intentionally enter into and assume conditions of vulnerability for ourselves (for example, when we decide to trust or forgive, enter into intimate relationships with others, become a parent, become a subject of medical or psychotherapeutic treatment, and the like). In this article, I propose a presently overlooked basis on which one might evaluate whether the imposition or assumption of vulnerability is acceptable, and on which one might ground a significant class of vulnerability-related obligations. Distinct from existing accounts of the importance of promoting autonomy in conditions of vulnerability, this article offers a preliminary exploration of the nature, role, and importance of resilience promotion, its relationship to autonomy promotion, and its prospects for improving human wellbeing in autonomy inhibiting conditions.

  13. Efecto de colutorio-gel de clorhexidina sobre el crecimiento de placa en 24 horas = Effect of chlorhexidine mouthrinses-gel on de novo plaque formation in 24 hours

    Directory of Open Access Journals (Sweden)

    Rivera, Tânia

    2006-01-01

    Full Text Available En un estudio cruzado, doble ciego y randomizado, 25 alumnos de Odontologia de buena salud oral, participaron de cuatro estudios donde ellos se abtuvieron de toda limpieza mecanica oral por 24 horas, los estudios estuvieron separados entre si por 4 semanas. Durante los estudios los alumnos en un randomizado orden, se enjuagaron por una vez con uno de los siguientes colutorios: CHX 0.12% + alcohol (Oralgene®, CHX 0.12% + alcohol (Perio.Aid®, CHX 0.1% + alcohol (Dentilim® y CHX 0.1% + HMC 2.5% (Colutoriogel®, nueva formula. Despues de un dia se midio formación de placa, se completo y registro el cuestionario de parametros clinicos. Las formulaciones de CHX 0.12% + alcohol y CHX 0.1% + HMC 2.5% se mostraron eficientes en retardar el crecimiento de placa dental de novo, esto obtenido de las observaciones clinicas, y siempre superior (p < 0.05 a la formulación del colutorio de CHX 0.1%+ alcohol (Dentilim®. Los resultados de este estudio demuestran el potencial clinico de este nuevo colutorio-gel sin alcohol de CHX 0.1% + HMC 2.5% (Colutoriogel® como un efectivo agente antiplaca y con reducidas efectos secundarios registrados

  14. Una secuencia didáctica de modelización, indagación y creación del conocimiento científico en torno a la deriva continental y la tectónica de placas

    Directory of Open Access Journals (Sweden)

    Jordi Domènech Casal

    2015-01-01

    Full Text Available Se describe una actividad de indagación sobre la Tectónica de placas. En ella, el alumnado debe reconstruir la historia geológica de un planeta imaginario integrando distintos tipos de datos (distribución geográfica de fósiles, antigüedad de orógenos, regiones sísmicas para construir un modelo de la ubicación de los límites de placa tectónica y los cambios que han sufrido los distintos continentes. A lo largo de la actividad se suceden distintas organizaciones de aula y andamios didácticos, con el objetivo de promover dinámicas de creación de conocimiento científico y la sistematización del aprendizaje y la consecución del objetivo final: realizar un breve vídeo de divulgación científica sobre la historia geológica de este planeta imaginario.

  15. Efeito do controle da placa supragengival sobre a microflora subgengival e tecidos periodontais Effect of supragingival plaque control on subgingival microflora and periodontal tissues

    Directory of Open Access Journals (Sweden)

    Allyson Nogueira MOREIRA

    2001-06-01

    Full Text Available O objetivo deste trabalho foi estudar, clínica e microbiologicamente, 44 sítios em 11 pacientes com periodontite crônica generalizada. IP, IG, SS, PS e NI foram registrados. Amostras de placa subgengival foram colhidas nos mesmos sítios para cultivo de bactérias anaeróbias e determinação dos morfotipos microbianos por MCE. Os registros clínicos e estudos microbiológicos foram tomados no "baseline" e 4 semanas após a incorporação em um programa de controle de placa e cálculo supragengival. A análise microbiológica categorizou o grau de desenvolvimento em: 0 - não detectado, 1 - escasso, 2 - moderado e 3 - abundante. Os registros clínicos no "baseline" e dia 28 foram: IP - 1,73 ± 0,10 e 0,30 ± 0,08, IG - 1,73 ± 0,08 e 1,41 ± 0,08, SS - 0,91 ± 0,04 e 0,59 ± 0,07, PS - 6,43 ± 0,20 e 5,77 ± 0,25, NI - 6,86 ± 0,32 e 6,52 ± 0,34, respectivamente. A redução do IP, IG, SS e PS foi significativa. Não foram registradas diferenças significativas no NI. As proporções relativas dos morfotipos bacterianos observados por MCE no "baseline" e dia 28 foram: células cocóideas - 21,16 ± 3,77 e 36,00 ± 4,66, bacilos móveis - 44,86 ± 2,65 e 39,50 ± 2,64, treponemas totais - 24,66 ± 3,08 e 19,25 ± 2,75. No "baseline" e no dia 28 foi observado: Pi/n - 1,36 ± 0,18 e 0,43 ± 0,11, Pg - 0,48 ± 0,16 e 0,32 ± 0,13, Aa - 0,23 ± 0,09 e 0,23 ± 0,10, Fusobacterium nucleatum - 0,32 ± 0,14 e 0,41 ± 0,13 e peptostreptococos - 0,82 ± 0,19 e 0,54 ± 0,16, respectivamente. Houve um aumento significativo das células cocóideas, diminuição de treponemas e de Pi/n.The aim of this study was to investigate, clinically and microbiologically, forty-four sites in 11 patients presenting with generalized chronic periodontitis. Plaque Index (PI, Gingival Index (GI, Probing Bleeding (PB, Probing Depth (PD and Insertion Level (IL were registered. Samples of subgingival plaque were collected in the same sites for cultivation of anaerobic

  16. Methods to Secure Databases Against Vulnerabilities

    Science.gov (United States)

    2015-12-01

    for several languages such as C, C++, PHP, Java and Python [16]. MySQL will work well with very large databases. The documentation references...using Eclipse and connected to each database management system using Python and Java drivers provided by MySQL , MongoDB, and Datastax (for Cassandra...tiers in Python and Java . Problem MySQL MongoDB Cassandra 1. Injection a. Tautologies Vulnerable Vulnerable Not Vulnerable b. Illegal query

  17. Ransomware - Threats Vulnerabilities And Recommendations

    Directory of Open Access Journals (Sweden)

    Nadeem Shah

    2017-06-01

    Full Text Available Attack methodologies transform with the transforming dynamics of technology. Consequently it becomes imperative that individuals and organization implement the highest levels of security within their devices and infrastructure for optimal protection against these rapidly evolving attacks. Ransomware is one such attack that never fails to surprise in terms of its ability to identify vulnerabilities and loopholes in technology. This paper discusses the categories of ransomware its common attack vectors and provides a threat landscape with the aim to highlight the true potential and destructive nature of such malware based attacks. In this paper we also present the most current ransomware attack that is still a potential threat and also provide recommendations and strategies for prevention and protection against these attacks. A novel solution is also discussed that could be further worked upon in the future by other researchers and vendors of security devices.

  18. Proliferation Vulnerability Red Team report

    Energy Technology Data Exchange (ETDEWEB)

    Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

    1996-10-01

    This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

  19. ICMPv6 RA Flooding Vulnerability Research

    Directory of Open Access Journals (Sweden)

    Linas Jočys

    2016-06-01

    Full Text Available ICMPv6 is the newest version of internet control message protocol, whose main purpose is to send error message indicating packet processing failure. It is know that ICMPv6 is technologically vulnerable. One of those vulnerabilities is the ICMPv6 RA flooding vulnerability, which can lead to systems in Local Area Network slow down or full stop. This paper will discuss Windows (XP, 7, 8.1 and Linux Ubuntu 14 operating systems resistance to RA flooding attack research and countermeasures to minimize this vulnerability.

  20. Vulnerability maps for Druzba crude oil pipeline

    International Nuclear Information System (INIS)

    Hladik, P.; Hosnedl, P.; Buresova, H.; Corbet, J.

    2012-01-01

    Maps of risk for individual environmental aspects within the protection zone of the Czech part of the Druzba crude oil pipeline (505.7 km) were developed based on a modified 'H and V index' method. Risk data were added into a GIS of the Druzba pipeline so that the system could be used as conceptual material in the field of environmental protection (a base for the new SCADA system). Considered environmental aspects were assessed in terms of their vulnerability. The criteria were defined as the vulnerability of the aquatic environment (surface waters and ground waters), the vulnerability of soil environment and the vulnerability of biotic components of the environment. (authors)

  1. Assessing vulnerability of urban African communities

    DEFF Research Database (Denmark)

    Karlsson Nyed, Patrik; Jean-Baptiste, Nathalie; Herslund, Lise Byskov

    2014-01-01

    East African cities are in the process of assessing their vulnerabilities to climate change, but face difficulties in capturing the complexity of the various facets of vulnerability. This holistic approach, captures four different dimensions of vulnerability to flooding - Assets, Institutions......, Attitudes and the Physical environment, with Dar es Salaam, Tanzania, as a case city. The methodology is actively involving the expertise of the stakeholders, and uses GIS to analyze and compile the data. The final output is presented as a comprehensible map, delineating the varying vulnerability...

  2. Commercial Air Carrier Vulnerabilities to Information Operations

    National Research Council Canada - National Science Library

    Shelburn, Bryan H

    2002-01-01

    .... The increasing dependence of government and industry on information technology has created critical vulnerabilities that can be exploited by degrading or destroying the use of information systems...

  3. Mining Bug Databases for Unidentified Software Vulnerabilities

    Energy Technology Data Exchange (ETDEWEB)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  4. A vulnerability-centric requirements engineering framework : Analyzing security attacks, countermeasures, and requirements based on vulnerabilities

    NARCIS (Netherlands)

    Elahi, G.; Yu, E.; Zannone, N.

    2010-01-01

    Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a methodological framework for security requirements

  5. Modeling Coastal Vulnerability through Space and Time.

    Science.gov (United States)

    Hopper, Thomas; Meixler, Marcia S

    2016-01-01

    Coastal ecosystems experience a wide range of stressors including wave forces, storm surge, sea-level rise, and anthropogenic modification and are thus vulnerable to erosion. Urban coastal ecosystems are especially important due to the large populations these limited ecosystems serve. However, few studies have addressed the issue of urban coastal vulnerability at the landscape scale with spatial data that are finely resolved. The purpose of this study was to model and map coastal vulnerability and the role of natural habitats in reducing vulnerability in Jamaica Bay, New York, in terms of nine coastal vulnerability metrics (relief, wave exposure, geomorphology, natural habitats, exposure, exposure with no habitat, habitat role, erodible shoreline, and surge) under past (1609), current (2015), and future (2080) scenarios using InVEST 3.2.0. We analyzed vulnerability results both spatially and across all time periods, by stakeholder (ownership) and by distance to damage from Hurricane Sandy. We found significant differences in vulnerability metrics between past, current and future scenarios for all nine metrics except relief and wave exposure. The marsh islands in the center of the bay are currently vulnerable. In the future, these islands will likely be inundated, placing additional areas of the shoreline increasingly at risk. Significant differences in vulnerability exist between stakeholders; the Breezy Point Cooperative and Gateway National Recreation Area had the largest erodible shoreline segments. Significant correlations exist for all vulnerability (exposure/surge) and storm damage combinations except for exposure and distance to artificial debris. Coastal protective features, ranging from storm surge barriers and levees to natural features (e.g. wetlands), have been promoted to decrease future flood risk to communities in coastal areas around the world. Our methods of combining coastal vulnerability results with additional data and across multiple time

  6. IT Security Vulnerability and Incident Response Management

    NARCIS (Netherlands)

    Hafkamp, W.H.M.; Paulus, S.; Pohlman, N.; Reimer, H.

    2006-01-01

    This paper summarises the results of a Dutch PhD research project on IT security vulnerability and incident response management, which is supervised by the University of Twente in the Netherlands and which is currently in its final stage. Vulnerabilities are ‘failures or weaknesses in computer

  7. Vulnerability, Borderline Personality Disorders. Clinical and ...

    African Journals Online (AJOL)

    Borderline personality disorder and vulnerability are difficult to assess and are rather elusive to define. A case study material is presented from a cognitive analytical model. An attempt of the dominant features of cognitive analytical therapy and discussion of vulnerability in relation to personality disorder is provided.

  8. Managing Risk, Reducing Vulnerability and Enhancing Productivity ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Managing Risk, Reducing Vulnerability and Enhancing Productivity under a Changing Climate. The countries of the Greater Horn of Africa are particularly vulnerable to drought, exacerbated by widespread poverty and dependence on rainfed agriculture. Even with normal rainfall, the region does not produce enough food to ...

  9. Reducing vulnerability among pastoralists in Northern Kenya

    International Development Research Centre (IDRC) Digital Library (Canada)

    CCAA

    vulnerability among pastoralist communities in Mandera and Turkana in Northern Kenya, led by the Kenyan NGO ... to understand how people have experienced droughts and other ... norms and gender roles may make them more or less vulnerable, ... and see direct impacts on the resources they depend on for their.

  10. The politics of vulnerability and resilience

    NARCIS (Netherlands)

    Frerks, G.E.; Warner, J.F.; Weijs, B.

    2011-01-01

    Much conceptual confusion exists over the concepts of vulnerability and (social) resilience, reinforced by the different paradigms (the article identifies four) and disciplinary traditions underlying their use. While since the 1980s the social construction of "vulnerability" as a driver for disaster

  11. Climate change vulnerability assessment in Georgia

    Science.gov (United States)

    Binita KC; J. Marshall Shepherd; Cassandra Johnson Gaither

    2015-01-01

    Climate change is occurring in the Southeastern United States, and one manifestation is changes in frequency and intensity of extreme events. A vulnerability assessment is performed in the state of Georgia (United States) at the county level from 1975 to 2012 in decadal increments. Climate change vulnerability is typically measured as a function of exposure to physical...

  12. Predicting Vulnerability Risks Using Software Characteristics

    Science.gov (United States)

    Roumani, Yaman

    2012-01-01

    Software vulnerabilities have been regarded as one of the key reasons for computer security breaches that have resulted in billions of dollars in losses per year (Telang and Wattal 2005). With the growth of the software industry and the Internet, the number of vulnerability attacks and the ease with which an attack can be made have increased. From…

  13. Vulnerability and Adaptation to Climate Change: Agricultural ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2016-04-21

    Apr 21, 2016 ... Much of this biodiversity is highly vulnerable to climate change. ... an astonishing range of life forms found nowhere else on the planet. ... As well as improving information on climate change vulnerabilities, ... They also note negative effects on traditional knowledge, which is seen as losing its sacred power.

  14. Method of Pentest Synthesis and Vulnerability Detection

    OpenAIRE

    Hahanova Irina Vitalyevna

    2012-01-01

    The structural method for penetration test generation and vulnerability simulation for infrastructure of telecommunication hardwaresoftware information cybernetic systems (CS), focused to protect against unauthorized access the services defined in the system specification by means of penetrating through legal interfaces of component interaction, which have vulnerabilities, is proposed. A protection service infrastructure is created with cybersystem and maintains it during the life cycle, serv...

  15. Current diagnostic modalities for vulnerable plaque detection

    NARCIS (Netherlands)

    J.A. Schaar (Johannes); F. Mastik (Frits); E.S. Regar (Eveline); C.A. den Uil (Corstiaan); F.J.H. Gijsen (Frank); J.J. Wentzel (Jolanda); P.W.J.C. Serruys (Patrick); A.F.W. van der Steen (Ton)

    2007-01-01

    textabstractRupture of vulnerable plaques is the main cause of acute coronary syndrome and myocardial infarction. Identification of vulnerable plaques is therefore essential to enable the development of treatment modalities to stabilize such plaques. Several diagnostic methods are currently tested

  16. Tratamento conservador ocular dos melanomas de coróide com braquiterapia utilizando placas de iodo-125 Conservative treatment of choroidal melanomas using iodine brachytherapy

    Directory of Open Access Journals (Sweden)

    Antônio Cássio Assis Pellizzon

    2004-08-01

    Full Text Available OBJETIVO: Avaliar, retrospectivamente, o resultado do tratamento conservador do melanoma de coróide, por meio de braquiterapia, usando placas episclerais de iodo-125 (modelo 6711, Amershan. MATERIAIS E MÉTODOS: Foram avaliados 49 pacientes portadores de melanoma de coróide tratados no Hospital do Câncer, São Paulo, SP, de março de 2001 a janeiro de 2003. Os seguintes parâmetros foram analisados e correlacionados ao controle local e sobrevida: sexo, idade, dimensões da lesão, tempo de tratamento e doses no ápice e base das lesões. RESULTADOS: Com diâmetro máximo da base do tumor de 17 mm e altura máxima de 12 mm, observamos que as doses na base do tumor variaram de 213 a 463 Gy (mediana de 347 Gy e no ápice, de 51 a 250 Gy (mediana de 91 Gy. As taxas de preservação ocular, sobrevida livre de doença e conservação ocular, atuariais em dois anos, foram de 96%, 93,5% e 96,3%, respectivamente. Através de análise univariada, o único fator prognóstico para controle local nesta análise foi a altura do tumor menor que 6 mm (p = 0,0348. CONCLUSÃO: A braquiterapia levou a uma taxa bastante satisfatória de controle local, confirmando que a altura do tumor é um dos fatores prognósticos importantes desse parâmetro.OBJECTIVE: To retrospectively evaluate the results of conservative therapy using episcleral iodine-125 (model 6711, Amershan plaque for brachytherapy of choroidal melanoma. MATERIALS AND METHODS: We evaluated 49 patients with choroidal melanoma treated at "Hospital do Câncer", São Paulo, Brazil, from March 2001 to January 2003. The following clinical parameters were analyzed and correlated with local control and survival rate: gender, age, lesion dimension, treatment duration, as well as doses in apex and base of the tumors. RESULTS: The maximum diameter and height of the base of the tumors treated were 17 mm and 12 mm, respectively. Doses at those points ranged from 213 to 463 Gy (median: 347 Gy and 51 to 250 Gy

  17. Vulnerabilities Classification for Safe Development on Android

    Directory of Open Access Journals (Sweden)

    Ricardo Luis D. M. Ferreira

    2016-06-01

    Full Text Available The global sales market is currently led by devices with the Android operating system. In 2015, more than 1 billion smartphones were sold, of which 81.5% were operated by the Android platform. In 2017, it is estimated that 267.78 billion applications will be downloaded from Google Play. According to Qian, 90% of applications are vulnerable, despite the recommendations of rules and standards for the safe software development. This study presents a classification of vulnerabilities, indicating the vulnerability, the safety aspect defined by the Brazilian Association of Technical Standards (Associação Brasileira de Normas Técnicas - ABNT norm NBR ISO/IEC 27002 which will be violated, which lines of code generate the vulnerability and what should be done to avoid it, and the threat agent used by each of them. This classification allows the identification of possible points of vulnerability, allowing the developer to correct the identified gaps.

  18. Enfermedad de la Peyronie: De la extirpación a la incisión de la placa de fibrosis Peyronie's disease: Incision or extirpation of the plaque

    Directory of Open Access Journals (Sweden)

    A. A. Núñez Serrano

    2008-06-01

    Full Text Available La Enfermedad de La Peyronie es una entidad médica bien descrita y conocida, sin embargo su tratamiento quirúrgico no siempre consigue el resultado esperado. Las técnicas habituales (Nesbitt, Horton- Devine, basadas en la extirpación de la placa fibrosa que desvía el pene eréctil, suelen conllevar acortamiento peneano y/o recidiva de la enfermedad. Presentamos una serie de 20 pacientes con Enfermedad de La Peyronie tratados con una nueva técnica basada en la incisión de la placa fibrosa e interposición de injerto dérmico autólogo. Describimos indicación, procedimiento quirúrgico y resultados obtenidos en un período de seguimiento de entre 16 y 1 años último paciente incluido. La técnica supone un cambio sustancial del enfoque terapéutico; la incisión de la placa frente a su extirpación respeta el tejido peneano, protege el paquete vasculonervioso aminorando la incidencia de impotencia, no acorta la longitud peneana, disminuye la incidencia de recidivas y su ejecución quirúrgica es asequible y simple.Peyronie's disease is a well-known medical entity but its surgical treatment does not get the expected outcome all the time. Usual techniques are based on the extirpation of fibrous plaque which distorts the erectile penis. These traditional techniques can produce shortening of the penis and/or disease recidivation. We report a 20 patient series afflicted of Peyronie's disease who were treated by a new surgical procedure; it consists of the incision over the fibrotic plaque and the insertion of a dermal autologous graft. We describe indication, surgical procedure, and results achieved by us with a following time within 16 to 1 year (last patient included. This technique changes the essential therapeutic approach. Using plaque incision instead of plaque extirpation we contribute to preserve vessels, nerves and we penis length. The incidence of impotence and disease recidivation also decreases with this simple and available

  19. GESTÃO HÍDRICA A PARTIR DE CISTERNAS DE PLACAS: AVALIAÇÃO SOCIOAMBIENTAL DA EFICIÊNCIA DO P1MC NO MUNICÍPIO DE PEDRA LAVRADA-PB

    Directory of Open Access Journals (Sweden)

    José Adailton Silva

    2014-08-01

    Full Text Available Atualmente, muitas populações rurais do Semiárido brasileiro têm convivido com árduas realidades em virtude da carência de água. Diante disto, as cisternas de placas surgem como mecanismo para prover o acesso e disponibilidade de água. Neste sentido, a Articulação do Semiárido (ASA elaborou o “Programa Um Milhão de Cisternas Rurais – P1MC”, o qual busca prover o gerenciamento e a valorização da água para a “convivência sustentável” com a escassez de água no Semiárido brasileiro. Conhecendo-se as premissas do P1MC, o presente estudo objetivou analisar a eficiência das cisternas de placas e o desempenho do P1MC para com a disponibilidade de água, e a melhoria da qualidade de vida das famílias que convivem com a escassez hídrica. Para tanto, foram realizados: i estudos sobre a pluviometria (série de 61 anos de precipitação pluvial; ii estimativa do Volume Potencial de Captação (VPC dos telhados residenciais e das cisternas; e iii aplicação de questionários semiestruturados a 40 famílias beneficiadas pelo P1MC, no município de Pedra Lavrada – PB. Como resultados, concluiu-se que: 1 as cisternas de placa é uma tecnologia eficiente e capaz de suprir as necessidades hídricas durante o período de estiagem (8 meses; 2 o P1MC apresentou pontos negativos: ausência de fiscalização das cisternas com problemas (rachaduras e vazamentos, e a impossibilidade de atender aos anseios familiares (dessedentação animal ou cultivo de pequenas lavouras; e 3 o P1MC promoveu o acesso/disponibilidade de água, e “independência hídrica”, promovendo assim a sustentabilidade das famílias rurais em meio às adversidades edafoclimáticas do Semiárido brasileiro.

  20. Influência da distribuição granulométrica na estabilidade dimensional de placas cerâmicas de base vermelha Influence of particle size distribution on the dimensional stability of red ceramic tiles

    Directory of Open Access Journals (Sweden)

    A. C. A. Prado

    2008-12-01

    Full Text Available As propriedades do revestimento cerâmico queimado estão intrinsecamente ligadas às características da massa, dentre estas se encontram o tamanho, a distribuição, o formato e o arranjo das partículas. O efeito da distribuição granulométrica de partículas sobre a estabilidade dimensional de placas cerâmicas para revestimentos de base vermelha foi estudado em três massas, todas continham no mínimo 57% de material advindo da Formação Corumbataí. Foram estudadas duas distribuições granulométricas - uma parecida com aquelas usadas no Pólo Cerâmico de Santa Gertrudes e, outra, com uma massa de grés. De uma maneira geral, granulações mais grossas, semelhantes à massa de Santa Gertrudes, variaram menos dimensionalmente quando as placas apresentaram médias e altas porosidades (absorção de água entre 3,0 e 10,0%. Já, granulações mais finas, similares a massas de grés, foram necessárias para a produção de placas de baixa absorção (menor que 3,0%.The properties of final ceramic tiles are related with the mass characteristics, among them the size, shape, distribution and arrange of particles. The effect of particle size distribution on dimensional stability of red ceramic tiles was studied in three masses; all of them composed with, at minimum, 57% of Corumbataí Formation's materials. Two particle size distributions were investigated: the first was similar to the masses that are used in the Santa Gertrudes Ceramic Pole's factories and the other was similar to the stoneware mass. In general, masses with larger particle sizes, similar to that of Santa Gertrudes, had greater dimensional stability in the products with 3 to 10% of water absorption. On the other hand, in the manufacture of low porosity tiles (water absorption capacity < 3% it is recommended the use of smaller grain size.

  1. EFICACIA DEL CEPILLADO CON Y SIN DENTÍFRICO EN EL CONTROL DE LA PLACA BACTERIANA SUPRAGINGIVAL EN ALUMNOS DEL 1ER GRADO DEL NIVEL PRIMARIO DE LA INSTITUCIÓN EDUCATIVA JUAN MANUEL POLAR DEL DISTRITO DE JOSÉ LUIS BUSTAMANTE Y RIVERO. AREQUIPA, 2015.

    OpenAIRE

    CÁRDENAS DEL CARPIO, ROSA ELENA

    2016-01-01

    CEPILLADO OBJETIVOS FRECUENCIA DE CEPILLADO DURACIÓN DEL CEPILLADO TÉCNICAS DE CEPILLADO REQUISITOS DE UN CEPILLADO DE DIENTES SATISFACTORIO DENTÍFRICO O PASTA DENTAL PLACA BACTERIANA ÍNDICE DE HIGIENE ORAL SIMPLIFICADO ANÁLISIS DE ANTECEDENTES INVESTIGATIVOS

  2. Resultados clínico-radiológicos en pacientes jóvenes con fractura articular completa de radio distal tratados con placa palmar bloqueada. [Clinical and radiological results in young patients with complete articular distal radius fractures treated with volar locked plate.

    Directory of Open Access Journals (Sweden)

    Pablo De Carli

    2016-02-01

    Conclusión: El tratamiento de las fracturas de radio distal tipo C en pacientes jóvenes con placa palmar bloqueada muestra resultados clínicos y radiológicos favorables con corrección de la mayoría de los escalones articulares.

  3. Stress Tests and Vulnerability Assessment

    International Nuclear Information System (INIS)

    Wallner, A.; Lorenz, P.

    2012-01-01

    After the accident in Fukushima, nuclear safety as topic in anti-nuclear work has gained importance within the Joint Project countries. Therefore, nuclear safety and in particular the activities of the European stress tests were chosen to be the main focus of the Joint Project 2011/2012 as well as the common theme of the national projects. This brochure describes: A) Vulnerability Assessment A critical review of the EU Nuclear Stress Tests in Bulgaria, Hungary, Romania and Ukraine is presented in chapter 1. The review details the main weaknesses identified within the stress tests. Important shortcomings not mentioned in the stress tests reports are also discussed. These evaluations do not claim to be exhaustive, but the findings contribute to a more comprehensive understanding of safety and risk of nuclear power plants in Europe. B) Transparency of the stress tests In chapter 2 the experience of the Joint Project NGOs concerning transparency of the stress tests is presented. The information is not meant to be an evaluation of the transparency of the stress tests in general – such an evaluation is not possible within the scope of this brochure. The evaluation aims to show activities concerning stress tests and how they were conceived by the JP NGOs. Some recommendations for improvement are given. C) Safety focus Within the main topic “nuclear safety” of the Joint Project 2011/2012 the NGOs of each JP country selected a special safety relevant topic, which is/was of particular interest in their country: Bulgaria: The short story of Belene NPP – The victory – Key points of the campaign against the nuclear power plant Romania: Risks of the CANDU reactor design Czech Republic: Results of the conference “Power Plant Load Testing: Safety Inspection or Propaganda?“ Slovakia: Safety deficits of the NPP Mochovce These safety relevant issues are discussed in separate sections within the brochure at hand. (author)

  4. Stress Tests and Vulnerability Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Wallner, A. [Austrian Institute of Ecology, Vienna (Austria); Lorenz, P. [ed.; Becker, O. [eds.; Weber, U. [Austrian Institute of Ecology, Vienna (Austria)

    2012-07-01

    After the accident in Fukushima, nuclear safety as topic in anti-nuclear work has gained importance within the Joint Project countries. Therefore, nuclear safety and in particular the activities of the European stress tests were chosen to be the main focus of the Joint Project 2011/2012 as well as the common theme of the national projects. This brochure describes: A) Vulnerability Assessment A critical review of the EU Nuclear Stress Tests in Bulgaria, Hungary, Romania and Ukraine is presented in chapter 1. The review details the main weaknesses identified within the stress tests. Important shortcomings not mentioned in the stress tests reports are also discussed. These evaluations do not claim to be exhaustive, but the findings contribute to a more comprehensive understanding of safety and risk of nuclear power plants in Europe. B) Transparency of the stress tests In chapter 2 the experience of the Joint Project NGOs concerning transparency of the stress tests is presented. The information is not meant to be an evaluation of the transparency of the stress tests in general – such an evaluation is not possible within the scope of this brochure. The evaluation aims to show activities concerning stress tests and how they were conceived by the JP NGOs. Some recommendations for improvement are given. C) Safety focus Within the main topic “nuclear safety” of the Joint Project 2011/2012 the NGOs of each JP country selected a special safety relevant topic, which is/was of particular interest in their country: Bulgaria: The short story of Belene NPP – The victory – Key points of the campaign against the nuclear power plant Romania: Risks of the CANDU reactor design Czech Republic: Results of the conference “Power Plant Load Testing: Safety Inspection or Propaganda?“ Slovakia: Safety deficits of the NPP Mochovce These safety relevant issues are discussed in separate sections within the brochure at hand. (author)

  5. Vulnerability of intertropical littoral areas

    Science.gov (United States)

    Manighetti, Isabelle; De Wit, Rutger; Duvail, Stéphanie; Seyler, Patrick

    2017-10-01

    The coastal zone is of very high importance for human development and human wellbeing. Half of the global urban population lives in the coastal zone, where it has access to both continental and marine ecosystem services and to maritime transport. These urban populations coexist with rural and traditional coastal populations, some of which still possess good traditional ecological knowledge of the coastal ecosystems. Marine biodiversity and favourable environmental conditions sustain fisheries and aquaculture, represent a source of inspiration for humankind and provide numerous opportunities for recreation and tourism. In addition, coastal areas provide nursery functions for juvenile fish and invertebrates, which is important for the fish and crayfish stocks exploited offshore. Located at the interface between marine energy and continental processes, the coastal landscapes are dynamic environments. Nevertheless, the destruction of habitats and the increasing exploitation of the coastal zone represent serious threats to the ecosystems. Moreover, human land use and modifications in the watersheds have strong impacts on the coastal zone primarily by contributing to their pollution and nutrient over-enrichment. Damming and creation of reservoirs upstream also heavily modify the hydrology of the watersheds and often dramatically reduce the delivery of sediments to the coastal zone. In addition to these regional and local anthropogenic impacts, the coastal zone is vulnerable to global change among which sea level rise and climate change are particularly important drivers. Many coastal zones extend along giant faults and subduction zones, which makes them particularly exposed to earthquakes and tsunami hazards. Other forms of natural hazards are caused by hurricanes and cyclones that develop at sea and whose trajectories often hit the coastlines.

  6. Groundwater vulnerability mapping of Qatar aquifers

    Science.gov (United States)

    Baalousha, Husam Musa

    2016-12-01

    Qatar is one of the most arid countries in the world with limited water resources. With little rainfall and no surface water, groundwater is the only natural source of fresh water in the country. Whilst the country relies mainly on desalination of seawater to secure water supply, groundwater has extensively been used for irrigation over the last three decades, which caused adverse environmental impact. Vulnerability assessment is a widely used tool for groundwater protection and land-use management. Aquifers in Qatar are carbonate with lots of fractures, depressions and cavities. Karst aquifers are generally more vulnerable to contamination than other aquifers as any anthropogenic-sourced contaminant, especially above a highly fractured zone, can infiltrate quickly into the aquifer and spread over a wide area. The vulnerability assessment method presented in this study is based on two approaches: DRASTIC and EPIK, within the framework of Geographical Information System (GIS). Results of this study show that DRASTIC vulnerability method suits Qatar hydrogeological settings more than EPIK. The produced vulnerability map using DRASTIC shows coastal and karst areas have the highest vulnerability class. The southern part of the country is located in the low vulnerability class due to occurrence of shale formation within aquifer media, which averts downward movement of contaminants.

  7. Vulnerability, Health Agency and Capability to Health.

    Science.gov (United States)

    Straehle, Christine

    2016-01-01

    One of the defining features of the capability approach (CA) to health, as developed in Venkatapuram's book Health Justice, is its aim to enable individual health agency. Furthermore, the CA to health hopes to provide a strong guideline for assessing the health-enabling content of social and political conditions. In this article, I employ the recent literature on the liberal concept of vulnerability to assess the CA. I distinguish two kinds of vulnerability. Considering circumstantial vulnerability, I argue that liberal accounts of vulnerability concerned with individual autonomy, align with the CA to health. Individuals should, as far as possible, be able to make health-enabling decisions about their lives, and their capability to do so should certainly not be hindered by public policy. The CA to health and a vulnerability-based analysis then work alongside to define moral responsibilities and designate those who hold them. Both approaches demand social policy to address circumstances that hinder individuals from taking health-enabling decisions. A background condition of vulnerability, on the other hand, even though it hampers the capability for health, does not warrant the strong moral claim proposed by the CA to health to define health as a meta-capability that should guide social policy. Nothing in our designing social policy could change the challenge to health agency when we deal with background conditions of vulnerability. © 2016 John Wiley & Sons Ltd.

  8. A measure of vulnerability and damage tolerance

    International Nuclear Information System (INIS)

    Lind, Niels C.

    1995-01-01

    The purpose of the paper is to present probabilistic definitions of 'vulnerability' and 'damage tolerance'. A new measure of damage is also proposed. Disastrous failures, such as of the Titanic or the Chernobyl reactor, have revealed that some systems can be highly vulnerable. A seemingly insignificant damage can reduce such a system's resistance severely. Attempts to write design code requirements for damage tolerance or structural integrity have not been successful so far. One reason is that these ideas have not been defined with the necessary precision. The suggested definitions aim to be general, applicable to all engineered systems, and readily specializable to particular system types. Vulnerability is defined as the ratio of the failure probability of the damaged system to the failure probability of the undamaged system. It is argued that 'vulnerability' and 'damage tolerance' are complementary concepts. Damage tolerance is defined as the reciprocal of vulnerability. Vulnerability and damage tolerance both concern hypothetical future damage. A damage factor, applicable for the analysis of an existing structure in an assessed state of damage, is defined analogous to vulnerability. Application is illustrated by examples

  9. Determining Vulnerability Importance in Environmental Impact Assessment

    International Nuclear Information System (INIS)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-01

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: ► The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. ► The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. ► A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. ► Results in Colombia highlight the usefulness and objectivity of this method.

