WorldWideScience

Sample records for plan targets vulnerable

  1. Plutonium Vulnerability Management Plan

    International Nuclear Information System (INIS)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy's response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department's Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B

  2. Social vulnerability indicators as a sustainable planning tool

    International Nuclear Information System (INIS)

    Lee, Yung-Jaan

    2014-01-01

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts

  3. Social vulnerability indicators as a sustainable planning tool

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Yung-Jaan, E-mail: yungjaanlee@gmail.com

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study

  4. Vulnerability Assessments and Resilience Planning at Federal Facilities. Preliminary Synthesis of Project

    Energy Technology Data Exchange (ETDEWEB)

    Moss, R. H. [Pacific Northwest National Lab. (PNNL)/Univ. of Maryland, College Park, MD (United States). Joint Global Change Research Inst.; Blohm, A. J. [Univ. of Maryland, College Park, MD (United States); Delgado, A. [Pacific Northwest National Lab. (PNNL)/Univ. of Maryland, College Park, MD (United States). Joint Global Change Research Inst.; Henriques, J. J. [James Madison Univ., Harrisonburg, VA (United States); Malone, E L. [Pacific Northwest National Lab. (PNNL)/Univ. of Maryland, College Park, MD (United States). Joint Global Change Research Inst.

    2015-08-15

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. Agencies have been experimenting with these frameworks and approaches. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Department of Energy and the Department of Defense. The purpose of the paper is to solicit comments and feedback from interested program managers and analysts before final conclusions are published. The paper describes the characteristics of a systematic process for prioritizing needs for adaptation planning at individual facilities and examines requirements and methods needed. It then suggests a framework of steps for vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change. The case studies point to several preliminary conclusions; (1) Vulnerability assessments are needed to translate potential changes in climate exposure to estimates of impacts and evaluation of their significance for operations and mission attainment, in other words into information that is related to and useful in ongoing planning, management, and decision-making processes; (2) To increase the relevance and utility of vulnerability assessments to site personnel, the assessment process needs to emphasize the characteristics of the site infrastructure, not just climate change; (3) A multi-tiered framework that includes screening, vulnerability assessments at the most vulnerable installations, and adaptation design will efficiently target high-risk sites and infrastructure

  5. Grid Transmission Expansion Planning Model Based on Grid Vulnerability

    Science.gov (United States)

    Tang, Quan; Wang, Xi; Li, Ting; Zhang, Quanming; Zhang, Hongli; Li, Huaqiang

    2018-03-01

    Based on grid vulnerability and uniformity theory, proposed global network structure and state vulnerability factor model used to measure different grid models. established a multi-objective power grid planning model which considering the global power network vulnerability, economy and grid security constraint. Using improved chaos crossover and mutation genetic algorithm to optimize the optimal plan. For the problem of multi-objective optimization, dimension is not uniform, the weight is not easy given. Using principal component analysis (PCA) method to comprehensive assessment of the population every generation, make the results more objective and credible assessment. the feasibility and effectiveness of the proposed model are validated by simulation results of Garver-6 bus system and Garver-18 bus.

  6. Putting the puzzle together: Reducing vulnerability through people-focused planning

    International Nuclear Information System (INIS)

    Hutton, D.

    2009-01-01

    Supporting and integrating vulnerable persons into emergency management has emerged as an increasing priority in emergency management in Canada. Events such as the 2003 European heat wave and Hurricane Katrina have shown that disasters almost always have the harshest affects on the frail elderly, people with disabilities, the disadvantaged and the least able. While it is neither possible-nor the role of emergency management-to eliminate or reduce many factors that make people vulnerable to hazards, it is important that emergency managers work closely with communities to not only identify risks and vulnerabilities, but also to build on the resources and capacities that enable people to effectively prepare for, respond to and recover from threats of all types. To this end, emergency management must take into account the level of capacities and resources that a community has to prepare for emergencies and disasters, in addition to people's vulnerabilities to extreme events. To be successful, people must be viewed not as a part of the problem to be solved or managed during an emergency, but rather a part of the solution to building more resilient and disaster-resistant societies. This requires 'people-focused' planning methodologies that move beyond planning for to planning with all segments of society, including the most vulnerable and marginalised groups that are more readily overlooked. This not only begins to ensure that emergency planning and response capacities can effectively address the diverse needs of all people, but is also an important step to empowering the most vulnerable to prepare themselves for emergencies and other critical events. (authors)

  7. Summarizing components of U.S. Department of the Interior vulnerability assessments to focus climate adaptation planning

    Science.gov (United States)

    Thompson, Laura M.; Staudinger, Michelle D.; Carter, Shawn L.

    2015-09-29

    A secretarial order identified climate adaptation as a critical performance objective for future management of U.S. Department of the Interior (DOI) lands and resources in response to global change. Vulnerability assessments can inform climate adaptation planning by providing insight into what natural resources are most at risk and why. Three components of vulnerability—exposure, sensitivity, and adaptive capacity—were defined by the Intergovernmental Panel on Climate Change (IPCC) as necessary for identifying climate adaptation strategies and actions. In 2011, the DOI requested all internal bureaus report ongoing or completed vulnerability assessments about a defined range of assessment targets or climate-related threats. Assessment targets were defined as freshwater resources, landscapes and wildlife habitat, native and cultural resources, and ocean health. Climate-related threats were defined as invasive species, wildfire risk, sea-level rise, and melting ice and permafrost. Four hundred and three projects were reported, but the original DOI survey did not specify that information be provided on exposure, sensitivity, and adaptive capacity collectively as part of the request, and it was unclear which projects adhered to the framework recommended by the IPCC. Therefore, the U.S. Geological Survey National Climate Change and Wildlife Science Center conducted a supplemental survey to determine how frequently each of the three vulnerability components was assessed. Information was categorized for 124 of the 403 reported projects (30.8 percent) based on the three vulnerability components, and it was discovered that exposure was the most common component assessed (87.9 percent), followed by sensitivity (68.5 percent) and adaptive capacity (33.1 percent). The majority of projects did not fully assess vulnerability; projects focused on landscapes/wildlife habitats and sea-level rise were among the minority that simultaneously addressed all three vulnerability

  8. Savannah River Site management response plan for chemical safety vulnerability field assessment. Revision 1

    International Nuclear Information System (INIS)

    Kahal, E.J.; Murphy, S.L.; Salaymeh, S.R.

    1994-09-01

    As part of the U.S. Department of Energy's (DOE) initiative to identify potential chemical safety vulnerabilities in the DOE complex, the Chemical Safety Vulnerability Core Working Group issued a field verification assessment report. While the report concluded that Savannah River Site (SRS) is moving in a positive direction, the report also identified five chemical safety vulnerabilities with broad programmatic impact that are not easily nor quickly remedied. The May 1994 SRS Management Response Plan addressed the five SRS vulnerabilities identified in the field assessment report. The SRS response plan listed observations supporting the vulnerabilities and any actions taken or planned toward resolution. Many of the observations were resolved by simple explanations, such as the existence of implementation plans for Safety Analysis Report updates. Recognizing that correcting individual observations does not suffice in remedying the vulnerabilities, a task team was assembled to address the broader programmatic issues and to recommend corrective actions

  9. Vulnerability Management for an Enterprise Resource Planning System

    Science.gov (United States)

    Goel, Shivani; Kiran, Ravi; Garg, Deepak

    2012-09-01

    Enterprise resource planning (ERP) systems are commonly used in technical educational institutions(TEIs). ERP systems should continue providing services to its users irrespective of the level of failure. There could be many types of failures in the ERP systems. There are different types of measures or characteristics that can be defined for ERP systems to handle the levels of failure. Here in this paper, various types of failure levels are identified along with various characteristics which are concerned with those failures. The relation between all these is summarized. The disruptions causing vulnerabilities in TEIs are identified .A vulnerability management cycle has been suggested along with many commercial and open source vulnerability management tools. The paper also highlights the importance of resiliency in ERP systems in TEIs.

  10. Let's Stop Trying to Quantify Household Vulnerability: The Problem With Simple Scales for Targeting and Evaluating Economic Strengthening Programs.

    Science.gov (United States)

    Moret, Whitney M

    2018-03-21

    Economic strengthening practitioners are increasingly seeking data collection tools that will help them target households vulnerable to HIV and poor child well-being outcomes, match households to appropriate interventions, monitor their status, and determine readiness for graduation from project support. This article discusses efforts in 3 countries to develop simple, valid tools to quantify and classify economic vulnerability status. In Côte d'Ivoire, we conducted a cross-sectional survey with 3,749 households to develop a scale based on the definition of HIV-related economic vulnerability from the U.S. President's Emergency Plan for AIDS Relief (PEPFAR) for the purpose of targeting vulnerable households for PEPFAR-funded programs for orphans and vulnerable children. The vulnerability measures examined did not cluster in ways that would allow for the creation of a small number of composite measures, and thus we were unable to develop a scale. In Uganda, we assessed the validity of a vulnerability index developed to classify households according to donor classifications of economic status by measuring its association with a validated poverty measure, finding only a modest correlation. In South Africa, we developed monitoring and evaluation tools to assess economic status of individual adolescent girls and their households. We found no significant correlation with our validation measures, which included a validated measure of girls' vulnerability to HIV, a validated poverty measure, and subjective classifications generated by the community, data collector, and respondent. Overall, none of the measures of economic vulnerability used in the 3 countries varied significantly with their proposed validation items. Our findings suggest that broad constructs of economic vulnerability cannot be readily captured using simple scales to classify households and individuals in a way that accounts for a substantial amount of variance at locally defined vulnerability levels. We

  11. Public Health Planning for Vulnerable Populations and Pandemic Influenza

    National Research Council Canada - National Science Library

    Cameron, Wendy K

    2008-01-01

    This thesis addresses planning for vulnerable populations, those segments of each community that are normally independent but that may require special assistance during a health emergency such as an influenza pandemic...

  12. The vulnerability of the global container shipping network to targeted link disruption

    CSIR Research Space (South Africa)

    Viljoen, NM

    2016-11-01

    Full Text Available transport, complex network theory has had limited application in studying the vulnerability of maritime networks. This study uses targeted link disruption to investigate the strategy specific vulnerability of the network. Although nodal infrastructure...