  10. Bite force and sleep quality in patients with bruxism before and after using a mandibular advancement device = Força de mordida e qualidade do sono em pacientes bruxômanos antes e após o uso de placa de avanço mandibular

    Directory of Open Access Journals (Sweden)

    Mainieri, Vivian Chiada

    2008-01-01

    Full Text Available Objetivo: Comparar a força de mordida e a qualidade do sono em pacientes com bruxismo antes e depois do uso de uma placa de avanço mandibular resiliente. Metodologia: Dezoito pacientes com bruxismo em atendimento na Clínica de Oclusão da Faculdade de Odontologia da PUCRS foram selecionados de acordo com os critérios de eligibilidade do estudo, examinados segundo o protocolo RDC/DTM e tratados com uma placa de avanço mandibular resiliente. Antes e após 30 dias de uso da placa de avanço mandibular os sujeitos foram submetidos a testes de força máxima de mordida com um transdutor de força compressiva de arco cruzado posicionado na região de primeiro molar; de qualidade do sono, de acordo com o questionário QAS da Universidade de Toronto; e de contagem do número de contrações do músculo masseter durante o sono usando-se o adesivo BiteStrip®. Os dados foram analisados por teste t de Student, teste de Wilcoxon e teste de McNemar ao nível de significância de 0,05. Resultados: Houve diminuição significativa (P < 0,05 dos parâmetros de bruxismo, de força de mordida e do escore total do QAS após o uso da placa de avanço mandibular por 30 dias. Conclusão: Os resultados sugerem que o uso da placa de avanço mandibular resiliente por um mês reduziu a força de mordida e o bruxismo e melhorou a qualidade do sono nesta amostra

  11. Relación placa bacteriana y caries en un grupo de niños escolarizados entre 5 y 14 años de la población de la Boquilla - Cartagena en el año 20041

    Directory of Open Access Journals (Sweden)

    Lizelia Alfaro Zolá

    2013-10-01

    Full Text Available Objetivo: Describir la ocurrencia de placa bacteriana en las superficies dentales y relacionarla con el tipo de lesión de caries que se presenta en niños escolares de 5 a 14 años de la Boquilla - Cartagena. Materiales y Métodos: Se realizó un estudio de corte transversal, en el cual se seleccionó una muestra de 89 niños escolares de la población de la Boquilla a través de un muestreo aleatorio sistemático, a quienes se les evaluó el estado de higiene oral mediante el índice de placa comunitario de Corchuelo modificado y el índice de caries superficial con criterios de diagnóstico Ekstrand. Resultados: La superficie con lesiones de caries de mayor frecuencia fue la oclusal, presentándose un mayor numero de lesiones detenidas, seguido en palatino por las lesiones precavitacionales, a diferencia de las superficies vestibular y lingual donde se encontraron un mayor número de superficies sanas. En todas las superficies evaluadas predominó la presencia de placa bacteriana independientemente de la presencia de caries y no se encontró una relación estadísticamente significativa entre estas dos variables. Conclusiones: La alta frecuencia de placa bacteriana en las superficies dentarias nos mostró el deficiente estado de higiene oral de la población, sin embargo, sigue en duda la pertinencia de los índices de placa para la predicción de la caries debido a que no se encontró relación estadística. (Duazary 2007; 2: 119 - 126

  12. Imobilização interna da coluna vertebral lombar com placas de cloreto de polivinila, em cães - parte I: resultados clínico-cirúrgicos Internal immobilization of the lumbar canine spine using polyvinylchloride plates - part I: clinical and surgical results

    Directory of Open Access Journals (Sweden)

    Eduardo Alberto Tudury

    1997-03-01

    Full Text Available Utilizando-se 20 cães, com o segmento lombar da coluna vertebral cirurgicamente desestabilizado na junção das vértebras L2-L3, foi testada a eficiência de placas ortopédicas de cloreto de polivinila (PVC Tigre®, fixadas com parafusos nos corpos vertebrais e com fio ortopédico de aço inoxidável nos processos espinhosos. As placas foram manual e individualmente confeccionadas para cada animal e esterilizadas pelo calor. Apesar de apresentar maleabilidade adequada, a resistência das placas utilizadas no corpos vertebrais deixou a desejar, dado seu rompimento em 40% dos casos. Apesar disto, durante os 45 dias do estudo, verificaram-se resultados favoráveis quanto ao estado clinico-neurológico, resultados de exames laboratoriais, achados radiológicos, estabilidade e alinhamento da coluna vertebral, assim como, quanto a resistência e flexibilidade das placas utilizadas nos processos espinhosos. Os fios ortopédicos de aço inoxidável, utilizados para fixar as placas no compartimento dorsal da coluna vertebral, passaram entre e não através desses processos.The efficiency ofpolyvinylchioride (PVC orthopedic plates, fixed by screws to the vertebral bodies and by cerciage wires to the spinous processes, were tested in twenty dogs with the lumbar spine destabilized at L2-L3. The plates were produced manually and individuatly for each animal and sterilized by heat. The plates exhibited suitable malleabitity but inappropriate strength because 40% ofthose affixed to the vertebral bodies were bmken. Nevertheless, during the 45 days ofthe study, the technique was consideredefective based on stability, clinicai, neurological, laboratory and radiological results. This effïciency was achieved by the technique used m the spinous processes, where the plates were fixed by wires passing between (not through them.

  13. Observando as marés atmosféricas: uma aplicação da placa Arduino com sensores de pressão barométrica e temperatura

    OpenAIRE

    Carvalho,Luiz Raimundo Moreira de; Amorim,Helio Salim de

    2014-01-01

    Apresentamos uma montagem experimental simples para o estudo da maré atmosférica, baseada no uso da placa Arduino Uno. Com essa montagem, o professor de física no Ensino Médio poderá apresentar para seus alunos as oscilações barométricas, um efeito fundamentalmente de origem térmica devido ao aquecimento da atmosfera produzido pela radiação solar. Apresentamos também uma comparação entre a maré atmosférica e o efeito gravitacional da maré oceânica, destacando as diferenças entre os dois fenôm...

  14. Treatment of unstable sacral fractures with percutaneous reconstruction plate internal fixation Tratamento de fraturas sacrais instáveis com reconstrução percutânea com fixação de placa interna

    Directory of Open Access Journals (Sweden)

    Hong-Wei Chen

    2012-05-01

    Full Text Available PURPOSE: To study the effects of percutaneous reconstruction plate internal fixation in the treatment of unstable sacral fractures. METHODS: Percutaneous reconstruction plate internal fixation was applied on 21 cases of unstable sacral fracture (15 males and six females, at age range of 16-65 years, mean 38.3 years including four cases of Denis Zone I, 14 cases of Zone II and three cases of Zone III. In operation, an arc incision (about 3-5 cm long was made along the iliac crest on the outside border of posterior superior iliac spine (PSIS on both sides, and then the plate was transported from the wounded side to the opposite one through the subcutaneous tunnel. RESULTS: The mean incision length, operation time, intraoperative blood loss was 4.3cm, 45.2min, and 160.8ml respectively. All these patients were followed up for 12-33 months (average 16.3 months, which showed no incision infection, intraoperative neurovascular injury, internal fixation loose or breakage, disunion, or obvious lower limb length inequality. The function result was rated as excellent in six cases, good in 12 and fair in 3, with excellence rate of 85.7%, according to the Majeed scoring system. CONCLUSION: Percutaneous reconstruction plate internal fixation is an ideal surgical approach to unstable sacral fractures, as it is easy, safe, causing less trauma and fewer complications, and conducive to quicker recovery.OBJETIVO: Estudar os efeitos da reconstrução percutânea com fixação de placa interna no tratamento de fraturas sacrais instáveis. MÉTODOS: A reconstrução percutânea com fixação de placa interna foi aplicada em 21 casos de fratura sacral instável (15 homens e seis mulheres, com idade variando entre 16 e 65 anos, média de 38,3 anos incluindo quatro casos de Zona I de Denis, 14 casos de Zona II e três casos de Zona III. No ato operatório, uma incisão arqueada (cerca de 3 a 5cm de comprimento foi feita ao longo da crista ilíaca na borda externa da

  15. Premature closure of the distal ulna in the dog. A case report; Fechamento prematuro da placa epifisária distal da ulna em um cäo. Descriçäo de um caso

    Energy Technology Data Exchange (ETDEWEB)

    Borges, Andréa Pacheco Batista; Araújo, Roberto Baracat de; Sampaio, Romeu; Del Carlo, Ricardo Junqueira; Pompermayer, Luiz Gonzaga

    1991-02-15

    A case of premature closure of the distal ulna in a ten-month-old crossbred dog is described. Diagnosis was suggested by clinical signs including lameness, angular deformity of the forelimb, and pain [Portuguese] Descreve-se um caso de fechamento prematuro da placa epifisária distal da ulna em um cäo sem raça definida e de aproximadamente dez meses de idade. O diagnóstico clínico baseou-se na sintomatologia de claudicaçäo, deslocamento lateral do membro torácico direito e sensibilidade dolorosa. Os exames radiográficos confirmaram o diagnóstico (AU)

  16. Características energéticas de una placa fotovoltaica, por variación de ángulo de inclinación, frente a la radiación solar en Ecuador.

    Directory of Open Access Journals (Sweden)

    Germán Alfredo Mora Trujillo

    2015-11-01

    Igualmente se implementara un sistema de control de la producción diaria de energía (Kw/h y el ahorro de emisiones de CO2 a la atmósfera, con el fin de hacer las comparaciones del uso de energía renovable frente a la convencional, lo que permitirá estimar el beneficio económico y ambiental. Esta investigación, permitirá registrar información precisa para diseñar instalaciones solares fotovoltaicas teniendo en cuenta la incidencia de la radiación solar en una placa fotovoltaica por variación de ángulo de inclinación frente al sol y determinar el ahorro de emisiones de CO2 a la atmósfera.

  17. Defining energy vulnerability in mobility. Measuring energy vulnerability in mobility. Acting against energy vulnerability in mobility. Discussing energy vulnerability in mobility. Task no. 4

    International Nuclear Information System (INIS)

    Jouffe, Yves; Massot, Marie-Helene; Noble, Cyprien

    2015-01-01

    Extensive expansion of urban areas generates transportation needs and energy expenses for mobility. Households already impacted by fuel poverty also suffer from energy vulnerability in their mobility. This report was prepared in the framework of the study of fuel poverty in France in the light of several indicators from existing inquiries, databases and modeling tools. The report is organised in 4 parts dealing with: the definition of energy vulnerability in mobility, its measurement, the possible remedial actions, and the discussions about energy vulnerability in mobility through working group meetings, respectively

  18. Vulnerability of networks of interacting Markov chains.

    Science.gov (United States)

    Kocarev, L; Zlatanov, N; Trajanov, D

    2010-05-13

    The concept of vulnerability is introduced for a model of random, dynamical interactions on networks. In this model, known as the influence model, the nodes are arranged in an arbitrary network, while the evolution of the status at a node is according to an internal Markov chain, but with transition probabilities that depend not only on the current status of that node but also on the statuses of the neighbouring nodes. Vulnerability is treated analytically and numerically for several networks with different topological structures, as well as for two real networks--the network of infrastructures and the EU power grid--identifying the most vulnerable nodes of these networks.

  19. DOE contractor vulnerability analysis: DPA or MAIT

    International Nuclear Information System (INIS)

    Six, D.E.; Nichols, D.H.

    1980-01-01

    Two vulnerability analysis techniques, Diversion Path Analysis (DPA) and Matrix Analysis of the Insider Threat (MAIT), were applied by EG and G Idaho, Inc. Safeguards and Security to the same item accountable SNM storage area at INEL. Technical and cost data for each methodology were collected and compared. A recommendation that MAIT be utilized for future vulnerability analyses of item accountable SNM storage and use areas operated by EG and G Idaho for DOE-ID resulted. Unclassified results of the two techniques and MAIT/DPA technical and cost comparisons will be presented which show that MAIT can be used for vulnerability analyses to comply with Department of Energy (DOE) requirements

  20. Nuclear material production cycle vulnerability analysis

    International Nuclear Information System (INIS)

    Bott, T.F.

    1996-01-01

    This paper discusses a method for rapidly and systematically identifying vulnerable equipment in a nuclear material or similar production process and ranking that equipment according to its attractiveness to a malevolent attacker. A multistep approach was used in the analysis. First, the entire production cycle was modeled as a flow diagram. This flow diagram was analyzed using graph theoretical methods to identify processes in the production cycle and their locations. Models of processes that were judged to be particularly vulnerable based on the cycle analysis then were developed in greater detail to identify equipment in that process that is vulnerable to intentional damage

  1. Effect of a 0.5% chlorhexidine gel on dental plaque superinfecting microorganisms in mentally handicapped patients Efeito do gel de clorexidina a 0,5% em microrganismos superinfectantes da placa bacteriana de portadores de necessidades especiais

    Directory of Open Access Journals (Sweden)

    Cláudio Mendes Pannuti

    2003-09-01

    Full Text Available A randomized clinical trial was conducted to investigate the effect of a 0.5% chlorhexidine (CHX gel on dental plaque superinfecting microorganisms in mentally handicapped patients. Thirty inmates from the institution "Casas André Luiz" were assigned to either test group (CHX gel, n = 15 or control group (placebo gel, n = 15. The gel was administered over a period of 8 weeks. Supragingival plaque samples were collected at baseline, after gel use (8 weeks and 16 weeks after baseline. The presence of Gram-negative Enterobacteriaceae, Staphylococcus and yeasts was evaluated. No significant growth of any superinfecting microorganism was observed in the CHX group, when compared to the placebo group. The results indicated that the 0.5% chlorhexidine gel did not produce an undesirable shift in these bacterial populations.Foi conduzido um ensaio clínico aleatório com objetivo de investigar o efeito do gel de clorexidina (CHX a 0,5% sobre microorganismos superinfectantes da placa bacteriana de pacientes especiais. Trinta internos da instituição "Casas André Luiz" foram aleatoriamente divididos em grupo teste (gel de CHX, n = 15 e controle (gel placebo, n = 15. O gel foi utilizado por oito semanas. Amostras de placa supragengival foram coletadas no início do estudo, após o uso do gel (oito semanas e 16 semanas após o início do estudo. Foi avaliada a presença de bacilos entéricos Gram-negativos, Staphylococcus e leveduras. Não houve diferença entre os grupos quanto à presença desses microorganismos em qualquer momento do estudo. Os resultados indicam que o gel de CHX não provocou mudanças significativas na composição desses microorganismos.

  2. Anisotropic Migration in Slab Lattices; Migration Anisotrope dans les Reseaux a Plaques; Anizotropicheskaya migratsiya v reshetkakh iz plastin; Migracion Anisotropica en Reticulados de Placas

    Energy Technology Data Exchange (ETDEWEB)

    Honeck, H. C.; Quiquemelle, B. C. [Brookhaven National Laboratory, Upton, NY (United States)

    1965-08-15

    les sections efficaces 3 un groupe ci-apres: aluminium, {Sigma}{sub a} = 0.01228 cm{sup -1}, {Sigma}{sub S} = 0.08428 cm{sup -1}, {mu} = 0; polyethylene, {Sigma}{sub a} = 0.01947 cm{sup -1}, {Sigma}{sub S} = 2.593 cm{sup -1}, {mu} = 0.25. (author) [Spanish] Una de las aplicaciones mas modernas de los experimentos con neutrones pulsados es la medicion en diferentes direcciones de los coeficientes de difusion anisotropica de neutrones termicos en un medio heterogeneo. La memoria describe un metodo teorico que se ha establecido para predecir estos coeficientes de difusion, y presenta algunos de los resultados obtenidos en los experimentos que se realizan en el Brookhaven National Laboratory. La interpretacion de los resultados se simplifica considerablemente si el conjunto experimental es de grandes dimensiones. En este caso cabe prescindir del enfriamiento por difusion, suponeT que los espectros son maxwellianos y considerar un solo grupo energetico. Gracias a esta simplficacion se consigue resolver numericamente la ecuacion de transporte cuando se trata de una geometria de placas. Los autores introducen en esta ecuacion una solucion de la forma Empty-Set (x, y, z, {Omega}, t) = exp (iB{sub 1}X + iB{sub 2}y - {lambda}t) Empty-Set (x, {Omega}) y despejan Empty-Set (x, {Omega}) por una combinacion de metodos DSN y de teorfa integral del transporte. Las principales ventajas de este procedimiento son que permite facilmente incluir la absorcion y la dispersion anisotropica, y que la celda se puede componer de muchas subregiones. Es posible tratar de encontrar el valor propio {lambda} cuando se conocen B{sub 1} y B{sub 2}, pero conviene mas sustituir iB{sub 1} por K{sub 1}, iB{sub 2} por K{sub 2}, y determinar K{sub 1}, una vez conocidos K{sub 2} y {lambda}. En este caso, {lambda} se puede expresar como serie exponencial de K{sup 2}{sub 1} y K{sup 2}{sub 2} (o lo que es equivalente, de B{sup 2}{sub 1} y de B{sup 2}{sub 2}). Entonces, la ecuacion D{sub n} = -d{lambda}/K{sup 2

  3. Transdisciplinary knowledge integration : cases from integrated assessment and vulnerability assessment

    NARCIS (Netherlands)

    Hinkel, J.

    2008-01-01

    Keywords: climate change, integrated assessment, knowledge integration, transdisciplinary research, vulnerability, vulnerability assessment.
    This thesis explores how transdisciplinary knowledge integration can be facilitated in the context of integrated assessments and vulnerability

  4. Are older people a vulnerable group? Philosophical and bioethical perspectives on ageing and vulnerability.

    Science.gov (United States)

    Bozzaro, Claudia; Boldt, Joachim; Schweda, Mark

    2018-05-01

    The elderly are often considered a vulnerable group in public and academic bioethical debates and regulations. In this paper, we examine and challenge this assumption and its ethical implications. We begin by systematically delineating the different concepts of vulnerability commonly used in bioethics, before then examining whether these concepts can be applied to old age. We argue that old age should not, in and of itself, be used as a marker of vulnerability, since ageing is a process that can develop in a variety of different ways and is not always associated with particular experiences of vulnerability. We, therefore, turn to more fundamental phenomenological considerations in order to reconstruct from a first person perspective the intricate interconnections between the experiences of ageing and vulnerability. According to this account, ageing and old age are phenomena in which the basic anthropological vulnerability of human beings can manifest itself in an increased likelihood of harm and exploitation. Thus, we plead for a combined model of vulnerability that helps to avoid problems related to the current concepts of vulnerability. We conclude first that old age as such is not a sufficient criterion for being categorized as vulnerable in applied ethics, and second that reflections on ageing can help to develop a better understanding of the central role of vulnerability in human existence and in applied ethics. © 2018 John Wiley & Sons Ltd.

  5. Consumer financial vulnerability: identifying transmission linkages ...

    African Journals Online (AJOL)

    activates the postulated consumer financial vulnerability index (CFVI) .... words, the relationship between income, consumption, debt and saving as well as .... separation/divorce and bad financial management, as well as exogenous factors.

  6. Focus Cities : Reducing the Vulnerability, Poverty and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Focus Cities : Reducing the Vulnerability, Poverty and Environmental Load in ... 000 lives in closely constructed houses built right up to the edge of the Rimac River. ... and the Lima Metropolitan Urban Plan will be updated in light of the results.

  7. Social protection initiatives for Zimbabwe's vulnerable groups ...

    African Journals Online (AJOL)

    Saharan African region. ... especially for vulnerable groups. At independence in 1980, Zimbabwe pledged to promote a viable social protection system that would be predicated on the principles of social justice and equality of opportunity.

  8. evaluation of models for assessing groundwater vulnerability

    African Journals Online (AJOL)

    DR. AMINU

    applied models for groundwater vulnerability assessment mapping. The appraoches .... The overall 'pollution potential' or DRASTIC index is established by applying the formula: DRASTIC Index: ... affected by the structure of the soil surface.

  9. The vulnerability of Palestinian refugees from Syria

    Directory of Open Access Journals (Sweden)

    Leah Morrison

    2014-09-01

    Full Text Available While Syrian nationals may eventually return to their home country, the future for Palestinians from Syria is increasingly uncertain. Meanwhile they are more vulnerable than, and treated worse than, most other refugees from the Syrian conflict.

  10. A Survey of Satellite Communications System Vulnerabilities

    National Research Council Canada - National Science Library

    Steinberger, Jessica A

    2008-01-01

    The U.S. military's increasing reliance on commercial and military communications satellites to enable widely-dispersed, mobile forces to communicate makes these space assets increasingly vulnerable to attack by adversaries...

  11. Climate Change, Household Vulnerability and Smart Agriculture

    International Development Research Centre (IDRC) Digital Library (Canada)

    Marina

    The cost benefits analysis was the main technique used to evaluate alternative adaptation strategies. .... Figure 7 Different vulnerability levels of households from Lambani and Alice . ...... practices and the maintenance of surface residues.

  12. CDC's Social Vulnerability Index (SVI) Mapping Dashboard

    Data.gov (United States)

    U.S. Department of Health & Human Services — The interactive maps are visual representations of the Social Vulnerability Index (SVI). Data were extracted from the US Census and the American Community Survey.

  13. AGRICULTURAL VULNERABILITY TO CLIMATE CHANGE IN ...

    African Journals Online (AJOL)

    victoria

    to adapt to climate change automatically implies vulnerability [14]. Thus, a .... this pattern is that rainfall may not be witnessed when desired for agricultural production .... climate change since it will enhance their ability to adopt innovations and ...

  14. Violence and vulnerabilities: Afghans in Pakistan

    Directory of Open Access Journals (Sweden)

    Sanaa Alimia

    2014-05-01

    Full Text Available Given that the majority of Afghans who live in Pakistan today are unlikely to return to Afghanistan, more needs to be done to address their vulnerabilities and protect them from harassment and violence.

  15. Distributed Generation to Counter Grid Vulnerability

    National Research Council Canada - National Science Library

    Nerad, Anton H

    2007-01-01

    In this paper I examine how the United States can best defend against the interruption of critical electrical energy by hostile acts, identify and examine some of the vulnerabilities to our nation's...

  16. A Critical Analysis of Vulnerability Taxonomies

    National Research Council Canada - National Science Library

    Bishop, Matt; Bailey, David

    1996-01-01

    Computer vulnerabilities seem to be omnipresent. In every system fielded programming errors configuration errors and operation errors have allowed unauthorized users to enter systems or authorized users to take unauthorized actions...

  17. Commercial Air Carrier Vulnerabilities to Information Operations

    National Research Council Canada - National Science Library

    Shelburn, Bryan H

    2002-01-01

    .... Among those elements susceptible to these vulnerabilities are the operations of commercial air carriers that are essential to the military's ability to wage war and project power wherever needed in the world...

  18. 5. Sexual Behaviours and Vulnerabilities to HIV

    African Journals Online (AJOL)

    Esem

    disability are among the poorest, least educated, and ... services can trap people in a cycle of poverty ... vulnerability, the need for attendant care, life in ... instrument by relying on approaches . ...... Training in learning disability for peers that.

  19. Relative seismic shaking vulnerability microzonation using an ...

    Indian Academy of Sciences (India)

    the relative seismic shaking vulnerability for built structures of different height categories within adjacent ..... monitor for possible changes in the microzonation results over time ..... The vehicle's ... A Garmin GPS 12XL was used to determine the.

  20. [Aged woman's vulnerability related to AIDS].

    Science.gov (United States)

    Silva, Carla Marins; Lopes, Fernanda Maria do Valle Martins; Vargens, Octavio Muniz da Costa

    2010-09-01

    This article is a systhematic literature review including the period from 1994 to 2009, whose objective was to discuss the aged woman's vulnerability in relation to Acquired Imunodeficiency Syndrome (Aids). The search for scientific texts was accomplished in the following databases: Biblioteca Virtual em Saúde, Scientific Eletronic Library Online (SciELO), Literatura Latino-Americana e do Caribe em Ciências da Saúde (LILACS) and Medical Literature Analysis and Retrieval System Online (MEDLINE). The descriptors used were vulnerability, woman and Aids. Eighteen texts were analyzed, including articles in scientific journals, thesis and dissertations. As a conclusion, it was noted that aged women and vulnerability to Aids are directly related, through gender characteristics including submission and that were built historical and socially. We consider as fundamental the development of studies which may generate publications accessible to women, in order to help them see themselves as persons vulnerable to Aids contagion just for being women.

  1. Extinction vulnerability of coral reef fishes.

    Science.gov (United States)

    Graham, Nicholas A J; Chabanet, Pascale; Evans, Richard D; Jennings, Simon; Letourneur, Yves; Aaron Macneil, M; McClanahan, Tim R; Ohman, Marcus C; Polunin, Nicholas V C; Wilson, Shaun K

    2011-04-01

    With rapidly increasing rates of contemporary extinction, predicting extinction vulnerability and identifying how multiple stressors drive non-random species loss have become key challenges in ecology. These assessments are crucial for avoiding the loss of key functional groups that sustain ecosystem processes and services. We developed a novel predictive framework of species extinction vulnerability and applied it to coral reef fishes. Although relatively few coral reef fishes are at risk of global extinction from climate disturbances, a negative convex relationship between fish species locally vulnerable to climate change vs. fisheries exploitation indicates that the entire community is vulnerable on the many reefs where both stressors co-occur. Fishes involved in maintaining key ecosystem functions are more at risk from fishing than climate disturbances. This finding is encouraging as local and regional commitment to fisheries management action can maintain reef ecosystem functions pending progress towards the more complex global problem of stabilizing the climate. © 2011 Blackwell Publishing Ltd/CNRS.

  2. The CERT Guide to Coordinated Vulnerability Disclosure

    Science.gov (United States)

    2017-08-11

    Incident vs. Vulnerability Response 6 1.3 Why Coordinate Vulnerability Disclosures? 6 1.4 Previewing the Remainder of this Document 7 2 Principles of...Accidental Leaks 53 6.5 Independent Discovery 54 6.6 Active Exploitation 55 6.7 Relationships that Go Sideways 55 6.8 Hype, Marketing , and...guide provides an introduction to the key concepts, principles , and roles necessary to establish a successful CVD process. It also provides insights

  3. The Vulnerable Subject of Negligence Law

    OpenAIRE

    Stychin, C.

    2012-01-01

    The approach taken by English courts to the duty of care question in negligence has been subject to harsh criticism in recent years. This article examines this fundamental issue in tort law, drawing upon Canadian and Australian jurisprudence by way of comparison. From this analysis, the concept of vulnerability is developed as a productive means of understanding the duty of care. Vulnerability is of increasing interest in legal and political theory and it is of particular relevance to the law...

  4. Resultados clínicos e radiológicos en serie de artrodesis cervical anterior con caja de fusión intersomática y placa Resultados clínicos e radiológicos em série de artrodese cervical anterior com dispositivo de fusão intersomática e placa Clinical and radiologica outcomes in series of anterior cervical fusion with intersomatic cage and plate

    Directory of Open Access Journals (Sweden)

    Lyonel Beaulieu Lalanne

    2012-06-01

    Full Text Available OBJETIVOS: Analizar los resultados clínicos e radiológicos de una serie de pacientes sometidos a artrodesis cervical anterior con caja de fusión intersomática (CAGE y placa. MÉTODOS: Análisis retrospectivo de serie de pacientes sometidos a artrodesis cervical anterior con caja de fusión intersomática y placa entre los años 2004 y 2009. Revisión de fichas clínicas y radiografías, registro de edad, sexo, diagnósticos, nivel operado, complicaciones, evolución clínica y radiológica. Técnica quirúrgica de Smith-Robinson. Las cajas de fusión intersomática fueron llenadas con sustitutos de huesos. Deambulación 12 horas después de la cirugía, alta a las 48 horas, collar cervical intermitente por 2 semanas. Evaluación clínica mediante criterios de Odom. Seguimiento 17 a 78 meses. RESULTADOS: Diagnósticos: Hernia del núcleo pulposo (HNP cervical, 44 (71%, mielopatía, 11 (17,7%, fracturas, 7 (11,3%. Nivel 1: 44 (71%, Nivel 2: 15 (24,2%, Nivel 3: (4,8%. El nivel C5-C6 incluyó 92% de los casos. Alivio del dolor radicular: 60 (97%. Recuperación del déficit neurológico: 59 (95,2%. Alivio de la mielopatía: 8/11 pacientes (73%. Alivio del dolor cervical: 56 (90%. Resultados clínicos: 91,9% excelentes y buenos. Complicaciones (12,9%: 4 disfagias transitorias (6,5%, 1 disfagia permanente (1,6%, 2 disfonías transitorias (3,3%, 1 subcidencia con aflojamiento del implante y fractura asintomática de placa (1,6%. No hubo pseudoartrosis. CONCLUSIONES: Esta serie presenta buenos resultados clínicos, com alivio del dolor y recuperación neurológica comparables con los hallazgos en la literatura. El uso de la caja de fusión intersomática evita complicaciones de la zona dadora y, cuando es asociado a placa cervical anterior permite fijación intersomática inmediata, dando soporte estructural adecuado, con buenos resultados y sin complicaciones a largo plazo.OBJETIVOS: Analisar os resultados clínicos e radiológicos de uma série de

  5. Rockfall vulnerability assessment for reinforced concrete buildings

    Science.gov (United States)

    Mavrouli, O.; Corominas, J.

    2010-10-01

    The vulnerability of buildings to the impact of rockfalls is a topic that has recently attracted increasing attention in the scientific literature. The quantification of the vulnerability, when based on empirical or heuristic approaches requires data recorded from historical rockfalls, which are not always available. This is the reason why appropriate alternatives are required. The use of analytical and numerical models can be one of them. In this paper, a methodology is proposed for the analytical evaluation of the vulnerability of reinforced concrete buildings. The vulnerability is included in the risk equation by incorporating the uncertainty of the impact location of the rock block and the subsequent damage level. The output is a weighted vulnerability that ranges from 0 to 1 and expresses the potential damage that a rock block causes to a building in function of its velocity and size. The vulnerability is calculated by the sum of the products of the probability of block impact on each element of the building and its associated damage state, the latter expressed in relative recovery cost terms. The probability of exceeding a specific damage state such as non-structural, local, partial, extensive or total collapse is also important for the quantification of risk and to this purpose, several sets of fragility curves for various rock diameters and increasing velocities have been prepared. An example is shown for the case of a simple reinforced concrete building and impact energies from 0 to 4075 kJ.

  6. Avaliação do tratamento da discopatia degenerativa cervical pela artrodese via anterior utilizando placas associadas a cages ou cages em peek isoladamente Evaluación del tratamiento de la enfermedad degenerativa del disco cervical por la artrodesis anterior utilizando placas asociadas con jaulas o jaulas en peec, aisladamente Evaluation of cervical degenerative disc disease treatment by anterior arthrodesis using plates associated with cages or cages in peek alone

    Directory of Open Access Journals (Sweden)

    André Rafael Hübner

    2011-01-01

    Full Text Available OBJETIVOS: Avaliar comparativamente o tratamento da discopatia degenerativa cervical por discectomia e artrodese cervical via anterior utilizando placas associadas a cages ou cages em PEEK isoladamente. MÉTODOS: Foi realizado um estudo retrospectivo comparativo entre dois grupos de pacientes operados pela técnica de discectomia e artrodese cervical via anterior. Foram selecionados aleatoriamente 70 pacientes, 35 operados com o método de fixação com placas associadas a cages - denominado Grupo I - e 35 com o cage em PEEK isoladamente - Grupo II. Realizou-se anamnese, exame físico, escores de dor (escala visual e analógica da dor e função (critérios de Odom's, SF-36, Indice de incapacidade do pescoço o pré e pós-operatório e exames de imagem. RESULTADOS: Houve predominância de pacientes do sexo feminino em ambos os grupos, com média de idade de 55 anos no Grupo I e 47 no Grupo II. Ambos os grupos apresentaram distribuição semelhante quanto ao número de níveis operados, assim como nas complicações encontradas e escores de dor, cervicalgia e SF36 no pré e pós-operatório. Houve 97.1% de fusão com 94.3% de bons resultados no Grupo I e 100% de fusão, com 97 % de bons resultados no Grupo II. CONCLUSÕES: O estudo comparativo da utilização de placas com cages e cages em PEEK isoladamente apresentou resultados semelhantes e satisfatórios para os grupos estudados, não se constatando superioridade ou inferioridade de um método com relação ao outro.OBJETIVOS: Evaluar comparativamente el tratamiento de la enfermedad degenerativa del disco cervical por discectomía y artrodesis cervical vía anterior, utilizando placas asociadas con el uso de jaulas o estas en PEEK [Poliéster-Éter-Éter-Cetona], aisladamente. MÉTODOS: fue realizado un estudio retrospectivo comparativo de dos grupos de pacientes tratados con la técnica de discectomía y artrodesis cervical vía anterior. Se seleccionaron al azar 70 pacientes, 35 operados

  7. Drought vulnerability assesssment and mapping in Morocco

    Science.gov (United States)

    Imani, Yasmina; Lahlou, Ouiam; Bennasser Alaoui, Si; Naumann, Gustavo; Barbosa, Paulo; Vogt, Juergen

    2014-05-01

    Drought vulnerability assessment and mapping in Morocco Authors: Yasmina Imani 1, Ouiam Lahlou 1, Si Bennasser Alaoui 1 Paulo Barbosa 2, Jurgen Vogt 2, Gustavo Naumann 2 1: Institut Agronomique et Vétérinaire Hassan II (IAV Hassan II), Rabat Morocco. 2: European Commission, Joint Research Centre (JRC), Institute for Environment and Sustainability (IES), Ispra, Italy. In Morocco, nearly 50% of the population lives in rural areas. They are mostly small subsistent farmers whose production depends almost entirely on rainfall. They are therefore very sensitive to drought episodes that may dramatically affect their incomes. Although, as a consequence of the increasing frequency, length and severity of drought episodes in the late 90's, the Moroccan government decided, to move on from a crisis to a risk management approach, drought management remains in practice mainly reactive and often ineffective. The lack of effectiveness of public policy is in part a consequence of the poor understanding of drought vulnerability at the rural community level, which prevents the development of efficient mitigation actions and adaptation strategies, tailored to the needs and specificities of each rural community. Thus, the aim of this study is to assess and map drought vulnerability at the rural commune level in the Oum Er-Rbia basin which is a very heterogeneous basin, showing a big variability of climates, landscapes, cropping systems and social habits. Agricultural data collected from the provincial and local administrations of Agriculture and socio-economic data from the National Department of Statistics were used to compute a composite vulnerability index (DVI) integrating four different components: (i) the renewable natural capacity, (ii) the economic capacity, (iii) human and civic resources, and (iv) infrastructure and technology. The drought vulnerability maps that were derived from the computation of the DVI shows that except very specific areas, most of the Oum er Rbia

  8. A knowledge integration approach to flood vulnerability

    Science.gov (United States)

    Mazzorana, Bruno; Fuchs, Sven

    2014-05-01

    Understanding, qualifying and quantifying vulnerability is an essential need for implementing effective and efficient flood risk mitigation strategies; in particular if possible synergies between different mitigation alternatives, such as active and passive measures, should be achieved. In order to combine different risk management options it is necessary to take an interdisciplinary approach to vulnerability reduction, and as a result the affected society may be willing to accept a certain degree of self-responsibility. However, due to differing mono-disciplinary approaches and regional foci undertaken until now, different aspects of vulnerability to natural hazards in general and to floods in particular remain uncovered and as a result the developed management options remain sub-optimal. Taking an even more fundamental viewpoint, the empirical vulnerability functions used in risk assessment specifically fail to capture physical principles of the damage-generating mechanisms to the build environment. The aim of this paper is to partially close this gap by discussing a balanced knowledge integration approach which can be used to resolve the multidisciplinary disorder in flood vulnerability research. Modelling techniques such as mathematical-physical modelling of the flood hazard impact to and response from the building envelope affected, and formative scenario analyses of possible consequences in terms of damage and loss are used in synergy to provide an enhanced understanding of vulnerability and to render the derived knowledge into interdisciplinary mitigation strategies. The outlined formal procedure allows for a convincing knowledge alignment of quantified, but partial, information about vulnerability as a result of the application of physical and engineering notions and valuable, but often underspecified, qualitative argumentation strings emerging from the adopted socio-economic viewpoint.

  9. Partial time use of anterior repositioning splints in the management of TMJ pain and dysfunction: a one-year controlled study Utilização de placas protrusivas em tempo parcial no tratamento da dor e disfunção da ATM: estudo controlado de um ano

    Directory of Open Access Journals (Sweden)

    Paulo César Rodrigues Conti

    2005-12-01

    Full Text Available This study aimed at evaluating the effectiveness of partial use of anterior repositioning appliances in the management of TMJ pain and dysfunction when compared to stabilization splints and a control group in a one-year follow-up. Sample was initially constituted by 60 patients, randomly divided into three groups: I- stabilization splints, II- repositioning splints and III- no treatment. The whole sample was evaluated by means of TMJ and muscle palpation, mandibular AROM, analysis of occlusal contacts, joint sounds inspection and Visual Analogue Scale (VAS for one year; 52 patients composed the final sample. A significant (after 15 days improvement in pain report (VAS and palpation index was found for group II (pO objetivo desse estudo foi avaliar a efetividade das placas oclusais reposicionadoras no controle de patologias intra-articulares da ATM, quando comparadas a um tratamento convencional (placa estabilizadora e um grupo sem tratamento (controle. A amostra final constou de 52 pacientes portadores de sinais e sintomas de desordens intra-articulares da ATM, divididos, aleatoriamente em três grupos, de acordo com o procedimento empregado: grupo I (n=20, utilizou placa estabilizadora, grupo II (n=18 utilizou placa reposicionadora e grupo III (n=14, sem nenhum tratamento.Toda a amostra foi acompanhada durante um ano, sendo avaliada através de questionários anamnésicos, palpação muscular e da ATM, movimentação mandibular e detecção de sons articulares.Uma avaliação da condição oclusal também foi realizada nos diferentes períodos de exame. Os resultados demonstraram uma maior efetividade das placas reposicionadoras na redução inicial da dor relatada pelo paciente, assim como uma diminuição na sensibilidade a palpação na ATM.Todos os grupos mostraram-se semelhantes após seis meses de controle em relação aos sintomas, assim como em relação aos ruídos articulares. Os índices de palpação muscular mostraram-se melhor

  10. Silver release from decomposed hyperaccumulating Amanita solitaria fruit-body biomass strongly affects soil microbial community

    Czech Academy of Sciences Publication Activity Database

    Gryndler, Milan; Hršelová, Hana; Soukupová, Lucie; Borovička, Jan

    2012-01-01

    Roč. 25, č. 5 (2012), s. 987-993 ISSN 0966-0844 R&D Projects: GA ČR(CZ) GAP504/11/0484 Institutional support: RVO:61389005 ; RVO:61388971 ; RVO:67985831 Keywords : soil fungi * bacteria * microbiota * heavy metals * toxicity * T-RFLP Subject RIV: BG - Nuclear, Atomic and Molecular Physics, Colliders; EE - Microbiology, Virology (MBU-M); DD - Geochemistry (GLU-S) Impact factor: 3.284, year: 2012

  11. Silver relase from decomposed hyperaccumulating Amanita solitaria fruit-body biomass strongly affects soil microbial community

    Czech Academy of Sciences Publication Activity Database

    Gryndler, M.; Hršelová, H.; Soukupová, L.; Borovička, Jan

    2012-01-01

    Roč. 25, č. 5 (2012), s. 987-993 ISSN 0966-0844 Institutional support: RVO:67985831 Keywords : soil fungi * bacteria * microbiota * heavy metals * toxicity * T-RFLP Subject RIV: DD - Geochemistry Impact factor: 3.284, year: 2012

  12. Fluctuation between grandiose and vulnerable narcissism.

    Science.gov (United States)

    Gore, Whitney L; Widiger, Thomas A

    2016-10-01

    Current literature on narcissistic personality disorder has emphasized a distinction between grandiose and vulnerable narcissism. Some researchers have further suggested that narcissistic persons fluctuate between grandiose and vulnerable narcissism. However, this perception has been confined largely to clinical experience with no systematic research testing the hypothesis. Clinicians and clinical psychology professors in the current study identified 143 persons who fit a description of either a grandiose or a vulnerable narcissist and indicated the extent to which these persons ever demonstrated traits of the complementary variant. The results supported the fluctuation hypothesis, particularly for episodes of vulnerable narcissism in persons identified as a grandiose narcissist. Correlations of the grandiose and vulnerable narcissism traits with a brief five-factor model measure corroborated past trait descriptions of the 2 respective variants of narcissism. The results of the current study are compared with existing cross-sectional and longitudinal research, and suggestions for future research are provided. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  13. Comparative studies of groundwater vulnerability assessment

    Science.gov (United States)

    Maria, Rizka

    2018-02-01

    Pollution of groundwater is a primary issue because aquifers are susceptible to contamination from land use and anthropogenic impacts. Groundwater susceptibility is intrinsic and specific. Intrinsic vulnerability refers to an aquifer that is susceptible to pollution and to the geological and hydrogeological features. Vulnerability assessment is an essential step in assessing groundwater contamination. This approach provides a visual analysis for helping planners and decision makers to achieve the sustainable management of water resources. Comparative studies are applying different methodologies to result in the basic evaluation of the groundwater vulnerability. Based on the comparison of methods, there are several advantages and disadvantages. SI can be overlaid on DRASTIC and Pesticide DRASTIC to extract the divergence in sensitivity. DRASTIC identifies low susceptibility and underestimates the pollution risk while Pesticide DRASTIC and SI represents better risk and is recommended for the future. SINTACS method generates very high vulnerability zones with surface waters and aquifer interactions. GOD method could be adequate for vulnerability mapping in karstified carbonate aquifers at small-moderate scales, and EPIK method can be used for large scale. GOD method is suitable for designing large area such as land management while DRASTIC has good accuracy and more real use in geoenvironmental detailed studies.

  14. Vulnerability of multiple-barrier systems

    International Nuclear Information System (INIS)

    Lind, N.C.

    1996-01-01

    'Vulnerability' is defined as the ratio of the probability of failure of a damaged system to the probability of failure of the undamaged system. This definition applies to all engineered systems and can be specialized to particular system types. Some disastrous failures (e.g., Chernobyl) have shown that systems can be highly vulnerable. open-quotes Defense in depthclose quotes is a powerful design principle, reducing vulnerability when the consequences of failure can be catastrophic. In the nuclear industry, defense in depth is widely used in radiation protection, reactor control, and shutdown systems. A multiple-barrier system is a simple example of a system that has defense in depth. The idea is that the system is not vulnerable. It cannot fail if one barrier fails because there is another to take its place. This idea is untenable in waste management, but a quantified vulnerability of a system can help owners, designers, and regulators decide how much defense in depth is desirable or enough. Many multiple-barrier systems can be modeled as systems of components physically in a series, each individually able to prevent failure. Components typically have bimodal distributions of the service time to failure, as illustrated by an example of application to a hypothetical nuclear fuel waste repository

  15. Windows Server 2012 vulnerabilities and security

    Directory of Open Access Journals (Sweden)

    Gabriel R. López

    2015-09-01

    Full Text Available This investigation analyses the history of the vulnerabilities of the base system Windows Server 2012 highlighting the most critic vulnerabilities given every 4 months since its creation until the current date of the research. It was organized by the type of vulnerabilities based on the classification of the NIST. Next, given the official vulnerabilities of the system, the authors show how a critical vulnerability is treated by Microsoft in order to countermeasure the security flaw. Then, the authors present the recommended security approaches for Windows Server 2012, which focus on the baseline software given by Microsoft, update, patch and change management, hardening practices and the application of Active Directory Rights Management Services (AD RMS. AD RMS is considered as an important feature since it is able to protect the system even though it is compromised using access lists at a document level. Finally, the investigation of the state of the art related to the security of Windows Server 2012 shows an analysis of solutions given by third parties vendors, which offer security products to secure the base system objective of this study. The recommended solution given by the authors present the security vendor Symantec with its successful features and also characteristics that the authors considered that may have to be improved in future versions of the security solution.

  16. Vulnerabilities in snakebites in Sao Paulo, Brazil

    Directory of Open Access Journals (Sweden)

    Maria Rita Bertolozzi

    2015-01-01

    Full Text Available ABSTRACTOBJECTIVE To describe elements of vulnerability of victims of snakebite.METHODS This qualitative, descriptive, cross-sectional study had, as theoretical framework, the concept of vulnerability in individual, social, and programmatic dimensions. We interviewed 21 patients admitted into a hospital specialized in the care of accidents caused by venomous animals. The interviews were analyzed according to a discourse analysis technique.RESULTS Patients were mainly young men, living in remote countryside areas, where health services frequently have limited resources. We found social and individual conditions of vulnerability, such as precarious schooling, low professional qualification, housing without access to piped water, no sewage treated, and no regular garbage collection, and lack of knowledge on this health problem. Regarding the programmatic dimension, we found limited accessibility to the health services that could affect the prognosis and the frequency of sequelae and deaths.CONCLUSIONS Considering such vulnerabilities evoke the need to improve the program for control the Accidents by Venomous Animals and the training of health workers, we highlight the potential use of the concept of vulnerability, which may amplify the understanding and the recommendations for the practice and education related to snakebites.

  17. Vulnerability of schools to floods in Nyando River catchment, Kenya.

    Science.gov (United States)

    Ochola, Samuel O; Eitel, Bernhard; Olago, Daniel O

    2010-07-01

    This paper assesses the vulnerability of schools to floods in the Nyando River catchment (3,600 km(2)) in western Kenya and identifies measures needed to reduce this vulnerability. It surveys 130 schools in the lower reaches, where flooding is a recurrent phenomenon. Of the primary schools assessed, 40% were vulnerable, 48% were marginally vulnerable and 12% were not vulnerable. Of the secondary schools, 8% were vulnerable, 73% were marginally vulnerable and 19% were not vulnerable. Vulnerability to floods is due to a lack of funds, poor building standards, local topography, soil types and inadequate drainage. The Constituencies Development Fund (CDF), established in 2003, provides financial support to cover school construction and reconstruction costs; CDF Committees are expected to adopt school building standards. In an effort to promote safe and resilient construction and retrofitting to withstand floods, this paper presents vulnerability reduction strategies and recommendations for incorporating minimum standards in the on-going Primary School Infrastructure Programme Design.

  18. Assessing species vulnerability to climate change

    Science.gov (United States)

    Pacifici, Michela; Foden, Wendy B.; Visconti, Piero; Watson, James E. M.; Butchart, Stuart H. M.; Kovacs, Kit M.; Scheffers, Brett R.; Hole, David G.; Martin, Tara G.; Akçakaya, H. Resit; Corlett, Richard T.; Huntley, Brian; Bickford, David; Carr, Jamie A.; Hoffmann, Ary A.; Midgley, Guy F.; Pearce-Kelly, Paul; Pearson, Richard G.; Williams, Stephen E.; Willis, Stephen G.; Young, Bruce; Rondinini, Carlo

    2015-03-01

    The effects of climate change on biodiversity are increasingly well documented, and many methods have been developed to assess species' vulnerability to climatic changes, both ongoing and projected in the coming decades. To minimize global biodiversity losses, conservationists need to identify those species that are likely to be most vulnerable to the impacts of climate change. In this Review, we summarize different currencies used for assessing species' climate change vulnerability. We describe three main approaches used to derive these currencies (correlative, mechanistic and trait-based), and their associated data requirements, spatial and temporal scales of application and modelling methods. We identify strengths and weaknesses of the approaches and highlight the sources of uncertainty inherent in each method that limit projection reliability. Finally, we provide guidance for conservation practitioners in selecting the most appropriate approach(es) for their planning needs and highlight priority areas for further assessments.

  19. The Mental Vulnerability Questionnaire: a psychometric evaluation

    DEFF Research Database (Denmark)

    Eplov, Lene Falgaard; Petersen, Janne; Jørgensen, Torben

    2010-01-01

    The Mental Vulnerability Questionnaire was originally a 22 item scale, later reduced to a 12 item scale. In population studies the 12 item scale has been a significant predictor of health and illness. The scale has not been psychometrically evaluated for more than 30 years, and the aim of the pre......The Mental Vulnerability Questionnaire was originally a 22 item scale, later reduced to a 12 item scale. In population studies the 12 item scale has been a significant predictor of health and illness. The scale has not been psychometrically evaluated for more than 30 years, and the aim...... 0.30 for the 12 and the 22 item scales. All five Mental Vulnerability scales had positively skewed score distributions which were associated significantly with both SCL-90-R symptom scores and NEO-PI-R personality scales (primarily Neuroticism and Extraversion). Coefficient alpha was highest...

  20. Mental vulnerability and survival after cancer

    DEFF Research Database (Denmark)

    Nakaya, Naoki; Bidstrup, Pernille E; Eplov, Lene F

    2009-01-01

    BACKGROUND: It has been hypothesized that personality traits affect survival after cancer, but studies have produced inconsistent results. This study examined the association between mental vulnerability and survival after cancer in Denmark in a prospective cohort study. METHODS: Between 1976...... and 2001, 12733 residents of Copenhagen completed a questionnaire eliciting information on a 12-item mental vulnerability scale, as well as various personal data. Follow-up in the Danish Cancer Registry until 2003 identified 884 incident cases of primary cancer, and follow-up for death from the date...... of cancer diagnosis until 2003 identified 382 deaths. Mental vulnerability scores were divided into 4 approximately equal-sized groups. Cox proportional hazards regression models were used to estimate the hazard ratio (HR) of all-cause mortality. RESULTS: Multivariate HR for all-cause mortality for persons...

  1. Reflexivity and vulnerability in collaborative knowledge production

    DEFF Research Database (Denmark)

    Jakobsen, Helle Nordentoft; Olesen, Birgitte Ravn

    -reports of positive learning outcomes and fails to illuminate how power is always at play leaving certain participants exposed and potentially vulnerable (Fenwick, 2008). As such, it remains unclear how power relations unfold in moment-by-moment interactions including how the researcher’s position matters...... because their voices are subjugated and they appear to be vulnerable. The extent of this development in the peer interactions and the reproductive nature of the knowledge produced were unexpected. In other words we – the researchers – became struck in the analytical process. In the final part of the paper......, we discuss how the reproduction of power relations invokes ethical concerns and raises critical perspectives on the undeniable common good of collaborative research in which participants’ vulnerability may be overlooked in potentially reflexive moments (Nordentoft and Kappel, 2011). Still, we find...

  2. A new approach to analyzing vulnerability

    International Nuclear Information System (INIS)

    O'Callaghan, P.B.; Carlson, R.L.; Riedeman, G.W.

    1986-01-01

    The Westinghouse Hanford Company (WHC) has recently completed construction of the Fuel Cycle Plant (FCP) at Richland, Washington. At start-up the facility will fabricate driver fuel for the Fast Flux Test Facility in the Secure Automated Fabrication line. After construction completion, but before facility certification, the Department of Energy (DOE) Richland Operation Office requested that a vulnerability analysis be performed which assumed multiple insiders as a threat to the security system. A unique method of analyzing facility vulnerabilities was developed at the Security Applications Center (SAC), which is managed by WHC for DOE. The method that was developed verifies a previous vulnerability assessment, as well as introducing a modeling technique which analyzes security alarms in relation to delaying factors and possible insider activities. With this information it is possible to assess the relative strength or weakness of various possible routes to and from a target within a facility,

  3. Narcissistic grandiosity and narcissistic vulnerability in psychotherapy.

    Science.gov (United States)

    Pincus, Aaron L; Cain, Nicole M; Wright, Aidan G C

    2014-10-01

    This article briefly summarizes the empirical and clinical literature underlying a contemporary clinical model of pathological narcissism. Unlike the DSM Narcissistic Personality Disorder (NPD), this clinical model identifies and differentiates between two phenotypic themes of dysfunction-narcissistic grandiosity and narcissistic vulnerability-that can be expressed both overtly and covertly in patients' ways of thinking, feeling, behaving, and participating in treatment. Clinical recognition that narcissistic patients can and often do present for psychotherapy in vulnerable states of depression, anxiety, shame, and even suicidality increases the likelihood of accurate diagnosis and effective treatment planning. This article provides case examples derived from psychotherapies with narcissistic patients to demonstrate how narcissistic grandiosity and narcissistic vulnerability concurrently present in patients who seek treatment. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  4. Vulnerability and controllability of networks of networks

    International Nuclear Information System (INIS)

    Liu, Xueming; Peng, Hao; Gao, Jianxi

    2015-01-01

    Network science is a highly interdisciplinary field ranging from natural science to engineering technology and it has been applied to model complex systems and used to explain their behaviors. Most previous studies have been focus on isolated networks, but many real-world networks do in fact interact with and depend on other networks via dependency connectivities, forming “networks of networks” (NON). The interdependence between networks has been found to largely increase the vulnerability of interacting systems, when a node in one network fails, it usually causes dependent nodes in other networks to fail, which, in turn, may cause further damage on the first network and result in a cascade of failures with sometimes catastrophic consequences, e.g., electrical blackouts caused by the interdependence of power grids and communication networks. The vulnerability of a NON can be analyzed by percolation theory that can be used to predict the critical threshold where a NON collapses. We review here the analytic framework for analyzing the vulnerability of NON, which yields novel percolation laws for n-interdependent networks and also shows that percolation theory of a single network studied extensively in physics and mathematics in the last 50 years is a specific limited case of the more general case of n interacting networks. Understanding the mechanism behind the cascading failure in NON enables us finding methods to decrease the vulnerability of the natural systems and design of more robust infrastructure systems. By examining the vulnerability of NON under targeted attack and studying the real interdependent systems, we find two methods to decrease the systems vulnerability: (1) protect the high-degree nodes, and (2) increase the degree correlation between networks. Furthermore, the ultimate proof of our understanding of natural and technological systems is reflected in our ability to control them. We also review the recent studies and challenges on the

  5. Avaliação da técnica de epifisiodese temporária com o uso das placas de Sherman: resultados preliminares Evaluation of the temporary epiphysiodesis procedure using the sherman plate: preliminary results

    Directory of Open Access Journals (Sweden)

    José Antonio Pinto

    2010-12-01

    Full Text Available OBJETIVO: Avaliar os resultados preliminares da técnica de epifisiodese temporária utilizando-se as placas de Sherman no tratamento de distúrbios e deformidades dos membros inferiores. MÉTODOS: Foram avaliados, retrospectivamente, 27 pacientes submetidos à epifisiodese temporária do fêmur distal ou tíbia proximal com as placas de Sherman, em um total de 28 procedimentos. A idade média no momento da cirurgia foi de 11,2 anos (3-15 anos. Os implantes de dois furos eram confeccionados em liga de aço e apresentavam um orifício central para ser utilizado como guia. A fixação foi feita com dois parafusos canulados de 3,5mm. As indicações para o tratamento foram os desvios angulares dos membros inferiores em valgo (n = 10, varo (n = 2 e mistos (n = 1; discrepância do comprimento dos membros (n = 9; e contratura em flexo do joelho (n = 5. RESULTADOS: O tempo médio de seguimento foi de 11,78 meses (±4,07. Observamos apenas um evento adverso (migração do implante em um paciente submetido à epifisiodese anterior do fêmur distal para correção de flexo de joelho. Não houve nenhum caso de quebra do material ou fechamento fisário prematuro. CONCLUSÃO: A técnica de epifisiodese temporária com o uso das placas de Sherman mostrou ser de fácil execução e esteve envolvida com um baixo índice de complicações e custo inferior aos implantes similares em titânio. Por ser um procedimento de baixa morbidade, pode ser indicado em uma ampla faixa etária e para uma grande variedade de distúrbios do esqueleto imaturo.OBJECTIVE: To evaluate the preliminary results of a technique using temporary epiphysiodesis plates using a Sherman plate in the treatment of disorders and deformities of the lower limbs. METHODS: We retrospectively reviewed 27 patients who underwent temporary epiphysiodesis of the distal femur or proximal tibia with Sherman plates, comprising 28 procedures. The mean age at surgery was 11.2 years (3-15 years. The two

  6. Desenho de placa em forma de borboleta para tratamento de fraturas do calcâneo Design of butterfly-shaped plate and its application in treatment for calcaneal fractures

    Directory of Open Access Journals (Sweden)

    Guangrong Yu

    2012-12-01

    Full Text Available OBJETIVO: Apresentar um desenho de placa em forma de borboleta e sua aplicação no tratamento de fraturas do calcâneo e discutir suas indicações clínicas, vantagens e desvantagens. MÉTODOS: De fevereiro de 2008 a abril de 2010, 22 pacientes com 26 fraturas intra-articulares do calcâneo foram tratados com redução a céu aberto e fixação interna com placa em forma de borboleta. Dezesseis pacientes eram homens e 6 eram mulheres, com média de idade de 36,8 anos. Onze eram pés esquerdos e 15, direitos. De acordo com a classificação de Sanders, 12 eram fraturas de calcâneo Tipo II (inclusive 3 Tipo IIa, 7 Tipo IIb e 2 Tipo IIc e 14 eram Tipo III (inclusive cinco do Tipo IIIab, 7 Tipo IIIac e duas do Tipo IIIbc. RESULTADOS: Dezessete pacientes (21 pés foram submetidos a acompanhamento por em média 19,2 meses. Os desfechos funcionais foram avaliados com o sistema Maryland Foot Score. Entre os nove pés com fraturas Tipo II, sete receberam escore excelente e dois, bom. Entre as 12 fraturas Tipo III, seis tiveram escore excelente, cinco, bom e uma, razoável. CONCLUSÃO: A placa em forma de borboleta é aplicável ao tratamento de fraturas do calcâneo do Tipo II e Tipo III de Sanders, com a vantagem de garantir fixação confiável, facilitar a cirurgia, produzir menos complicações pós-operatórias e produzir melhores desfechos clínicos gerais. Nível de Evidência IV, Série de casos.OBJECTIVE: To introduce the design of butterfly-shaped plate and its application in treatment for calcaneal fractures, and to discuss its clinical indications, advantages and disadvantages. METHODS: From February 2008 to April 2010, 22 patients with 26 intra-articular calcaneal fractures were treated by open reduction and internal fixation with butterfly-shape plate. Sixteen patients were male and 6 patients were female, with a mean age of 36.8 years. Eleven were left feet and 15, right. According to Sanders classification, 12 were Type II (including 3

  7. Assessment of Chemical and Radiological Vulnerabilities

    International Nuclear Information System (INIS)

    SETH, S.S.

    2000-01-01

    Following the May 14, 1997 chemical explosion at Hanford's Plutonium Reclamation Facility, the Department of Energy Richland Operations Office and its prime contractor, Fluor Hanford, Inc., completed an extensive assessment to identify and address chemical and radiological safety vulnerabilities at all facilities under the Project Hanford Management Contract. This was a challenging undertaking because of the immense size of the problem, unique technical issues, and competing priorities. This paper focuses on the assessment process, including the criteria and methodology for data collection, evaluation, and risk-based scoring. It does not provide details on the facility-specific results and corrective actions, but discusses the approach taken to address the identified vulnerabilities

  8. Terminological Ontologies for Risk and Vulnerability Analysis

    DEFF Research Database (Denmark)

    Madsen, Bodil Nistrup; Erdman Thomsen, Hanne

    2014-01-01

    Risk and vulnerability analyses are an important preliminary stage in civil contingency planning. The Danish Emergency Management Agency has developed a generic model and a set of tools that may be used in the preparedness planning, i.e. for identifying and describing society’s critical functions......, for formulating threat scenarios and for assessing consequences. Terminological ontologies, which are systems of domain specific concepts comprising concept relations and characteristics, are useful, both when describing the central concepts of risk and vulnerability analysis (meta concepts), and for further...

  9. Urban Vulnerability and Climate Change in Africa

    DEFF Research Database (Denmark)

    Urbanisation and climate change are among the major challenges for sustainable development in Africa. The overall aim of this book is to present innovative approaches to vulnerability analysis and for enhancing the resilience of African cities against climate change-induced risks. Locally adapted...... explores the role of governance in successfully coping with climate-induced risks in urban areas. The book is unique in that it combines: a top-down perspective of climate change modeling with a bottom-up perspective of vulnerability assessment; quantitative approaches from engineering sciences...

  10. The right to health care and vulnerability

    Directory of Open Access Journals (Sweden)

    João Carlos Loureiro

    2017-10-01

    Full Text Available The article seeks to clarify the concept of vulnerability, by taking structural and epochal frailty into account. To understand the right to health care, the author reflects about the fundamental goods, and he then examines how that same right is present in the Portuguese and the Spanish constitutions. The association between vulnerability and the law is also tackled, with a special reference –in dialogue with Herbert Hart– to its fundamental level and to other links between both terms in the field of health. The article closes with a few remarks on posthumanist attempts at saying goodbye to human frailty.

  11. Multi-dimensional flood vulnerability assessment using data envelopment analysis

    Science.gov (United States)

    Zahid, Zalina; Saharizan, Nurul Syuhada; Hamzah, Paezah; Hussin, Siti Aida Sheikh; Khairi, Siti Shaliza Mohd

    2017-11-01

    Malaysia has been greatly impacted by flood during monsoon seasons. Even though flood prone areas are well identified, assessment on the vulnerability of the disaster is lacking. Assessment of flood vulnerability, defined as the potential for loss when a disaster occurs, is addressed in this paper. The focus is on the development of flood vulnerability measurement in 11 states in Peninsular Malaysia using a non-parametric approach of Data Envelopment Analysis. Scores for three dimensions of flood vulnerability (Population Vulnerability, Social Vulnerability and Biophysical) were calculated using secondary data of selected input and output variables across an 11-year period from 2004 to 2014. The results showed that Johor and Pahang were the most vulnerable to flood in terms of Population Vulnerability, followed by Kelantan, the most vulnerable to flood in terms of Social Vulnerability and Kedah, Pahang and Terengganu were the most vulnerable to flood in terms of Biophysical Vulnerability among the eleven states. The results also showed that the state of Johor, Pahang and Kelantan to be most vulnerable across the three dimensions. Flood vulnerability assessment is important as it provides invaluable information that will allow the authority to identify and develop plans for flood mitigation and to reduce the vulnerability of flood at the affected regions.

  12. Characterization of gold and nickel coating on AISI 304 stainless steel for use in the fabrication of current collector plates for fuel cells; Caracterizacion de recubrimientos de oro y niquel realizados sobre acero inoxidable AISI 304 para su empleo en la fabricacion de placas colectoras de corriente para celdas de combustible

    Energy Technology Data Exchange (ETDEWEB)

    Flores Hernandez, J. Roberto [Instituto de Investigaciones Electricas, Cuernavaca, Morelos (Mexico)] e-mail: jrflores@iie.org.mx; Aguilar Gama, M. Tulio [UNAM. Facultad de Quimica, Mexico D.F. (Mexico); Cano Castillo, Ulises; Albarran, Lorena [Instituto de Investigaciones Electricas, Cuernavaca, Morelos (Mexico); Olvera, J. Carlos; Orozco, German [CIDETEQ, Pedro Escobedo, Queretaro (Mexico)

    2009-09-15

    Among the different components that compose fuel cell technology (MEA, bipolar plates, seals, etc.) current collector plates play an important role in the good performance of fuel cells, since they collect all of the current generated and distribute it to the external circuit. Therefore, the most important properties that the current collector plates should have are excellent conductivity and good resistance to the corrosive conditions present in the fuel cell. This document presents results obtained during the nickel and gold electrodeposition process on AISI 304 stainless steel and the morphology and thickness of each coating, their adhesion, hardness and conductivity values. Finally, results obtained during some of the electrochemical tests performed on the coatings are shown. [Spanish] De los diferentes componentes que integran la tecnologia de celdas de combustible (MEA's, placas bipolares, sellos, etc.), las placas colectoras de corriente tienen un importante rol en el buen desempeno de la celdas de combustibles, ya que en estas placas se colecta toda la corriente generada y se distribuye al circuito externo. Debido a esto, las propiedades mas importantes que deben tener las placas colectaras de corriente son: excelente conductividad y buena resistencia a las condiciones corrosivas presentes en la celda de combustible. En este documento se presentan los resultados obtenidos en el proceso de electrodeposicion de niquel y oro sobre acero inoxidable AISI 304, asi como la morfologia y el espesor de cada recubrimiento, sus valores de adherencia, dureza y conductividad. Finalmente se muestran tambien los resultados obtenidos de algunas pruebas electroquimicas a los que fueron sometidos los recubrimientos.

  13. Chemical Safety Vulnerability Working Group Report

    Energy Technology Data Exchange (ETDEWEB)

    1994-09-01

    This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

  14. Oil Vulnerabilities and United States Strategy

    Science.gov (United States)

    2007-02-08

    Mazda, Mercedes - Benz , Ford, Mercury, and Nissan offer flexible fuel vehicles in the United States. Ethanol is currently produced in the United States...USAWC STRATEGY RESEARCH PROJECT OIL VULNERABILITIES AND UNITED STATES STRATEGY by Colonel Shawn P. Walsh...Colleges and Schools, 3624 Market Street, Philadelphia, PA 19104, (215) 662-5606. The Commission on Higher Education is an institutional accrediting

  15. Retrieval from Memory: Vulnerable or Inviolable?

    Science.gov (United States)

    Jones, Dylan M.; Marsh, John E.; Hughes, Robert W.

    2012-01-01

    We show that retrieval from semantic memory is vulnerable even to the mere presence of speech. Irrelevant speech impairs semantic fluency--namely, lexical retrieval cued by a semantic category name--but only if it is meaningful (forward speech compared to reversed speech or words compared to nonwords). Moreover, speech related semantically to the…

  16. Food fraud vulnerability and its key factors

    NARCIS (Netherlands)

    Ruth, van Saskia M.; Huisman, Wim; Luning, Pieternel A.

    2017-01-01

    Background Food fraud prevention and fraud vulnerability reduction are the first steps to combat food fraud and require a recurrent effort throughout the food supply chain. Due to the intentional nature of fraud, it requires different tactics than the common food safety approaches. However,

  17. Web vulnerability study of online pharmacy sites.

    Science.gov (United States)

    Kuzma, Joanne

    2011-01-01

    Consumers are increasingly using online pharmacies, but these sites may not provide an adequate level of security with the consumers' personal data. There is a gap in this research addressing the problems of security vulnerabilities in this industry. The objective is to identify the level of web application security vulnerabilities in online pharmacies and the common types of flaws, thus expanding on prior studies. Technical, managerial and legal recommendations on how to mitigate security issues are presented. The proposed four-step method first consists of choosing an online testing tool. The next steps involve choosing a list of 60 online pharmacy sites to test, and then running the software analysis to compile a list of flaws. Finally, an in-depth analysis is performed on the types of web application vulnerabilities. The majority of sites had serious vulnerabilities, with the majority of flaws being cross-site scripting or old versions of software that have not been updated. A method is proposed for the securing of web pharmacy sites, using a multi-phased approach of technical and managerial techniques together with a thorough understanding of national legal requirements for securing systems.

  18. Vulnerability and Knowledge of Sexually Transmitted Infections ...

    African Journals Online (AJOL)

    Vulnerability and Knowledge of Sexually Transmitted Infections Among Female Traders of Reproductive Age in Enugu, Nigeria. ... Conclusion: The inclusion of health education in schools' curricula to ensure that adolescents are adequately aware of STIs, their modes of transmission, prevention and treatment before ...

  19. Development on Vulnerability Assessment Methods of PPS

    Institute of Scientific and Technical Information of China (English)

    MIAO; Qiang; ZHANG; Wen-liang; BU; Li-xin; YIN; Hong-he; LI; Xin-jun; FANG; Xin

    2013-01-01

    Through investigating information from domestic and abroad,joint the domestic assessment experience,we present a set of physical protection system(PPS)vulnerability assessment methods for on-operating nuclear power plants and for on-designing nuclear facilities.The methods will help to strengthen and upgrade the security measures of the nuclear facilities,improve the effectiveness and

  20. Vulnerability to Climate Change in Rural Nicaragua

    Science.gov (United States)

    Byrne, T. R.; Townshend, I.; Byrne, J. M.; McDaniel, S. A.

    2013-12-01

    While there is a growing recognition of the impact that climate change may have on human development, there has been a shift in focus from an impacts-led assessment approach towards a vulnerability-led assessment approach. This research operationalizes the IPCC's definition of vulnerability in a sub-national assessment to understand how different factors that shape vulnerability to climate change vary spatially across rural Nicaragua. The research utilizes the Food and Agriculture Organization of the United Nations' (FAO UN) CropWat model to evaluate how the annual yield of two of Nicaragua's staple crops may change under projected changes in temperature and precipitation. This analysis of agricultural sensitivity under exposure to climate change is then overlain with an indicator-based assessment of adaptive capacity in rural Nicaraguan farming households. Adaptive capacity was evaluated using household survey data from the 2001 National Household Survey on Living Standards Measurement, which was provided to us by the FAO UN. The result is a map representing current vulnerability to future climate change, and can serve as a basis for targeting policy interventions in rural Nicaragua.

  1. AGRICULTURAL VULNERABILITY TO CLIMATE CHANGE IN ...

    African Journals Online (AJOL)

    victoria

    climate change in eight selected rural settlements in Sokoto State, Nigeria adopting the ... on the environmental and socio-economic determinants of agricultural vulnerability to .... global warming show increasing trends in Sokoto. .... One of the consequences of desertification is southward migration of nomads to the more.

  2. Care and housing for vulnerable elderly

    NARCIS (Netherlands)

    M.M.Y. de Klerk

    2004-01-01

    Original title: Zorg en wonen voor kwetsbare ouderen. There is a general belief that old age automatically brings infirmities, though this is by no means always the case. This edition of the Report on the Elderly investigates which elderly people are vulnerable. They include older persons

  3. Using Fuzz Testing for Searching Software Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Bogdan Leonidovich Kozirsky

    2014-12-01

    Full Text Available This article deals with fuzz testing (fuzzing, a software testing and vulnerability searching technique based on providing inputs of programs with random data and further analysis of their behavior. The basics of implementing cmdline argument fuzzer, environment variable fuzzer and syscall fuzzer in any UNIX-like OS have been closely investigated.

  4. Configuration Fuzzing for Software Vulnerability Detection.

    Science.gov (United States)

    Dai, Huning; Murphy, Christian; Kaiser, Gail

    2010-02-15

    Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environment. One approach to detecting these vulnerabilities is fuzz testing, which feeds a range of randomly modified inputs to a software application while monitoring it for failures. However, typical fuzz testing makes no guarantees regarding the syntactic and semantic validity of the input, or of how much of the input space will be explored. To address these problems, in this paper we present a new testing methodology called configuration fuzzing. Configuration fuzzing is a technique whereby the configuration of the running application is randomly modified at certain execution points, in order to check for vulnerabilities that only arise in certain conditions. As the application runs in the deployment environment, this testing technique continuously fuzzes the configuration and checks "security invariants" that, if violated, indicate a vulnerability; however, the fuzzing is performed in a duplicated copy of the original process, so that it does not affect the state of the running application. In addition to discussing the approach and describing a prototype framework for implementation, we also present the results of a case study to demonstrate the approach's efficiency.

  5. Defense Against National Vulnerabilities in Public Data

    Science.gov (United States)

    2017-02-28

    ingestion of subscription based precision data sources ( Business Intelligence Databases, Monster, others).  Flexible data architecture that allows for...components of program execution from technical design to business and program management, to ensure timely and complete execution of contract...type. Satellite Imagery Adapters Planet and Carto Adapter Juno Services Vulnerability Assessment Framework Computer Model Facebook Graph API

  6. Economic factors of vulnerability trade and exploitation

    NARCIS (Netherlands)

    Allodi, L.

    2017-01-01

    Cybercrime markets support the development and diffusion of new attack technologies, vulnerability exploits, and malware. Whereas the revenue streams of cyber attackers have been studied multiple times in the literature, no quantitative account currently exists on the economics of attack acquisition

  7. Monitoring the Vulnerability of Energy Supply System

    International Nuclear Information System (INIS)

    Gnansonounou, E.