  13. Is a clean river fun for all? Recognizing social vulnerability in watershed planning.

    Science.gov (United States)

    Cutts, Bethany B; Greenlee, Andrew J; Prochaska, Natalie K; Chantrill, Carolina V; Contractor, Annie B; Wilhoit, Juliana M; Abts, Nancy; Hornik, Kaitlyn

    2018-01-01

    Watershed planning can lead to policy innovation and action toward environmental protection. However, groups often suffer from low engagement with communities that experience disparate impacts from flooding and water pollution. This can limit the capacity of watershed efforts to dismantle pernicious forms of social inequality. As a result, the benefits of environmental changes often flow to more empowered residents, short-changing the power of watershed-based planning as a tool to transform ecological, economic, and social relationships. The objectives of this paper are to assess whether the worldview of watershed planning actors are sufficiently attuned to local patterns of social vulnerability and whether locally significant patterns of social vulnerability can be adequately differentiated using conventional data sources. Drawing from 35 in-depth interviews with watershed planners and community stakeholders in the Milwaukee River Basin (WI, USA), we identify five unique definitions of social vulnerability. Watershed planners in our sample articulate a narrower range of social vulnerability definitions than other participants. All five definitions emphasize spatial and demographic characteristics consistent with existing ways of measuring social vulnerability. However, existing measures do not adequately differentiate among the spatio-temporal dynamics used to distinguish definitions. In response, we develop two new social vulnerability measures. The combination of interviews and demographic analyses in this study provides an assessment technique that can help watershed planners (a) understand the limits of their own conceptualization of social vulnerability and (b) acknowledge the importance of place-based vulnerabilities that may otherwise be obscured. We conclude by discussing how our methods can be a useful tool for identifying opportunities to disrupt social vulnerability in a watershed by evaluating how issue frames, outreach messages, and engagement tactics

  14. Is a clean river fun for all? Recognizing social vulnerability in watershed planning

    Science.gov (United States)

    Greenlee, Andrew J.; Prochaska, Natalie K.; Chantrill, Carolina V.; Contractor, Annie B.; Wilhoit, Juliana M.; Abts, Nancy; Hornik, Kaitlyn

    2018-01-01

    Watershed planning can lead to policy innovation and action toward environmental protection. However, groups often suffer from low engagement with communities that experience disparate impacts from flooding and water pollution. This can limit the capacity of watershed efforts to dismantle pernicious forms of social inequality. As a result, the benefits of environmental changes often flow to more empowered residents, short-changing the power of watershed-based planning as a tool to transform ecological, economic, and social relationships. The objectives of this paper are to assess whether the worldview of watershed planning actors are sufficiently attuned to local patterns of social vulnerability and whether locally significant patterns of social vulnerability can be adequately differentiated using conventional data sources. Drawing from 35 in-depth interviews with watershed planners and community stakeholders in the Milwaukee River Basin (WI, USA), we identify five unique definitions of social vulnerability. Watershed planners in our sample articulate a narrower range of social vulnerability definitions than other participants. All five definitions emphasize spatial and demographic characteristics consistent with existing ways of measuring social vulnerability. However, existing measures do not adequately differentiate among the spatio-temporal dynamics used to distinguish definitions. In response, we develop two new social vulnerability measures. The combination of interviews and demographic analyses in this study provides an assessment technique that can help watershed planners (a) understand the limits of their own conceptualization of social vulnerability and (b) acknowledge the importance of place-based vulnerabilities that may otherwise be obscured. We conclude by discussing how our methods can be a useful tool for identifying opportunities to disrupt social vulnerability in a watershed by evaluating how issue frames, outreach messages, and engagement tactics

  15. Business continuity, emergency planning and special needs: How to protect the vulnerable.

    Science.gov (United States)

    Reilly, Daniel

    2015-01-01

    Emergencies and disasters affect all segments of the population. Some segments are more at risk during the emergency response and recovery efforts owing to vulnerabilities that increase the risk of harm. These vulnerabilities are due to individuals' disabilities, which must be incorporated into emergency and business continuity planning. Some disabilities are obvious, such as impaired vision, hearing or mobility, while other are less evident, but equally disabling, such as cognitive disorders, geographical or language isolation, and numerous age-related factors. Taken together when creating emergency or business continuity plans, the issues identified as disabilities can be grouped by functionality and termed as special needs. This paper will detail the identification of special needs populations, explain how these persons are vulnerable during the emergency or disaster response and recovery process, and provide examples of how to partner with individuals within identified special needs populations to improve the planning process.

  16. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 2

    International Nuclear Information System (INIS)

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. To address the facility-specific and site-specific vulnerabilities, responsible DOE and site-contractor line organizations have developed initial site response plans. These plans, presented as Volume 2 of this Management Response Plan, describe the actions needed to mitigate or eliminate the facility- and site-specific vulnerabilities identified by the CSV Working Group field verification teams. Initial site response plans are described for: Brookhaven National Lab., Hanford Site, Idaho National Engineering Lab., Lawrence Livermore National Lab., Los Alamos National Lab., Oak Ridge Reservation, Rocky Flats Plant, Sandia National Laboratories, and Savannah River Site

  17. Vulnerability Assessments and Resilience Planning at Federal Sites

    Energy Technology Data Exchange (ETDEWEB)

    Moss, Richard H. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Blohm, Andrew [Univ. of Maryland, College Park, MD (United States); Delgado, Alison [Pacific Northwest National Lab. (PNNL), Richland, WA (United States); Henriques, Justin J. [James Madison Univ., Harrisonburg, VA (United States); Malone, Elizabeth L. [Pacific Northwest National Lab. (PNNL), Richland, WA (United States)

    2016-02-01

    U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Departments of Energy and Defense. The paper provides a framework of steps for climate vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change.

  18. Social identity and support for counteracting tobacco company marketing that targets vulnerable populations

    Science.gov (United States)

    Baig, Sabeeh A.; Pepper, Jessica K.; Morgan, Jennifer C.; Brewer, Noel T.

    2017-01-01

    Rationale Tobacco companies use advertising to target vulnerable populations, including youth, racial/ethnic minorities, and sexual minorities. Objective We sought to examine how personal identity affects support for population-specific anti-smoking advertisements that could serve as countermeasures to industry practices. Methods In 2014–2015, we surveyed probability phone samples of adults and adolescents (n = 6,139) and an online convenience sample of adults (n = 4,137) in the United States. We experimentally varied the description of tobacco industry marketing practices (no description, general, or specific to a target group). The four prevention target groups were teens; African Americans; Latinos; and gays, lesbians, and bisexuals (GLBs). Participants were either members or non-members of their prevention target group. Results Support was highest for anti-smoking advertisements targeting teens, moderate for Latinos and African Americans, and lowest for GLBs. In-group members expressed higher support than out-group members when anti-smoking advertisements targeted African Americans, Latinos, and GLBs (all p marketing practices did not have an effect. Results were similar across the phone and online studies. Conclusions Our findings suggest that the public strongly supports advertisements to prevent smoking among teens, but support for similar efforts among other vulnerable populations is comparatively low. Anti-smoking campaigns for vulnerable populations may benefit from a greater understanding of the role of social identity in shaping public support for such campaigns. PMID:28427731

  19. Social identity and support for counteracting tobacco company marketing that targets vulnerable populations.

    Science.gov (United States)

    Baig, Sabeeh A; Pepper, Jessica K; Morgan, Jennifer C; Brewer, Noel T

    2017-06-01

    Tobacco companies use advertising to target vulnerable populations, including youth, racial/ethnic minorities, and sexual minorities. We sought to examine how personal identity affects support for population-specific anti-smoking advertisements that could serve as countermeasures to industry marketing practices. In 2014-2015, we surveyed probability phone samples of adults and adolescents (n = 6,139) and an online convenience sample of adults (n = 4,137) in the United States. We experimentally varied the description of tobacco industry marketing practices (no description, general, or specific to a target group). The four prevention target groups were teens; African Americans; Latinos; and gays, lesbians, and bisexuals (GLBs). Participants were either members or non-members of their prevention target group. Support was highest for anti-smoking advertisements targeting teens, moderate for Latinos and African Americans, and lowest for GLBs. In-group members expressed higher support than out-group members when anti-smoking advertisements targeted African Americans, Latinos, and GLBs (all p marketing practices did not have an effect. Results were similar across the phone and online studies. Our findings suggest that the public strongly supports advertisements to prevent smoking among teens, but support for similar efforts among other vulnerable populations is comparatively low. Anti-smoking campaigns for vulnerable populations may benefit from a greater understanding of the role of social identity in shaping public support for such campaigns. Copyright © 2017 Elsevier Ltd. All rights reserved.

  20. 40 CFR 35.9020 - Planning targets.

    Science.gov (United States)

    2010-07-01

    ... STATE AND LOCAL ASSISTANCE Financial Assistance for the National Estuary Program § 35.9020 Planning targets. The EPA Assistant Administrator for Water develops planning targets each year to help each... 40 Protection of Environment 1 2010-07-01 2010-07-01 false Planning targets. 35.9020 Section 35...

  1. Groundwater vulnerability assessment to assist the measurement planning of the water framework directive - a practical approach with stakeholders

    Science.gov (United States)

    Berkhoff, K.

    2007-05-01

    An evaluation scheme is presented in this paper which can be used to assess groundwater vulnerability according to the requirements of the European Water Framework Directive (WFD). The evaluation scheme results in a groundwater vulnerability map identifying areas of high, medium and low vulnerability, as necessary for the measurement planning of the WFD. The evaluation scheme is based on the definition of the vulnerability of the Intergovernmental Panel on Climate Change (IPCC). It considers exposure, sensitivity and the adaptive capacity of the region. The adaptive capacity is evaluated in an actors' platform, which was constituted for the region in the PartizipA ("Participative modelling, Actor and Ecosystem Analysis in Regions with Intensive Agriculture") project. As a result of the vulnerability assessment, 21% of the catchment area was classified as being highly vulnerable, whereas 73% has medium vulnerability and 6% has low vulnerability. Thus, a groundwater vulnerability assessment approach is presented, which can be used in practice on a catchment scale for the WFD measurement planning.

  2. Vulnerability

    Science.gov (United States)

    Taback, I.

    1979-01-01

    The discussion of vulnerability begins with a description of some of the electrical characteristics of fibers before definiting how vulnerability calculations are done. The vulnerability results secured to date are presented. The discussion touches on post exposure vulnerability. After a description of some shock hazard work now underway, the discussion leads into a description of the planned effort and some preliminary conclusions are presented.