    2006-01-01

    Due to the increasing complexity of the world evolution, the public decision makers, the energy supply industry and the consumers in industrialised countries are more and more sensitive to the vulnerability of energy supply. The emergence of new big consumer countries and the perspective of oil and gas depletion at the end of the current century raise the concerns about how to share fairly the remaining resources for the common and sustainable development of the mankind. Erratic energy prices discourage investment and delay the energy transition. Voluntary measures are needed mainly in industrialised countries in order to develop alternative and sustainable energy sources and to avoid world struggle for energy procurement. In this contribution a synthetic energy vulnerability index is defined for monitoring energy supply vulnerability. The proposed index is based on energy intensity, oil and gas import dependency, CO 2 content of primary energy supply, electricity supply vulnerability and non-diversity in transport fuels. The preliminary assessment of this synthetic index for selected industrialised countries provides promising results that need however further refinement.(author)

  8. Assessing infrastructure vulnerability to major floods

    Energy Technology Data Exchange (ETDEWEB)

    Jenssen, Lars

    1998-12-31

    This thesis proposes a method for assessing the direct effects of serious floods on a physical infrastructure or utility. This method should be useful in contingency planning and in the design of structures likely to be damaged by flooding. A review is given of (1) methods of floodplain management and strategies for mitigating floods, (2) methods of risk analysis that will become increasingly important in flood management, (3) methods for hydraulic computations, (4) a variety of scour assessment methods and (5) applications of geographic information systems (GIS) to the analysis of flood vulnerability. Three computer codes were developed: CULVCAP computes the headwater level for circular and box culverts, SCOUR for assessing riprap stability and scour depths, and FASTFLOOD prepares input rainfall series and input files for the rainfall-runoff model used in the case study. A road system in central Norway was chosen to study how to analyse the flood vulnerability of an infrastructure. Finally, the thesis proposes a method for analysing the flood vulnerability of physical infrastructure. The method involves a general stage that will provide data on which parts of the infrastructure are potentially vulnerable to flooding and how to analyse them, and a specific stage which is concerned with analysing one particular kind of physical infrastructure in a study area. 123 refs., 59 figs., 17 tabs= .

  9. Analysis of computational vulnerabilities in digital repositories

    Directory of Open Access Journals (Sweden)

    Valdete Fernandes Belarmino

    2015-04-01

    Full Text Available Objective. Demonstrates the results of research that aimed to analyze the computational vulnerabilities of digital directories in public Universities. Argues the relevance of information in contemporary societies like an invaluable resource, emphasizing scientific information as an essential element to constitute scientific progress. Characterizes the emergence of Digital Repositories and highlights its use in academic environment to preserve, promote, disseminate and encourage the scientific production. Describes the main software for the construction of digital repositories. Method. The investigation identified and analyzed the vulnerabilities that are exposed the digital repositories using Penetration Testing running. Discriminating the levels of risk and the types of vulnerabilities. Results. From a sample of 30 repositories, we could examine 20, identified that: 5% of the repositories have critical vulnerabilities, 85% high, 25% medium and 100% lowers. Conclusions. Which demonstrates the necessity to adapt actions for these environments that promote informational security to minimizing the incidence of external and / or internal systems attacks.Abstract Grey Text – use bold for subheadings when needed.

  10. The vulnerability and resilience of historic structures

    Czech Academy of Sciences Publication Activity Database

    Drdácký, Miloš

    2017-01-01

    Roč. 11, č. 4 (2017), s. 8-12 ISSN 1842-5631 R&D Projects: GA ČR(CZ) GBP105/12/G059 Institutional support: RVO:68378297 Keywords : emergency situations * vulnerability * resilience * maintenance * cultural heritage Subject RIV: AL - Art, Architecture, Cultural Heritage OBOR OECD: Architecture engineering

  11. Climate change vulnerability map of Southeast Asia

    International Development Research Centre (IDRC) Digital Library (Canada)

    anshory

    Development Studies (CEDS), Padjadjaran University, for his excellent research assistance. ... Malaysia, and Philippines) are the most vulnerable to climate change. 2. ... system to adjust to climate change (including climate variability and extremes), ... national administrative areas in seven countries in Southeast Asia, i.e., ...

  12. Cyber/Physical Security Vulnerability Assessment Integration

    International Nuclear Information System (INIS)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-01-01

    This internally funded Laboratory-Directed R and D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  13. Perceived Vulnerability to Disease Predicts Environmental Attitudes

    Science.gov (United States)

    Prokop, Pavol; Kubiatko, Milan

    2014-01-01

    Investigating predictors of environmental attitudes may bring valuable benefits in terms of improving public awareness about biodiversity degradation and increased pro-environmental behaviour. Here we used an evolutionary approach to study environmental attitudes based on disease-threat model. We hypothesized that people vulnerable to diseases may…

  14. Environmental conflicts and women's vulnerability in Africa

    African Journals Online (AJOL)

    based violence since environmental conflicts increase women's vulnerability .... on 'immediate' and 'hard' security issues over 'everyday politics' has meant that .... these studies provide valuable information about the plight of women and key ..... schools: Case studies from the Durban Metropolitan Area, M.A. dissertation ...

  15. A pragmatic analysis of vulnerability in clinical research.

    Science.gov (United States)

    Wendler, David

    2017-09-01

    Identifying which subjects are vulnerable, and implementing safeguards to protect them, is widely regarded as essential to clinical research. Commentators have endorsed a number of responses to these challenges and have thereby made significant progress in understanding vulnerability in clinical research. At the same time, this literature points to a central contradiction which calls into question its potential to protect vulnerable subjects in practice. Specifically, analysis suggests that all human subjects are vulnerable and vulnerability in clinical research is comparative and context dependent, in the sense that individuals are vulnerable relative to others and in some contexts only. Yet, if everyone is vulnerable, there seems to be no point in citing the vulnerability of some individuals. Moreover, the conclusion that everyone is vulnerable seems inconsistent with the claims that vulnerability is comparative and context dependent, raising concern over whether it will be possible to develop a comprehensive account of vulnerability that is internally consistent. The solution to this dilemma lies in recognition of the fact that the practical significance of claims regarding vulnerability depends on the context in which they are used. The claims that appear to lead to the central contradiction are in fact accurate conclusions that follow from different uses of the term 'vulnerability'. The present manuscript describes this 'pragmatic' approach to vulnerability in clinical research and considers its implications for ensuring that subjects receive appropriate protection. Published 2017. This article is a U.S. Government work and is in the public domain in the USA.

  16. Irreversibility analysis of non isothermal flat plate solar collectors for air heating with a dimensionless model; Analisis de las irreversibilidades en colectores solares de placas planas no isotermicos para calentamiento de aire utilizando un modelo adimensional

    Energy Technology Data Exchange (ETDEWEB)

    Bracamonte-Baran, Johane Hans; Baritto-Loreto, Miguel Leonardo [Universidad Central de Venezuela (Venezuela)]. E-mails: johanehb@gmail.com; johane.bracamonte@ucv.ve; miguel.baritto@ucv.ve

    2013-04-15

    The dimensionless model developed and validated by Baritto and Bracamonte (2012) for the thermal behavior of flat plate solar collector without glass cover is improved by adding the entropy balance equation in a dimensionless form. The model is solved for a wide range of aspect ratios and mass flow numbers. A parametric study is developed and the distribution of internal irreversibilities along the collector is analyzed. The influence of the design parameters on the entropy generation by fluid friction and heat transfer is analyzed and it is found that for certain combinations of these parameters optimal thermodynamic operation can be achieved. [Spanish] En el presente trabajo, el modelo adimensional desarrollado y validado por Baritto y Bracamonte (2012) para describir el comportamiento termico de colectores solares de placas planas sin cubierta transparente, se complementa con la ecuacion adimensional de balance de entropia para un elemento diferencial de colector solar. El modelo se resuelve para un amplio rango de valores de relaciones de aspecto y numero de flujo de masa. A partir de los resultados del modelo se desarrolla un analisis detallado de la influencia de estos parametros sobre la distribucion de irreversibilidades internas a lo largo del colector. Adicionalmente se estudia la influencia de estos parametros sobre los numeros de generacion de entropia por friccion viscosa, por transferencia de calor y total. Se encuentra que existen combinaciones de los parametros antes mencionados, para los cuales, la operacion del colector es termodinamicamente optima para numeros de flujo de masa elevados.

  17. Placa fibrosa de la frente o del cuero cabelludo: Un marcador cutáneo temprano del complejo de la esclerosis tuberosa Forehead or scalp fibrous plaque: An earley cutaneous marker in tuberous sclerosis complex

    Directory of Open Access Journals (Sweden)

    A. E Saponaro

    2010-09-01

    Full Text Available El complejo de la Esclerosis tuberosa es una afección hereditaria, que se transmite en forma autosómica dominante. Se caracteriza por convulsiones, retraso mental y manifestaciones en diversos órganos. Los signos cutáneos suelen ser determinantes para el diagnóstico de la enfermedad. Entre éstos se destaca la placa fibrosa, la que se localiza más frecuentemente en la frente, pero puede observarse en cualquier área del cuero cabelludo. Cuando está presente, suele ser el signo cutáneo inicial de la enfermedad, como ocurrió en nuestro paciente, subdiagnosticado. Su importancia radica entonces en reconocerlo como un marcador precoz y patognomónico de la enfermedad.The complex of tuberous sclerosis is an hereditary disease that passes in the autosomal dominant way. It is characterized by convulsions, mental retardation and manifestations in different organs. The cutaneous signs are used to be determinant for the diagnosis of the illness. Among these, it is important the fibrous plaque, which is usually localized in the forehead, but it can also be observed in any area of the scalp.When it is presented, it is used to be the first cutaneous sign of the illness, and like it happened in our patient, underdiagnosed. So, the importance of the fibrous plaque lies in recognizing it as an early cutaneous marker and pathognomonic of the disease.

  18. Investigación de la unión soldada entre el vástago y las placas de las cuchillas calzadas // Investigation of the welded joint between plates and tipped single-point lathe tools

    Directory of Open Access Journals (Sweden)

    M. Jacas Cabrera

    2000-01-01

    Full Text Available El presente trabajo está dirigido al incremento de los niveles de producción y calidad, específicamente en la línea defabricación de cuchillas calzadas para torno en el centro fabril “Miguel Saavedra” HERRAMIX.En este caso se realizó un análisis para la sustitución de las pastillas de soldar, fabricadas por CIME por nuevastrimetálicas.En el mismo se determinaron los tiempos de calentamiento necesarios para realizar la soldadura, en las máquinas deinducción (TBCHE, así como los valores de resistencia al cizallamiento de los calzos una vez soldados.Palabras claves: Cuchillas de punta, calzos metalo-ceramicos, placas trimetálicas_____________________________________________________________________Abstract:The present work is directed to increase the production and quality levels of tipped single-point lathe tools at “MiguelSaavedra” plant HERRAMIX.This work deals with a study about the substitution of brazing-pads made by CIME for tri-metallic new ones.The induction brazing heating time’s necessaries at induction machines (TBCHE as well as shear-stress values at the tips afterwelding are determined.Key words: tip single point lathe tool, metal ceramic plate, trimetallic pads.

  19. Placas máculonoduliformes hiperpigmentadas pruriginosas en niño de dos años de edad Nodular, brownish macules and pruriginous patches in a two years old boy

    Directory of Open Access Journals (Sweden)

    AD Pérez-Elizondo

    2011-12-01

    Full Text Available Se atiende a paciente masculino de dos años de edad, con numerosas placas máculonoduliformes discretamente sobreelevadas, de tinte marronáceo bien definidas, ovaladas e irregulares, muy pruriginosas, localizadas en tronco involucrando especialmente dorso. Tiempo de evolución: desde los seis meses de vida. Se refieren molestas agudizaciones y remisiones parciales, sin desaparición lesional completa a intervalos variables. Se observan episodios ampollosos y de urticación ocasionales, durante la exposición solar y baño corporal con agua caliente. La presentación clínica característica correlacionada con los hallazgos histopatológicos, confirma el diagnóstico de urticaria pigmentosa.A 2-year old male patient with multiple nodular and brownish itchy macules and patches, located at the back of the trunk was received medical attention at a children´s hospital. Frequent flares and incomplete remissions with blister and weal outbreaks after sun exposure and hot water baths were the rule. The distinctive cutaneous lesions as well as histopathological findings confirm urticaria pigmentosa.

  20. RECICLAGEM DE PLACAS DE CIRCUITO IMPRESSO DE COMPUTADORES SUCATADOS PARA A RECUPERAÇÃO DE ESTANHO POR ELETROELUIÇÃO DE RESINAS POLIMÉRICAS DE TROCA IÔNICA

    Directory of Open Access Journals (Sweden)

    Afonso Henriques Martins

    2014-08-01

    Full Text Available Este trabalho apresenta os resultados experimentais para a recuperação de estanho presente em soluções aquosas a parir da reciclagem de computadores sucatados, através da técnica de eletroeluição de resina polimérica catiônica Amberlite IR-120®(Merck, USA. A resina foi carregada pela passagem de 200ml de solução aquosa 0,2g/l de Sn em 2,18N H2SO4 (concentração do licor de lixiviação de placas de circuito impresso-PCI de microcomputadores sucatados através do leito de 10g de resina. A realização dos experimentos foi baseada em um planejamento estatístico pelo método fatorial completo replicado de três variáveis a dois níveis. A otimização foi feita pelo método do passo ascendente. As condições consideradas ótimas visando a eletrorrecuperação de estanho foram 150A/m2 de densidade de corrente catódica, tempo de eletroeluição de 45 minutos e intensidade de agitação moderada do eletrólito (100rpm.

  1. Avaliação da porosidade e placa férrica de raízes de arroz cultivado em hipoxia Evaluation of porosity and iron plaque on rice roots grown under hypoxia

    Directory of Open Access Journals (Sweden)

    Marquel Jonas Holzschuh

    2010-10-01

    Full Text Available A alta difusividade do oxigênio em diversos materiais dificulta a criação e, ou, manutenção de um ambiente livre de O2. As técnicas utilizadas são pouco eficientes na exclusão do O2 e, portanto, não expressam a condição do solo alagado. Os objetivos deste trabalho foram desenvolver um método para obtenção de raízes em condição de hipoxia e avaliar a placa férrica e a formação de aerênquima no arroz. Foi criada uma condição de hipoxia semelhante à do solo alagado em tanques de 50 L, explorando a capacidade de difusão do O2 por meio do vinil em contato com solo reduzido. Cada tanque preenchido com solo (Gleissolo háplico recebeu cinco sacos de vinil e foi mantido alagado. Plantas dos genótipos IRGA 423 e IRGA 424 previamente cultivadas em campo foram coletadas, tendo as raízes cortadas junto ao colo, lavadas e um terço da lâmina foliar removido. Cada saco de vinil recebeu 12 plantas de cada genótipo e solução nutritiva. Após sete dias, as novas raízes adventícias formadas foram utilizadas na determinação da porosidade e a da placa férrica em segmentos de 0-2, 2-4 e 4-6 cm a partir da ponta da raiz. As raízes foram colocadas em contato com a solução de um solo em processo de redução por 4 h e a placa férrica determinada após a extração do Fe com HCl 0,5 mol L-1. A porosidade foi determinada pela aplicação de ciclos de vácuo, com auxílio de seringas. A diferença de peso antes e depois do tratamento com vácuo e entrada de água foi assumida como sendo a estimativa da magnitude do aerênquima ao longo da raiz. A eficácia do método foi testada com a produção de raízes adventícias em saco de vinil com aeração e hipoxia. A porosidade nas raízes foi maior em ambiente hipóxico, comparado à aeração. A porosidade foi maior na proximidade da base da planta e, à medida que a porosidade aumentou, houve aumento do conteúdo de Fe na superfície das raízes, indicando que a placa férrica pode

  2. Aircraft vulnerability analysis by modeling and simulation

    Science.gov (United States)

    Willers, Cornelius J.; Willers, Maria S.; de Waal, Alta

    2014-10-01

    Infrared missiles pose a significant threat to civilian and military aviation. ManPADS missiles are especially dangerous in the hands of rogue and undisciplined forces. Yet, not all the launched missiles hit their targets; the miss being either attributable to misuse of the weapon or to missile performance restrictions. This paper analyses some of the factors affecting aircraft vulnerability and demonstrates a structured analysis of the risk and aircraft vulnerability problem. The aircraft-missile engagement is a complex series of events, many of which are only partially understood. Aircraft and missile designers focus on the optimal design and performance of their respective systems, often testing only in a limited set of scenarios. Most missiles react to the contrast intensity, but the variability of the background is rarely considered. Finally, the vulnerability of the aircraft depends jointly on the missile's performance and the doctrine governing the missile's launch. These factors are considered in a holistic investigation. The view direction, altitude, time of day, sun position, latitude/longitude and terrain determine the background against which the aircraft is observed. Especially high gradients in sky radiance occur around the sun and on the horizon. This paper considers uncluttered background scenes (uniform terrain and clear sky) and presents examples of background radiance at all view angles across a sphere around the sensor. A detailed geometrical and spatially distributed radiometric model is used to model the aircraft. This model provides the signature at all possible view angles across the sphere around the aircraft. The signature is determined in absolute terms (no background) and in contrast terms (with background). It is shown that the background significantly affects the contrast signature as observed by the missile sensor. A simplified missile model is constructed by defining the thrust and mass profiles, maximum seeker tracking rate, maximum

  3. Groundwater vulnerability maps for pesticides for Flanders

    Science.gov (United States)

    Dams, Jef; Joris, Ingeborg; Bronders, Jan; Van Looy, Stijn; Vanden Boer, Dirk; Heuvelmans, Griet; Seuntjens, Piet

    2017-04-01

    Pesticides are increasingly being detected in shallow groundwater and and are one of the main causes of the poor chemical status of phreatic groundwater bodies in Flanders. There is a need for groundwater vulnerability maps in order to design monitoring strategies and land-use strategies for sensitive areas such as drinking water capture zones. This research focuses on the development of generic vulnerability maps for pesticides for Flanders and a tool to calculate substance-specific vulnerability maps at the scale of Flanders and at the local scale. (1) The generic vulnerability maps are constructed using an index based method in which maps of the main contributing factors in soil and saturated zone to high concentrations of pesticides in groundwater are classified and overlain. Different weights are assigned to the contributing factors according to the type of pesticide (low/high mobility, low/high persistence). Factors that are taken into account are the organic matter content and texture of soil, depth of the unsaturated zone, organic carbon and redox potential of the phreatic groundwater and thickness and conductivity of the phreatic layer. (2) Secondly a tool is developed that calculates substance-specific vulnerability maps for Flanders using a hybrid approach where a process-based leaching model GeoPEARL is combined with vulnerability indices that account for dilution in the phreatic layer. The GeoPEARL model is parameterized for Flanders in 1434 unique combinations of soil properties, climate and groundwater depth. Leaching is calculated for a 20 year period for each 50 x 50 m gridcell in Flanders. (3) At the local scale finally, a fully process-based approach is applied combining GeoPEARL leaching calculations and flowline calculations of pesticide transport in the saturated zone to define critical zones in the capture zone of a receptor such as a drinking water well or a river segment. The three approaches are explained more in detail and illustrated

  4. US command improvements and command vulnerability

    International Nuclear Information System (INIS)

    Ball, D.; Bethe, H.A.; Blair, B.G.; Bracken, P.; Carter, A.B.; Dickinson, H.; Garwin, R.L.; Holloway, D.; Kendall, H.W.

    1988-01-01

    In essence, the United States still relies on the strategic command system erected during the 1960s and 1970s, but as we have seen, this system suffers from a number of serious weaknesses. Among these the authors emphasized the vulnerability of vital communications even before any warheads impact directly on U.S. targets, as well as the systems; heavy reliance on a relatively small number of limited-endurance aircraft as command posts and radio relays. This paper focuses on the committed improvement program, assess its impact on command vulnerability, and offer suggestions for further command improvements designed to enhance crisis stability and to facilitate ware termination should deterrence fail. The reader should note that this chapter is rather more technical than the remainder of this book

  5. Unified communication to reach vulnerable mothers.

    Science.gov (United States)

    Tezcan, B; Von Rege, I; Henkson, H; Oteng-Ntim, E

    2011-01-01

    The feasibility of using a mobile text to reach vulnerable patient groups was assessed in this study. A total of 121 pregnant or postnatal women were randomly asked to complete a questionnaire. The questionnaire was given to them in the antenatal clinic, postnatal ward, antenatal ward or in the day assessment unit at St Thomas' Hospital, London. The forms were collected and analysed using an Excel database. The results of this survey show that mobile technology is readily available for 97% of the obstetric population. In mothers from vulnerable groups and in mothers from deprived areas, 61% possessed 3rd generation mobile technology. The majority of mothers surveyed wanted their care supplemented by the use of their mobile phones.

  6. Vulnerable populations: cultural and spiritual direction.

    Science.gov (United States)

    Quest, Tammie E; Franks, Nicole M

    2006-08-01

    Cultural, spiritual, and religious diversity of emergency department patients is increasing while that of emergency physicians in particular remains predominantly homogeneous. With a discordance of cultural, race, and ethnicity exist, in the case of ethical conflict -resolution becomes that much more difficult. Patients may feel vulnerable when their emergency care provider does not understand his or her cultural, spiritual, and religious uniqueness as it relates to the patient-doctor interaction and health care decision making. This review will examine (1) language differences; (2) cultural, religious, and spiritual differences between patient and provider; (3) differing explanatory models of disease between patient and provider; and (4) diverse bioethical models of decision making of differing cultures in an effort to reduce vulnerabilities.

  7. Coping with subjectivity in vulnerability assessment

    International Nuclear Information System (INIS)

    Renis, T.A.; Cardwell, R.G.

    1988-01-01

    Vulnerability assessment models are widely used to systematically evaluate the performance of complex safeguards systems against a variety of threats. These models require varying levels of detail and input data about the physical design of a facility and its safeguards operations and procedures. However, to evaluate safeguards effectiveness and give a performance rating, these models require additional performance data reflecting probabilities of detection, assessment, interruption, and neutralization, as well as the associated times for various adversary scenarios. These data may be attained from equipment design specifications, laboratory testing, expert judgment, or component testing. Regardless of how these data are obtained, they are inherently subjective. This paper addresses the uses of various vulnerability assessment models and the nature of subjectivity in those models. The paper also describes methods for coping with subjective data

  8. Vulnerability, diversity and scarcity: on universal rights.

    Science.gov (United States)

    Turner, Bryan Stanley; Dumas, Alex

    2013-11-01

    This article makes a contribution to the on-going debates about universalism and cultural relativism from the perspective of sociology. We argue that bioethics has a universal range because it relates to three shared human characteristics,--human vulnerability, institutional precariousness and scarcity of resources. These three components of our argument provide support for a related notion of 'weak foundationalism' that emphasizes the universality and interrelatedness of human experience, rather than their cultural differences. After presenting a theoretical position on vulnerability and human rights, we draw on recent criticism of this approach in order to paint a more nuanced picture. We conclude that the dichotomy between universalism and cultural relativism has some conceptual merit, but it also has obvious limitations when we consider the political economy of health and its impact on social inequality.

  9. Intelligent Techniques for Power Systems Vulnerability Assessment

    Directory of Open Access Journals (Sweden)

    Mohamed A. El-Sharkawi

    2002-06-01

    Full Text Available With power grids considered national security matters, the reliable operation of the system is of top priority to utilities.  This concern is amplified by the utility’s deregulation, which increases the system’s openness while simultaneously decreasing the applied degree of control.  Vulnerability Assessment (VA deals with the power system’s ability to continue to provide service in case of an unforeseen catastrophic contingency.  Such contingencies may include unauthorized tripping, breaks in communication links, sabotage or intrusion by external agents, human errors, natural calamities and faults.  These contingencies could lead to a disruption of service to part or all of the system.  The service disruption is known as outage or blackout.  The paper outlines an approach by which feature extraction and boundary tracking can be implemented to achieve on line vulnerability assessment.

  10. [The Helsinki Declaration: relativism and vulnerability].

    Science.gov (United States)

    Diniz, D; Corrêa, M

    2001-01-01

    The Helsinki Declaration is a crucial ethical landmark for clinical research involving human beings. Since the Declaration was issued, a series of revisions and modifications have been introduced into the original text, but they have not altered its humanist approach or its international force for regulating clinical research. A proposal for an extensive revision of the Declaration's underlying ethical principles has been debated for the past four years. If the proposal is approved, international clinical research involving human beings will be modified, further increasing the vulnerability of certain social groups. This article discusses the historical process involved in passing the Helsinki Declaration and the most recent debate on the new draft. The article analyzes the new text's social implications for underdeveloped countries, arguing for a political approach to the vulnerability concept.

  11. Social Protection and Vulnerability to Climate Shocks: a Panel Data ...

    African Journals Online (AJOL)

    ' autonomous adaptation by reducing vulnerability to climatic shocks. This paper examines the role of the Productive Safety Net Program in reducing vulnerability to climate related shocks and its impacts on autonomous adaptation strategies ...

  12. a survey of security vulnerabilities in wireless sensor networks

    African Journals Online (AJOL)

    user

    which primarily are their stringent energy constraints to which sensing nodes typify and security vulnerabilities. Security concerns ... Keywords: Sensors, Wireless, Network, Vulnerabilities, Security. 1. .... If the node detects a transmission.

  13. Vulnerability to air pollution: To intervene or not to intervene

    CSIR Research Space (South Africa)

    John, J

    2008-11-01

    Full Text Available The Environmental Health Research Group has, amongst other interests, a specific focus on understanding and addressing vulnerability of communities to environmental pollution. No appropriate tools to determine vulnerability to environmental...

  14. Vulnerability of Smallholder Farmers to Climate Change in the ...

    African Journals Online (AJOL)

    Yitayal A.

    adopted Vulnerability as expected poverty (VEP)approach was where an individual's vulnerability is the .... cropping seasons. About 21% of the respondents are below the food poverty line of ..... Cambridge, UK: University Press. Stige, L., J.

  15. Psychological Vulnerability to Completed Suicide: A Review of Empirical Studies.

    Science.gov (United States)

    Conner, Kenneth R.; Duberstein, Paul R.; Conwell, Yeates; Seidlitz, Larry; Caine, Eric D.

    2001-01-01

    This article reviews empirical literature on psychological vulnerability to completed suicide. Five constructs have been consistently associated with completed suicide: impulsivity/aggression; depression; anxiety; hopelessness; and self-consciousness/social disengagement. Current knowledge of psychological vulnerability could inform social…

  16. Air pollution and vulnerability: solving the puzzle of prioritization

    CSIR Research Space (South Africa)

    Wright, CY

    2011-01-01

    Full Text Available conditions exacerbates the problem. Air quality management plans identify prioritized strategies for improved air quality independent of consideration of vulnerability. A population exposure and vulnerability risk prioritization framework comprising five...

  17. Climate change vulnerability in Ethiopia : disaggregation of Tigray Region

    NARCIS (Netherlands)

    Gidey Gebrehiwot, T.; Gidey, T.G.; van der Veen, A.

    2013-01-01

    Climate change and variability severely affect rural livelihoods and agricultural productivity, yet they are causes of stress vulnerable rural households have to cope with. This paper investigated farming communities' vulnerability to climate change and climate variability across 34

  18. 77 FR 28894 - Maritime Vulnerability Self-Assessment Tool

    Science.gov (United States)

    2012-05-16

    ... DEPARTMENT OF HOMELAND SECURITY Transportation Security Administration Maritime Vulnerability Self... maritime vulnerability self- assessment tool. SUMMARY: The Transportation Security Administration (TSA) announces that the TSA Maritime Self-Assessment Risk Module (TMSARM), developed to support the United States...

  19. Households' vulnerability and responses to shocks: evidence from rural Kenya

    NARCIS (Netherlands)

    Ndirangu, L.

    2007-01-01

    Key words: Vulnerability, HIV/AIDS, weather shocks, risk management, coping strategies, rural households, gender. Empirical investigation on household’s responses to sources of vulnerability is important for designing and implementation of social policies. The design of an effective

  20. Cognitive vulnerability to depression : genetic and environmental influences

    NARCIS (Netherlands)

    Antypa, Niki

    2011-01-01

    This thesis explores cognitive vulnerability to depression and the interplay between genetic and environmental influences. Cognitive vulnerability to depression is characterized by negative patterns of information processing. One aspect is cognitive reactivity - the tendency to respond with

  1. Associations Between Social Vulnerabilities and Psychosocial Problems in European Children

    DEFF Research Database (Denmark)

    Iguacel, Isabel; Michels, Nathalie; Fernández-Alvira, Juan M.

    2017-01-01

    The effect of socioeconomic inequalities on children’s mental health remains unclear. This study aims to explore the cross-sectional and longitudinal associations between social vulnerabilities and psychosocial problems, and the association between accumulation of vulnerabilities and psychosocial...

  2. Red Team Operations to Assess Information Technology Vulnerabilities

    NARCIS (Netherlands)

    Veltman, M.; Parker, R.L.

    1999-01-01

    All Information and Communication Technology (ICT) systems have vulnerabilities. Weaknesses in these systems are introduced either during the specification, implementation or operational phase. Leaving aside these introduced vulnerabilities are intentional or unintentional, the fact remains that

  3. Seeing climate vulnerabilities through lived experience in Madagascar

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-04-21

    Apr 21, 2011 ... ... both vulnerability and strategies for reducing risk, and the project is in the process of producing a range ... of the team's effort to paint a composite map of climate vulnerability and risk to agrarian systems. ... Feeling stressed?

  4. The Vulnerable Faces of Pathological Gambling

    OpenAIRE

    Fong, Timothy W.

    2005-01-01

    Pathological gambling is an emerging psychiatric disorder that has medical, psychiatric, and social consequences. Recently, research has been focusing on identifying which portions of the population are most vulnerable to developing problems related to ongoing gambling. Specific populations of interest have included adolescents, elderly, minorities, those with comorbid psychiatric or substance use disorders, and gender differences. Each group possesses unique biological, psychological, and/or...

  5. Overactive bladder in the vulnerable elderly

    Directory of Open Access Journals (Sweden)

    Wolff GF

    2014-10-01

    Full Text Available Gillian F Wolff,1 George A Kuchel,2 Phillip P Smith1,21Division of Urology, Department of Surgery, 2UConn Center on Aging, University of Connecticut Health Center, Farmington, CT, USAAbstract: Overactive bladder (OAB is a common problem that may occur in individuals of all ages. It has a considerable impact on patient quality of life, and although moderately effective management strategies do exist, this condition often remains undiagnosed and untreated. OAB needs to be viewed as a symptom complex. Its presentation and management are complicated in the vulnerable elderly by the presence of baseline frailty and multiple coexisting chronic conditions. Furthermore, and beyond a simple understanding of symptomatology, providers must address patient goals and motivations as well as the expectations of caretakers. These multiple levels of perception, function, expectations, and treatment efficacy/risks must be tailored to the individual patient. While the vulnerable elderly patient may often have evidence of urinary tract dysfunction, OAB and urge urinary incontinence in this population must be understood as a multifactorial geriatric syndrome and viewed in the context of medical and functional baseline and precipitating risk factors. Expectations and goals must be tailored to the resources of vulnerable elderly patients and their caregivers, and care must be coordinated with other medical care providers. The management of OAB in the vulnerable elderly often poses significant management challenges. Nonetheless, with a thoughtful approach and an aim towards future research specifically for this population, significant reductions in morbidity and mortality long with enhancement in health-related quality of life are possible.Keywords: urinary incontinence, urgency, antispasmodics, aging, frailty

  6. Optical measurement of stem xylem vulnerability

    OpenAIRE

    Brodribb, Timothy J.; Carriqui, Marc; Delzon, Sylvain; Lucani, Christopher

    2017-01-01

    The vulnerability of plant water transport tissues to a loss of function by cavitation during water stress is a key indicator of the survival capabilities of plant species during drought. Quantifying this important metric has been greatly advanced by noninvasive techniques that allow embolisms to be viewed directly in the vascular system. Here, we present a new method for evaluating the spatial and temporal propagation of embolizing bubbles in the stem xylem during imposed water stress. We de...

  7. Current status of vulnerable plaque detection.

    LENUS (Irish Health Repository)

    Sharif, Faisal

    2012-02-01

    Critical coronary stenoses have been shown to contribute to only a minority of acute coronary syndromes (ACS) and sudden cardiac death. Autopsy studies have identified a subgroup of high-risk patients with disrupted vulnerable plaque and modest stenosis. Consequently, a clinical need exists to develop methods to identify these plaques prospectively before disruption and clinical expression of disease. Recent advances in invasive and noninvasive imaging techniques have shown the potential to identify these high-risk plaques. The anatomical characteristics of the vulnerable plaque such as thin cap fibroatheroma and lipid pool can be identified with angioscopy, high frequency intravascular ultrasound, intravascular MRI, and optical coherence tomography. Efforts have also been made to recognize active inflammation in high-risk plaques using intravascular thermography. Plaque chemical composition by measuring electromagnetic radiation using spectroscopy is also an emerging technology to detect vulnerable plaques. Noninvasive imaging with MRI, CT, and PET also holds the potential to differentiate between low and high-risk plaques. However, at present none of these imaging modalities are able to detect vulnerable plaque neither has been shown to definitively predict outcome. Nevertheless in contrast, there has been a parallel development in the physiological assessment of advanced atherosclerotic coronary artery disease. Thus recent trials using fractional flow reserve in patients with modest non flow-limiting stenoses have shown that deferral of PCI with optimal medical therapy in these patients is superior to coronary intervention. Further trials are needed to provide more information regarding the natural history of high-risk but non flow-limiting plaque to establish patient-specific targeted therapy and to refine plaque stabilizing strategies in the future.

  8. Analyzing Android Browser Apps for file:// Vulnerabilities

    OpenAIRE

    Wu, Daoyuan; Chang, Rocky K. C.

    2014-01-01

    Securing browsers in mobile devices is very challenging, because these browser apps usually provide browsing services to other apps in the same device. A malicious app installed in a device can potentially obtain sensitive information through a browser app. In this paper, we identify four types of attacks in Android, collectively known as FileCross, that exploits the vulnerable file:// to obtain users' private files, such as cookies, bookmarks, and browsing histories. We design an automated s...

  9. MORAL HARASSMENT DURING WORK AND FEMININE VULNERABILITY

    OpenAIRE

    Silva, Sarah Cristina Andrade; Universidade de Franca - UNIFRAN; Bittar, Cléria Maria; Universidade de Franca - UNIFRAN

    2012-01-01

    Current investigation is a bibliographical review on feminine vulnerability with regard to moral harassment. Moral harassment is defined as all vexation during work, especially when a hierarchy between people has been established. Horizontal moral harassment among people of the same occupation, although it exists, is more difficult to be proved in court. Literature shows that victims of moral harassment may be women and men but research in Brazil and in other countries reveals that most victi...

  10. Seaside, Oregon, Tsunami Vulnerability Assessment Pilot Study

    Science.gov (United States)

    Dunbar, P. K.; Dominey-Howes, D.; Varner, J.

    2006-12-01

    The results of a pilot study to assess the risk from tsunamis for the Seaside-Gearhart, Oregon region will be presented. To determine the risk from tsunamis, it is first necessary to establish the hazard or probability that a tsunami of a particular magnitude will occur within a certain period of time. Tsunami inundation maps that provide 100-year and 500-year probabilistic tsunami wave height contours for the Seaside-Gearhart, Oregon, region were developed as part of an interagency Tsunami Pilot Study(1). These maps provided the probability of the tsunami hazard. The next step in determining risk is to determine the vulnerability or degree of loss resulting from the occurrence of tsunamis due to exposure and fragility. The tsunami vulnerability assessment methodology used in this study was developed by M. Papathoma and others(2). This model incorporates multiple factors (e.g. parameters related to the natural and built environments and socio-demographics) that contribute to tsunami vulnerability. Data provided with FEMA's HAZUS loss estimation software and Clatsop County, Oregon, tax assessment data were used as input to the model. The results, presented within a geographic information system, reveal the percentage of buildings in need of reinforcement and the population density in different inundation depth zones. These results can be used for tsunami mitigation, local planning, and for determining post-tsunami disaster response by emergency services. (1)Tsunami Pilot Study Working Group, Seaside, Oregon Tsunami Pilot Study--Modernization of FEMA Flood Hazard Maps, Joint NOAA/USGS/FEMA Special Report, U.S. National Oceanic and Atmospheric Administration, U.S. Geological Survey, U.S. Federal Emergency Management Agency, 2006, Final Draft. (2)Papathoma, M., D. Dominey-Howes, D.,Y. Zong, D. Smith, Assessing Tsunami Vulnerability, an example from Herakleio, Crete, Natural Hazards and Earth System Sciences, Vol. 3, 2003, p. 377-389.

  11. Space Station Program threat and vulnerability analysis

    Science.gov (United States)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  12. The French fire protection concept. Vulnerability analysis

    International Nuclear Information System (INIS)

    Kaercher, M.

    1998-01-01

    The French fire protection concept is based on a principle of three levels of defence in depth: fire prevention, fire containing and fire controlling. Fire prevention is based on arrangements which prevent the fire from starting or which make difficult for the fire to start. Fire containing is based on design measures so that the fire will have no impact on the safety of the installation. For fire controlling, equipment nad personnel are on duty in order to detect, to fight and to gain control over the fire as early as possible. The French fire protection concept gives priority to fire containing based on passive structural measures. All buildings containing safety equipment are divided into fire compartments (or fire areas) and fire cells (or fire zones). Basically, a compartment houses safety equipment belonging to one division (or train) so that the other division is always available to reach the plant safe shut down or to mitigate an accident. Because there is a large number of fire compartments and fire cells, deviations from the general principle can be observed. To this reason the RCC-I (Design and Construction Rules applicable for fire protection) requires to implement an assessment of the principle of division. This assessment is called vulnerability analysis. The vulnerability analysis is usually performed at the end of the project, before erection. It is also possible to perform a vulnerability analysis in an operating nuclear power plant in the scope of a fire safety upgrading programme. In the vulnerability analysis, the functional failure of all the equipment (except for those protected by a qualified fire barrier, designed or able to withstand the fire consequences) within the fire compartment or cell, where the fire breaks out, is postulated. The potential consequences for the plant safety are analysed

  13. LAVA: Large scale Automated Vulnerability Addition

    Science.gov (United States)

    2016-05-23

    LAVA: Large-scale Automated Vulnerability Addition Brendan Dolan -Gavitt∗, Patrick Hulin†, Tim Leek†, Fredrich Ulrich†, Ryan Whelan† (Authors listed...released, and thus rapidly become stale. We can expect tools to have been trained to detect bugs that have been released. Given the commercial price tag...low TCN) and dead (low liveness) program data is a powerful one for vulnera- bility injection. The DUAs it identifies are internal program quantities

  14. Vulnerability in the South African context

    CSIR Research Space (South Africa)

    John, J

    2006-02-28

    Full Text Available status Slide 10 © CSIR 2006 www.csir.co.za Gender The Prevalence of Chronic Conditions by Sex, South Africa (1998) 0 5 10 15 20 25 30 Diabetes Ischaemic Heart Disease Hypertension Chronic Bronchitis/Emphysema Cancer... www.csir.co.za Categories and factors associated with vulnerability EmploymentFuel useDiseaseDisease state Cultural practicesBody burdenObesityGender Socio-economic status Background exposure FitnessRace Education...

  15. The politics of vulnerability and resilience

    Directory of Open Access Journals (Sweden)

    Georg Frerks

    2011-12-01

    Full Text Available Much conceptual confusion exists over the concepts of vulnerability and (social resilience, reinforced by the different paradigms (the article identifies four and disciplinary traditions underlying their use. While since the 1980s the social construction of "vulnerability" as a driver for disaster received considerable attention, in recent years we have seen increased attention to people's capacities and resilience. The currently popular "complexity" approach to risk moreover appears to offer ways of breaking through entrenched vulnerabilities. Resilience however is also a political project which, we argue, also has its dark, conservative overtones and overlooks structural sources of vulnerability that continue to affect hazard-prone actors. We may therefore need to conceive resilience as the potential for social transformation after disaster.Existe muita confusão conceitual em torno dos conceitos de vulnerabilidade e resiliência (social, reforçada pela diferença de paradigmas (este artigo identifica quarto e tradições disciplinares subjacentes à sua utilização. Enquanto desde os anos 80 a construção social de "vulnerabilidade" como condutor para desastres recebeu atenção considerável, nos últimos anos temos visto maior atenção às capacidades e resiliência das pessoas. Atualmente popular, a abordagem da "complexidade" do risco, além disso, parece oferecer maneiras transformadoras através das vulnerabilidades enraizadas. No entanto, defendemos que a resiliência é um projeto político que também tem seus sombrios sobretons conservadores e omite fontes estruturais de vulnerabilidade que continuam a afetar os atores propensos ao risco. Podemos, portanto, precisar conceber a resiliência como potencial para transformação social depois de desastres.

  16. Intelligent Techniques for Power Systems Vulnerability Assessment

    OpenAIRE

    Mohamed A. El-Sharkawi

    2002-01-01

    With power grids considered national security matters, the reliable operation of the system is of top priority to utilities.  This concern is amplified by the utility’s deregulation, which increases the system’s openness while simultaneously decreasing the applied degree of control.  Vulnerability Assessment (VA) deals with the power system’s ability to continue to provide service in case of an unforeseen catastrophic contingency.  Such contingencies may include unauthorized tripping, breaks ...

  17. Vulnerability curves vs. vulnerability indicators: application of an indicator-based methodology for debris-flow hazards

    Science.gov (United States)

    Papathoma-Köhle, Maria

    2016-08-01

    The assessment of the physical vulnerability of elements at risk as part of the risk analysis is an essential aspect for the development of strategies and structural measures for risk reduction. Understanding, analysing and, if possible, quantifying physical vulnerability is a prerequisite for designing strategies and adopting tools for its reduction. The most common methods for assessing physical vulnerability are vulnerability matrices, vulnerability curves and vulnerability indicators; however, in most of the cases, these methods are used in a conflicting way rather than in combination. The article focuses on two of these methods: vulnerability curves and vulnerability indicators. Vulnerability curves express physical vulnerability as a function of the intensity of the process and the degree of loss, considering, in individual cases only, some structural characteristics of the affected buildings. However, a considerable amount of studies argue that vulnerability assessment should focus on the identification of these variables that influence the vulnerability of an element at risk (vulnerability indicators). In this study, an indicator-based methodology (IBM) for mountain hazards including debris flow (Kappes et al., 2012) is applied to a case study for debris flows in South Tyrol, where in the past a vulnerability curve has been developed. The relatively "new" indicator-based method is being scrutinised and recommendations for its improvement are outlined. The comparison of the two methodological approaches and their results is challenging since both methodological approaches deal with vulnerability in a different way. However, it is still possible to highlight their weaknesses and strengths, show clearly that both methodologies are necessary for the assessment of physical vulnerability and provide a preliminary "holistic methodological framework" for physical vulnerability assessment showing how the two approaches may be used in combination in the future.

  18. The SAVI Vulnerability Analysis Software Package

    International Nuclear Information System (INIS)

    Mc Aniff, R.J.; Paulus, W.K.; Key, B.; Simpkins, B.

    1987-01-01

    SAVI (Systematic Analysis of Vulnerability to Intrusion) is a new PC-based software package for modeling Physical Protection Systems (PPS). SAVI utilizes a path analysis approach based on the Adversary Sequence Diagram (ASD) methodology. A highly interactive interface allows the user to accurately model complex facilities, maintain a library of these models on disk, and calculate the most vulnerable paths through any facility. Recommendations are provided to help the user choose facility upgrades which should reduce identified path vulnerabilities. Pop-up windows throughout SAVI are used for the input and display of information. A menu at the top of the screen presents all options to the user. These options are further explained on a message line directly below the menu. A diagram on the screen graphically represents the current protection system model. All input is checked for errors, and data are presented in a logical and clear manner. Print utilities provide the user with hard copies of all information and calculated results

  19. Environment, vulnerability, and gender in Andean ethnomedicine.

    Science.gov (United States)

    Larme, A C

    1998-10-01

    In Cuyo Cuyo, in the southern Peruvian highlands, ethnomedicine is rife with images of human vulnerability to a hostile and unpredictable environment. This is represented in the ethnomedical system by a focus on wayras, air- or wind-borne illnesses that enter through vulnerable body openings such as the head, orifices, lower back, and feet. Women are viewed to be more vulnerable, or débil, than men to illness because they have an extra orifice, the vagina, they lose copious amounts of blood, which is thought to be irreplaceable, during childbirth. and because they suffer more negative emotions, which are thought to attract wayras and other illnesses to the body. The relationship of ethnomedical beliefs to the Andean physical and political economic environment is explored within the context of social and economic change. Negative beliefs about women's bodies have negative effects on women's roles and position vis-à-vis men in present day Cuyo Cuyo. Ethnomedical beliefs reflect and reinforce gender inequalities in present day Peru and are part of a cultural ideology that in general devalues women. This case study demonstrates that power is a key dimension in the cultural construction of medical knowledge. whether in non-Western or Western societies.

  20. Vulnerability of birds to climate change in California's Sierra Nevada

    OpenAIRE

    Rodney B. Siegel; Peter Pyle; James H. Thorne; Andrew J. Holguin; Christine A. Howell; Sarah Stock; Morgan W. Tingley

    2014-01-01

    In a rapidly changing climate, effective bird conservation requires not only reliable information about the current vulnerability of species of conservation concern, but also credible projections of their future vulnerability. Such projections may enable managers to preempt or reduce emerging climate-related threats through appropriate habitat management. We used NatureServe's Climate Change Vulnerability Index (CCVI) to predict vulnerability to climate change of 168 bird species that breed i...

  1. Mental vulnerability as a risk factor for depression

    DEFF Research Database (Denmark)

    Østergaard, Ditte; Dalton, Susanne Oksbjerg; Bidstrup, Pernille Envold

    2012-01-01

    Mental vulnerability (i.e. a tendency to experience psychosomatic symptoms, mental symptoms or interpersonal problems) is associated with various diseases. This study investigated whether mental vulnerability is associated with hospitalization for depression.......Mental vulnerability (i.e. a tendency to experience psychosomatic symptoms, mental symptoms or interpersonal problems) is associated with various diseases. This study investigated whether mental vulnerability is associated with hospitalization for depression....

  2. Analysis of Zero-Day Vulnerabilities in Java

    OpenAIRE

    Marius Popa

    2013-01-01

    The zero-day vulnerability is a security lack of the computer system that is unknown to software vendor. This kind of vulnerability permits building attack strategies for gaining the access to the resources and data of a computer system. The main issue of the topic is how a computer system can be protected by zero-day vulnerabilities using the actual security procedures and tools for identifying the potential attacks that exploit the vulnerabilities unknown to computer users and software prov...

  3. An Empirical Measure of Computer Security Strength for Vulnerability Remediation

    Science.gov (United States)

    Villegas, Rafael

    2010-01-01

    Remediating all vulnerabilities on computer systems in a timely and cost effective manner is difficult given that the window of time between the announcement of a new vulnerability and an automated attack has decreased. Hence, organizations need to prioritize the vulnerability remediation process on their computer systems. The goal of this…

  4. Groundwater Vulnerability Map for South Africa | Musekiwa | South ...

    African Journals Online (AJOL)

    Vulnerability of groundwater is a relative, non-measurable and dimensionless property which is based on the concept that some land areas are more vulnerable to groundwater contamination than others. Maps showing groundwater vulnerability assist with the identification of areas more susceptible to contamination than ...

  5. 6 CFR 27.400 - Chemical-terrorism vulnerability information.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Chemical-terrorism vulnerability information. 27... FACILITY ANTI-TERRORISM STANDARDS Other § 27.400 Chemical-terrorism vulnerability information. (a... that constitute Chemical-terrorism Vulnerability Information (CVI), as defined in § 27.400(b). The...

  6. Working up a Debt: Students as Vulnerable Consumers

    Science.gov (United States)

    Robson, Julie; Farquhar, Jillian Dawes; Hindle, Christopher

    2017-01-01

    Students are recognized as vulnerable consumers where financial matters are concerned, particularly with reference to indebtedness. This study examines student indebtedness in order to initiate wider debate about student vulnerability. We consider vulnerability as dynamic and temporal, linked to an event that renders the consumer susceptible to…

  7. An assessment of coastal vulnerability for the South African coast ...

    African Journals Online (AJOL)

    Coastal vulnerability is the degree to which a coastal system is susceptible to, or unable to cope with, adverse effects of climate change. One of the most widely used methods in assessing risk and vulnerability of coastlines on a regional scale includes the calculation of vulnerability indices and presenting these results on a ...

  8. Reconceptualizing Vulnerability in Personal Narrative Writing with Youths

    Science.gov (United States)

    Johnson, Elisabeth

    2014-01-01

    Through a student/teacher classroom conflict, the author explores ways adults produce student writers as vulnerable. Drawing on post-structural concepts of adolescence, identity production, interrogation, and vulnerability, the author details how an English teacher invited students to perform vulnerability in personal narratives about issues like…

  9. Spatial variation of vulnerability in geographic areas of North Lebanon

    NARCIS (Netherlands)

    Issa, Sahar; van der Molen, I.; Nader, M.R.; Lovett, Jonathan Cranidge

    2014-01-01

    This paper examines the spatial variation in vulnerability between different geographical areas of the northern coastal region of Lebanon within the context of armed conflict. The study is based on the ‘vulnerability of space’ approach and will be positioned in the academic debate on vulnerability

  10. Quantificação computadorizada dos índices de placa e cálculo dentais da imagem digital da superfície vestibular dos dentes de cães

    Directory of Open Access Journals (Sweden)

    Samira L. Abdalla

    2009-08-01

    Full Text Available A doença periodontal é causada pelo acúmulo de placa bacteriana sobre os dentes e estruturas adjacentes. Para sua mensuração têm sido formulados índices que consideram a quantidade e intensidade de placa bacteriana (PB e de cálculo dental (CD existentes na superfície dentária por meio de avaliação visual subjetiva. O presente estudo tem como objetivo avaliar o método de análise computadorizada para medição de área de PB e CD nos dentes de cães através da comparação com a avaliação visual. Foram utilizados 10 cães Beagles, três machos e sete fêmeas, com similares características e mantidos sob o mesmo manejo e dieta alimentar. As avaliações das superfícies vestibulares dos dentes ocorreram antes da profilaxia dentária, que foi realizada sob anestesia geral inalatória, e após sete dias para PB e após 28 dias para CD. A avaliação computadorizada da área de CD demonstrou ser estatisticamente melhor em relação à avaliação visual antes e após a profilaxia; entretanto, não demonstrou diferença significante na avaliação da PB. Concluiu-se que a avaliação computadorizada é vantajosa em relação à visual por conferir maior precisão na obtenção da proporção entre área total do dente e área acometida, mostrando-se estatistticamente superior na quantificação do CD após 28 dias.Periodontal disease is caused by dental plaque accumulation on teeth and adjacent structures. Indices have been formulated for its measurement considering the amount and intensity of dental plaque (DP and dental calculus (C on the surface of teeth through subjective visual evaluation. This study aims at assessing the computerized analysis method for measurement of DP and C areas on the teeth of dogs by comparing it with the visual evaluation in the oral cavity. Ten beagle dogs with similar characteristics and kept under the same management and diet were used. Evaluations of oral cavity occurred before surgical prophylaxis

  11. Ensaios estáticos de flexão e rigidez em placas do tipo sistema dinâmico do quadril (DHS Static load test on dynamic hip system (DHS plates

    Directory of Open Access Journals (Sweden)

    Anderson Freitas

    2009-01-01

    Full Text Available OBJETIVO: Avaliar isolada e comparativamente placas do tipo sistema dinâmico do quadril (DHS de dois fabricantes nacionais, analisar estatisticamente seus resultados e demonstrar a falta de determinantes para sua fabricação. MÉTODOS: Foram realizados ensaios estáticos de flexão em cinco placas DHS do fabricante I (grupo I e em igual quantidade do mesmo modelo do fabricante II (grupo II, sendo todas fabricadas em aço inoxidável austenítico ASTM F 138, com quatro furos e angulação de 135º. Utilizou-se máquina servohidráulica MTS, modelo Test Star II®, com capacidade de carga de 10 toneladas e controle de deslocamento. Foram obtidos dados da carga aplicada (P em função do deslocamento vertical do pistão (L, cuja velocidade foi 5 mm/min. Os ensaios foram interrompidos após atingir a deflexão vertical máxima especificada pelas normas dos ensaios. RESULTADOS: Grupo I: resistência de flexão, 161,4 ± 17,2 kgf rigidez, 64,5 ± 1,8 kgf/mm, ductilidade, > 25,4 mm. Grupo II: resistência de flexão, 124,7 ± 4,4, rigidez 59,6 ± 2,3, ductilidade > 25,4 mm. Para análise estatística foi adotado o teste de Mann-Whitney e a determinação de significância foi de 5% (pOBJECTIVE: To evaluate, both individually and comparatively, dynamic hip system-type plates marketed by two local manufacturers, to statistically analyze its results and show the lack of parameters for its manufacturing. METHODS: Static tests of flexion were carried out in five DHS plates of the manufacturer I (I group I and in equal quantity of the same model of the manufacturer II (I group II, being all made in stainless austenitic ASTM F 138 steel, with four holes and a 135º angle. A servo-hydraulic MTS machine, Test Star II model, was used with a load capacity of 10 tons and dislocation control. The data were obtained from the applied load (P as a function of the vertical dislocation of the piston (L, whose speed was 5mm/min. The tests were shutdown after reaching

  12. Vulnerability of Coastal Communities from Storm Surge and Flood Disasters

    Science.gov (United States)

    Bathi, Jejal Reddy; Das, Himangshu S.

    2016-01-01

    Disasters in the form of coastal storms and hurricanes can be very destructive. Preparing for anticipated effects of such disasters can help reduce the public health and economic burden. Identifying vulnerable population groups can help prioritize resources for the most needed communities. This paper presents a quantitative framework for vulnerability measurement that incorporates both socioeconomic and flood inundation vulnerability. The approach is demonstrated for three coastal communities in Mississippi with census tracts being the study unit. The vulnerability results are illustrated as thematic maps for easy usage by planners and emergency responders to assist in prioritizing their actions to vulnerable populations during storm surge and flood disasters. PMID:26907313

  13. The principle of vulnerability and its potential applications in bioethics

    Directory of Open Access Journals (Sweden)

    Demény Enikő

    2016-12-01

    Full Text Available The principle of vulnerability is a specific principle within European Bioethics. On the one hand, vulnerability expresses human limits and frailty on the other hand it represents moral and ethical action principles. In this paper a discussion on the relationship between the concepts of autonomy, vulnerability and responsibility is proposed and presentation of some possible applications of the principle of vulnerability within bioethics. In conclusion, some potential benefits of applying the principle of vulnerability as well as possible difficulties in its application are highlighted.

  14. Evaluación de un antígeno de Brucella abortus para aglutinación en placa como prueba tamiz en el diagnóstico de la brucelosis bovina

    Directory of Open Access Journals (Sweden)

    David Rajme-Manzur

    2017-12-01

    Full Text Available Este trabajo tuvo como objetivo obtener y validar un antígeno buferado de Brucella abortus para la prueba de aglutinación en placa como prueba diagnóstica de base de la brucelosis bovina. Se formularon tres lotes de antígeno a partir de la multiplicación de la cepa 99 de Brucella abortus. Se realizaron los controles de calidad correspondientes (determinación de pH, volumen celular, esterilidad, capacidad buferante y las pruebas serológicas para la evaluación del desempeño. Se emplearon 1070 muestras de suero bovino (350 positivas y 720 negativas previamente controladas con las pruebas de diagnóstico establecidas. Se determinó la sensibilidad y especificidad diagnóstica y relativa, los valores predictivos positivos y negativos, la eficacia y la concordancia. En los tres lotes todas las características evaluadas resultaron estar dentro de los parámetros establecidos para este tipo de producto. La especificidad y sensibilidad diagnósticas fueron de 99,5% y 100% respectivamente. El valor predictivo positivo fue de 99,1%, el valor predictivo negativo fue de 100% y la eficacia de un 99,7%. El antígeno mostró una sensibilidad y especificidad relativas de un 100% y la concordancia resultó ser clasificada como muy buena. La evaluación del desempeño arrojó resultados satisfactorios, demostrando que el método de producción empleado es factible para la obtención de un producto con adecuada eficacia.

  15. Correção de falhas ósseas diafisárias: trasnporte ósseo fixado com placa Corretive procedure in diaphyseal bone gaps: bone trasnpot fixated with plate

    Directory of Open Access Journals (Sweden)

    Celso Hermínio Ferraz Picado

    2007-01-01

    Full Text Available O objetivo deste estudo é descrever um novo sistema de transporte ósseo que dispensa o uso de fios transfixantes. O sistema, constituído por uma placa, um carro móvel e por um dispositivo tracionador, foi instalado na tíbia direita de 17 ovelhas para preencher um defeito ósseo de 1 cm. O transporte ósseo foi iniciado 7 dias após a cirurgia numa taxa de 0,8 mm/dia, dividido em 0,2 mm a cada 6 horas. Radiografias em ântero-posterior e perfil foram realizadas imediatamente após a cirurgia e semanalmente até o término do transporte. Em todos os 12 animais que completaram o estudo, o defeito ósseo foi preenchido com formação do regenerado e consolidação do foco alvo. O estudo demonstra que o sistema aqui apresentado realiza o transporte ósseo de maneira efetiva, eliminando o uso de fios ou pinos transfixantes.The objective of this study is to describe a new bone transport system not requiring the use of transfixating wires. The system, which is constituted by a plate, a movable conveyor and a hauling device, was set up on the right tibia of 17 sheep intending to fill a 1-cm bone gap. Bone transport started 7 days after surgery on a rate of 0.8 mm/day, divided into 0.2 mm at each 6 hours. X-ray images of anteroposterior and lateral planes were taken immediately after surgery and on a weekly basis until transport was finished. In all 12 animals completing the study, the bone gap was filled with regenerated formation and target focus consolidation. The study shows that the system presented here effectively performs bone transport, eliminating the use of transfixating wires or pins.

  16. Aren't we all vulnerable: why do vulnerability analysis?

    Energy Technology Data Exchange (ETDEWEB)

    Moench, Marcus

    2011-11-15

    The idea of 'vulnerability' is widely-used shorthand for the disproportionate impacts that climate change will have on high-risk groups and fragile ecosystems. Decision makers increasingly want to target adaptation funding to those people and environments most affected by climate change. They must also be able to monitor the effectiveness of their investments. Vulnerability analysis is sometimes presented as the solution to these wants and needs — but existing approaches are often of little use: at best, they reiterate what we already know; at worst, they are used to justify entrenched agendas. To be truly useful as a basis for dialogue, action and accountability, the meaning of 'vulnerability' must be clarified and the methods for analysing it greatly strengthened. This means establishing standard, replicable approaches that differentiate between the roles and exposure of stakeholders, systems and institutions.

  17. Not the usual suspects: addressing layers of vulnerability.

    Science.gov (United States)

    Luna, Florencia; Vanderpoel, Sheryl

    2013-07-01

    This paper challenges the traditional account of vulnerability in healthcare which conceptualizes vulnerability as a list of identifiable subpopulations. This list of 'usual suspects', focusing on groups from lower resource settings, is a narrow account of vulnerability. In this article we argue that in certain circumstances middle-class individuals can be also rendered vulnerable. We propose a relational and layered account of vulnerability and explore this concept using the case study of cord blood (CB) banking. In the first section, two different approaches to 'vulnerability' are contrasted: categorical versus layered. In the second section, we describe CB banking and present a case study of CB banking in Argentina. We examine the types of pressure that middle-class pregnant women feel when considering CB collection and storage. In section three, we use the CB banking case study to critique the categorical approach to vulnerability: this model is unable to account for the ways in which these women are vulnerable. A layered account of vulnerability identifies several ways in which middle-class women are vulnerable. Finally, by utilizing the layered approach, this paper suggests how public health policies could be designed to overcome vulnerabilities. © 2013 John Wiley & Sons Ltd.

  18. Climate Vulnerability and Human Migration in Global Perspective

    Science.gov (United States)

    Grecequet, Martina; DeWaard, Jack; Hellmann, Jessica J.; Abel, Guy J.

    2018-01-01

    The relationship between climate change and human migration is not homogenous and depends critically on the differential vulnerability of population and places. If places and populations are not vulnerable, or susceptible, to climate change, then the climate–migration relationship may not materialize. The key to understanding and, from a policy perspective, planning for whether and how climate change will impact future migration patterns is therefore knowledge of the link between climate vulnerability and migration. However, beyond specific case studies, little is known about this association in global perspective. We therefore provide a descriptive, country-level portrait of this relationship. We show that the negative association between climate vulnerability and international migration holds only for countries least vulnerable to climate change, which suggests the potential for trapped populations in more vulnerable countries. However, when analyzed separately by life supporting sector (food, water, health, ecosystem services, human habitat, and infrastructure) and vulnerability dimension (exposure, sensitivity, and adaptive capacity), we detect evidence of a relationship among more, but not the most, vulnerable countries. The bilateral (i.e., country-to-country) migration show that, on average, people move from countries of higher vulnerability to lower vulnerability, reducing global risk by 15%. This finding is consistent with the idea that migration is a climate adaptation strategy. Still, ~6% of bilateral migration is maladaptive with respect to climate change, with some movement toward countries with greater climate change vulnerability. PMID:29707262

  19. Climate Vulnerability and Human Migration in Global Perspective.

    Science.gov (United States)

    Grecequet, Martina; DeWaard, Jack; Hellmann, Jessica J; Abel, Guy J

    2017-05-01

    The relationship between climate change and human migration is not homogenous and depends critically on the differential vulnerability of population and places. If places and populations are not vulnerable, or susceptible, to climate change, then the climate-migration relationship may not materialize. The key to understanding and, from a policy perspective, planning for whether and how climate change will impact future migration patterns is therefore knowledge of the link between climate vulnerability and migration. However, beyond specific case studies, little is known about this association in global perspective. We therefore provide a descriptive, country-level portrait of this relationship. We show that the negative association between climate vulnerability and international migration holds only for countries least vulnerable to climate change, which suggests the potential for trapped populations in more vulnerable countries. However, when analyzed separately by life supporting sector (food, water, health, ecosystem services, human habitat, and infrastructure) and vulnerability dimension (exposure, sensitivity, and adaptive capacity), we detect evidence of a relationship among more, but not the most, vulnerable countries. The bilateral (i.e., country-to-country) migration show that, on average, people move from countries of higher vulnerability to lower vulnerability, reducing global risk by 15%. This finding is consistent with the idea that migration is a climate adaptation strategy. Still, ~6% of bilateral migration is maladaptive with respect to climate change, with some movement toward countries with greater climate change vulnerability.

  20. Vulnerability of Forests in India: A National Scale Assessment.

    Science.gov (United States)

    Sharma, Jagmohan; Upgupta, Sujata; Jayaraman, Mathangi; Chaturvedi, Rajiv Kumar; Bala, Govindswamy; Ravindranath, N H

    2017-09-01

    Forests are subjected to stress from climatic and non-climatic sources. In this study, we have reported the results of inherent, as well as climate change driven vulnerability assessments for Indian forests. To assess inherent vulnerability of forests under current climate, we have used four indicators, namely biological richness, disturbance index, canopy cover, and slope. The assessment is presented as spatial profile of inherent vulnerability in low, medium, high and very high vulnerability classes. Fourty percent forest grid points in India show high or very high inherent vulnerability. Plantation forests show higher inherent vulnerability than natural forests. We assess the climate change driven vulnerability by combining the results of inherent vulnerability assessment with the climate change impact projections simulated by the Integrated Biosphere Simulator dynamic global vegetation model. While 46% forest grid points show high, very high, or extremely high vulnerability under future climate in the short term (2030s) under both representative concentration pathways 4.5 and 8.5, such grid points are 49 and 54%, respectively, in the long term (2080s). Generally, forests in the higher rainfall zones show lower vulnerability as compared to drier forests under future climate. Minimizing anthropogenic disturbance and conserving biodiversity can potentially reduce forest vulnerability under climate change. For disturbed forests and plantations, adaptive management aimed at forest restoration is necessary to build long-term resilience.

  1. Periodontopathogens in the saliva and subgingival dental plaque of a group of mothers Periodontopatógenos na saliva e placa subgengival de um grupo de mães

    Directory of Open Access Journals (Sweden)

    Odila Pereira da Silva Rosa

    2002-12-01

    Full Text Available The aim of this study was to assess the periodontal condition and the presence of putative periodontal pathogens in 30 Brazilian mothers, aging 21-40 years (28.4 ± 4.49 years, and in their children, aging 5-6 years, since mothers can be a source of pathogens and, thus, influence their children's bacteriological and clinical condition. Besides assessing the plaque index (PI, gingival index (GI and pocket probing depth (PD, the survey analyzed four subgingival dental plaque samples from mothers and children, as well as a sample of stimulated saliva from mothers. Those samples were analyzed by means of the slot immunoblot (SIB technique, in order to determine the presence of Actinobacillus actinomycetemcomitans (Aa, Prevotella nigrescens (Pn, Porphyromonas gingivalis (Pg and Treponema denticola (Td. The mean values and standard deviations of the evaluated clinical variables for mothers and children were, respectively: 1.86 ± 0.67 and 1.64 ± 0.68 for PI, and 1.24 ± 0.67 and 0.82 ± 0.37, for GI. Only for mothers, the total PD was 1.81 ± 0.69 mm, and the PD of four sites was 4.03 ± 1.40 mm. The Wilcoxon test revealed significant difference (p Procurou-se avaliar a condição periodontal e a presença de periodontopatógenos em 30 mães brasileiras, com idades entre 21-40 anos (28,4 ± 4,49 anos e seus filhos, com 5-6 anos de idade, considerando que elas possam ser fonte de transmissão para seus filhos e influenciar suas condições clínicas e bacteriológicas. Além de determinar o índice de placa (IP, índice gengival (IG de mães e filhos, e a profundidade de sondagem periodontal (PS, apenas das mães, avaliaram-se quatro amostras de placa dental subgengival de mães e filhos e uma amostra de saliva total estimulada das mães para a presença de Actinobacillus actinomycetemcomitans (Aa, Prevotella nigrescens (Pn, Porphyromonas gingivalis (Pg e Treponema denticola (Td, pela técnica de "slot immunoblot" (SIB. As médias e desvios

  2. Australian climate change impacts, adaptation and vulnerability

    International Nuclear Information System (INIS)

    Hennessy, K.; Fitzharris, B.

    2007-01-01

    Full text: Full text: The IPCC Fourth Assessment Report on impacts, adaptation and vulnerability made the following conclusions about Australia (Hennessy et al., 2007): Regional climate change has occurred. Since 1950, there has been 0.7 0 C warming, with more heat waves, fewer frosts, more rain in north-west Australia, less rain in southern and eastern Australia, an increase in the intensity of Australian droughts and a rise in sea level of about 70 mm. Australia is already experiencing impacts from recent climate change. These are now evident in increasing stresses on water supply and agriculture, changed natural ecosystems, and reduced seasonal snow cover. Some adaptation has already occurred in response to observed climate change. Examples come from sectors such as water, natural ecosystems, agriculture, horticulture and coasts. However, ongoing vulnerability to extreme events is demonstrated by substantial economic losses caused by droughts, floods, fire, tropical cyclones and hail. The climate of the 21st century is virtually certain to be warmer, with changes in extreme events. Heat waves and fires are virtually certain to increase in intensity and frequency. Floods, landslides, droughts and storm surges are very likely to become more frequent and intense, and snow and frost are very likely to become less frequent. Large areas of mainland Australia are likely to have less soil moisture. Potential impacts of climate change are likely to be substantial without further adaptation; As a result of reduced precipitation and increased evaporation, water security problems are projected to intensify by 2030 in southern and eastern Australia; Ongoing coastal development and population growth, in areas such as Cairns and south-east Queensland, are projected to exacerbate risks from sea level rise and increases in the severity and frequency of storms and coastal flooding by 2050. Significant loss of biodiversity is projected to occur by 2020 in some ecologically rich

  3. Trophic redundancy reduces vulnerability to extinction cascades.

    Science.gov (United States)

    Sanders, Dirk; Thébault, Elisa; Kehoe, Rachel; Frank van Veen, F J

    2018-03-06

    Current species extinction rates are at unprecedentedly high levels. While human activities can be the direct cause of some extinctions, it is becoming increasingly clear that species extinctions themselves can be the cause of further extinctions, since species affect each other through the network of ecological interactions among them. There is concern that the simplification of ecosystems, due to the loss of species and ecological interactions, increases their vulnerability to such secondary extinctions. It is predicted that more complex food webs will be less vulnerable to secondary extinctions due to greater trophic redundancy that can buffer against the effects of species loss. Here, we demonstrate in a field experiment with replicated plant-insect communities, that the probability of secondary extinctions is indeed smaller in food webs that include trophic redundancy. Harvesting one species of parasitoid wasp led to secondary extinctions of other, indirectly linked, species at the same trophic level. This effect was markedly stronger in simple communities than for the same species within a more complex food web. We show that this is due to functional redundancy in the more complex food webs and confirm this mechanism with a food web simulation model by highlighting the importance of the presence and strength of trophic links providing redundancy to those links that were lost. Our results demonstrate that biodiversity loss, leading to a reduction in redundant interactions, can increase the vulnerability of ecosystems to secondary extinctions, which, when they occur, can then lead to further simplification and run-away extinction cascades. Copyright © 2018 the Author(s). Published by PNAS.

  4. Children of Darfur: a vulnerable population.

    Science.gov (United States)

    Chaikin, Jennifer

    2008-02-01

    Four years of intense war in Darfur has created an entire generation of children who might never recover. Children in this region are particularly vulnerable and suffer from issues including physical and psychological illness, malnutrition, rape and unlawful military recruitment. This international crisis is among the most important public health issues in the world. The responsibility of the international community to these children is significant and required to break this cycle. This paper will discuss the concerns surrounding these children, how current strategies are failing and proposed public health nursing interventions.

  5. Techniques for Finding Vulnerabilities in Web Applications

    OpenAIRE

    Mihai Sandulescu

    2014-01-01

    The current trend is to move everything on the Internet. Because a lot of companies store sensitive user information, security has become mandatory. Usually, software developers don’t follow some basic practices in order to secure their applications. This paper will present in the second chapter, the white-box, black-box and gray-box methods which can be used in order to test applications for possible vulnerabilities. It focuses on fuzz testing, which is a black-box testing method, presented ...

  6. Prisoners as Living Donors: A Vulnerabilities Analysis.

    Science.gov (United States)

    Ross, Lainie Friedman; Thistlethwaite, J Richard

    2018-01-01

    Although national guidelines exist for evaluating the eligibility of potential living donors and for procuring their informed consent, no special protections or considerations exist for potential living donors who are incarcerated. Human research subject protections in the United States are codified in the Federal Regulations, 45 CFR 46, and special protections are given to prisoners. Living donor transplantation has parallels with human subject research in that both activities are performed with the primary goal of benefiting third parties. In this article, we describe what special considerations should be provided to prisoners as potential living donors using a vulnerabilities approach adapted from the human research subject protection literature.

  7. Extending Vulnerability Assessment to Include Life Stages Considerations.

    Science.gov (United States)

    Hodgson, Emma E; Essington, Timothy E; Kaplan, Isaac C

    2016-01-01

    Species are experiencing a suite of novel stressors from anthropogenic activities that have impacts at multiple scales. Vulnerability assessment is one tool to evaluate the likely impacts that these stressors pose to species so that high-vulnerability cases can be identified and prioritized for monitoring, protection, or mitigation. Commonly used semi-quantitative methods lack a framework to explicitly account for differences in exposure to stressors and organism responses across life stages. Here we propose a modification to commonly used spatial vulnerability assessment methods that includes such an approach, using ocean acidification in the California Current as an illustrative case study. Life stage considerations were included by assessing vulnerability of each life stage to ocean acidification and were used to estimate population vulnerability in two ways. We set population vulnerability equal to: (1) the maximum stage vulnerability and (2) a weighted mean across all stages, with weights calculated using Lefkovitch matrix models. Vulnerability was found to vary across life stages for the six species explored in this case study: two krill-Euphausia pacifica and Thysanoessa spinifera, pteropod-Limacina helicina, pink shrimp-Pandalus jordani, Dungeness crab-Metacarcinus magister and Pacific hake-Merluccius productus. The maximum vulnerability estimates ranged from larval to subadult and adult stages with no consistent stage having maximum vulnerability across species. Similarly, integrated vulnerability metrics varied greatly across species. A comparison showed that some species had vulnerabilities that were similar between the two metrics, while other species' vulnerabilities varied substantially between the two metrics. These differences primarily resulted from cases where the most vulnerable stage had a low relative weight. We compare these methods and explore circumstances where each method may be appropriate.