  3. ENTERPRISE RESOURCE STRATEGIC PLANNING: TARGET CHOICE TECHNIQUES

    Directory of Open Access Journals (Sweden)

    A. S. Lankin

    2011-01-01

    Full Text Available Choice of the targets is one of most important elements of the resource planning system. Particular feature of the strategic planning is development of future alternatives for the enterprise. Main resource strategic planning cycle elements: examination of principal external and internal environment components; forming the company mission; development of long-term targets; concretization of the long-term targets through short-term aims; examination of strategies and final choice.

  4. Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1

    International Nuclear Information System (INIS)

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation

  5. Vulnerability of Australian agriculture to climate change: sequencing impacts over IPCC trajectories for adaptation planning

    International Nuclear Information System (INIS)

    Mallawaarachchi, Thilak; Hodges, Andrew; Wicks, Santhi; Kokic, Phil; Nelson, Rohan

    2007-01-01

    Full text: Full text: Agricultural systems are susceptible to adverse effects of climate change, including climate variability and extremes. While the degree of vulnerability is a function of the magnitude and the rate of variation in climate exposure, agricultural systems with a stronger adaptive capacity are likely to be less vulnerable to climate change. In preparing the agriculture sector for ongoing climate change, adaptation planning to moderate potential impacts and to take advantage of opportunities, has emerged as an effective strategic response. Global climate change scenarios developed by the IPCC indicate that changes in climate may alter the production potential of agriculture across many regions. Wide regional variability in productivity, extensive land use and the dominance in rural economies across Australia could expose agriculture to considerable risks from climate change impacts. In many cases these risks could cascade across a range of sectors and vary overtime, reflecting the capacity of exposed enterprises to adapt to a changing climate by taking advantage of opportunities. Effective planning of adaptation responses will require integrated assessments of regional vulnerability to climate risks over IPCC projection trajectories. In this paper, we present a method for estimating and mapping vulnerability to climate risks at the regional level, and apply this method to examine the vulnerability of Australian agriculture to climate change, focusing on case studies drawn from dryland broadacre and irrigated horticulture industries. In developing a conceptual framework for assessing vulnerability and adaptation options, the paper provides a review of key approaches used globally for the assessment of vulnerability to climate change in agriculture. It presents an approach to link global climate change scenario-based projections for assessing economic impacts on industries and regions through a process that maps climate risks to factors contributing

  6. Exploring spatial patterns of vulnerability for diverse biodiversity descriptors in regional conservation planning.

    Science.gov (United States)

    Vimal, Ruppert; Pluvinet, Pascal; Sacca, Céline; Mazagol, Pierre-Olivier; Etlicher, Bernard; Thompson, John D

    2012-03-01

    In this study, we developed a multi-criteria assessment of spatial variability of the vulnerability of three different biodiversity descriptors: sites of high conservation interest by virtue of the presence of rare or remarkable species, extensive areas of high ecological integrity, and landscape diversity in grid cells across an entire region. We assessed vulnerability in relation to (a) direct threats in and around sites to a distance of 2 km associated with intensive agriculture, building and road infrastructure and (b) indirect effects of human population density on a wider scale (50 km). The different combinations of biodiversity and threat indicators allowed us to set differential priorities for biodiversity conservation and assess their spatial variation. For example, with this method we identified sites and grid cells which combined high biodiversity with either high threat values or low threat values for the three different biodiversity indicators. In these two classes the priorities for conservation planning will be different, reduce threat values in the former and restrain any increase in the latter. We also identified low priority sites (low biodiversity with either high or low threats). This procedure thus allows for the integration of a spatial ranking of vulnerability into priority setting for regional conservation planning. Copyright © 2011 Elsevier Ltd. All rights reserved.

  7. Targetable vulnerabilities in T- and NK-cell lymphomas identified through preclinical models.

    Science.gov (United States)

    Ng, Samuel Y; Yoshida, Noriaki; Christie, Amanda L; Ghandi, Mahmoud; Dharia, Neekesh V; Dempster, Joshua; Murakami, Mark; Shigemori, Kay; Morrow, Sara N; Van Scoyk, Alexandria; Cordero, Nicolas A; Stevenson, Kristen E; Puligandla, Maneka; Haas, Brian; Lo, Christopher; Meyers, Robin; Gao, Galen; Cherniack, Andrew; Louissaint, Abner; Nardi, Valentina; Thorner, Aaron R; Long, Henry; Qiu, Xintao; Morgan, Elizabeth A; Dorfman, David M; Fiore, Danilo; Jang, Julie; Epstein, Alan L; Dogan, Ahmet; Zhang, Yanming; Horwitz, Steven M; Jacobsen, Eric D; Santiago, Solimar; Ren, Jian-Guo; Guerlavais, Vincent; Annis, D Allen; Aivado, Manuel; Saleh, Mansoor N; Mehta, Amitkumar; Tsherniak, Aviad; Root, David; Vazquez, Francisca; Hahn, William C; Inghirami, Giorgio; Aster, Jon C; Weinstock, David M; Koch, Raphael

    2018-05-22

    T- and NK-cell lymphomas (TCL) are a heterogenous group of lymphoid malignancies with poor prognosis. In contrast to B-cell and myeloid malignancies, there are few preclinical models of TCLs, which has hampered the development of effective therapeutics. Here we establish and characterize preclinical models of TCL. We identify multiple vulnerabilities that are targetable with currently available agents (e.g., inhibitors of JAK2 or IKZF1) and demonstrate proof-of-principle for biomarker-driven therapies using patient-derived xenografts (PDXs). We show that MDM2 and MDMX are targetable vulnerabilities within TP53-wild-type TCLs. ALRN-6924, a stapled peptide that blocks interactions between p53 and both MDM2 and MDMX has potent in vitro activity and superior in vivo activity across 8 different PDX models compared to the standard-of-care agent romidepsin. ALRN-6924 induced a complete remission in a patient with TP53-wild-type angioimmunoblastic T-cell lymphoma, demonstrating the potential for rapid translation of discoveries from subtype-specific preclinical models.

  8. Plan demographics, participants' saving behavior, and target-date fund investments.

    Science.gov (United States)

    Park, Youngkyun

    2009-05-01

    This analysis explores (1) whether plan demographic characteristics would affect individual participant contribution rates and target-date fund investments and (2) equity glide paths for participants in relation to plan demographics by considering target replacement income and its success rate. PLAN DEMOGRAPHIC CHARACTERISTICS IN PARTICIPANT CONTRIBUTION RATES: This study finds empirical evidence that 401(k) plan participants' contribution rates differ by plan demographics based on participants' income and/or tenure. In particular, participants in 401(k) plans dominated by those with low income and short tenure tend to contribute less than those in plans dominated by participants with high income and long tenure. Future research will explore how participant contribution behavior may also be influenced by incentives provided by employers through matching formulae. PLAN DEMOGRAPHIC CHARACTERISTICS IN TARGET-DATE FUND INVESTMENTS: The study also finds empirical evidence that participants' investments in target-date funds with different equity allocations differ by plan demographics based on participants' income and/or tenure. In particular, target-date fund users with 90 percent or more of their account balances in target-date funds who are in 401(k) plans dominated by low-income and short-tenure participants tend to hold target-date funds with lower equity allocations, compared with their counterparts in plans dominated by high-income and long-tenure participants. Future research will focus on the extent to which these characteristics might influence the selection of target-date funds by plan sponsors. EQUITY GLIDE PATHS: Several stylized equity glide paths as well as alternative asset allocations are compared for participants at various starting ages to demonstrate the interaction between plan demographics and equity glide paths/asset allocations in terms of success rates in meeting various replacement income targets. The equity glide path/asset allocation providing

  9. Comparison of provider and plan-based targeting strategies for disease management.

    Science.gov (United States)

    Annis, Ann M; Holtrop, Jodi Summers; Tao, Min; Chang, Hsiu-Ching; Luo, Zhehui

    2015-05-01

    We aimed to describe and contrast the targeting methods and engagement outcomes for health plan-delivered disease management with those of a provider-delivered care management program. Health plan epidemiologists partnered with university health services researchers to conduct a quasi-experimental, mixed-methods study of a 2-year pilot. We used semi-structured interviews to assess the characteristics of program-targeting strategies, and calculated target and engagement rates from clinical encounter data. Five physician organizations (POs) with 51 participating practices implemented care management. Health plan member lists were sent monthly to the practices to accept patients, and then the practices sent back data reports regarding targeting and engagement in care management. Among patients accepted by the POs, we compared those who were targeted and engaged by POs with those who met health plan targeting criteria. The health plan's targeting process combined claims algorithms and employer group preferences to identify candidates for disease management; on the other hand, several different factors influenced PO practices' targeting approaches, including clinical and personal knowledge of the patients, health assessment information, and availability of disease-relevant programs. Practices targeted a higher percentage of patients for care management than the health plan (38% vs 16%), where only 7% of these patients met the targeting criteria of both. Practices engaged a higher percentage of their targeted patients than the health plan (50% vs 13%). The health plan's claims-driven targeting approach and the clinically based strategies of practices both provide advantages; an optimal model may be to combine the strengths of each approach to maximize benefits in care management.

  10. Spatial Planning Experiences for Vulnerability Reduction in the Wildland-Urban Interface in Mediterranean European Countries

    Directory of Open Access Journals (Sweden)

    Galiana-Martín Luis

    2017-09-01

    Full Text Available Expansion of the wildland-urban interface in countries in the European Mediterranean basin is increasing vulnerability to forest fires. Despite more effective extinction systems, this is still a growing problem. This article defends the importance of spatial planning (land-use and urban planning and the need for systematic intervention to mitigate this wildfire risk. A critical review of the current situation, noting intervention focused on buildings and plots and insufficient action on intermediate spatial scales, is followed by the presentation of significant and relevant experiences in the European context.