  8. Integrated flash flood vulnerability assessment: Insights from East Attica, Greece

    Science.gov (United States)

    Karagiorgos, Konstantinos; Thaler, Thomas; Heiser, Micha; Hübl, Johannes; Fuchs, Sven

    2016-10-01

    In the framework of flood risk assessment, vulnerability is a key concept to assess the susceptibility of elements at risk. Besides the increasing amount of studies on flash floods available, in-depth information on vulnerability in Mediterranean countries was missing so far. Moreover, current approaches in vulnerability research are driven by a divide between social scientists who tend to view vulnerability as representing a set of socio-economic factors, and natural scientists who view vulnerability in terms of the degree of loss to an element at risk. Further, vulnerability studies in response to flash flood processes are rarely answered in the literature. In order to close this gap, this paper implemented an integrated vulnerability approach focusing on residential buildings exposed to flash floods in Greece. In general, both physical and social vulnerability was comparable low, which is interpreted as a result from (a) specific building regulations in Greece as well as general design principles leading to less structural susceptibility of elements at risk exposed, and (b) relatively low economic losses leading to less social vulnerability of citizens exposed. The population show high risk awareness and coping capacity to response to natural hazards event and in the same time the impact of the events are quite low, because of the already high use of local protection measures. The low vulnerability score for East Attica can be attributed especially to the low physical vulnerability and the moderate socio-economic well-being of the area. The consequence is to focus risk management strategies mainly in the reduction of the social vulnerability. By analysing both physical and social vulnerability an attempt was made to bridge the gap between scholars from sciences and humanities, and to integrate the results of the analysis into the broader vulnerability context.

  9. Modelling farm vulnerability to flooding: A step toward vulnerability mitigation policies appraisal

    Science.gov (United States)

    Brémond, P.; Abrami, G.; Blanc, C.; Grelot, F.

    2009-04-01

    Recent catastrophic flood events such as Elbe in 2002 or Rhône in 2003 have shown limits of flood management policies relying on dykes protection: worsening of flood impacts downstream, increased damage by dykes rupture. Those events, among others, contributes to radical changes on the philosophy of flood prevention, with the promotion of new orientations for mitigating flood exposition. Two new trends may have a significant impact on rural areas: floodplain restoration and vulnerability mitigation. The Rhône River program, which is an contract of objectives signed between French Government and local collectivites, is highly illustrative of these new trends and their impact on agricultural sector. In this program, it appears that areas to be concerned by floodplain restoration are agricultural ones, because their supposed vulnerability to flood is expected to be less important to urban areas. As a consequence, agricultural sector is particularly concerned by planned actions on mitigation of assets vulnerability, an important part of the program (financial support of European Union of 7.5 Million euros). Mitigation of agricultural assets vulnerability reveals particularly interesting for two following reasons. Firstly, it is a way to maintain agricultural activities in floodplains yet existing, without promoting flood protection. Secondly, in case of floodplain restoration, vulnerability mitigation is a way for local authorities to compensate over-flooding impacts. In practice, local authorities may financially support farmers for implementing measures to mitigate their farm vulnerability. On the Rhône River, an important work has already been done to identify farm vulnerability to flooding, and propose measures to mitigate it. More than 3 000 farms exposed to flood risk have been identified representing 88 690 ha of agricultural areas which is estimated to generate damage between 400 and 800 Million euros depending on the season of occurrence for a catastrophic

  10. Addressing the vulnerabilities of pass-thoughts

    Science.gov (United States)

    Fernandez, Gabriel C.; Danko, Amanda S.

    2016-05-01

    As biometrics become increasingly pervasive, consumer electronics are reaping the benefits of improved authentication methods. Leveraging the physical characteristics of a user reduces the burden of setting and remembering complex passwords, while enabling stronger security. Multi-factor systems lend further credence to this model, increasing security via multiple passive data points. In recent years, brainwaves have been shown to be another feasible source for biometric authentication. Physically unique to an individual in certain circumstances, the signals can also be changed by the user at will, making them more robust than static physical characteristics. No paradigm is impervious however, and even well-established medical technologies have deficiencies. In this work, a system for biometric authentication via brainwaves is constructed with electroencephalography (EEG). The efficacy of EEG biometrics via existing consumer electronics is evaluated, and vulnerabilities of such a system are enumerated. Impersonation attacks are performed to expose the extent to which the system is vulnerable. Finally, a multimodal system combining EEG with additional factors is recommended and outlined.

  11. Vulnerabilities to misinformation in online pharmaceutical marketing

    Science.gov (United States)

    De Freitas, Julian; Falls, Brian A; Haque, Omar S; Bursztajn, Harold J

    2013-01-01

    Given the large percentage of Internet users who search for health information online, pharmaceutical companies have invested significantly in online marketing of their products. Although online pharmaceutical marketing can potentially benefit both physicians and patients, it can also harm these groups by misleading them. Indeed, some pharmaceutical companies have been guilty of undue influence, which has threatened public health and trust. We conducted a review of the available literature on online pharmaceutical marketing, undue influence and the psychology of decision-making, in order to identify factors that contribute to Internet users’ vulnerability to online pharmaceutical misinformation. We find five converging factors: Internet dependence, excessive trust in the veracity of online information, unawareness of pharmaceutical company influence, social isolation and detail fixation. As the Internet continues to change, it is important that regulators keep in mind not only misinformation that surrounds new web technologies and their contents, but also the factors that make Internet users vulnerable to misinformation in the first place. Psychological components are a critical, although often neglected, risk factor for Internet users becoming misinformed upon exposure to online pharmaceutical marketing. Awareness of these psychological factors may help Internet users attentively and safely navigate an evolving web terrain. PMID:23761527

  12. Contract gangs: race, gender and vulnerability

    Directory of Open Access Journals (Sweden)

    Heather Goodall

    2015-12-01

    Full Text Available While violence directed at Indian students in Australian cities has been highlighted in the Indian and Australian press, far less attention has been paid to the violence directed at Indians in rural areas. This has most often involved Indians employed in contract labour in seasonal industries like fruit or vegetable picking. This article reviews various media accounts, both urban and rural, of violence directed at Indians from 2009 to 2012. It draws attention to the far longer history of labour exploitation which has taken place in rural and urban Australia in contract labour conditions and the particular invisibility of rural settings for such violence. Racial minorities, like Aboriginal and Chinese workers, and women in agriculture and domestic work, have seldom had adequate power to respond industrially or politically. This means that in the past, these groups been particularly vulnerable to such structural exploitation. The paper concludes by calling for greater attention not only to the particular vulnerability of Indians in rural settings but to the wider presence of racialised and gendered exploitation enabled by contract labour structures.

  13. The assessment of radio vulnerability in agroecosystems

    International Nuclear Information System (INIS)

    Wasserman, Maria Angelica; Viana, Aline G.; Conti, Claudio C.; Rochedo, Elaine R.; Vivone, Ronaldo J.; Bartoly, Flavia; Perez, Daniel V.

    2005-01-01

    A soil specific sequential extraction protocol, associated to soil to plant transfer factors (TF) data is proposed in this work as a methodology able to detect vulnerability of agro-ecosystems to the contamination with 137 Cs and 90 Sr. The objective is to provide parameters for environmental assessment models and to optimize emergency response planning for the main Brazilian agro-ecosystems and to other Countries with similar soil conditions. Transfer factor values were determined for reference plants, cultivated in Ferralsol, Nitisol and Acrisol that constitute great part in the national agricultural soil. The preliminary results of geochemical partition for these radionuclides were coherent with soil to plant transfer factors (TF) data. And with some soil properties recognized by the specialized literature as related with mechanisms of sorption to Cs (e.g. exchangeable K, organic matter and iron oxides content) and Sr (e.g. exchangeable Ca). Nitisol, showed lower TF for 90 Sr and 137 Cs compared with the other studied soil. In the Nitisol, it is possible that reduction in 137 Cs transfer be also associated with fixation in the internal faces of 2:1 clay mineral type. The integration of experimental methods results obtained in the laboratory with results obtained in field experiments seems to confirm the vulnerability of some Brazilian soil to the radioactivity contamination. (author)

  14. Vulnerabilities to misinformation in online pharmaceutical marketing.

    Science.gov (United States)

    De Freitas, Julian; Falls, Brian A; Haque, Omar S; Bursztajn, Harold J

    2013-05-01

    Given the large percentage of Internet users who search for health information online, pharmaceutical companies have invested significantly in online marketing of their products. Although online pharmaceutical marketing can potentially benefit both physicians and patients, it can also harm these groups by misleading them. Indeed, some pharmaceutical companies have been guilty of undue influence, which has threatened public health and trust. We conducted a review of the available literature on online pharmaceutical marketing, undue influence and the psychology of decision-making, in order to identify factors that contribute to Internet users' vulnerability to online pharmaceutical misinformation. We find five converging factors: Internet dependence, excessive trust in the veracity of online information, unawareness of pharmaceutical company influence, social isolation and detail fixation. As the Internet continues to change, it is important that regulators keep in mind not only misinformation that surrounds new web technologies and their contents, but also the factors that make Internet users vulnerable to misinformation in the first place. Psychological components are a critical, although often neglected, risk factor for Internet users becoming misinformed upon exposure to online pharmaceutical marketing. Awareness of these psychological factors may help Internet users attentively and safely navigate an evolving web terrain.

  15. VULNERABILITY AND RISK OF CONTAMINATION KARSTIC AQUIFERS

    Directory of Open Access Journals (Sweden)

    Yameli Aguilar

    2013-08-01

    Full Text Available Karstic systems occupy nearly 20% of the surface of the earth and are inhabited by numerous human communities. Karstic aquifers are the most exposed to pollution from human activities. Pollution of karstic aquifers is a severe environmental problem worldwide.  In order to face the vulnerability of karstic aquifers to pollution, researchers have created a diversity of study approaches and models, each one having their own strengths and weaknesses depending on the discipline from which they were originated, thus requiring a thorough discussion within the required multidisciplinary character. The objective of this article was to analyze the theoretical and methodological approaches applied to the pollution of karstic aquifers. The European hydrogeological, land evaluation, hydropedological and a geographic approach were analyzed. The relevance of a geomorphological analysis as a cartographic basis for the analysis of vulnerability and risks were emphasized. From the analysis of models, approaches and methodologies discussed the following recommendation is made: to form an interdisciplinary work team, to elaborate a conceptual model according to the site and the working scale and to e, apply and validate the model.

  16. Syndemic vulnerability and the right to health.

    Science.gov (United States)

    Willen, Sarah S; Knipper, Michael; Abadía-Barrero, César E; Davidovitch, Nadav

    2017-03-04

    Investigators working both in syndemics, a field of applied health research with roots in medical anthropology, and in the field of health and human rights recognise that upstream social, political, and structural determinants contribute more to health inequities than do biological factors or personal choices. Syndemics investigates synergistic, often deleterious interactions among comorbid health conditions, especially under circumstances of structural and political adversity. Health and human rights research draws on international law to argue that all people deserve access not only to health care, but also to the underlying determinants of good health. Taking the urgent matter of migrant health as an empirical focus, we juxtapose the fields of syndemics and health and human rights, identify their complementarities, and advocate for a combined approach. By melding insights from these fields, the combined syndemics/health and human rights approach advanced here can provide clinicians and other key stakeholders with concrete insights, tools, and strategies to tackle the health inequities that affect migrants and other vulnerable groups by: (1) mapping the effect of social, political, and structural determinants on health; (2) identifying opportunities for upstream intervention; and (3) working collaboratively to tackle the structures, institutions, and processes that cause and exacerbate health inequities. Undergirding this approach is an egalitarian interpretation of the right to health that differs from narrow legalistic and individual interpretations by insisting that all people are equal in worth and, as a result, equally deserving of protection from syndemic vulnerability. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. Vulnerability of housing buildings in Bucharest, Romania

    Science.gov (United States)

    Bostenaru, M.

    2009-04-01

    The author participates to the World Housing Encyclopedia project (www.world-housing.net), an internet based database of housing buildings in earthquake prone areas of the world. This is a voluntary project run by the Earthquake Engineering Research Institute, Oakland, California and the International Association of Earthquake Engineering, financial means being available only for the website where the information is shared. For broader dissemination in 2004 a summary publication of the reports to date was published. The database can be querried for various parameters and browsed after geographic distribution. Participation is open to any housing experts. Between 2003 and 2006 the author was also member of the editorial board. The author contributed numerous reports about building types in Romania, and each one about building types in Germany and Switzerland. This presentation will be about the contributed reports on building types in Romania. To the Encyclopedia eight reports on building types from Bucharest were contributed, while in further research of the author one more was similarly described regarding the vulnerability and the seismic retrofit. The selection of these types was done considering the historic development of the built substance in Bucharest from 1850 on, time from which a representative amount of housing buildings which can be classified in typologies can be found in Bucharest. While the structural types are not necessarily characteristic for the style, since the style has other time limits, often appearing before the type became common and then remaining being practiced also after another style gained ground, a historic succession can be seen also in this case. The nine types considered can be grouped in seven time categories: - the time 1850-1880, for a vernacular housing type with masonry load bearing walls and timber floors, - the time 1880-1920, for the type of two storey or multi-storey house with masonry walls and timber floors (in which

  18. Vulnerability analysis methods for road networks

    Science.gov (United States)

    Bíl, Michal; Vodák, Rostislav; Kubeček, Jan; Rebok, Tomáš; Svoboda, Tomáš

    2014-05-01

    Road networks rank among the most important lifelines of modern society. They can be damaged by either random or intentional events. Roads are also often affected by natural hazards, the impacts of which are both direct and indirect. Whereas direct impacts (e.g. roads damaged by a landslide or due to flooding) are localized in close proximity to the natural hazard occurrence, the indirect impacts can entail widespread service disabilities and considerable travel delays. The change in flows in the network may affect the population living far from the places originally impacted by the natural disaster. These effects are primarily possible due to the intrinsic nature of this system. The consequences and extent of the indirect costs also depend on the set of road links which were damaged, because the road links differ in terms of their importance. The more robust (interconnected) the road network is, the less time is usually needed to secure the serviceability of an area hit by a disaster. These kinds of networks also demonstrate a higher degree of resilience. Evaluating road network structures is therefore essential in any type of vulnerability and resilience analysis. There are a range of approaches used for evaluation of the vulnerability of a network and for identification of the weakest road links. Only few of them are, however, capable of simulating the impacts of the simultaneous closure of numerous links, which often occurs during a disaster. The primary problem is that in the case of a disaster, which usually has a large regional extent, the road network may remain disconnected. The majority of the commonly used indices use direct computation of the shortest paths or time between OD (origin - destination) pairs and therefore cannot be applied when the network breaks up into two or more components. Since extensive break-ups often occur in cases of major disasters, it is important to study the network vulnerability in these cases as well, so that appropriate

  19. [Chapter 1. Beyond the reification of vulnerability, thinking vulnerability as the subject capability

    Science.gov (United States)

    Botbol-Baum, Mylène

    2016-12-29

    In this introduction I will draw an overview of theories associated with the notion of care from feminist studies to clinical theory by articulating the concept of vulnerability to that of capability in Amartya Sen and showing the roots of capability theory in Aristotle and anti-utilitarian theories.

  20. A socioeconomic profile of vulnerable land to desertification in Italy.

    Science.gov (United States)

    Salvati, Luca

    2014-01-01

    Climate changes, soil vulnerability, loss in biodiversity, and growing human pressure are threatening Mediterranean-type ecosystems which are increasingly considered as a desertification hotspot. In this region, land vulnerability to desertification strongly depends on the interplay between natural and anthropogenic factors. The present study proposes a multivariate exploratory analysis of the relationship between the spatial distribution of land vulnerability to desertification and the socioeconomic contexts found in three geographical divisions of Italy (north, center and south) based on statistical indicators. A total of 111 indicators describing different themes (demography, human settlements, labor market and human capital, rural development, income and wealth) were used to discriminate vulnerable from non-vulnerable areas. The resulting socioeconomic profile of vulnerable areas in northern and southern Italy diverged significantly, the importance of demographic and economic indicators being higher in southern Italy than in northern Italy. On the contrary, human settlement indicators were found more important to discriminate vulnerable and non-vulnerable areas in northern Italy, suggesting a role for peri-urbanization in shaping the future vulnerable areas. An in-depth knowledge of the socioeconomic characteristics of vulnerable land may contribute to scenarios' modeling and the development of more effective policies to combat desertification. © 2013 Elsevier B.V. All rights reserved.

  1. Perspectives on contextual vulnerability in discourses of climate conflict

    Science.gov (United States)

    Okpara, U. T.; Stringer, L. C.; Dougill, A. J.

    2016-02-01

    The science of climate security and conflict is replete with controversies. Yet the increasing vulnerability of politically fragile countries to the security consequences of climate change is widely acknowledged. Although climate conflict reflects a continuum of conditional forces that coalesce around the notion of vulnerability, how different portrayals of vulnerability influence the discursive formation of climate conflict relations remains an exceptional but under-researched issue. This paper combines a systematic discourse analysis with a vulnerability interpretation diagnostic tool to explore (i) how discourses of climate conflict are constructed and represented, (ii) how vulnerability is communicated across discourse lines, and (iii) the strength of contextual vulnerability against a deterministic narrative of scarcity-induced conflict, such as that pertaining to land. Systematically characterising climate conflict discourses based on the central issues constructed, assumptions about mechanistic relationships, implicit normative judgements and vulnerability portrayals, provides a useful way of understanding where discourses differ. While discourses show a wide range of opinions "for" and "against" climate conflict relations, engagement with vulnerability has been less pronounced - except for the dominant context centrism discourse concerned about human security (particularly in Africa). In exploring this discourse, we observe an increasing sense of contextual vulnerability that is oriented towards a concern for complexity rather than predictability. The article concludes by illustrating that a turn towards contextual vulnerability thinking will help advance a constructivist theory-informed climate conflict scholarship that recognises historicity, specificity, and variability as crucial elements of contextual totalities of any area affected by climate conflict.

  2. Ecosystem Vulnerability Review: Proposal of an Interdisciplinary Ecosystem Assessment Approach

    Science.gov (United States)

    Weißhuhn, Peter; Müller, Felix; Wiggering, Hubert

    2018-06-01

    To safeguard the sustainable use of ecosystems and their services, early detection of potentially damaging changes in functional capabilities is needed. To support a proper ecosystem management, the analysis of an ecosystem's vulnerability provide information on its weaknesses as well as on its capacity to recover after suffering an impact. However, the application of the vulnerability concept to ecosystems is still an emerging topic. After providing background on the vulnerability concept, we summarize existing ecosystem vulnerability research on the basis of a systematic literature review with a special focus on ecosystem type, disciplinary background, and more detailed definition of the ecosystem vulnerability components. Using the Web of ScienceTM Core Collection, we overviewed the literature from 1991 onwards but used the 5 years from 2011 to 2015 for an in-depth analysis, including 129 articles. We found that ecosystem vulnerability analysis has been applied most notably in conservation biology, climate change research, and ecological risk assessments, pinpointing a limited spreading across the environmental sciences. It occurred primarily within marine and freshwater ecosystems. To avoid confusion, we recommend using the unambiguous term ecosystem vulnerability rather than ecological, environmental, population, or community vulnerability. Further, common ground has been identified, on which to define the ecosystem vulnerability components exposure, sensitivity, and adaptive capacity. We propose a framework for ecosystem assessments that coherently connects the concepts of vulnerability, resilience, and adaptability as different ecosystem responses. A short outlook on the possible operationalization of the concept by ecosystem vulnerabilty indices, and a conclusion section complete the review.

  3. Osteosíntesis mini-invasiva con placas bloqueadas en fracturas metafisarias distales de tibia. Resultados clínico-funcionales. [Minimally invasive plate osteosynthesis in distal metaphyseal fractures of tibia. Comparison of results between fractures AO 43A and AO 43C.

    OpenAIRE

    Juan Manuel Yañez Arauz; Ignacio Arzac Ulla; Javier Del Vecchio; Andres Eksarho; Leandro Civetta; Rodrigo Perez Davila

    2015-01-01

    Introducción Las fracturas distales de tibia son un desafío para el tratamiento debido a la escasa cobertura y particular vascularización. Los objetivos del presente estudio son analizar los resultados clínicos y funcionales de los pacientes con fractura de tibia distal; tratados con técnica MIPO (minimally invasive plate osteosynthesis) con placas bloqueadas; comparar los resultados del grupo de fracturas tipo AO 43A con las tipo AO 43C1-C2; y comparar los resultados MIPO con el tratamie...

  4. Osteossíntese de fratura diafisária do úmero com placa em ponte: apresentação e descrição da técnica Osteosynthesis of the humeral shaft fractures, with bridge plate

    Directory of Open Access Journals (Sweden)

    Bruno Livani

    2004-06-01

    Full Text Available Os autores descrevem o método cirúrgico inédito para o tratamento das fraturas da diáfise do úmero, com placa colocada por técnica minimamente invasiva. Após estudos anatômicos, foram identificadas três acessos cirúrgicos pelos quais se pode introduzir uma placa na face anterior do úmero, sem risco de lesão vásculo nervosa. O acesso proximal se faz entre os múculos deltóide, lateralmente, e bíceps braquial, medialmente. Nas fraturas do terço médio o acesso distal é feito entre os músculos bíceps braquial e braquial com a placa introduzida de proximal para distal. Nas fraturas distais do úmero o acesso proximal é o mesmo, mas o acesso distal é o descrito por Kocher, com a placa introduzida de distal para proximal e fixada na face anterior da coluna lateral do úmero. O método aqui apresentado vem sendo utilizado desde junho de 2001, principalmente nos pacientes politraumatizados e polifraturados, por ser rápida, segura e por permitir que o paciente possa ser operado em decúbito dorsal horizontal. Além disso, não há necessidade de intensificador de imagem, ou mesmo aparelho de radiografia. Até o momento não foram observadas complicações vásculo nervosas nos 22 pacientes tratados.The authors describe for the first time ever a minimally invasive plate osteosythesis for the treatment of the humeral shatf fractures. After anatomic human cadaver's studies, it was identified three surgical approaches for plate percutaneous insertion on the anterior surface of the humerus without vascular and nervous injury. The proximal approach is between the biceps and deltoid muscles. The distal approach for medial third fractures is between the biceps brachialis and brachialis muscles. The plate is inserted from the proximal to distal direction. For distal fractures, the proximal approach is the same described by Krocher, with the plate inserted from distal to proximal and fixed on the anterior surface of the lateral column of the

  5. Baropodometria dinâmica de atletas remadores, com sinais e sintomas de disfunção temporomandibular, pré e pós tratamento, com placa oclusal estabilizadora e exercício terapêutico de movimento mandibular: estudo piloto

    OpenAIRE

    Eduardo Yujiro Abe

    2016-01-01

    A desordem temporomadibular em atletas da modalidade do remo é uma temática ainda pouco abordada na literatura, muito embora se tenha conhecimento que a biomecânica do gesto esportivo possa provocar dores lombares, fratura de costela devido ao estresse, além de dores cervicais provenientes do desprendimento de força, para atingir grande velocidade e manutendo o equilíbrio por um longo tempo. O presente estudo tem como objetivo analisar, por meio da baropodometria dinâmica, a ação da placa ocl...

  6. Análisis, diseño e implementación de un sistema de control de ingreso de vehículos basado en visión artificial y reconocimiento de placas en el parqueadero de la Universidad Politécnica Salesiana - Sede Cuenca

    OpenAIRE

    Álvarez Durán, Mayra Alejandra

    2014-01-01

    El presente trabajo consiste en un sistema de reconocimiento de placas vehiculares que utiliza algoritmos de Reconocimiento Óptico de Caracteres ROC o OCR, mediante las librerías OPENCV, está desarrollado en lenguaje JAVA y se encuentra basado en Inteligencia Artificial, esta herramienta recepta y procesa las imágenes desde una cámara de video que se encuentra al ingresar al parqueadero de la Universidad Politécnica Salesiana, sede Cuenca. This work consists of recognition system license p...

  7. Social vulnerability indicators as a sustainable planning tool

    International Nuclear Information System (INIS)

    Lee, Yung-Jaan

    2014-01-01

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts

  8. Susceptibility to mountain hazards in Austria - paradigms of vulnerability revisited

    Science.gov (United States)

    Fuchs, Sven

    2010-05-01

    The concept of vulnerability is pillared by multiple disciplinary theories underpinning either a technical or a social origin of the concept and resulting in a range of paradigms for either a qualitative or quantitative assessment of vulnerability. However, efforts to reduce susceptibility to hazards and to create disaster-resilient communities require intersections among these theories, since human activity cannot be seen independently from the environmental setting. Acknowledging different roots of disciplinary paradigms, issues determining structural, economic, institutional and social vulnerability are discussed with respect to mountain hazards in Austria. The underlying idea of taking such an integrative viewpoint was the cognition that human action in mountain environments affects the state of vulnerability, and the state of vulnerability in turn shapes the possibilities of human action. It is argued that structural vulnerability as originator results in considerable economic vulnerability, generated by the institutional settings of dealing with natural hazards and shaped by the overall societal framework. Hence, the vulnerability of a specific location and within a considered point of time is triggered by the hazardous event and the related physical susceptibility of structures, such as buildings located on a torrent fan. Depending on the specific institutional settings, economic vulnerability of individuals or of the society results, above all with respect to imperfect loss compensation mechanisms in the areas under investigation. While this potential for harm can be addressed as social vulnerability, the concept of institutional vulnerability has been developed with respect to the overall political settings of governmental risk management. As a result, the concept of vulnerability, as being used in natural sciences, can be extended by integration of possible reasons why such physical susceptibility of structures exists, and by integration of compensation

  9. Social vulnerability assessment: a growing practice in Europe?

    Science.gov (United States)

    Tapsell, S.; McC arthy, S.

    2012-04-01

    This paper builds upon work on social vulnerability from the CapHaz-Net consortium, an ongoing research project funded by the European Commission in its 7th Framework Programme. The project focuses on the social dimensions of natural hazards, as well as on regional practices of risk prevention and management, and aims at improving the resilience of European societies to natural hazards, paying particular attention to social capacity building. The topic of social vulnerability is one of seven themes being addressed in the project. There are various rationales for examining the relevance of social vulnerability to natural hazards. Vulnerability assessment has now been accepted as a requirement for the effective development of emergency management capability, and assessment of social vulnerability has been recognised as being integral to understanding the risk to natural hazards. The aim of our research was to examine social vulnerability, how it might be understood in the context of natural hazards in Europe, and how social vulnerability can be addressed to increase social capacity. The work comprised a review of research on social vulnerability to different natural hazards within Europe and included concepts and definitions of social vulnerability (and related concepts), the purpose of vulnerability assessment and who decides who is vulnerable, different approaches to assessing or measuring social vulnerability (such as the use of 'classical' quantitative vulnerability indicators and qualitative community-based approaches, along with the advantages and disadvantages of both), conceptual frameworks for assessing social vulnerability and three case studies of social vulnerability studies within Europe: flash floods in the Italian Alps, fluvial flooding in Germany and heat waves in Spain. The review reveals variable application of social vulnerability analysis across Europe and there are indications why this might be the case. Reasons could range from the scale of

  10. Identification of vulnerability within a child and family health service.

    Science.gov (United States)

    Kimla, Katarina; Nathanson, Dania; Woolfenden, Susan; Zwi, Karen

    2017-11-21

    Objective The aims of the present study were to describe the prevalence of vulnerability in a cohort of newborns, identify the factors that increase the risk of vulnerability and examine whether those who are most vulnerable are receiving home visits. Methods A prospective cross-sectional study was performed using data collected from questionnaires completed by child and family health nurses and obstetric discharge summaries for each mother-baby dyad. Descriptive frequencies and percentages are used to describe the proportions of children who were vulnerable, offered services and had risk factors for vulnerability. Categorical data were compared using Pearson's Chi-squared analysis. Results In all, 1517 newborns were included in the present study. Of these, 40.5% were identified as vulnerable and 13.9% had two or more risk factors for vulnerability (95% confidence interval (CI) 12-16%). The most common risk factors were biological. Across all newborns, 33.7% were visited at home, and 74.6% of vulnerable newborns were offered a home visit. Children identified as vulnerable were more likely to have a home visit than those who were not (z for 95% CI=1.96; Pvulnerability allowed the offer of home visiting to be directed towards those most likely to benefit. What is known about the topic? Of the Australian child population, 10-20% are vulnerable to adverse health, developmental and wellbeing outcomes. Vulnerable infants are at a greater risk of becoming vulnerable children, adolescents and adults over the life course. Biological and psychosocial risk factors for vulnerability are well described. Families with the greatest need are often the least likely to access or receive support, and have lower utilisation of preventative health services despite evidence that support in the first few years of life can significantly improve long-term outcomes. What does this paper add? This paper provides a detailed description of vulnerabilities in a cohort of newborns and

  11. Social vulnerability indicators as a sustainable planning tool

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Yung-Jaan, E-mail: yungjaanlee@gmail.com

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study

  12. Áreas vulnerables en el centro de Madrid

    Directory of Open Access Journals (Sweden)

    Agustín Hernández Aja

    2007-07-01

    This document shows an vulnerability analysis of the central area of Madrid taken it as the field of APE-00.01. Its objective is to delimit “vulnerable areas” so there can be evaluated the opportunities for interve trough them and then define the best tools in detriment of their vulnerability reasons. To determinate those areas we have developed a sociodemographic analysis where we have found those units of population with vulnerable values. Once determinated, we have synthetize them to define them as easy drafts that makes understandable the work area for later on establish a vulnerable areas catalogue with spatial homogeneity and significant size. The basic nucleus of the análisis has been the sociodemographic fact, based on homogeneus data sources for all the area so they could be referenced to specific spacial areas. In each case has been advised other possible indicators of vulnerability including a signifier selection of thrm on the fifth chapter.

  13. Childhood physical abuse and aggression: Shame and narcissistic vulnerability.

    Science.gov (United States)

    Keene, Amanda C; Epps, James

    2016-01-01

    This study examined narcissistic vulnerability and shame-proneness as potential mediators between childhood physical abuse (CPA) and adult anger and aggression. Participants were 400 undergraduate students, 134 of whom had a history of CPA. All participants completed self-report questionnaires assessing history of CPA, shame-proneness, narcissistic vulnerability, physical aggression, trait anger, and hostility. Results indicated abused participants were more angry and aggressive and experienced higher levels of shame-proneness and narcissistic vulnerability than nonabused participants. Multiple mediation analyses showed that narcissistic vulnerability, but not shame-proneness, partially mediated the relation between abuse and physical aggression. However, narcissistic vulnerability and shame-proneness both emerged as partial mediators between abuse and the anger and hostility variables. These findings suggest that narcissistic vulnerability and shame-proneness may function as mediators of adjustment following childhood maltreatment. Study limitations and recommendations for future research are discussed. Copyright © 2015 Elsevier Ltd. All rights reserved.

  14. Mental vulnerability--a risk factor for ischemic heart disease

    DEFF Research Database (Denmark)

    Eplov, Lene Falgaard; Jørgensen, Torben; Birket-Smith, Morten

    2006-01-01

    OBJECTIVE: The purpose of this study is to examine whether mental vulnerability is a risk factor for the development of ischemic heart disease (IHD) after adjustment for well-established risk factors. METHODS: In three prospective cohort studies in Copenhagen County, Denmark, we recorded the level...... of mental vulnerability and possible risk factors to IHD at baseline. For follow-up, the sample was linked to relevant registries to identify all cases of fatal and nonfatal IHD. The relationship between mental vulnerability and IHD was examined using both Kaplan-Meir and Cox proportional hazard models...... adjusting for possible confounding factors. RESULTS: Mental vulnerability was significantly associated with the risk for IHD (medium mental vulnerability: hazard ratio 1.41, 95% confidence interval 1.04-1.91; and high mental vulnerability: hazard ratio 2.05; 95% confidence interval 1.46-2.88), after...

  15. Statistics of software vulnerability detection in certification testing

    Science.gov (United States)

    Barabanov, A. V.; Markov, A. S.; Tsirlov, V. L.

    2018-05-01

    The paper discusses practical aspects of introduction of the methods to detect software vulnerability in the day-to-day activities of the accredited testing laboratory. It presents the approval results of the vulnerability detection methods as part of the study of the open source software and the software that is a test object of the certification tests under information security requirements, including software for communication networks. Results of the study showing the allocation of identified vulnerabilities by types of attacks, country of origin, programming languages used in the development, methods for detecting vulnerability, etc. are given. The experience of foreign information security certification systems related to the detection of certified software vulnerabilities is analyzed. The main conclusion based on the study is the need to implement practices for developing secure software in the development life cycle processes. The conclusions and recommendations for the testing laboratories on the implementation of the vulnerability analysis methods are laid down.

  16. The Unfair Commercial Practices Directive and Vulnerable Consumers

    DEFF Research Database (Denmark)

    Trzaskowski, Jan

    the economic behaviour of consumers ‘below 1 average’ even though the practice does not meet the requirements of professional diligence. The Directive’s adoption of the European Court of Justice’s ‘average consumer’ entails that protection is generally provided only for those who are far from vulnerable......Consumer protection is deeply anchored in EU law, including the Treaty and the Charter of Fundamental Rights. This article discusses the concept of consumer vulnerability and how vulnerable consumers are protected in the context of commercial practices which is fully harmonised by the Unfair....... The Directive’s Article 5(3) concerning vulnerable consumers protects only—and to a limited extent—groups who are vulnerable due to mental or physical infirmity, age or credulity. Even though consumers make many good choices, all consumers are vulnerable in certain situations—often due to time constraints...

  17. Vulnerability of birds to climate change in California's Sierra Nevada

    Directory of Open Access Journals (Sweden)

    Rodney B. Siegel

    2014-06-01

    Full Text Available In a rapidly changing climate, effective bird conservation requires not only reliable information about the current vulnerability of species of conservation concern, but also credible projections of their future vulnerability. Such projections may enable managers to preempt or reduce emerging climate-related threats through appropriate habitat management. We used NatureServe's Climate Change Vulnerability Index (CCVI to predict vulnerability to climate change of 168 bird species that breed in the Sierra Nevada mountains of California, USA. The CCVI assesses species-specific exposure and sensitivity to climate change within a defined geographic area, through the integration of (a species' range maps, (b information about species' natural history traits and ecological relationships, (c historic and current climate data, and (d spatially explicit climate change projections. We conducted the assessment under two different downscaled climate models with divergent projections about future precipitation through the middle of the 21st century. Assessments differed relatively little under the two climate models. Of five CCVI vulnerability ranking categories, only one species, White-tailed Ptarmigan (Lagopus leucura, received the most vulnerable rank, Extremely Vulnerable. No species received the second-highest vulnerability ranking, Highly Vulnerable. Sixteen species scored as Moderately Vulnerable using one or both climate models: Common Merganser (Mergus merganser, Osprey (Pandion haliaetus, Bald Eagle (Haliaeetus leucocephalus, Northern Goshawk (Accipiter gentilis, Peregrine Falcon (Falco peregrinus, Prairie Falcon (Falco mexicanus, Spotted Sandpiper (Actitis macularius, Great Gray Owl (Strix nebulosa, Black Swift (Cypseloides niger, Clark's Nutcracker (Nucifraga columbiana, American Dipper (Cinclus mexicanus, Swainson's Thrush (Catharus ustulatus, American Pipit (Anthus rubescens, Gray-crowned Rosy-Finch (Leucosticte tephrocotis, Pine Grosbeak

  18. Assessing local vulnerability to climate change in Ecuador

    OpenAIRE

    Fernandez, Mario Andres; Bucaram, Santiago J.; Renteria, Willington

    2015-01-01

    Vulnerability assessments have become necessary to increase the understanding of climate-sensitive systems and inform resource allocation in developing countries. Challenges arise when poor economic and social development combines with heterogeneous climatic conditions. Thus, finding and harmonizing good-quality data at local scale may be a significant hurdle for vulnerability research. In this paper we assess vulnerability to climate change at a local level in Ecuador. We take Ecuador as a c...

  19. Temporal dimensions of vulnerability to crime in economic sectors

    OpenAIRE

    Klima, Noel

    2011-01-01

    This paper presents the results of research into vulnerability to crime in two economic sectors in Belgium. Vulnerability to crime is an integration of diverse temporal factors. We address pre-crime and post-crime aspects of vulnerability, arising before and after the criminal event in an economic context. Based on interviews with professionals, security staff, law enforcement agents and with criminals in the transport sector and the hotel and catering industry, a study of police files, and i...

  20. Cyber Security Vulnerability Impact on I and C Reliability

    International Nuclear Information System (INIS)

    Hadley, Mark D.; McBride, Justin B.

    2006-01-01

    We present a discussion of the cyber security vulnerability impact on instrument and control reliability. In the discussion we demonstrate the likely vector of attack and vulnerabilities associated with commodity hardware, protocols and communication media. The current fleet of nuclear power plants in the United States utilizes aging analog instrument and control systems which are more frequently suffering from obsolescence and failure. The commodity equipment available now and in the near future incorporates features from information technology systems which compound cyber vulnerabilities

  1. Introduction to emerging threats and vulnerabilities to create user awareness

    CSIR Research Space (South Africa)

    Veerasamy, N

    2009-04-01

    Full Text Available around the world [4]. 3.3 Web Application Vulnerabilities SQL injection takes place when there is improper validation of user input. According to IBM, SQL injection vulnerabilities increased a staggering 134% from 2007 [1]. This indicates that even... though this vulnerability is not a new exploit, its application is still wide-spread. With SQL injection, access to sensitive information in databases can be gained and thus the integrity of information on web sites and in transactions could...

  2. RISK, VULNERABILITY AND ADAPTATION TO CLIMATE CHANGE: AN INTERDISCIPLINARY APPROACH

    OpenAIRE

    Iwama,Allan Yu; Batistella,Mateus; Ferreira,Lúcia da Costa; Alves,Diogenes Salas; Ferreira,Leila da Costa

    2016-01-01

    Abstract This study addresses risk, vulnerability, and their implications for the adaptation of communities to the problems they face in the everyday life and to those derived from climate change. Based on the literature about risk, vulnerability and adaptation to disasters and on a case study conducted in the Northern coast of São Paulo - Brazil, we summarize the converging themes in the analysis of vulnerability and adaptation to climate change, which are divided in three components: (i) in...

  3. Macroeconomic Vulnerability in Developing Countries: Approaches and Issues

    OpenAIRE

    Anuradha Seth; Amr Ragab

    2012-01-01

    Economic vulnerability is approached from micro- and macroeconomic perspectives. While the microeconomic perspective is concerned with the impact of shocks on the well-being of individual households, the macroeconomic perspective focuses on the impact of these shocks on economic growth. This paper reviews the literature on macroeconomic vulnerability and finds that there is no single approach to understanding macroeconomic vulnerability in the context of financial and economic crises in devel...

  4. VULNERABILITIES, TERRORIST AND BIOTERRORIST THREATS AND RISKS

    Directory of Open Access Journals (Sweden)

    Viorel ORDEANUL

    2014-12-01

    Full Text Available The contemporary society has been, is and will probably be dominated "urbi et orbi " (everywhere and for everybody by conflicts expressed through violence, social confrontations, permissiveness, authority collapse, collapse of moral norms. Paradoxically, although it is spoken and written much about terrorism and terrorists, there is still no complete and accepted definition of these terms, and the legal classification is approximate. The analysis of threats is an extremely important decisional asset when setting up plans of direct protection or objective security strategies or institutions suitable to become targets of violent actions, but today's intelligence community has not yet established a clear set of procedures and principles that constitute the expert main frame for a comprehensive analysis of threats and vulnerabilities.

  5. Hydration, morbidity, and mortality in vulnerable populations.

    Science.gov (United States)

    Maughan, Ronald J

    2012-11-01

    Both acute and chronic fluid deficits have been shown to be associated with a number of adverse health outcomes. At the extreme, deprivation of water for more than a few days inevitably leads to death, but even modest fluid deficits may precipitate adverse events, especially in young children, in the frail elderly and in those with poor health. Epidemiological studies have shown an association, although not necessarily a causal one, between a low habitual fluid intake and some chronic diseases, including urolithiasis, constipation, asthma, cardiovascular disease, diabetic hyperglycemia, and some cancers. Acute hypohydration may be a precipitating factor in a number of acute medical conditions in elderly persons. Increased mortality, especially in vulnerable populations, is commonly observed during periods of abnormally warm weather, with at least part of this effect due to failure to increase water intake, and this may have some important implications for those responsible for forward planning in healthcare facilities. © 2012 International Life Sciences Institute.

  6. Parenting style and the vulnerable child syndrome.

    Science.gov (United States)

    Duncan, Andrea Freeman; Caughy, Margaret O'Brien

    2009-11-01

    Vulnerable child syndrome (VCS) refers to the combination of the parental view that their child is at increased risk for death despite the child's objective health and the resulting behavior problems in the child. Although risk factors for the development of the syndrome have been outlined, the variability in the development of VCS has not been explained. A theoretical explanation for the variability in the development of VCS utilizing Susan Calkins' model is explored. By considering the development of VCS in light of Calkins' model, variability may be explained and preventative interventions may be instituted. Relevant literature pertaining to child development and VCS was reviewed. By recognizing the risk of the role that parenting sensitivity plays in the development of VCS, team-based interventions involving a developmental approach may be employed, and the long-term behavioral sequelae of the disorder may be prevented or alleviated.

  7. Method and tool for network vulnerability analysis

    Science.gov (United States)

    Swiler, Laura Painton [Albuquerque, NM; Phillips, Cynthia A [Albuquerque, NM

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  8. Research considerations: guardianship and the vulnerable elderly.

    Science.gov (United States)

    Thomas, B L

    1994-05-01

    1. The use of legal guardianship for the elderly is increasing due to the increase in numbers of vulnerable elders and the subsequent dynamic effect on their families and communities. 2. Although the guardianship system provides a necessary service, the effects on "wards of the court" can lead to further physical and psychological deterioration due to their loss of all major decision making powers. 3. There is an assumption that the closest living relative would be the best guardian. There also is an assumption that elders who are confused or disoriented in dealing with money or business affairs require full guardianship. The validity of these assumptions, without assessment and intervention of geriatric specialists, is questionable.

  9. Ecosystems Vulnerability Challenge and Prize Competition

    Science.gov (United States)

    Smith, J. H.; Frame, M. T.; Ferriter, O.; Recker, J.

    2014-12-01

    Stimulating innovation and private sector entrepreneurship is an important way to advance the preparedness of communities, businesses and individuals for the impacts of climate change on certain aspects of ecosystems, such as: fire regimes; water availability; carbon sequestration; biodiversity conservation; weather-related hazards, and the spread of invasive species. The creation of tools is critical to help communities and natural resource managers better understand the impacts of climate change on ecosystems and the potential resulting implications for ecosystem services and conservation efforts. The Department of the Interior is leading an interagency effort to develop the Ecosystems Vulnerability theme as part of the President's Climate Action Plan. This effort will provide seamless access to relevant datasets that can help address such issues as: risk of wildfires to local communities and federal lands; water sensitivity to climate change; and understanding the role of ecosystems in a changing climate. This session will provide an overview of the proposed Ecosystem Vulnerability Challenge and Prize Competition, outlining the intended audience, scope, goals, and overall timeline. The session will provide an opportunity for participants to offer new ideas. Through the Challenge, access will be made available to critical datasets for software developers, engineers, scientists, students, and researchers to develop and submit applications addressing critical science issues facing our Nation today. Application submission criteria and guidelines will also be discussed. The Challenge will be open to all sectors and organizations (i.e. federal, non-federal, private sector, non-profits, and universities) within the United States. It is anticipated the Challenge will run from early January 2015 until spring of 2015.

  10. Vulnerability of Ukrainian Forests to Climate Change

    Directory of Open Access Journals (Sweden)

    Anatoly Shvidenko

    2017-06-01

    Full Text Available Ukraine is a country of the Mid-Latitude ecotone—a transition zone between forest zone and forestless dry lands. Availability of water defines distribution of the country’s forests and decreases their productivity towards the south. Climate change generates a particular threat for Ukrainian forests and stability of agroforestry landscapes. This paper considers the impacts of expected climate change on vulnerability of Ukrainian forests using ensembles of global and regional climatic models (RCM based on Scenarios B1, A2, A1B of the Intergovernmental Panel for Climate Change, and a “dry and warm” scenario A1B+T−P (increasing temperature and decreasing precipitation. The spatially explicit assessment was provided by RCM for the WMO standard period (1961–1990, “recent” (1991–2010 and three future periods: 2011–2030, 2031–2050 and 2081–2100. Forest-climate model by Vorobjov and model of amplitude of flora’s tolerance to climate change by Didukh, as well as a number of specialized climatic indicators, were used in the assessment. Different approaches lead to rather consistent conclusions. Water stress is the major limitation factor of distribution and resilience of flatland Ukrainian forests. Within Scenario A1B, the area with unsuitable growth conditions for major forest forming species will substantially increase by end of the century occupying major part of Ukraine. Scenario A1B+T−P projects even a more dramatic decline of the country’s forests. It is expected that the boundary of conditions that are favorable for forests will shift to north and northwest, and forests of the xeric belt will be the most vulnerable. Consistent policies of adaptation and mitigation might reduce climate-induced risks for Ukrainian forests.

  11. [Clinical trials: vulnerability and ethical relativism].

    Science.gov (United States)

    Lima, Cristina

    2005-01-01

    Research in human beings is an important chapter of medical ethics. In recent years, investigation has been taken over by profit driven corporations that must guarantee the medical and commercial application of results. This new model of investigation has generated conflicts of interest in doctor-patient, researcher-subject relationship. The inevitable debate and media reaction has led. These trials of controversial design to regions of the globe where the vulnerability of the populations continues to allow their undertaking. This article includes a historical perspective on experimentation in human beings and the conditions that led to its regulation: the Nuremberg CODE, followed by the Helsinky Declaration in its different versions, and the Belmont Report, that defend the subject according to the ethic of principles used in western medicine. There is then a review of the attempts to change international regulation to reintroduce clinical trials with placebo--which since 1996 is only permitted where there are no therapeutic or diagnostic methods--on populations that would otherwise have no access to treatment. This then leads on to the issue of double standards in medical investigation defended by many investigators and some official entities. The article concludes that it may be prudent to allow local ethical commissions to approve deviation from the established norm if such is necessary to resolve urgent questions of health in the country, but it is unacceptable that any such emergency is used as a reason to reduce the ethical prerequisites, in clinical trials. It also concludes that true urgency is in making available to all who need it the effective products already in existence. Furthermore, that the acceptance of ethical relativism can result in the exploitation of vulnerable third world populations for research programmes that cannot be undertaken in their sponsoring countries due to the ethical restrictions in place.

  12. Human Rights and Vulnerability. Examples of Sexism and Ageism

    Directory of Open Access Journals (Sweden)

    Mª DEL CARMEN BARRANCO AVILÉS

    2015-12-01

    Full Text Available A human rights based approach applied to the idea of ‘vulnerable group’ connects vulnerability and structural discrimination. The Convention on the Rights of Persons with Disability provides some elements that allow to state that we are facing a new paradigm in the International Human Rights Law. One of the keys for the understanding of this new framework is the assumption of the disadvantage related to vulnerability as, at least in a part, socially built and ideologically justified. Sexism and ageism are examples of how ideologies reinforce vulnerability of women, children and aged persons transforming them in groups which members are in risk of discrimination.

  13. Climate Change Vulnerability Analysis of Baluran National Park

    Directory of Open Access Journals (Sweden)

    Beny Harjadi

    2016-12-01

    Full Text Available Every ecosystem has a different level of susceptibility to environmental disturbances it receives, both from natural factors or anthropogenic disturbance. National Park (NP Baluran is one national park that has a representation of a complete ecosystem that includes upland forest ecosystems, lowland forests, coastal forests, mangroves, savanna and evergreen forest. The objective of this study is to get a formula calculation of vulnerability analysis of constant and dynamic factors. Baluran NP vulnerability assessment to climate change done by looking at the dynamic and fixed factors. Vulnerability remains a vulnerability factor to the condition of the original (control, whereas vulnerability is the vulnerability of the dynamic change factors which affected the condition from the outside. Constant Vulnerability (CV in  Baluran NP dominated resistant conditions (61%, meaning that the geomorphology and other fixed factors (slope and slope direction/aspect, then the condition in Baluran NP sufficiently resilient to climate change. Dynamic Vulnerability (DV is the vulnerability of an area or areas that change because of pressure from external factors. DV is influenced by climatic factors (WI = Wetness Index, soil (SBI = Soil Brightness Index, and vegetation (GI = Greenness Index. DV in  Baluran NP from 1999 to 2010 shifted from the original category of being (84.76% and shifted to the susceptible (59.88%.  The role of remote sensing for the analysis of raster digital system, while the geographic information system to display the results of cartographic maps.

  14. Development of a Malicious Insider Composite Vulnerability Assessment Methodology

    National Research Council Canada - National Science Library

    King, William H

    2006-01-01

    .... There are very few vulnerability and impact models capable of providing information owners with the ability to comprehensively assess the effectiveness an organization's malicious insider mitigation strategies...

  15. Informality and employment vulnerability: application in sellers with subsistence work.

    Science.gov (United States)

    Garzón-Duque, María Osley; Cardona-Arango, María Doris; Rodríguez-Ospina, Fabio León; Segura-Cardona, Angela María

    2017-10-05

    To describe the origin, evolution, and application of the concept of employment vulnerability in workers who subsist on street sales. We have carried out an analysis of the literature in database in Spanish, Portuguese, and English, without restriction by country. This is a review of the gray literature of government reports, articles, and documents from Latin America and the Caribbean. We have analyzed information on the informal economy, social-employment vulnerability, and subsistence workers. The concept of informal economy is dispersed and suggested as synonymous with employment vulnerability. As a polysemic term, it generates confusion and difficulty in identifying defined profiles of employment vulnerability in informal subsistence workers, who sell their products on the streets and sidewalks of cities. The lack of a clear concept and profile of employment vulnerability for this type of workers generates a restriction on defined actions to reduce employment vulnerability. The profiles could facilitate access to the acquisition of assets that support their structure of opportunities, facilitating and mediating in the passage from vulnerability to social mobility with opportunities. We propose as a concept of employment vulnerability for subsistence workers in the informal sector, the condition of those who must work by day to eat at night, who have little or no ownership of assets, and who have a minimum structure of opportunities to prevent, face, and resist the critical situations that occur daily, putting at risk their subsistence and that of the persons who are their responsibility, thus making the connection between social and employment vulnerability.

  16. Global analysis of urban surface water supply vulnerability

    International Nuclear Information System (INIS)

    Padowski, Julie C; Gorelick, Steven M

    2014-01-01

    This study presents a global analysis of urban water supply vulnerability in 71 surface-water supplied cities, with populations exceeding 750 000 and lacking source water diversity. Vulnerability represents the failure of an urban supply-basin to simultaneously meet demands from human, environmental and agricultural users. We assess a baseline (2010) condition and a future scenario (2040) that considers increased demand from urban population growth and projected agricultural demand. We do not account for climate change, which can potentially exacerbate or reduce urban supply vulnerability. In 2010, 35% of large cities are vulnerable as they compete with agricultural users. By 2040, without additional measures 45% of cities are vulnerable due to increased agricultural and urban demands. Of the vulnerable cities in 2040, the majority are river-supplied with mean flows so low (1200 liters per person per day, l/p/d) that the cities experience ‘chronic water scarcity’ (1370 l/p/d). Reservoirs supply the majority of cities facing individual future threats, revealing that constructed storage potentially provides tenuous water security. In 2040, of the 32 vulnerable cities, 14 would reduce their vulnerability via reallocating water by reducing environmental flows, and 16 would similarly benefit by transferring water from irrigated agriculture. Approximately half remain vulnerable under either potential remedy. (letter)

  17. Tripartite Governance: Enabling Successful Implementations with Vulnerable Populations.

    Science.gov (United States)

    Kennedy, Margaret Ann

    2016-01-01

    Vulnerable populations are often at a distinct disadvantage when it comes to the implementation of health information systems in an equitable, appropriate, and timely manner. The disadvantages experienced by vulnerable populations are innumerable and include lack of representation, lack of appropriate levels of funding, lack of resources and capacity, and lack of representation. Increasingly, models of representation for complex implementations involve a tripartite project governance model. This tripartite partnership distributes accountability across all partners, and ensures that vulnerable populations have an equitable contribution to the direction of implementation according to their needs. This article shares lessons learned and best practices from complex tripartite partnerships supporting implementations with vulnerable populations in Canada.

  18. Modelling homogeneous regions of social vulnerability to malaria in Rwanda.

    Science.gov (United States)

    Bizimana, Jean Pierre; Kienberger, Stefan; Hagenlocher, Michael; Twarabamenye, Emmanuel

    2016-03-31

    Despite the decline in malaria incidence due to intense interventions, potentials for malaria transmission persist in Rwanda. To eradicate malaria in Rwanda, strategies need to expand beyond approaches that focus solely on malaria epidemiology and also consider the socioeconomic, demographic and biological/disease-related factors that determine the vulnerability of potentially exposed populations. This paper analyses current levels of social vulnerability to malaria in Rwanda by integrating a set of weighted vulnerability indicators. The paper uses regionalisation techniques as a spatially explicit approach for delineating homogeneous regions of social vulnerability to malaria. This overcomes the limitations of administrative boundaries for modelling the trans-boundary social vulnerability to malaria. The utilised approach revealed high levels of social vulnerability to malaria in the highland areas of Rwanda, as well as in remote areas where populations are more susceptible. Susceptibility may be due to the populations' lacking the capacity to anticipate mosquito bites, or lacking resilience to cope with or recover from malaria infection. By highlighting the most influential indicators of social vulnerability to malaria, the applied approach indicates which vulnerability domains need to be addressed, and where appropriate interventions are most required. Interventions to improve the socioeconomic development in highly vulnerable areas could prove highly effective, and provide sustainable outcomes against malaria in Rwanda. This would ultimately increase the resilience of the population and their capacity to better anticipate, cope with, and recover from possible infection.

  19. Neutralización por reducción en placas como método específico para el Diagnóstico Serológico de Fiebre Amarilla

    Directory of Open Access Journals (Sweden)

    Maribel Acuña B

    2001-07-01

    Full Text Available Objetivos: Estudiar la capacidad neutralizante de muestras séricas humanas para ser empleada como prueba de confirmación frente a otras técnicas y evaluar la relación de neutralización en diferentes poblaciones para cepas de FA: 287-78 (nativa y 17D (referencial. Materiales y métodos: Se empleó la cepa 17D para la estandarización de la prueba en células VERO utilizando dos métodos (sólido y semi-líquido; además, se seleccionaron muestras séricas humanas en base al antecedente vacunal (presente o ausente, a la procedencia (endémica y no endémica y la positividad a virus del dengue, las cuáles fueron evaluadas por ELISA. Las poblaciones seleccionadas se enfrentaron por la prueba estandarizada (PRNT frente a las cepas de FA: 17D (cepa vacunal derivada del prototipo Asibi y 287-78 (primer aislamiento de FA del Instituto Nacional de Salud del Perú. Resultados: Se obtuvieron buenos resultados con el método semi-líquido, siendo el séptimo día el óptimo de coloración de las placas. De los cuatro grupos seleccionados, tres fueron positivos por ELISA y los resultados por PRNT fueron para la suspensión 17D, 29 negativos y 67 positivos con títulos entre 1:10 y 1:2560; y para la cepa 287-78, 17 negativos y 79 positivos con títulos entre 1:10 y 1:2560. Conclusiones: La técnica semi-líquida con tiempo de coloración al séptimo día ofrece óptimos resultados en plaqueo y neutralización. Además, el ELISA resultó ser menos específico frente al PRNT y se encontró variación en relación a títulos y capacidad neutralizante en algunos sueros para ambas cepas.

  20. Vulnerability tester: an Android app which finds and exploits application layer vulnerabilities of other apps

    OpenAIRE

    Μάντος, Πέτρος Λάζαρος Κάρολος; Mantos, Petros Lazaros Karolos; Μπουκικάς, Ευστάθιος; Boukikas, Efstathios

    2017-01-01

    Android is the most popular mobile operating system. Nowadays, it is used not only in smartphones but can be found at the heart of each smart device. This makes it one of the most popular targets amongst malware developers and cyber criminals. The main purpose of this dissertation is to examine possible application layer vulnerabilities that lie both in Android application components and its architecture. This was not only accomplished theoretically but also by developing from scratch an Andr...

  1. Mapping human vulnerability to climate change in the Brazilian Amazon: The construction of a municipal vulnerability index.

    Directory of Open Access Journals (Sweden)

    Júlia Alves Menezes

    Full Text Available Vulnerability, understood as the propensity to be adversely affected, has attained importance in the context of climate change by helping to understand what makes populations and territories predisposed to its impacts. Conditions of vulnerability may vary depending on the characteristics of each territory studied-social, environmental, infrastructural, public policies, among others. Thus, the present study aimed to evaluate what makes the municipalities of the state of Amazonas, Brazil, vulnerable to climate change in the context of the largest tropical forest in the world, and which regions of the State are the most susceptible. A Municipal Vulnerability Index was developed, which was used to associate current socio-environmental characteristics of municipalities with climate change scenarios in order to identify those that may be most affected by climate change. The results showed that poor adaptive capacity and poverty had the most influence on current vulnerability of the municipalities of Amazonas with the most vulnerable areas being the southern, northern, and eastern regions of the state. When current vulnerability was related to future climate change projections, the most vulnerable areas were the northern, northeastern, extreme southern, and southwestern regions. From a socio-environmental and climatic point of view, these regions should be a priority for public policy efforts to reduce their vulnerability and prepare them to cope with the adverse aspects of climate change.

  2. Mapping human vulnerability to climate change in the Brazilian Amazon: The construction of a municipal vulnerability index.

    Science.gov (United States)

    Menezes, Júlia Alves; Confalonieri, Ulisses; Madureira, Ana Paula; Duval, Isabela de Brito; Santos, Rhavena Barbosa Dos; Margonari, Carina

    2018-01-01

    Vulnerability, understood as the propensity to be adversely affected, has attained importance in the context of climate change by helping to understand what makes populations and territories predisposed to its impacts. Conditions of vulnerability may vary depending on the characteristics of each territory studied-social, environmental, infrastructural, public policies, among others. Thus, the present study aimed to evaluate what makes the municipalities of the state of Amazonas, Brazil, vulnerable to climate change in the context of the largest tropical forest in the world, and which regions of the State are the most susceptible. A Municipal Vulnerability Index was developed, which was used to associate current socio-environmental characteristics of municipalities with climate change scenarios in order to identify those that may be most affected by climate change. The results showed that poor adaptive capacity and poverty had the most influence on current vulnerability of the municipalities of Amazonas with the most vulnerable areas being the southern, northern, and eastern regions of the state. When current vulnerability was related to future climate change projections, the most vulnerable areas were the northern, northeastern, extreme southern, and southwestern regions. From a socio-environmental and climatic point of view, these regions should be a priority for public policy efforts to reduce their vulnerability and prepare them to cope with the adverse aspects of climate change.

  3. Social Vulnerability and Ebola Virus Disease in Rural Liberia.

    Directory of Open Access Journals (Sweden)

    John A Stanturf

    Full Text Available The Ebola virus disease (EVD epidemic that has stricken thousands of people in the three West African countries of Liberia, Sierra Leone, and Guinea highlights the lack of adaptive capacity in post-conflict countries. The scarcity of health services in particular renders these populations vulnerable to multiple interacting stressors including food insecurity, climate change, and the cascading effects of disease epidemics such as EVD. However, the spatial distribution of vulnerable rural populations and the individual stressors contributing to their vulnerability are unknown. We developed a Social Vulnerability Classification using census indicators and mapped it at the district scale for Liberia. According to the Classification, we estimate that districts having the highest social vulnerability lie in the north and west of Liberia in Lofa, Bong, Grand Cape Mount, and Bomi Counties. Three of these counties together with the capital Monrovia and surrounding Montserrado and Margibi counties experienced the highest levels of EVD infections in Liberia. Vulnerability has multiple dimensions and a classification developed from multiple variables provides a more holistic view of vulnerability than single indicators such as food insecurity or scarcity of health care facilities. Few rural Liberians are food secure and many cannot reach a medical clinic in <80 minutes. Our results illustrate how census and household survey data, when displayed spatially at a sub-county level, may help highlight the location of the most vulnerable households and populations. Our results can be used to identify vulnerability hotspots where development strategies and allocation of resources to address the underlying causes of vulnerability in Liberia may be warranted. We demonstrate how social vulnerability index approaches can be applied in the context of disease outbreaks, and our methods are relevant elsewhere.

  4. Modeling groundwater vulnerability to pollution using Optimized DRASTIC model

    International Nuclear Information System (INIS)

    Mogaji, Kehinde Anthony; Lim, Hwee San; Abdullar, Khiruddin

    2014-01-01

    The prediction accuracy of the conventional DRASTIC model (CDM) algorithm for groundwater vulnerability assessment is severely limited by the inherent subjectivity and uncertainty in the integration of data obtained from various sources. This study attempts to overcome these problems by exploring the potential of the analytic hierarchy process (AHP) technique as a decision support model to optimize the CDM algorithm. The AHP technique was utilized to compute the normalized weights for the seven parameters of the CDM to generate an optimized DRASTIC model (ODM) algorithm. The DRASTIC parameters integrated with the ODM algorithm predicted which among the study areas is more likely to become contaminated as a result of activities at or near the land surface potential. Five vulnerability zones, namely: no vulnerable(NV), very low vulnerable (VLV), low vulnerable (LV), moderate vulnerable (MV) and high vulnerable (HV) were identified based on the vulnerability index values estimated with the ODM algorithm. Results show that more than 50% of the area belongs to both moderate and high vulnerable zones on the account of the spatial analysis of the produced ODM-based groundwater vulnerability prediction map (GVPM).The prediction accuracy of the ODM-based – GVPM with the groundwater pH and manganese (Mn) concentrations established correlation factors (CRs) result of 90 % and 86 % compared to the CRs result of 62 % and 50 % obtained for the validation accuracy of the CDM – based GVPM. The comparative results, indicated that the ODM-based produced GVPM is more reliable than the CDM – based produced GVPM in the study area. The study established the efficacy of AHP as a spatial decision support technique in enhancing environmental decision making with particular reference to future groundwater vulnerability assessment

  5. Multidetector row computed tomography may accurately estimate plaque vulnerability. Does MDCT accurately estimate plaque vulnerability? (Pro)

    International Nuclear Information System (INIS)

    Komatsu, Sei; Imai, Atsuko; Kodama, Kazuhisa

    2011-01-01

    Over the past decade, multidetector row computed tomography (MDCT) has become the most reliable and established of the noninvasive examination techniques for detecting coronary heart disease. Now MDCT is chasing intravascular ultrasound (IVUS) in terms of spatial resolution. Among the components of vulnerable plaque, MDCT may detect lipid-rich plaque, the lipid pool, and calcified spots using computed tomography number. Plaque components are detected by MDCT with high accuracy compared with IVUS and angioscopy when assessing vulnerable plaque. The TWINS study and TOGETHAR trial demonstrated that angioscopic loss of yellow color occurred independently of volumetric plaque change by statin therapy. These 2 studies showed that plaque stabilization and regression reflect independent processes mediated by different mechanisms and time course. Noncalcified plaque and/or low-density plaque was found to be the strongest predictor of cardiac events, regardless of lesion severity, and act as a potential marker of plaque vulnerability. MDCT may be an effective tool for early triage of patients with chest pain who have a normal electrocardiogram (ECG) and cardiac enzymes in the emergency department. MDCT has the potential ability to analyze coronary plaque quantitatively and qualitatively if some problems are resolved. MDCT may become an essential tool for detecting and preventing coronary artery disease in the future. (author)

  6. As Placas de Petri de Samuel

    Directory of Open Access Journals (Sweden)

    Araújo, Maria Valéria Pereira de

    2014-12-01

    Full Text Available The case teaching "The Petri dishes of Samuel" mentions a real situation occurred in a small business Medical Laboratory located in the city of Natal-RN. The dilemma of the case comes to a decision-making situation involving João, Director of the Laboratory Tércio Rosado and responsible for the human resources sector of the organization. The case is narrated from his point of view which faces a situation where one employee who works at the company for 25 years can not get adapted to the new technologies of the Medical Laboratory area, although the employee possesses behavioral and attitudinal competences which sets it apart from other professionals. After several attempts of training processes, trying to make Samuel adapt his behavior to the new technological requirements of the position, none of them were successful. Facing the situation the Director had a dilemma to solve: keep him in the company or not? If the company remains the employee, it might discourage the learning development of the other ones? On the other hand, the company would have other alternatives of training him in order to develop the required skills? What could be done? The case was constructed from observational data and informal conversations with employees and with the former owners of the company. Fictitious names were used to preserve the identity of the involved.

  7. Regional vulnerability of longitudinal cortical association connectivity

    Directory of Open Access Journals (Sweden)

    Rafael Ceschin

    2015-01-01

    Full Text Available Preterm born children with spastic diplegia type of cerebral palsy and white matter injury or periventricular leukomalacia (PVL, are known to have motor, visual and cognitive impairments. Most diffusion tensor imaging (DTI studies performed in this group have demonstrated widespread abnormalities using averaged deterministic tractography and voxel-based DTI measurements. Little is known about structural network correlates of white matter topography and reorganization in preterm cerebral palsy, despite the availability of new therapies and the need for brain imaging biomarkers. Here, we combined novel post-processing methodology of probabilistic tractography data in this preterm cohort to improve spatial and regional delineation of longitudinal cortical association tract abnormalities using an along-tract approach, and compared these data to structural DTI cortical network topology analysis. DTI images were acquired on 16 preterm children with cerebral palsy (mean age 5.6 ± 4 and 75 healthy controls (mean age 5.7 ± 3.4. Despite mean tract analysis, Tract-Based Spatial Statistics (TBSS and voxel-based morphometry (VBM demonstrating diffusely reduced fractional anisotropy (FA reduction in all white matter tracts, the along-tract analysis improved the detection of regional tract vulnerability. The along-tract map-structural network topology correlates revealed two associations: (1 reduced regional posterior–anterior gradient in FA of the longitudinal visual cortical association tracts (inferior fronto-occipital fasciculus, inferior longitudinal fasciculus, optic radiation, posterior thalamic radiation correlated with reduced posterior–anterior gradient of intra-regional (nodal efficiency metrics with relative sparing of frontal and temporal regions; and (2 reduced regional FA within frontal–thalamic–striatal white matter pathways (anterior limb/anterior thalamic radiation, superior longitudinal fasciculus and cortical spinal tract

  8. Relación placa bacteriana y caries en un grupo de niños escolarizados entre 5 y 14 años de la población de la Boquilla - Cartagena en el año 2004-1

    Directory of Open Access Journals (Sweden)

    Lizelia Alfaro Zolá

    2013-10-01

    Full Text Available ResumenObjetivo: Describir la ocurrencia de placa bacteriana en las superficies dentales y relacionarla con el tipo de lesión de caries que se presenta en niños escolares de 5 a 14 años de la Boquilla - Cartagena. Materiales y Métodos: Se realizó un estudio de corte transversal, en el cual se seleccionó una muestra de 89 niños escolares de la población de la Boquilla a través de un muestreo aleatorio sistemático, a quienes se les evaluó el estado de higiene oral mediante el índice de placa comunitario de Corchuelo modificado y el índice de caries superficial con criterios de diagnóstico Ekstrand. Resultados: La superficie con lesiones de caries de mayor frecuencia fue la oclusal, presentándose un mayor numero de lesiones detenidas, seguido en palatino por las lesiones precavitacionales, a diferencia de las superficies vestibular y lingual donde se encontraron un mayor número de superficies sanas. En todas las superficies evaluadas predominó la presencia de placa bacteriana independientemente de la presencia de caries y no se encontró una relación estadísticamente significativa entre estas dos variables. Conclusiones: La alta frecuencia de placa bacteriana en las superficies dentarias nos mostró el deficiente estado de higiene oral de la población, sin embargo, sigue en duda la pertinencia de los índices de placa para la predicción de la caries debido a que no se encontró relación estadística. (Duazary 2007; 2: 119 - 126AbstractObjectives: describe the presence of dental plaque in healthy in the dental surfaces and relate it with the type of lesion of caries in children between 5 and 14 years of age in the village of la Boquilla- Cartagena. Material and Methods: This is study transversal, in a universe of 89 scholar children in the village of la Boquilla, 60 of these were chosen through a systematic aleatory sampling. They were evaluated to establish their status of oral hygiene using the modified

  9. Climate variability and vulnerability to poverty in Nicaragua

    NARCIS (Netherlands)

    C. Herrera (Carlos); R. Ruben (Ruerd); A.G. Dijkstra (Geske)

    2018-01-01

    textabstractThis study considers the effect of climate variability on vulnerability to poverty in Nicaragua. It discusses how such vulnerability could be measured and which heterogeneous effects can be expected. A multilevel empirical framework is applied, linking per capita consumption

  10. Social Vulnerability and Ebola Virus Disease in Rural Liberia.

    Science.gov (United States)

    Stanturf, John A; Goodrick, Scott L; Warren, Melvin L; Charnley, Susan; Stegall, Christie M

    2015-01-01

    The Ebola virus disease (EVD) epidemic that has stricken thousands of people in the three West African countries of Liberia, Sierra Leone, and Guinea highlights the lack of adaptive capacity in post-conflict countries. The scarcity of health services in particular renders these populations vulnerable to multiple interacting stressors including food insecurity, climate change, and the cascading effects of disease epidemics such as EVD. However, the spatial distribution of vulnerable rural populations and the individual stressors contributing to their vulnerability are unknown. We developed a Social Vulnerability Classification using census indicators and mapped it at the district scale for Liberia. According to the Classification, we estimate that districts having the highest social vulnerability lie in the north and west of Liberia in Lofa, Bong, Grand Cape Mount, and Bomi Counties. Three of these counties together with the capital Monrovia and surrounding Montserrado and Margibi counties experienced the highest levels of EVD infections in Liberia. Vulnerability has multiple dimensions and a classification developed from multiple variables provides a more holistic view of vulnerability than single indicators such as food insecurity or scarcity of health care facilities. Few rural Liberians are food secure and many cannot reach a medical clinic in Liberia may be warranted. We demonstrate how social vulnerability index approaches can be applied in the context of disease outbreaks, and our methods are relevant elsewhere.

  11. Intravascular Photoacoustic Imaging : A New Tool for Vulnerable Plaque Identification

    NARCIS (Netherlands)

    Jansen, K.; Van Soest, G.; Van der Steen, A.F.W.