  11. A patient-specific planning target volume used in 'plan of the day' adaptation for interfractional motion mitigation

    International Nuclear Information System (INIS)

    Chen, Wenjing; Gemmel, Alexander; Rietzel, Eike

    2013-01-01

    We propose a patient-specific planning target volume (PTV) to deal with interfractional variations, and test its feasibility in a retrospective treatment-planning study. Instead of using one planning image only, multiple scans are taken on different days. The target and organs at risk (OARs) are delineated on each images. The proposed PTV is generated from a union of those target contours on the planning images, excluding voxels of the OARs, and is denoted the PTV 'GP-OAR' (global prostate-organs at risk). The study is performed using 'plan of the day' adaptive workflow, which selects a daily plan from a library of plans based on a similarity comparison between the daily scan and planning images. The daily plans optimized for GP-OAR volumes are compared with those optimized for PTVs generated from a single prostate contour (PTV SP). Four CT serials of prostate cancer patient datasets are included in the test, and in total 28 fractions are simulated. The results show that the daily chosen GP-OAR plans provide excellent target coverage, with V95 values of the prostate mostly >95%. In addition, dose delivered to the OARs as calculated from applying daily chosen GP-OAR plans is slightly increased but comparable to that calculated from applying daily SP plans. In general, the PTV GP-OARs are able to cover possible target variations while keeping dose delivered to the OARs at a similar level to that of the PTV SPs. (author)

  12. Use of target-date funds in 401(k) plans, 2007.

    Science.gov (United States)

    Copeland, Craig

    2009-03-01

    WHAT THEY ARE: Target-date funds (also called "life-cycle" funds) are a type of mutual fund that automatically rebalances its asset allocation following a predetermined pattern over time. They typically rebalance to more conservative and income-producing assets as the participant's target date of retirement approaches. WHY THEY'RE IMPORTANT AND GROWING: Of the 401(k) plan participants in the EBRI/ICI 401(k) database who were found to be in plans that offeredtarget-date funds, 37 percent had at least some fraction of their account in target-date funds in 2007. Target-date funds held about 7 percent of total assets in 401(k) plans and the use of these funds is expected to increase in the future. The Pension Protection Act of 2006 made it easier for plan sponsors to automatically enroll new workers in a 401(k) plan, and target-date funds were one of the types of approved funds specified for a "default" investment if the participant does not elect a choice. BRI/ICI 401(K) DATABASE: This study uses the unique richness of the data in the EBRI/ICI Participant-Directed Retirement Plan Data Collection Project, which has almost 22 million participants, to examine the choices and characteristics of participants whose plans offer target-date funds. EFFECT OF AGE, SALARY, JOB TENURE, AND ACCOUNT BALANCE: Younger workers are significantly more likely to invest in target-date funds than are older workers: Almost 44 percent of participants under age 30 had assets in a target-date fund, compared with 27 percent of those 60 or older. Target-date funds appeal to those with lower incomes, little time on the job, and with few assets. On average, target-date fund investors are about 2.5 years younger than those who do not invest in target-date funds, have about 3.5 years less tenure, make about $11,000 less in salary, have $25,000 less in their account, and are in smaller plans. EFFECT OF AUTOMATIC ENROLLMENT: While the EBRI/ICI database does not contain specific information on whether

  13. Final Work Plan: Targeted Investigation at York, Nebraska

    Energy Technology Data Exchange (ETDEWEB)

    LaFreniere, Lorraine M. [Argonne National Lab. (ANL), Argonne, IL (United States)

    2016-08-01

    The targeted investigation at York will be implemented in phases, so that data collected and interpretations developed at each stage of the program can be evaluated to guide subsequent phases most effectively. Section 2 of this Work Plan presents a brief overview of the York site, its geologic and hydrologic setting, and the previous CCC/USDA investigations. Section 3, outlines the proposed technical program for the targeted investigation, and Section 4 describes the investigative methods to be employed. A community relations plan is in Section 5, and Section 6 includes health and safety information. In addition to this site-specific Work Plan, the Master Work Plan (Argonne 2002) developed by Argonne for CCC/USDA investigations in Nebraska should be consulted for complete details of the methods and procedures to be used at York.

  14. Mangrove vulnerability index using GIS

    Science.gov (United States)

    Yunus, Mohd Zulkifli Mohd; Ahmad, Fatimah Shafinaz; Ibrahim, Nuremira

    2018-02-01

    Climate change, particularly its associated sea level rise, is major threat to mangrove coastal areas, and it is essential to develop ways to reduce vulnerability through strategic management planning. Environmental vulnerability can be understood as a function of exposure to impacts and the sensitivity and adaptive capacity of ecological systems towards environmental tensors. Mangrove vulnerability ranking using up to 14 parameters found in study area, which is in Pulau Kukup and Sg Pulai, where 1 is low vulnerability and 5 is very high vulnerability. Mangrove Vulnerability Index (MVI) is divided into 3 main categories Physical Mangrove Index (PMI), Biological Mangrove Index (BMI) and Hazard Mangrove Index (HMI).

  15. Evaluation of Regional Vulnerability to Disasters by People of Ishikawa, Japan: A Cross Sectional Study Using National Health Insurance Data

    Science.gov (United States)

    Fujiu, Makoto; Morisaki, Yuma; Takayama, Junichi; Yanagihara, Kiyoko; Nishino, Tatsuya; Sagae, Masahiko; Hirako, Kohei

    2018-01-01

    The 2013 Partial Amendment of the Disaster Countermeasures Basic Law mandated that a roster of vulnerable persons during disasters be created, and further development of evacuation support is expected. In this study, the number of vulnerable people living in target analytical areas are identified in terms of neighborhood units by using the National Health Insurance Database to create a realistic and efficient evacuation support plan. Later, after considering the “vulnerability” of an area to earthquake disaster damage, a quantitative evaluation of the state of the disaster is performed using a principle component analysis that further divided the analytical target areas into neighborhood units to make a detailed determination of the number of disaster-vulnerable persons, the severity of the disaster, etc. The results of the disaster evaluation performed after considering the vulnerability of an area are that 628 disaster-vulnerable persons live in areas with a relatively higher disaster evaluation value. PMID:29534021

  16. Prescribing and evaluating target dose in dose-painting treatment plans

    DEFF Research Database (Denmark)

    Håkansson, Katrin; Specht, Lena; Aznar, Marianne C

    2014-01-01

    BACKGROUND: Assessment of target dose conformity in multi-dose-level treatment plans is challenging due to inevitable over/underdosage at the border zone between dose levels. Here, we evaluate different target dose prescription planning aims and approaches to evaluate the relative merit of such p......-painting and multi-dose-level plans. The tool can be useful for quality assurance of multi-center trials, and for visualizing the development of treatment planning in routine clinical practice....... of such plans. A quality volume histogram (QVH) tool for history-based evaluation is proposed. MATERIAL AND METHODS: Twenty head and neck cancer dose-painting plans with five prescription levels were evaluated, as well as clinically delivered simultaneous integrated boost (SIB) plans from 2010 and 2012. The QVH...

  17. Vulnerability And Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    International Nuclear Information System (INIS)

    Durling, R.L. Jr.; Price, D.E.; Spero, K.K.

    2005-01-01

    For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities is presented

  18. Modelling farm vulnerability to flooding: A step toward vulnerability mitigation policies appraisal

    Science.gov (United States)

    Brémond, P.; Abrami, G.; Blanc, C.; Grelot, F.

    2009-04-01

    Recent catastrophic flood events such as Elbe in 2002 or Rhône in 2003 have shown limits of flood management policies relying on dykes protection: worsening of flood impacts downstream, increased damage by dykes rupture. Those events, among others, contributes to radical changes on the philosophy of flood prevention, with the promotion of new orientations for mitigating flood exposition. Two new trends may have a significant impact on rural areas: floodplain restoration and vulnerability mitigation. The Rhône River program, which is an contract of objectives signed between French Government and local collectivites, is highly illustrative of these new trends and their impact on agricultural sector. In this program, it appears that areas to be concerned by floodplain restoration are agricultural ones, because their supposed vulnerability to flood is expected to be less important to urban areas. As a consequence, agricultural sector is particularly concerned by planned actions on mitigation of assets vulnerability, an important part of the program (financial support of European Union of 7.5 Million euros). Mitigation of agricultural assets vulnerability reveals particularly interesting for two following reasons. Firstly, it is a way to maintain agricultural activities in floodplains yet existing, without promoting flood protection. Secondly, in case of floodplain restoration, vulnerability mitigation is a way for local authorities to compensate over-flooding impacts. In practice, local authorities may financially support farmers for implementing measures to mitigate their farm vulnerability. On the Rhône River, an important work has already been done to identify farm vulnerability to flooding, and propose measures to mitigate it. More than 3 000 farms exposed to flood risk have been identified representing 88 690 ha of agricultural areas which is estimated to generate damage between 400 and 800 Million euros depending on the season of occurrence for a catastrophic

  19. Animal Ownership Among Vulnerable Populations in Regional South Australia: Implications for Natural Disaster Preparedness and Resilience.

    Science.gov (United States)

    Thompson, Kirrilly; Trigg, Joshua; Smith, Bradley

    Few studies have examined the prevalence of animal ownership among populations likely to be at greater risk from disaster events within a bushfire context. To investigate the proportion of vulnerable community members keeping animals and the types of animals kept, as well as perceived risk of harm to pets, and their inclusion in bushfire survival planning. Statewide anonymous online survey in 2014 of adult South Australian animal owners threatened by bushfire in January 2014. Respondents were asked about animal ownership, their bushfire risk perception, and household survival planning. Descriptive statistics are presented for 5 groups considered likely to contribute to increased risk of harm for households: linguistically diverse, older adults, families with young children, physically frail, and self-identifying disabled, as well as individuals with mental health considerations. An opt-in purposively targeted sample of anonymous South Australians living in high fire-risk locations. Adult South Australian animal owners threatened or directly impacted by bushfire events, including individuals matching 1 of the 5 vulnerable groups. Self-reported details of animal ownership, perceived fire risk, survival planning, and vulnerability characteristics. Animal ownership was found to be more prevalent in these 5 populations than in the wider South Australian population. Perceived risk to pets was low to moderately low in these individuals. Variation was observed in the role of animals generally and pets specifically as motivators for preparing bushfire survival plans. Emergency services and associated agencies need to consider how the unique needs of vulnerable populations that keep animals, and their potential differences in risk perception, relate to their bushfire survival planning and preparedness requirements.

  20. Is uniform target dose possible in IMRT plans in the head and neck?

    International Nuclear Information System (INIS)

    Vineberg, K.A.; Eisbruch, A.; Coselmon, M.M.; McShan, D.L.; Kessler, M.L.; Fraass, B.A.

    2002-01-01

    Purpose: Various published reports involving intensity-modulated radiotherapy (IMRT) plans developed using automated optimization (inverse planning) have demonstrated highly conformal plans. These reported conformal IMRT plans involve significant target dose inhomogeneity, including both overdosage and underdosage within the target volume. In this study, we demonstrate the development of optimized beamlet IMRT plans that satisfy rigorous dose homogeneity requirements for all target volumes (e.g., ±5%), while also sparing the parotids and other normal structures. Methods and Materials: The treatment plans of 15 patients with oropharyngeal cancer who were previously treated with forward-planned multisegmental IMRT were planned again using an automated optimization system developed in-house. The optimization system allows for variable sized beamlets computed using a three-dimensional convolution/superposition dose calculation and flexible cost functions derived from combinations of clinically relevant factors (costlets) that can include dose, dose-volume, and biologic model-based costlets. The current study compared optimized IMRT plans designed to treat the various planning target volumes to doses of 66, 60, and 54 Gy with varying target dose homogeneity while using a flexible optimization cost function to minimize the dose to the parotids, spinal cord, oral cavity, brainstem, submandibular nodes, and other structures. Results: In all cases, target dose uniformity was achieved through steeply varying dose-based costs. Differences in clinical plan evaluation metrics were evaluated for individual cases (eight different target homogeneity costlets), and for the entire cohort of plans. Highly conformal plans were achieved, with significant sparing of both the contralateral and ipsilateral parotid glands. As the homogeneity of the target dose distributions was allowed to decrease, increased sparing of the parotids (and other normal tissues) may be achieved. However, it

  1. Vulnerability of European freshwater catchments to climate change.

    Science.gov (United States)

    Markovic, Danijela; Carrizo, Savrina F; Kärcher, Oskar; Walz, Ariane; David, Jonathan N W

    2017-09-01

    Climate change is expected to exacerbate the current threats to freshwater ecosystems, yet multifaceted studies on the potential impacts of climate change on freshwater biodiversity at scales that inform management planning are lacking. The aim of this study was to fill this void through the development of a novel framework for assessing climate change vulnerability tailored to freshwater ecosystems. The three dimensions of climate change vulnerability are as follows: (i) exposure to climate change, (ii) sensitivity to altered environmental conditions and (iii) resilience potential. Our vulnerability framework includes 1685 freshwater species of plants, fishes, molluscs, odonates, amphibians, crayfish and turtles alongside key features within and between catchments, such as topography and connectivity. Several methodologies were used to combine these dimensions across a variety of future climate change models and scenarios. The resulting indices were overlaid to assess the vulnerability of European freshwater ecosystems at the catchment scale (18 783 catchments). The Balkan Lakes Ohrid and Prespa and Mediterranean islands emerge as most vulnerable to climate change. For the 2030s, we showed a consensus among the applied methods whereby up to 573 lake and river catchments are highly vulnerable to climate change. The anthropogenic disruption of hydrological habitat connectivity by dams is the major factor reducing climate change resilience. A gap analysis demonstrated that the current European protected area network covers climate change. Priority should be placed on enhancing stakeholder cooperation at the major basin scale towards preventing further degradation of freshwater ecosystems and maintaining connectivity among catchments. The catchments identified as most vulnerable to climate change provide preliminary targets for development of climate change conservation management and mitigation strategies. © 2017 John Wiley & Sons Ltd.

  2. Planificación familiar en mujeres en condiciones de vulnerabilidad social Family planning for women in vulnerable social

    Directory of Open Access Journals (Sweden)

    Liliana Franco Hincapié

    2011-12-01

    filhos (pIntroduction: Family planning is an essential component of primary health care and reproductive, unattended in socially vulnerable populations. Objective: To evaluate the basic knowledge about family planning and its implementation, in women of reproductive age living in poverty and vulnerability in a neighborhood of the city of Medellín, Colombia in 2010. Materials and methods: It was performed a cross sectional study, which applied a semi-structured interview to 100 women elected by open sampling. Results: The women surveyed had basic knowledge about the existence of different methods of family planning. 93% of women did not want to conceive more children, the 38.7% of these, did not plan at the time of the interview. 42% had low level of schooling relation was found between this and the number of children, where 31% of the mothers had children between 3 and 7 (p <0.001, OR: 5.8. 68% of the women were sexually active, 69.1% of these planned. 33% began sex before age 15 year old, relating to failure to use contraception, the number of children and not planning pregnancies; (p <0.02. From the women using some form of planning 82% received medical advice for their use, however only 14% belong to the family planning program. Conclusion: The level of knowledge of family planning methods is acceptable, however this is not reflected in their use. The age of first sexual intercourse early, is a determinant of vulnerability, because it is influenced by the poverty status of these women. Salud UIS 2011; 43 (3: 241-248

  3. How urban system vulnerabilities to flooding could be assessed to improve resilience and adaptation in spatial planning

    Science.gov (United States)

    Pasi, Riccardo; Viavattene, Christophe; La Loggia, Goffredo

    2016-04-01

    Natural hazards damage assets and infrastructure inducing disruptions to urban functions and key daily services. These disruptions may be short or long with a variable spatial scale of impact. From an urban planning perspective, measuring these disruptions and their consequences at an urban scale is fundamental in order to develop more resilient cities. Whereas the assessment of physical vulnerabilities and direct damages is commonly addressed, new methodologies for assessing the systemic vulnerability at the urban scale are required to reveal these disruptions and their consequences. Physical and systemic vulnerability should be measured in order to reflect the multifaceted fragility of cities in the face of external stress, both in terms of the natural/built environment and socio-economic sphere. Additionally, a systemic approach allows the consideration of vulnerability across different spatial scales, as impacts may vary and be transmitted across local, regional or national levels. Urban systems are spatially distributed and the nature of this can have significant effects on flood impacts. The proposed approach identifies the vulnerabilities of flooding within urban contexts, including both in terms of single elementary units (buildings, infrastructures, people, etc.) and systemic functioning (urban functions and daily life networks). Direct losses are appraised initially using conventional methodologies (e.g. depth-damage functions). This aims to both understand the spatial distribution of physical vulnerability and associated losses and, secondly, to identify the most vulnerable building types and ways to improve the physical adaptation of our cities, proposing changes to building codes, design principles and other municipal regulation tools. The subsequent systemic approach recognises the city as a collection of sub-systems or functional units (such as neighbourhoods and suburbs) providing key daily services for inhabitants (e.g. healthcare facilities

  4. County-level heat vulnerability of urban and rural residents in Tibet, China.

    Science.gov (United States)

    Bai, Li; Woodward, Alistair; Cirendunzhu; Liu, Qiyong

    2016-01-12

    Tibet is especially vulnerable to climate change due to the relatively rapid rise of temperature over past decades. The effects on mortality and morbidity of extreme heat in Tibet have been examined in previous studies; no heat adaptation initiatives have yet been implemented. We estimated heat vulnerability of urban and rural populations in 73 Tibetan counties and identified potential areas for public health intervention and further research. According to data availability and vulnerability factors identified previously in Tibet and elsewhere, we selected 10 variables related to advanced age, low income, illiteracy, physical and mental disability, small living spaces and living alone. We separately created and mapped county-level cumulative heat vulnerability indices for urban and rural residents by summing up factor scores produced by a principal components analysis (PCA). For both study populations, PCA yielded four factors with similar structure. The components for rural and urban residents explained 76.5 % and 77.7 % respectively of the variability in the original vulnerability variables. We found spatial variability of heat vulnerability across counties, with generally higher vulnerability in high-altitude counties. Although we observed similar median values and ranges of the cumulative heat vulnerability index values among urban and rural residents overall, the pattern varied strongly from one county to another. We have developed a measure of population vulnerability to high temperatures in Tibet. These are preliminary findings, but they may assist targeted adaptation plans in response to future rapid warming in Tibet.

  5. Vulnerability Assessment and Resiliency Planning: The National Renewable Energy Laboratory's Process and Best Practices; May 23, 2014 - June 5, 2015

    Energy Technology Data Exchange (ETDEWEB)

    Vogel, J. [Abt Environmental Research, Boulder, CO (United States); Renfrow, S. [Abt Environmental Research, Boulder, CO (United States)

    2016-02-19

    The National Renewable Energy Laboratory (NREL) is a U.S. Department of Energy (DOE) research laboratory that employs more than 2,500 people. The laboratory focuses on renewable energy and energy-efficiency research and has two campuses along the Front Range of Colorado. In 2014, NREL worked with Abt Environmental Research (then called Stratus Consulting Inc.) to develop a vulnerability assessment and resiliency action plan as part of NREL's Climate Change Resiliency and Preparedness (CCRP) project. This guide describes the process that NREL undertook during this project. NREL used a participatory approach to vulnerability assessment and resiliency planning that emphasized organizational context, building internal capacity, and the application of climate science in a practical and actionable manner.

  6. Development of a heat vulnerability index for New York State.

    Science.gov (United States)

    Nayak, S G; Shrestha, S; Kinney, P L; Ross, Z; Sheridan, S C; Pantea, C I; Hsu, W H; Muscatiello, N; Hwang, S A

    2017-12-01

    benefit from targeted interventions. The HVI will be used as a planning tool to help allocate appropriate adaptation measures like cooling centers and issue heat alerts to mitigate effects of heat in vulnerable areas. Copyright © 2017 The Authors. Published by Elsevier Ltd.. All rights reserved.

  7. Helping air quality managers identify vulnerable communities

    CSIR Research Space (South Africa)

    Wright, C

    2008-10-01

    Full Text Available population exposure and vulnerability risk prioritisation model is proposed for potential use by air quality managers in conjunction with their air quality management plans. The model includes factors such as vulnerability caused by poverty, respiratory...

  8. The Filipino male as a target audience in family planning.

    Science.gov (United States)

    Vitug, W

    1986-01-01

    Since the official launching of the Philippine Population Program in 1970, family planning campaigns have substantially addressed themselves to women. The suggestion to devote equal, if not more, attention to men as family planning targets had been raised by Dr. Mercado as early as 1971. It was not until 1978, that the deliberate inclusion of males as a target audience in family planning became a matter of policy. The Population Center Foundation (PCF), from 1979 to 1982, carried out research projects to determine the most suitable approaches and strategies to reach Filipino men. The objectives of the PCF's Male Specific Program are: 1) to test alternative schemes in promoting male family planning methods through pilot-testing of family planning clinics for men, 2) to develop teaching materials geared toward specific segments of the male population, 3) to undertake skills training in male-specific motivational approaches for program professionals, and 4) to assess the extent of the husband's role in family planning. An important finding of 1 study was that most outreach workers were female stood in the way of the motivation process, thus hampering the campaign. While the consultative motivational skills training improved knowledge, attitudes, and skills of outreach workers with regard to vasectomy and the motivation process, there were certain predispositions that were hindering the fieldworkers' effectiveness in motivating target clients. Overall, in-depth, 1-to-1 motivation in dealing with men is needed to strengthen internalization of family planning values.