    2014-01-01

    The vulnerable atherosclerotic plaque is believed to be at the root of the majority of acute coronary events. Even though the exact origins of plaque vulnerability remain elusive, the thin-cap fibroatheroma, characterized by a lipid-rich necrotic core covered by a thin fibrous cap, is considered to

  12. Agency and Vulnerability: Reconfiguring the Female Characters in ...

    African Journals Online (AJOL)

    This article recognizes the pressures on an individual's agency and vulnerability to societal containment as constant interplay that accounts for creative dimensions and responses intensified within a love relationship. It locates agency and vulnerability as mutually inclusive within the philosophical nexus of self-actualization ...

  13. Workplace support after breast cancer treatment: recognition of vulnerability.

    Science.gov (United States)

    Tiedtke, Corine; Dierckx de Casterlé, Bernadette; Donceel, Peter; de Rijk, Angelique

    2015-01-01

    Support from the workplace seems to be a key element in addressing the poor return-to-work (RTW) rate of employees with breast cancer. We aim to acquire an in-depth understanding of how Flemish employees experience their RTW after breast cancer and the support from the workplace. Fourteen in-depth interviews of women who experienced breast cancer and returned to work (high school graduates, age range 42-55 years, mean age 48 at time of surgery) were analysed using the Qualitative Analysis Guide of Leuven (QUAGOL), based on a Grounded Theory approach. The key experiences were feeling vulnerable, feeling able to work and need for support. Although little diversity in RTW experiences was found, the background of the vulnerability varied. Women experienced support (which could be emotional or practical) only as adequate if it addressed their specific vulnerability. Employees felt particularly vulnerable. Vulnerability is not the same as low-work ability and as such it should be added as theoretical concept in RTW research. Adequate workplace support addresses the specific vulnerability of an individual woman. Our study offers a nuanced insight into the RTW process of breast cancer survivors. Upon actual return-to-work (RTW) after breast cancer treatment, women feel vulnerable but able to work and, hence, have a high need for workplace support. Support from the workplace during RTW after breast cancer treatment is experienced as adequate when it expresses genuine recognition of the individual woman's vulnerability.

  14. Categorisation of typical vulnerability patterns in global drylands

    NARCIS (Netherlands)

    Sietz, D.; Lûdeke, M.K.B.; Walther, C.

    2011-01-01

    Drylands display specific vulnerability-creating mechanisms which threaten ecosystems and human well-being. The upscaling of successful interventions to reduce vulnerability arises as an important, but challenging aim, since drylands are not homogenous. To support this aim, we present the first

  15. 6 CFR 27.215 - Security vulnerability assessments.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security vulnerability assessments. 27.215 Section 27.215 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.215 Security vulnerability...

  16. Economic vulnerability of timber resources to forest fires

    Science.gov (United States)

    Francisco Rodriguez y Silva; Juan Ramon Molina; Armando Gonzalez-Caban; Miguel Angel Herrera Machuca

    2012-01-01

    The temporal-spatial planning of activities for a territorial fire management program requires knowing the value of forest ecosystems. In this paper we extend to and apply the economic valuation principle to the concept of economic vulnerability and present a methodology for the economic valuation of the forest production ecosystems. The forest vulnerability is...

  17. Parental overprotection and its relation to perceived child vulnerability.

    Science.gov (United States)

    Thomasgard, M; Metz, W P

    1997-04-01

    A study of 280 parents with a child age 5-10 years examined the relation between and correlates of parental overprotection (less education, younger child age, being an only child) and parental perception of increased child vulnerability (history of life-threatening illness, child medical condition, first child). One-third of parents who considered their child vulnerable were also considered overprotective.

  18. Assessing local vulnerability to climate change in Ecuador.

    Science.gov (United States)

    Fernandez, Mario Andres; Bucaram, Santiago J; Renteria, Willington

    2015-01-01

    Vulnerability assessments have become necessary to increase the understanding of climate-sensitive systems and inform resource allocation in developing countries. Challenges arise when poor economic and social development combines with heterogeneous climatic conditions. Thus, finding and harmonizing good-quality data at local scale may be a significant hurdle for vulnerability research. In this paper we assess vulnerability to climate change at a local level in Ecuador. We take Ecuador as a case study as socioeconomic data are readily available. To incorporate the spatial and temporal pattern of the climatic variables we use reanalysis datasets and empirical orthogonal functions. Our assessment strategy relies on the statistical behavior of climatic and socioeconomic indicators for the weighting and aggregation mechanism into a composite vulnerability indicator. Rather than assuming equal contribution to the formation of the composite indicator, we assume that the weights of the indicators vary inversely as the variance over the cantons (administrative division of Ecuador). This approach captures the multi-dimensionality of vulnerability in a comprehensive form. We find that the least vulnerable cantons concentrate around Ecuador's largest cities (e.g. Quito and Guayaquil); however, approximately 20 % of the national population lives in other cantons that are categorized as highly and very highly vulnerable to climate change. Results also show that the main determinants of high vulnerability are the lack of land tenure in agricultural areas and the nonexistence of government-funded programs directed to environmental and climate change management.

  19. Assessment of food fraud vulnerability in the spices chain

    NARCIS (Netherlands)

    Silvis, I.C.J.; Ruth, van S.M.; Fels, van der Ine; Luning, P.A.

    2017-01-01

    Recent scandals have increased the need to strengthen companies’ ability to combat fraud within their own organizations and across their supply chain. Vulnerability assessments are a first step towards the inventory of fraud vulnerability and fraud mitigation plans. Spices are reported frequently

  20. Vulnerable children speak out: voices from one rural school in ...

    African Journals Online (AJOL)

    The study recommends some strategies by which the Swaziland Ministry of Education and Training, the community, and the school can make collaborative and coordinated efforts aimed at enhancing vulnerable children's quality of schooling experiences. Keywords: Children; Schooling; Rural; Vulnerability; Education; ...

  1. Social Protection and Vulnerable Communities in East Africa ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Social protection mechanisms can reduce poverty and vulnerability, increase work and educational achievement, and promote economic growth. Formal social protection initiatives cover only a small proportion of the population in East Africa - those working in the formal sector. Vulnerable groups - such as the poor and ...

  2. Using vulnerability performance indicators to attain food supply chain robustness

    NARCIS (Netherlands)

    Vlajic, J.V.; Lokven, van S.W.M.; Haijema, R.; Vorst, van der J.G.A.J.

    2013-01-01

    High effectiveness and leanness of modern supply chains (SCs) increase their vulnerability, i.e. susceptibility to disturbances reflected in non-robust SC performances. Both the SC management literature and SC professionals indicate the need for the development of SC vulnerability assessment tools.

  3. Modelling self-assessed vulnerability to HIV and its associated ...

    African Journals Online (AJOL)

    Background: Globally, individuals' self-assessment of vulnerability to HIV infection is important to maintain safer sexual behaviour and reduce risky behaviours. However, determinants of self-perceived risk of HIV infection are not well documented and differ. We assessed the level of self-perceived vulnerability to HIV ...

  4. Assessment of farm households' vulnerability to climate change in ...

    African Journals Online (AJOL)

    Climate change is currently an emerging problem in Nigeria. The Niger Delta region presents some vulnerability due to activities of some oil companies. This study provides an assessment of farm households' perception of climate change and vulnerability in the Niger Delta region of Nigeria. The data were obtained form ...

  5. Groundwater Vulnerability Assessment of the Tarkwa Mining Area ...

    African Journals Online (AJOL)

    In view of the extensive mining in the Tarkwa area, quality of groundwater has become an important issue. This study estimates aquifer vulnerability by applying the SINTACS model which uses seven environmental parameters to evaluate aquifer vulnerability and geographical information system (GIS) in the Tarkwa mining ...

  6. Spatial Analysis of Human Exposure and Vulnerability to Coastal ...

    African Journals Online (AJOL)

    Disasters in coastal cities have shown an ever-increasing frequency of occurrence. Population growth and urbanisation have increased the vulnerability of properties and societies in coastal flood-prone areas. Analysis of human exposure and vulnerability is one of the main strategies used to determine the necessary ...

  7. Analysis of child poverty and vulnerability in Zambia | Moonga ...

    African Journals Online (AJOL)

    Vulnerability is increasingly becoming synonymous with poverty in the social policy literature. There are three age-groups that are more likely to be vulnerable and in poverty at any given time although with variations. These are children, adults with children and the elderly. This study focused on the children due to their ...

  8. Assessment of groundwater vulnerability and sensitivity to pollution ...

    African Journals Online (AJOL)

    Groundwater pollution caused by human activity is a serious environmental problem in cities. Pollution vulnerability assessment of groundwater resources provides information on how to protect areas vulnerable to pollution. The present study is a detailed investigation of the potential for groundwater contamination through ...

  9. Direction: happiness : improving well-being of vulnerable groups

    NARCIS (Netherlands)

    Weiss, Laura Anne

    2016-01-01

    In the PhD-thesis ‘Direction: Happiness. Improving well-being of vulnerable groups’, the effects of the Happiness Route, a positive psychology intervention, were examined. The intervention is directed at a vulnerable group with an accumulation of risk factors for a low well-being; lonely people with

  10. 7 CFR 1730.27 - Vulnerability and Risk Assessment (VRA).

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 11 2010-01-01 2010-01-01 false Vulnerability and Risk Assessment (VRA). 1730.27 Section 1730.27 Agriculture Regulations of the Department of Agriculture (Continued) RURAL UTILITIES... Requirements § 1730.27 Vulnerability and Risk Assessment (VRA). (a) Each borrower with an approved RUS electric...

  11. Fostering cooperation through the enhancement of own vulnerability

    NARCIS (Netherlands)

    Kopányi-Peuker, A.; Offerman, T.; Sloof, R.

    2013-01-01

    We consider the possibility that cooperation in a prisoner's dilemma is fostered by people's voluntary enhancement of their own vulnerability. The vulnerability of a player determines the effectiveness of possible punishment by the other. In the "Gradual" mechanism, players may condition their

  12. Community vulnerability to health impacts of wildland fire smoke exposure

    Science.gov (United States)

    Identifying communities vulnerable to adverse health effects from exposure to wildfire smoke may help prepare responses, increase the resilience to smoke and improve public health outcomes during smoke days. We developed a Community Health-Vulnerability Index (CHVI) based on fact...

  13. Fostering cooperation through the enhancement of own vulnerability

    NARCIS (Netherlands)

    Kopányi-Peuker, A.; Offerman, T.; Sloof, R.

    2012-01-01

    We consider the possibility that cooperation in a prisoner's dilemma is fostered by people's voluntarily enhancement of their own vulnerability. The vulnerability of a player determines the effectiveness of possible punishment by the other. In the "Gradual" mechanism, players may condition their

  14. Vulnerability of southern plains agriculture to climate change

    Science.gov (United States)

    Climate is a key driver for all ecological and economic systems; therefore, climate change introduces additional uncertainty and vulnerability into these systems. Agriculture represents a major land use that is critical to the survival of human societies and it is highly vulnerable to climate. Clima...

  15. Perspectives on plant vulnerabilities ampersand other plant and containment improvements

    International Nuclear Information System (INIS)

    LaChance, J.; Kolaczkowski, A.; Kahn, J.

    1996-01-01

    The primary goal of the Individual Plant Examination (IPE) Program was for licensees to identify plant-unique vulnerabilities and actions to address these vulnerabilities. A review of these vulnerabilities and plant improvements that were identified in the IPEs was performed as part of the IPE Insights Program sponsored by the U.S. Nuclear Regulatory Commission (NRC). The purpose of this effort was to characterize the identified vulnerabilities and the impact of suggested plant improvements. No specific definition for open-quotes vulnerabilityclose quotes was provided in NRC Generic Letter 88-20 or in the subsequent NRC IPE submittal guidance documented in NUREG-1335. Thus licensees were left to use their own definitions. Only 20% of the plants explicitly stated that they had vulnerabilities. However, most licensees identified other plant improvements to address issues not explicitly classified as vulnerabilities, but pertaining to areas in which overall plant safety could potentially be increased. The various definitions of open-quotes vulnerabilityclose quotes used by the licensees, explicitly identified vulnerabilities, proposed plant improvements to address these vulnerabilities, and other plant improvements are summarized and discussed

  16. Effective vulnerability assessments for physical security devices, systems, and programs

    International Nuclear Information System (INIS)

    Johnston, R.G.; Garcia, A.R.E.

    2002-01-01

    Full text: The efficacy of devices, systems, and programs used for physical security depend critically on having periodic and effective vulnerability assessments. Effective vulnerability assessments, in turn, require certain conditions and attributes. These include: a proper understanding of their purpose; not confusing vulnerability assessments with other kinds of metrics, analyses, tests, and security exercises; the view that vulnerabilities are inevitable, and that finding them is good news (since they can then be mitigated), not bad news; rejection of findings of no vulnerabilities; avoidance of mere 'compliance mode' rubber stamping; the use of the proper outside, independent, imaginative personnel; psychologically predisposed to finding and demonstrating problems; the absence of conflicts of interest; no unrealistic constraints on the possible attack tools, procedures, personnel, or strategies; efforts to not just find and demonstrate vulnerabilities, but also to suggest possible countermeasures; proper context; input and buy-in from ALL facility security personnel, especially low-level personnel; emphasis on the simplest, most relevant attacks first; no underestimation of potential adversaries; consideration of fault analysis attacks; awareness of Rohrbach's Maxim and Shannon's Maxim. In addition to these factors, we will cover some of the complex issues and problems associated with the design of vulnerability assessments. There will also be suggestions on how to conduct effective vulnerability assessments on a severely limited budget. We will conclude with a discussion of both conventional and unconventional ways of reporting results. (author)

  17. Relating plant height to demographic rates and extinction vulnerability

    NARCIS (Netherlands)

    Jonge, de Melinda M.J.; Hilbers, Jelle P.; Jongejans, Eelke; Ozinga, Wim A.; Hendriks, A.J.; Huijbregts, Mark A.J.

    2018-01-01

    To prioritize conservation efforts, it is important to know which plant species are most vulnerable to extinction. Intrinsic extinction vulnerabilities depend on demographic parameters, but for many species these demographic parameters are lacking. Body size has been successfully used as proxy of

  18. Identification and ranking of environmental threats with ecosystem vulnerability distributions.

    NARCIS (Netherlands)

    Zijp, Michiel C; Huijbregts, Mark A J; Schipper, Aafke M; Mulder, Christian; Posthuma, Leo

    2017-01-01

    Responses of ecosystems to human-induced stress vary in space and time, because both stressors and ecosystem vulnerabilities vary in space and time. Presently, ecosystem impact assessments mainly take into account variation in stressors, without considering variation in ecosystem vulnerability. We

  19. Vulnerabilities of regular labour migration in the EU : Guest editorial

    NARCIS (Netherlands)

    Houwerzijl, Mijke; de Lange, Tesseltje

    2015-01-01

    The aim of this special issue is to present an interdisciplinary overview of migrant workers vulnerabilities. The contributions all deal with the vulnerabilities of EU and third-country national (TCN) migrant workers with legal residence in a receiving state within the EU. Four of the seven articles

  20. Determining shallow aquifer vulnerability by the DRASTIC model ...

    Indian Academy of Sciences (India)

    Shallow aquifer vulnerability has been assessed using GIS-based DRASTIC model by incorporating the major geological and hydrogeological factors that affect and control the groundwater contamination in a granitic terrain. It provides a relative indication of aquifer vulnerability to the contamination. Further, it has been ...

  1. Stressful life events, vulnerable to stress and depression among ...

    African Journals Online (AJOL)

    The present study was carried out to observe the difference between male and female Eritrean students on the basis of stressful life events, vulnerable to stress and depression. Stressful life Events Questionnaire, Vulnerable to Stress Instrument and Beck Depression Scale were administered to gather information. The data ...

  2. Development of a heat vulnerability index for New York State.

    Science.gov (United States)

    Nayak, S G; Shrestha, S; Kinney, P L; Ross, Z; Sheridan, S C; Pantea, C I; Hsu, W H; Muscatiello, N; Hwang, S A

    2017-12-01

    The frequency and intensity of extreme heat events are increasing in New York State (NYS) and have been linked with increased heat-related morbidity and mortality. But these effects are not uniform across the state and can vary across large regions due to regional sociodemographic and environmental factors which impact an individual's response or adaptive capacity to heat and in turn contribute to vulnerability among certain populations. We developed a heat vulnerability index (HVI) to identify heat-vulnerable populations and regions in NYS. Census tract level environmental and sociodemographic heat-vulnerability variables were used to develop the HVI to identify heat-vulnerable populations and areas. Variables were identified from a comprehensive literature review and climate-health research in NYS. We obtained data from 2010 US Census Bureau and 2011 National Land Cover Database. We used principal component analysis to reduce correlated variables to fewer uncorrelated components, and then calculated the cumulative HVI for each census tract by summing up the scores across the components. The HVI was then mapped across NYS (excluding New York City) to display spatial vulnerability. The prevalence rates of heat stress were compared across HVI score categories. Thirteen variables were reduced to four meaningful components representing 1) social/language vulnerability; 2) socioeconomic vulnerability; 3) environmental/urban vulnerability; and 4) elderly/ social isolation. Vulnerability to heat varied spatially in NYS with the HVI showing that metropolitan areas were most vulnerable, with language barriers and socioeconomic disadvantage contributing to the most vulnerability. Reliability of the HVI was supported by preliminary results where higher rates of heat stress were collocated in the regions with the highest HVI. The NYS HVI showed spatial variability in heat vulnerability across the state. Mapping the HVI allows quick identification of regions in NYS that could

  3. A synthesized biophysical and social vulnerability assessment for Taiwan

    Science.gov (United States)

    Lee, Yung-Jaan

    2017-11-01

    Taiwan, located in the Western Pacific, is a country that is one of the most vulnerable to disasters that are associated with the changing climate; it is located within the Ring of Fire, which is the most geologically active region in the world. The environmental and geological conditions in Taiwan are sensitive and vulnerable to such disasters. Owing to increasing urbanization in Taiwan, floods and climate-related disasters have taken an increasing toll on human lives. As global warming accelerates the rising of sea levels and increasing of the frequency of extreme weather events, disasters will continue to affect socioeconomic development and human conditions. Under such circumstances, researchers and policymakers alike must recognize the importance of providing useful knowledge concerning vulnerability, disaster recovery and resilience. Strategies for reducing vulnerability and climate-related disaster risks and for increasing resilience involve preparedness, mitigation and adaptation. In the last two decades, extreme climate events have caused severe flash floods, debris flows, landslides, and other disasters and have had negative effects of many sectors, including agriculture, infrastructure and health. Since climate change is expected to have a continued impact on socio-economic development, this work develops a vulnerability assessment framework that integrates both biophysical and social vulnerability and supports synthesized vulnerability analyses to identify vulnerable areas in Taiwan. Owing to its geographical, geological and climatic features, Taiwan is susceptible to earthquakes, typhoons, droughts and various induced disasters. Therefore, Taiwan has the urgent task of establishing a framework for assessing vulnerability as a planning and policy tool that can be used to identify not only the regions that require special attention but also hotspots in which efforts should be made to reduce vulnerability and the risk of climate-related disaster. To

  4. Analyses Of Two End-User Software Vulnerability Exposure Metrics

    Energy Technology Data Exchange (ETDEWEB)

    Jason L. Wright; Miles McQueen; Lawrence Wellman

    2012-08-01

    The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

  5. [Assessment of eco-environmental vulnerability of Hainan Island, China].

    Science.gov (United States)

    Huang, Bao-rong; Ouyang, Zhi-yun; Zhang, Hui-zhi; Zhang, Li-hua; Zheng, Hua

    2009-03-01

    Based on the assessment method of environmental vulnerability constructed by SOPAC and UNEP, this paper constructed an indicator system from three sub-themes including hazard, resistance, and damage to assess the eco-environmental vulnerability of Hainan Island. The results showed that Hainan Island was suffering a middling level eco-environmental hazard, and the main hazards came from some intensive human activities such as intensive agriculture, mass tourism, mining, and a mass of solid wastes thrown by islanders and tourists. Some geographical characters such as larger land area, larger altitude range, integrated geographical form, and abundant habitat types endowed Hainan Island higher resistance to environmental hazards. However, disturbed by historical accumulative artificial and natural hazards, the Island ecosystem had showed serious ecological damage, such as soil degradation and biodiversity loss. Comprehensively considered hazard, resistance, damage, and degradation, the comprehensive environmental vulnerability of the Island was at a middling level. Some indicators showed lower vulnerability, but some showed higher vulnerability.

  6. Identifying Vulnerabilities and Hardening Attack Graphs for Networked Systems

    Energy Technology Data Exchange (ETDEWEB)

    Saha, Sudip; Vullinati, Anil K.; Halappanavar, Mahantesh; Chatterjee, Samrat

    2016-09-15

    We investigate efficient security control methods for protecting against vulnerabilities in networked systems. A large number of interdependent vulnerabilities typically exist in the computing nodes of a cyber-system; as vulnerabilities get exploited, starting from low level ones, they open up the doors to more critical vulnerabilities. These cannot be understood just by a topological analysis of the network, and we use the attack graph abstraction of Dewri et al. to study these problems. In contrast to earlier approaches based on heuristics and evolutionary algorithms, we study rigorous methods for quantifying the inherent vulnerability and hardening cost for the system. We develop algorithms with provable approximation guarantees, and evaluate them for real and synthetic attack graphs.

  7. Seychelles, a vulnerable or resilient SIDS? A local perspective

    Directory of Open Access Journals (Sweden)

    Dean Philpot

    2015-05-01

    Full Text Available This article analyses perceptions of residents of the Seychelles in the western Indian Ocean in relation to a long-running debate over small island developing states (SIDS as to whether they are vulnerable or resilient. The results of data obtained from 25 key informant interviews and 70 household surveys conducted in 2013 showed that respondents perceived their country to be both vulnerable and resilient. Moreover, the data revealed that the relationship between vulnerability and resilience was complex, and that five interpretations of that relationship were evident: conflict, compromise, complementarity, symbiosis and transformation. Also, the conceptual distance between the two terms – vulnerability and resilience – was shown to be closer than may be commonly assumed. Finally, the paper questions whether the debate over vulnerability versus resilience is rightly confined to SIDS or could be equally applied to other states.

  8. Climate change: are we all vulnerable?: Reconsidering inequalities

    International Nuclear Information System (INIS)

    Magnan, Alexandre

    2013-01-01

    This bibliographical note presents a book in which the author reviews two generally accepted ideas: first, the poorest communities would be the most vulnerable to climate change due to their weak adaptation capacities, and second, such an adaptation would only be an issue of projection on a long term. Based on his works on coastal areas and on his experience on issues of vulnerability and adaptation to climate change he shows that all societies are potentially vulnerable. He uses the notion of 'impact chains', introduces three global parameters for these chains (temperatures, sea level, and precipitation regime), and outlines the always increasing complexity of causes-consequences relationships. He discusses two key concepts: vulnerability as the degree at which a system might be affected by climate changes, and the adaptation capacity which is developed by societies to reduce their vulnerability to environmental changes

  9. Oil vulnerability index of oil-importing countries

    International Nuclear Information System (INIS)

    Gupta, Eshita

    2008-01-01

    This paper assesses the relative oil vulnerability of 26 net oil-importing countries for the year 2004 on the basis of various indicators - the ratio of value of oil imports to gross domestic product (GDP), oil consumption per unit of GDP, GDP per capita and oil share in total energy supply, ratio of domestic reserves to oil consumption, exposure to geopolitical oil market concentration risks as measured by net oil import dependence, diversification of supply sources, political risk in oil-supplying countries, and market liquidity. The approach using the principal component technique has been adopted to combine these individual indicators into a composite index of oil vulnerability. Such an index captures the relative sensitivity of various economies towards developments of the international oil market, with a higher index indicating higher vulnerability. The results show that there are considerable differences in the values of individual indicators of oil vulnerability and overall oil vulnerability index among the countries (both inter and intraregional). (author)

  10. Mental Vulnerability as a Predictor of Early Mortality

    DEFF Research Database (Denmark)

    Eplov, Lene F.; Jørgensen, Torben; Segel, S.

    2005-01-01

    BACKGROUND: Studies have demonstrated that mental vulnerability (ie, a tendency to experience psychosomatic symptoms or inadequate interpersonal interactions) is associated with various diseases. The objective of our study is to evaluate whether mental vulnerability is a risk factor for early...... mortality. METHODS: We conducted a prospective cohort study of 3 random samples of the population in Copenhagen County, Denmark selected in 1976, 1982-1984, and 1991 (n = 6435). Baseline data collection included measures of mental vulnerability, social factors, comorbidity, biologic risk markers (eg, blood...... of mortality as the result of natural causes. The association between mental vulnerability and survival was examined using Kaplan-Meir plots and Cox proportional-hazard models adjusting for possible confounding factors. RESULTS: With respect to mental vulnerability, 79% of the sample was classified...

  11. Oil vulnerability index of oil-importing countries

    Energy Technology Data Exchange (ETDEWEB)

    Gupta, Eshita [The Energy and Resources Institute, Darbari Seth Block, Habitat Place, New Delhi 110 003 (India)

    2008-03-15

    This paper assesses the relative oil vulnerability of 26 net oil-importing countries for the year 2004 on the basis of various indicators - the ratio of value of oil imports to gross domestic product (GDP), oil consumption per unit of GDP, GDP per capita and oil share in total energy supply, ratio of domestic reserves to oil consumption, exposure to geopolitical oil market concentration risks as measured by net oil import dependence, diversification of supply sources, political risk in oil-supplying countries, and market liquidity. The approach using the principal component technique has been adopted to combine these individual indicators into a composite index of oil vulnerability. Such an index captures the relative sensitivity of various economies towards developments of the international oil market, with a higher index indicating higher vulnerability. The results show that there are considerable differences in the values of individual indicators of oil vulnerability and overall oil vulnerability index among the countries (both inter and intraregional). (author)

  12. The Vulnerability of Some Networks including Cycles via Domination Parameters

    Directory of Open Access Journals (Sweden)

    Tufan Turaci

    2016-01-01

    Full Text Available Let G=(V(G,E(G be an undirected simple connected graph. A network is usually represented by an undirected simple graph where vertices represent processors and edges represent links between processors. Finding the vulnerability values of communication networks modeled by graphs is important for network designers. The vulnerability value of a communication network shows the resistance of the network after the disruption of some centers or connection lines until a communication breakdown. The domination number and its variations are the most important vulnerability parameters for network vulnerability. Some variations of domination numbers are the 2-domination number, the bondage number, the reinforcement number, the average lower domination number, the average lower 2-domination number, and so forth. In this paper, we study the vulnerability of cycles and related graphs, namely, fans, k-pyramids, and n-gon books, via domination parameters. Then, exact solutions of the domination parameters are obtained for the above-mentioned graphs.

  13. Parental bonding and vulnerability to adolescent suicide.

    Science.gov (United States)

    Martin, G; Waite, S

    1994-04-01

    Part of a series of studies into early detection in adolescent suicide, this study investigated relationships between parenting style and suicidal thoughts, acts and depression. Students (mean age 15 years) from 4 randomly chosen high schools completed self-report questionnaires containing the Parental Bonding Instrument (PBI) and the Youth Self Report, which provided information about suicide ideation, deliberate self-harm and depression. Significant differences for mean scores on the PBI subscales were noted between cases and noncases of depression, suicidal thoughts and deliberate self-harm. Assignment by adolescents of their parents to the "affectionless control" quadrant of the PBI doubles the relative risk for suicidal thoughts, increases the relative risk for deliberate self-harm 3-fold and increases the relative risk for depression 5-fold. It seems that the PBI may play a role in identification of vulnerable adolescents; further, it both elucidates aspects of adolescent-parent interaction and points toward areas for intervention with at-risk adolescents. We recommend the use of the PBI in early detection studies of adolescent suicide.

  14. Societal Vulnerability to Climate Change and Variability

    International Nuclear Information System (INIS)

    Handmer, J.W.; Dovers, S.; Downing, T.E.

    1999-01-01

    Institutions in many wealthy industrialised countries are robust and their societies appear to be relatively well insulated against the impacts of climate variability, economic problems elsewhere and so on. However, many countries are not in this position, and there is a growing group of humanity which is not benefiting from the apparent global adaptive trends. Worst case scenarios reinforce the impact of this uneven distribution of adaptive capacity, both between and within countries. Nevertheless, at the broad global scale human societies are strongly adaptive and not threatened by climate change for many decades. At the local level the picture is quite different and the survival of some populations at their present locations is in doubt. In the absence of abatement, the longer term outlook is highly uncertain. Adaptation research needs to begin with an understanding of social and economic vulnerability. It requires a different approach to the traditional IPCC impacts assessment, as human behaviour, institutional capacity and culture are more important than biophysical impacts. This is consistent with the intellectual history of the IPCC which has gradually embraced an increasing range of disciplines. 32 refs

  15. Hunger mapping: food insecurity and vulnerability information.

    Science.gov (United States)

    1997-12-01

    Save the Children Foundation (SCF), a nongovernmental organization (NGO), developed the "household food economy analysis" to assess the needs of an area or population facing acute food insecurity. This method considers all of the ways people secure access to food and illustrates the distribution of various food supplies in pie charts that allow comparison of the percentage contribution of each option during a normal year and a "bad" year. Data are gathered through the use of key informants, and the analysis permits identification of ways to support local initiatives and to target assistance. As a result of this work, SCF and another NGO, Helen Keller International, attended a March 1997 expert consultation organized by the UN Food and Agriculture Organization (FAO) to create a workplan for the Food Insecurity and Vulnerability Information and Mapping System (FIVIMS) called for in the World Food Summit Plan of Action. The consultation adopted use of the FAO's food and balance sheet approach, despite its limitations, and determined that indicators should be location- and time-specific as well as 1) simple and reliable, 2) readily available, 3) social and anthropometric, and 4) found at all levels. The consultation also recommended combination of the key informant and the indicator approach to data collection. Finally, the consultation identified appropriate actions that should be accomplished before the 1998 meeting of the FAO's Committee on World Food Security.

  16. Adaptation to climate change and industrial vulnerability

    International Nuclear Information System (INIS)

    Garnaud, Benjamin; Ferret, Celine

    2010-06-01

    In today's societies, the production base made up by the industrial fabric acts as an important link between the climate and its variations and our lifestyle. However, several decades of experience have often enabled us to minimise the impact of the weather and its fluctuations on activities, making the industrial sector out to be purely artificial and protected from climate impacts. Yet climate change leads us to challenge this assumption: if the industrial base is supposed to be impervious to the current climate, is this still the case in a context of climate change? In an attempt to answer this question, the Invulnerable project was launched, led by the Institute for Sustainable Development and International Relations (IDDRI) and bringing together scientific and industrial partners (Meteo-France, IPSL, CERFACS). Observing the availability of scientific resources on climate change, partly resulting from the modeling research coordinated by the IPCC, the idea was to work with industries to identify their vulnerabilities and to use these to define indicators for climatologists. These indicators are not chosen by scientists without consulting industries, but are in fact defined by these industries to ensure they correspond to their needs as closely as possible. The challenge is therefore to bring together scientists and industries and to catalyse a mutual understanding to ensure this discussion results in one or several indicators that are relevant to the activity in question and on which climatologists can work

  17. Vulnerability of health to market forces.

    Science.gov (United States)

    Brezis, Mayer; Wiist, William H

    2011-03-01

    This article reviews adverse influences of for-profit enterprises on health care and public health, and examines significance for public policy. Narrative review. For-profit health-care industries may increase costs and reduce quality, leading to market failure and contributing to the USA's unflattering position in international comparisons of health-care efficiency. Drug and device corporations use strategies such as making biased inferences, influencing scientists and physicians, marketing rather than informing the public, and lobbying to control their own industry regulations to create market advantage. Successful marketing leads to the increased use of costly profit-making drugs and procedures over cheaper, nonpatented therapies. Because resources are limited, the overuse of costly modalities contributes to expensive health care, which presents a challenge to universal coverage. The free market also fosters the proliferation of industries, such as tobacco, food, and chemicals, which externalize costs to maximize profits, seek to unduly influence research by paying experts and universities, and attempt to control the media and regulatory agencies. Most vulnerable to the cumulative harm of these tactics are children, the poor, the sick, and the least educated. The free market can harm health and health care. The corporate obligation to increase profits and ensure a return to shareholders affects public health. Such excesses of capitalism pose formidable challenges to social justice and public health. The recognition of the health risks entailed by corporation-controlled markets has important implications for public policy. Reforms are required to limit the power of corporations.

  18. Seismic vulnerability of natural gas pipelines

    International Nuclear Information System (INIS)

    Lanzano, Giovanni; Salzano, Ernesto; Santucci de Magistris, Filippo; Fabbrocino, Giovanni

    2013-01-01

    This work deals with the analysis of the interaction of earthquakes with pipelines transporting and distributing natural gas for industrial and civil use. To this aim, a new large data-set of seismic information classified on the basis of selected seismological, geotechnical and structural parameters is presented and analyzed. Particular attention is devoted to continuous pipelines under strong ground shaking, which is the geotechnical effect due to passage of waves in soil. Results are provided in terms of the likelihood of the loss of containment with respect to Peak Ground Velocity (PGV), a seismic intensity parameter which may be easily retrieved either from local authorities and public databases or from site dependent hazard analysis. Fragility functions and seismic intensity threshold values for the failure and for the loss of containment of gas from pipeline systems are also given. The obtained functions can be easily implemented in existing codes and guidelines for industrial risk assessment, land-use planning, and for the design of public distribution network, with specific reference to Natural—Technological interaction (Na-Tech). -- Highlights: • The seismic vulnerability of natural gas pipelines is analyzed. • A collection of data for pipelines damaged by earthquake is given. • Damage states and risk states for pipelines are defined. • Consequence-based fragility formulations for the loss of containment are given • Seismic threshold values for public authority, risk assessment and gas distribution are shown

  19. SCADA system vulnerabilities to cyber attack

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, W. T. [Cyber Security Consulting (Canada)

    2004-10-01

    The susceptibility to terrorist attacks of computer-based supervisory control (SCADA) systems that are used to monitor and control water distribution systems, oil and gas pipelines and the electrical grid, is discussed. The discussion includes ways in which SCADA systems may be attacked and remedial actions that may be taken to reduce or eliminate the possibility of such attacks. Attacks may take the form of causing the system to generate false data to divert attention from impending system disasters, or commandeer the system to seriously disable it, or cause damage to the process or equipment being controlled by sending improper control commands. SCADA systems are also vulnerable to internal threats, either from an accidental action that results in damage, or an intentional action, as for example by a disgruntled employee, or ex-employee, usually by way of reprogramming an RTU or PLC by accessing the polling/communications circuit. Recent SCADA systems are much more susceptible to concerted cyber attacks because of the adoption of IT technologies and standards into the design of such systems. (Older systems are more likely to be unique designs, hence less susceptible to attack). As far as protection of SCADA systems is concerned, there are no technologies that would prevent a technologically sophisticated terrorist or disgruntled employee from doing major damage to the system, however, the IT world has developed a range of technologies for the protection of IT assets, and many of these same technologies can also be used to safeguard modern SCADA systems.

  20. Big Data: Concept, Potentialities and Vulnerabilities

    Directory of Open Access Journals (Sweden)

    Fernando Almeida

    2018-03-01

    Full Text Available The evolution of information systems and the growth in the use of the Internet and social networks has caused an explosion in the amount of available data relevant to the activities of the companies. Therefore, the treatment of these available data is vital to support operational, tactical and strategic decisions. This paper aims to present the concept of big data and the main technologies that support the analysis of large data volumes. The potential of big data is explored considering nine sectors of activity, such as financial, retail, healthcare, transports, agriculture, energy, manufacturing, public, and media and entertainment. In addition, the main current opportunities, vulnerabilities and privacy challenges of big data are discussed. It was possible to conclude that despite the potential for using the big data to grow in the previously identified areas, there are still some challenges that need to be considered and mitigated, namely the privacy of information, the existence of qualified human resources to work with Big Data and the promotion of a data-driven organizational culture.