  9. Memory Vulnerability Diagnosis for Binary Program

    Directory of Open Access Journals (Sweden)

    Tang Feng-Yi

    2016-01-01

    Full Text Available Vulnerability diagnosis is important for program security analysis. It is a further step to understand the vulnerability after it is detected, as well as a preparatory step for vulnerability repair or exploitation. This paper mainly analyses the inner theories of major memory vulnerabilities and the threats of them. And then suggests some methods to diagnose several types of memory vulnerabilities for the binary programs, which is a difficult task due to the lack of source code. The diagnosis methods target at buffer overflow, use after free (UAF and format string vulnerabilities. We carried out some tests on the Linux platform to validate the effectiveness of the diagnosis methods. It is proved that the methods can judge the type of the vulnerability given a binary program.

  10. Assessing Climate Vulnerabilities of Food Distribution Center Sites in Greater Boston and Their Regional Implications: Climate Adaptation Planning in Practice

    Science.gov (United States)

    Teferra, A.; Watson, C.; Douglas, E. M.

    2016-12-01

    The Metro Boston region, an area whose civic leaders have been at the forefront of climate resilience initiatives in recent years, is finalizing a flood vulnerability assessment of food distribution center sites located north of Boston, with the support of the University of Massachusetts Boston and the American Geophysical Union's Thriving Earth Exchange program. The community-scientist collaboration emerged because of the need for more local analyses of the area to inform climate resiliency policy and planning actions for the region. A significant amount of the metro region's food supply passes through two major distribution centers in the cities of Everett and Chelsea, just north of the Mystic River. The Metropolitan Area Planning Council (MAPC), on behalf of the Metro Boston Climate Preparedness Taskforce, is working with Chris Watson and Ellen Douglas of UMass Boston to build on existing analyses of the region's food system and climate vulnerabilities and to develop a report identifying flood risk exposure to the sites. The analysis brings in dynamic modeling techniques that incorporate storm surge and sea level rise projections under different climate scenarios, and aims to align methodologies with those of other regional analyses, such as Climate Ready Boston and the City of Cambridge's Vulnerability Assessment. The study is helping to inform MAPC's and the Metro Boston Climate Preparedness Taskforce's understanding of this critical food distribution infrastructure, illustrate the larger regional implications of climate impacts on food distribution in the Greater Boston area, and guide the development of site-specific strategies for addressing identified vulnerabilities.

  11. A conceptual framework towards more holistic freshwater conservation planning through incorporation of stream connectivity and thermal vulnerability

    Science.gov (United States)

    Ramulifho, P. A.; Rivers-Moore, N. A.; Dallas, H. F.; Foord, S. H.

    2018-01-01

    The thermal regime of rivers plays an important role in the overall health and composition of aquatic ecosystems, and together with flow, is recognised as one of the most influential abiotic drivers of aquatic ecosystem processes affecting species distribution. Changes in thermal conditions in aquatic systems are driven by on-going human-induced climate change, hydrological, regional and structural factors. Here, we quantified the impact of instream impoundments on the natural longitudinal connectivity and estimated thermal vulnerability of catchments based on the functional relationship between changing temperature and the profile gradient of rivers in the eastern portion of South Africa. We identified catchments that are most vulnerable to thermal stress based on cold-water adapted species' tolerance to thermal changes. More than half of all studied catchments include rivers that are relatively intact longitudinally, with notable exceptions being rivers in the central portion of the study area. Thermal condition of high elevation sites is more heavily impacted by impoundments and consequently thermal vulnerability of these sites are higher. Blephariceridae and Notonemouridae, the most thermophobic families, are likely to become locally threatened or extinct, in the absence of connectivity. The quantification of stream connectivity and vulnerability of organisms to thermal changes in river systems are important decision making tools for effective adaptive and holistic conservation planning strategies.

  12. INSPTRAX - The Inspection Targeting, Planning and Tracking Database

    Data.gov (United States)

    U.S. Environmental Protection Agency — The INSPTRAX System tracks Air, RCRA, and Water inspection targeting, planning and tracking information. It is used by the the Air, RCRA, and Water programs to input...

  13. Terminological Ontologies for Risk and Vulnerability Analysis

    DEFF Research Database (Denmark)

    Madsen, Bodil Nistrup; Erdman Thomsen, Hanne

    2014-01-01

    Risk and vulnerability analyses are an important preliminary stage in civil contingency planning. The Danish Emergency Management Agency has developed a generic model and a set of tools that may be used in the preparedness planning, i.e. for identifying and describing society’s critical functions......, for formulating threat scenarios and for assessing consequences. Terminological ontologies, which are systems of domain specific concepts comprising concept relations and characteristics, are useful, both when describing the central concepts of risk and vulnerability analysis (meta concepts), and for further...

  14. Assessing socioeconomic vulnerability to dengue fever in Cali, Colombia: statistical vs expert-based modeling.

    Science.gov (United States)

    Hagenlocher, Michael; Delmelle, Eric; Casas, Irene; Kienberger, Stefan

    2013-08-14

    As a result of changes in climatic conditions and greater resistance to insecticides, many regions across the globe, including Colombia, have been facing a resurgence of vector-borne diseases, and dengue fever in particular. Timely information on both (1) the spatial distribution of the disease, and (2) prevailing vulnerabilities of the population are needed to adequately plan targeted preventive intervention. We propose a methodology for the spatial assessment of current socioeconomic vulnerabilities to dengue fever in Cali, a tropical urban environment of Colombia. Based on a set of socioeconomic and demographic indicators derived from census data and ancillary geospatial datasets, we develop a spatial approach for both expert-based and purely statistical-based modeling of current vulnerability levels across 340 neighborhoods of the city using a Geographic Information System (GIS). The results of both approaches are comparatively evaluated by means of spatial statistics. A web-based approach is proposed to facilitate the visualization and the dissemination of the output vulnerability index to the community. The statistical and the expert-based modeling approach exhibit a high concordance, globally, and spatially. The expert-based approach indicates a slightly higher vulnerability mean (0.53) and vulnerability median (0.56) across all neighborhoods, compared to the purely statistical approach (mean = 0.48; median = 0.49). Both approaches reveal that high values of vulnerability tend to cluster in the eastern, north-eastern, and western part of the city. These are poor neighborhoods with high percentages of young (i.e., local expertise, statistical approaches could be used, with caution. By decomposing identified vulnerability "hotspots" into their underlying factors, our approach provides valuable information on both (1) the location of neighborhoods, and (2) vulnerability factors that should be given priority in the context of targeted intervention

  15. Aren't we all vulnerable: why do vulnerability analysis?

    Energy Technology Data Exchange (ETDEWEB)

    Moench, Marcus

    2011-11-15

    The idea of 'vulnerability' is widely-used shorthand for the disproportionate impacts that climate change will have on high-risk groups and fragile ecosystems. Decision makers increasingly want to target adaptation funding to those people and environments most affected by climate change. They must also be able to monitor the effectiveness of their investments. Vulnerability analysis is sometimes presented as the solution to these wants and needs — but existing approaches are often of little use: at best, they reiterate what we already know; at worst, they are used to justify entrenched agendas. To be truly useful as a basis for dialogue, action and accountability, the meaning of 'vulnerability' must be clarified and the methods for analysing it greatly strengthened. This means establishing standard, replicable approaches that differentiate between the roles and exposure of stakeholders, systems and institutions.

  16. Assessing socioeconomic vulnerability to dengue fever in Cali, Colombia: statistical vs expert-based modeling

    OpenAIRE

    Hagenlocher, Michael; Delmelle, Eric; Casas, Irene; Kienberger, Stefan

    2013-01-01

    Background As a result of changes in climatic conditions and greater resistance to insecticides, many regions across the globe, including Colombia, have been facing a resurgence of vector-borne diseases, and dengue fever in particular. Timely information on both (1) the spatial distribution of the disease, and (2) prevailing vulnerabilities of the population are needed to adequately plan targeted preventive intervention. We propose a methodology for the spatial assessment of current socioecon...

  17. Chemical and radiological vulnerability assessment in urban areas

    Directory of Open Access Journals (Sweden)

    Stojanović Božidar

    2006-01-01

    Full Text Available Cities and towns are faced with various types of threat from the extraordinary events involving chemical and radiological materials as exemplified by major chemical accidents, radiological incidents, fires, explosions, traffic accidents, terrorist attacks, etc. On the other hand, many sensitive or vulnerable assets exist within cities, such as: settlements, infrastructures, hospitals, schools, churches, businesses, government, and others. Besides emergency planning, the land use planning also represents an important tool for prevention or reduction of damages on people and other assets due to unwanted events. This paper considers development of method for inclusion vulnerability assessment in land use planning with objective to assess and limit the consequences in cities of likely accidents involving hazardous materials. We made preliminary assessment of criticality and vulnerability of the assets within Belgrade city area in respect to chemical sites and transportation roads that can be exposed to chemical accidents, or terrorist attacks.

  18. Economic vulnerability of timber resources to forest fires.

    Science.gov (United States)

    y Silva, Francisco Rodríguez; Molina, Juan Ramón; González-Cabán, Armando; Machuca, Miguel Ángel Herrera

    2012-06-15

    The temporal-spatial planning of activities for a territorial fire management program requires knowing the value of forest ecosystems. In this paper we extend to and apply the economic valuation principle to the concept of economic vulnerability and present a methodology for the economic valuation of the forest production ecosystems. The forest vulnerability is analyzed from criteria intrinsically associated to the forest characterization, and to the potential behavior of surface fires. Integrating a mapping process of fire potential and analytical valuation algorithms facilitates the implementation of fire prevention planning. The availability of cartography of economic vulnerability of the forest ecosystems is fundamental for budget optimization, and to help in the decision making process. Published by Elsevier Ltd.

  19. Air pollution and vulnerability: solving the puzzle of prioritization

    CSIR Research Space (South Africa)

    Wright, CY

    2011-01-01

    Full Text Available conditions exacerbates the problem. Air quality management plans identify prioritized strategies for improved air quality independent of consideration of vulnerability. A population exposure and vulnerability risk prioritization framework comprising five...

  20. Setting Ambitious yet Achievable Targets Using Probabilistic Projections: Meeting Demand for Family Planning.

    Science.gov (United States)

    Kantorová, Vladimíra; New, Jin Rou; Biddlecom, Ann; Alkema, Leontine

    2017-09-01

    In 2015, governments adopted 17 internationally agreed goals to ensure progress and well-being in the economic, social, and environmental dimensions of sustainable development. These new goals present a challenge for countries to set empirical targets that are ambitious yet achievable and that can account for different starting points and rates of progress. We used probabilistic projections of family planning indicators, based on a global data set and Bayesian hierarchical modeling, to generate illustrative targets at the country level. Targets were defined as the percentage of demand for family planning satisfied with modern contraceptive methods where a country has at least a 10 percent chance of reaching the target by 2030. National targets for 2030 ranged from below 50 percent of demand satisfied with modern contraceptives (for three countries in Africa) to above 90 percent (for 41 countries from all major areas of the world). The probabilistic approach also identified countries for which a global fixed target value of 75 percent demand satisfied was either unambitious or has little chance of achievement. We present the web-based Family Planning Estimation Tool (FPET) enabling national decision makers to compute and assess targets for meeting family planning demand. © 2017 The Population Council, Inc.

  1. Planning Study Comparison of Real-Time Target Tracking and Four-Dimensional Inverse Planning for Managing Patient Respiratory Motion

    International Nuclear Information System (INIS)

    Zhang Peng; Hugo, Geoffrey D.; Yan Di

    2008-01-01

    Purpose: Real-time target tracking (RT-TT) and four-dimensional inverse planning (4D-IP) are two potential methods to manage respiratory target motion. In this study, we evaluated each method using the cumulative dose-volume criteria in lung cancer radiotherapy. Methods and Materials: Respiration-correlated computed tomography scans were acquired for 4 patients. Deformable image registration was applied to generate a displacement mapping for each phase image of the respiration-correlated computed tomography images. First, the dose distribution for the organs of interest obtained from an idealized RT-TT technique was evaluated, assuming perfect knowledge of organ motion and beam tracking. Inverse planning was performed on each phase image separately. The treatment dose to the organs of interest was then accumulated from the optimized plans. Second, 4D-IP was performed using the probability density function of respiratory motion. The beam arrangement, prescription dose, and objectives were consistent in both planning methods. The dose-volume and equivalent uniform dose in the target volume, lung, heart, and spinal cord were used for the evaluation. Results: The cumulative dose in the target was similar for both techniques. The equivalent uniform dose of the lung, heart, and spinal cord was 4.6 ± 2.2, 11 ± 4.4, and 11 ± 6.6 Gy for RT-TT with a 0-mm target margin, 5.2 ± 3.1, 12 ± 5.9, and 12 ± 7.8 Gy for RT-TT with a 2-mm target margin, and 5.3 ± 2.3, 11.9 ± 5.0, and 12 ± 5.6 Gy for 4D-IP, respectively. Conclusion: The results of our study have shown that 4D-IP can achieve plans similar to those achieved by RT-TT. Considering clinical implementation, 4D-IP could be a more reliable and practical method to manage patient respiration-induced motion

  2. VULNERABILITIES, TERRORIST AND BIOTERRORIST THREATS AND RISKS

    Directory of Open Access Journals (Sweden)

    Viorel ORDEANUL

    2014-12-01

    Full Text Available The contemporary society has been, is and will probably be dominated "urbi et orbi " (everywhere and for everybody by conflicts expressed through violence, social confrontations, permissiveness, authority collapse, collapse of moral norms. Paradoxically, although it is spoken and written much about terrorism and terrorists, there is still no complete and accepted definition of these terms, and the legal classification is approximate. The analysis of threats is an extremely important decisional asset when setting up plans of direct protection or objective security strategies or institutions suitable to become targets of violent actions, but today's intelligence community has not yet established a clear set of procedures and principles that constitute the expert main frame for a comprehensive analysis of threats and vulnerabilities.

  3. Vulnerability effects of passengers' intermodal transfer distance preference and subway expansion on complementary urban public transportation systems

    International Nuclear Information System (INIS)

    Hong, Liu; Yan, Yongze; Ouyang, Min; Tian, Hui; He, Xiaozheng

    2017-01-01

    The vulnerability studies on urban public transportation systems have attracted growing attentions in recent years, due to their important role in the economy development of a city and the well-beings of its citizens. This paper proposes a vulnerability model of complementary urban public transportation systems (CUPTSs) composed of bus systems and subway systems, with the consideration of passengers’ intermodal transfer distance preference (PITDP) to capture different levels of complementary strength between the two systems. Based on the model, this paper further introduces a CUPTSs-aimed vulnerability analysis method from two specific aspects: (a) vulnerability effects of different PITDP values, which facilitate the design of policies to change PITDP to reduce system vulnerability; (b) vulnerability effects of different subway expansion plans, which facilitate the vulnerability investigation of current expansion plan and the identification of the optimal expansion plan from the system vulnerability perspective. The proposed CUPTSs-aimed vulnerability analysis method is applied to investigate the complementary bus and subway systems in the city of Wuhan, China. The insights from this study are helpful to analyze other CUPTSs for valuable planning suggestions from the vulnerability perspective. - Highlights: • We model complementary urban public transportation systems’ (CUPTSs) vulnerability. • We use a PITDP metric to capture different levels of complementary relationship. • We study vulnerability under different PITDP and different subway expansion plans. • We analyze dynamic vulnerability of CUPTSs during their expansion process.

  4. The Application of WebGIS Tools for Visualizing Coastal Flooding Vulnerability and Planning for Resiliency: The New Jersey Experience

    Directory of Open Access Journals (Sweden)

    Richard Lathrop

    2014-03-01

    Full Text Available While sea level rise is a world-wide phenomenon, mitigating its impacts is a local decision-making challenge that is going to require site-specific remedies. Faced with a variety of conflicting mandates and uncertainty as to appropriate responses, local land use planners and managers need place-based decision support tools. With the increasing availability of high-resolution digital elevation models and the advancing speed and sophistication of web-based mapping, a number of web geographic information systems (GIS tools have been developed to map and visualize what areas of a coastal landscape will potentially be flooded under different scenarios of sea level rise. This paper presents a case study of one such WebGIS application, NJFloodMapper (www.NJFloodMapper.org, with a focus on the user-centered design process employed to help our target audience of coastal decision-makers in the state of New Jersey, USA, access and understand relevant geographic information concerning sea level rise and exposure to coastal inundation, as well as assess the vulnerability of key infrastructure, populations and natural resources within their communities. We discuss the success of this approach amidst the broader context of the application of WebGIS tools in this arena. Due to its flexible design and user-friendly interface, NJFloodMapper has been widely adopted by government and non-governmental agencies in the state to assess coastal flooding exposure and vulnerability in the aftermath of a recent destructive coastal storm. However, additional decision support tools are needed to help coastal decision-makers translate the place-based information into concrete action plans aimed at promoting more resilient coastal land use decisions.

  5. Urban Labelling: Resilience and Vulnerability as Key Concepts for a Sustainable Planning

    Directory of Open Access Journals (Sweden)

    Giuseppe Mazzeo

    2014-05-01

    Full Text Available Planning and implementation of sustainable urban neighborhoods has led in Europe and in other countries to the development of some recognized best practices. Each of these cases has followed specific aims and methodologies but it is still far the systematization of the results and the translation of the good practices into action lines.  The paper involves the necessity of new tools for local planning directed to the overall sustainability of the city. Sustainable energy, reduction of the climate-change causes, waste reduction, attention to water resources and to the natural ones are specific operational elements. A possible way to face this challenge is to consider the potentialities of executive plans addressed to increase the sustainability of urban areas starting from limited portions of they. These plans should foresee the minimum impact of volumes and functions to be set up, will provide for the realization of public spaces with zero or almost zero impact, will promote the integration of all the technologies to reduce consumption and encourage energy generation, in order to increase the resilience of the city reducing its vulnerability.  On this basis, aim of the paper is to deepen the issue of the measure of the expected results. To this purpose it is necessary to structure a new certification system (Urban Labelling that can be able to assign a specific sustainability level to a plan using both traditional and new indexes. The same system can also be applied to existing urban areas and as a basis for evaluating reward operations. The impact of the new tool will be cultural (to switch by a description to the facts in relation to urban sustainability, economic (to involve the supply chain from design, implementation, and urban transformation and technological (the sustainability of urban areas requires the use of advanced technologies not only for the buildings but also in the control of green areas, public spaces and mobility.

  6. Dosimetric effects of rotational output variation and x-ray target degradation on helical tomotherapy plans

    International Nuclear Information System (INIS)

    Staton, Robert J.; Langen, Katja M.; Kupelian, Patrick A.; Meeks, Sanford L.

    2009-01-01

    In this study, two potential sources of IMRT delivery error have been identified for helical tomotherapy delivery using the HiART system (TomoTherapy, Inc., Madison, WI): Rotational output variation and target degradation. The HiArt system is known to have output variation, typically about ±2%, due to the absence of a dose servo system. On the HiArt system, x-ray target replacement is required approximately every 10-12 months due to target degradation. Near the end of target life, the target thins and causes a decrease in the beam energy and a softening of the beam profile at the lateral edges of the beam. The purpose of this study is to evaluate the dosimetric effects of rotational output variation and target degradation by modeling their effects and incorporating them into recalculated treatment plans for three clinical scenarios: Head and neck, partial breast, and prostate. Models were created to emulate both potential sources of error. For output variation, a model was created using a sine function to match the amplitude (±2%), frequency, and phase of the measured rotational output variation data. A second model with a hypothetical variation of ±7% was also created to represent the largest variation that could exist without violating the allowable dose window in the delivery system. A measured beam profile near the end of target life was used to create a modified beam profile model for the target degradation. These models were then incorporated into the treatment plan by modifying the leaf opening times in the delivery sinogram. A new beam model was also created to mimic the change in beam energy seen near the end of target life. The plans were then calculated using a research version of the PLANNED ADAPTIVE treatment planning software from TomoTherapy, Inc. Three plans were evaluated in this study: Head and neck, partial breast, and prostate. The D 50 of organs at risk, the D 95 for planning target volumes (PTVs), and the local dose difference were used to

  7. Assessment of food fraud vulnerability in the spices chain

    NARCIS (Netherlands)

    Silvis, I.C.J.; Ruth, van S.M.; Fels, van der Ine; Luning, P.A.

    2017-01-01

    Recent scandals have increased the need to strengthen companies’ ability to combat fraud within their own organizations and across their supply chain. Vulnerability assessments are a first step towards the inventory of fraud vulnerability and fraud mitigation plans. Spices are reported frequently

  8. National Ignition Facility Cryogenic Target Systems Interim Management Plan

    International Nuclear Information System (INIS)

    Warner, B

    2002-01-01

    Restricted availability of funding has had an adverse impact, unforeseen at the time of the original decision to projectize the National Ignition Facility (NIF) Cryogenic Target Handling Systems (NCTS) Program, on the planning and initiation of these efforts. The purpose of this document is to provide an interim project management plan describing the organizational structure and management processes currently in place for NCTS. Preparation of a Program Execution Plan (PEP) for NCTS has been initiated, and a current draft is provided as Attachment 1 to this document. The National Ignition Facility is a multi-megajoule laser facility being constructed at Lawrence Livermore National Laboratory (LLNL) by the National Nuclear Security Administration (NNSA) in the Department of Energy (DOE). Its primary mission is to support the Stockpile Stewardship Program (SSP) by performing experiments studying weapons physics, including fusion ignition. NIF also supports the missions of weapons effects, inertial fusion energy, and basic science in high-energy-density physics. NIF will be operated by LLNL under contract to the University of California (UC) as a national user facility. NIF is a low-hazard, radiological facility, and its operation will meet all applicable federal, state, and local Environmental Safety and Health (ES and H) requirements. The NCTS Interim Management Plan provides a summary of primary design criteria and functional requirements, current organizational structure, tracking and reporting procedures, and current planning estimates of project scope, cost, and schedule. The NIF Director controls the NIF Cryogenic Target Systems Interim Management Plan. Overall scope content and execution schedules for the High Energy Density Physics Campaign (SSP Campaign 10) are currently undergoing rebaselining and will be brought into alignment with resources expected to be available throughout the NNSA Future Years National Security Plan (FYNSP). The revised schedule for

  9. Economic vulnerability of timber resources to forest fires

    Science.gov (United States)

    Francisco Rodriguez y Silva; Juan Ramon Molina; Armando Gonzalez-Caban; Miguel Angel Herrera Machuca

    2012-01-01

    The temporal-spatial planning of activities for a territorial fire management program requires knowing the value of forest ecosystems. In this paper we extend to and apply the economic valuation principle to the concept of economic vulnerability and present a methodology for the economic valuation of the forest production ecosystems. The forest vulnerability is...

  10. Kinome-wide transcriptional profiling of uveal melanoma reveals new vulnerabilities to targeted therapeutics.

    Science.gov (United States)

    Bailey, Fiona P; Clarke, Kim; Kalirai, Helen; Kenyani, Jenna; Shahidipour, Haleh; Falciani, Francesco; Coulson, Judy M; Sacco, Joseph J; Coupland, Sarah E; Eyers, Patrick A

    2018-03-01

    Metastatic uveal melanoma (UM) is invariably fatal, usually within a year of diagnosis. There are currently no effective therapies, and clinical studies employing kinase inhibitors have so far demonstrated limited success. This is despite common activating mutations in GNAQ/11 genes, which trigger signalling pathways that might predispose tumours to a variety of targeted drugs. In this study, we have profiled kinome expression network dynamics in various human ocular melanomas. We uncovered a shared transcriptional profile in human primary UM samples and across a variety of experimental cell-based models. The poor overall response of UM cells to FDA-approved kinase inhibitors contrasted with much higher sensitivity to the bromodomain inhibitor JQ1, a broad transcriptional repressor. Mechanistically, we identified a repressed FOXM1-dependent kinase subnetwork in JQ1-exposed cells that contained multiple cell cycle-regulated protein kinases. Consistently, we demonstrated vulnerability of UM cells to inhibitors of mitotic protein kinases within this network, including the investigational PLK1 inhibitor BI6727. We conclude that analysis of kinome-wide signalling network dynamics has the potential to reveal actionable drug targets and inhibitors of potential therapeutic benefit for UM patients. © 2017 The Authors. Pigment Cell & Melanoma Research Published by John Wiley & Sons.

  11. Flow-based vulnerability measures for network component importance: Experimentation with preparedness planning

    International Nuclear Information System (INIS)

    Nicholson, Charles D.; Barker, Kash; Ramirez-Marquez, Jose E.

    2016-01-01

    This work develops and compares several flow-based vulnerability measures to prioritize important network edges for the implementation of preparedness options. These network vulnerability measures quantify different characteristics and perspectives on enabling maximum flow, creating bottlenecks, and partitioning into cutsets, among others. The efficacy of these vulnerability measures to motivate preparedness options against experimental geographically located disruption simulations is measured. Results suggest that a weighted flow capacity rate, which accounts for both (i) the contribution of an edge to maximum network flow and (ii) the extent to which the edge is a bottleneck in the network, shows most promise across four instances of varying network sizes and densities. - Highlights: • We develop new flow-based measures of network vulnerability. • We apply these measures to determine the importance of edges after disruptions. • Networks of varying size and density are explored.

  12. Dosimetric consequences of the shift towards computed tomography guided target definition and planning for breast conserving radiotherapy

    Directory of Open Access Journals (Sweden)

    Korevaar Erik W

    2008-01-01

    Full Text Available Abstract Background The shift from conventional two-dimensional (2D to three-dimensional (3D-conformal target definition and dose-planning seems to have introduced volumetric as well as geometric changes. The purpose of this study was to compare coverage of computed tomography (CT-based breast and boost planning target volumes (PTV, absolute volumes irradiated, and dose delivered to the organs at risk with conventional 2D and 3D-conformal breast conserving radiotherapy. Methods Twenty-five patients with left-sided breast cancer were subject of CT-guided target definition and 3D-conformal dose-planning, and conventionally defined target volumes and treatment plans were reconstructed on the planning CT. Accumulated dose-distributions were calculated for the conventional and 3D-conformal dose-plans, taking into account a prescribed dose of 50 Gy for the breast plans and 16 Gy for the boost plans. Results With conventional treatment plans, CT-based breast and boost PTVs received the intended dose in 78% and 32% of the patients, respectively, and smaller volumes received the prescribed breast and boost doses compared with 3D-conformal dose-planning. The mean lung dose, the volume of the lungs receiving > 20 Gy, the mean heart dose, and volume of the heart receiving > 30 Gy were significantly less with conventional treatment plans. Specific areas within the breast and boost PTVs systematically received a lower than intended dose with conventional treatment plans. Conclusion The shift towards CT-guided target definition and planning as the golden standard for breast conserving radiotherapy has resulted in improved target coverage at the cost of larger irradiated volumes and an increased dose delivered to organs at risk. Tissue is now included into the breast and boost target volumes that was never explicitly defined or included with conventional treatment. Therefore, a coherent definition of the breast and boost target volumes is needed, based on

  13. Dosimetric consequences of the shift towards computed tomography guided target definition and planning for breast conserving radiotherapy

    International Nuclear Information System (INIS)

    Laan, Hans Paul van der; Dolsma, Wil V; Maduro, John H; Korevaar, Erik W; Langendijk, Johannes A

    2008-01-01

    The shift from conventional two-dimensional (2D) to three-dimensional (3D)-conformal target definition and dose-planning seems to have introduced volumetric as well as geometric changes. The purpose of this study was to compare coverage of computed tomography (CT)-based breast and boost planning target volumes (PTV), absolute volumes irradiated, and dose delivered to the organs at risk with conventional 2D and 3D-conformal breast conserving radiotherapy. Twenty-five patients with left-sided breast cancer were subject of CT-guided target definition and 3D-conformal dose-planning, and conventionally defined target volumes and treatment plans were reconstructed on the planning CT. Accumulated dose-distributions were calculated for the conventional and 3D-conformal dose-plans, taking into account a prescribed dose of 50 Gy for the breast plans and 16 Gy for the boost plans. With conventional treatment plans, CT-based breast and boost PTVs received the intended dose in 78% and 32% of the patients, respectively, and smaller volumes received the prescribed breast and boost doses compared with 3D-conformal dose-planning. The mean lung dose, the volume of the lungs receiving > 20 Gy, the mean heart dose, and volume of the heart receiving > 30 Gy were significantly less with conventional treatment plans. Specific areas within the breast and boost PTVs systematically received a lower than intended dose with conventional treatment plans. The shift towards CT-guided target definition and planning as the golden standard for breast conserving radiotherapy has resulted in improved target coverage at the cost of larger irradiated volumes and an increased dose delivered to organs at risk. Tissue is now included into the breast and boost target volumes that was never explicitly defined or included with conventional treatment. Therefore, a coherent definition of the breast and boost target volumes is needed, based on clinical data confirming tumour control probability and normal

  14. Risk management and the vulnerability assessment process of the United States Department of Energy

    International Nuclear Information System (INIS)

    Rivers, J.D.; Johnson, O.B.; Callahan, S.N.

    2001-01-01

    Full text: Risk management is an essential element in influencing how the United States Department of Energy's safeguards and security mission is executed. Risk management exists as a function of a target's attractiveness, along with the potential consequences associated with the unauthorized use of that target. The goal of risk management encompasses the fielding and operating of appropriate, cost-effective protection systems generating sufficient deterrence to protect sensitive programs and facilities. Risk mitigation and risk prevention are accomplished through the vulnerability assessment process. The implementation and continued validation of measures to prevent or mitigate risk to acceptable levels constitute the fundamental approach of the Department's risk management program. Due to the incomplete knowledge inherent in any threat definition, it is impossible to precisely tailor a protective system to defend against all threats. The challenge presented to safeguards and security program managers lies in developing systems sufficiently effective to defend against an array of threats slightly greater than can be hypothetically postulated (the design basis threat amended for local conditions). These systems are then balanced against technological, resource, and fiscal constraints. A key element in the risk assessment process is analyzing the security systems against the Design Basis Threat (DBT). The DBT is used to define the level and capability of the threat against the DOE facilities and their assets. In particular it defines motivation, numbers of adversaries, capabilities, and their objectives. Site Safeguards and Security Plans (SSSPs) provide the basis and justification for safeguards and security program development, budget, and staffing requirements. The SSSP process examines, describes, and documents safeguards and security programs, site-wide and by facility; establishes safeguards and security program improvement priorities; describes site and

  15. Urban Vulnerability Assessment Using AHP

    Directory of Open Access Journals (Sweden)

    Alireza Rezaei

    2018-01-01

    Full Text Available Purpose. Physical expansion of urban areas and cities is of great importance nowadays. Irreparable damages will thus be caused by lack of proper planning against natural disasters. Crisis management will therefore guide through prevention, preparedness, disaster relief, and recovery by planning an appropriate program. Methodology. Principal processes of crisis management against earthquake in Iran were evaluated and discussed. Multicriteria earthquake crisis management was then proposed by means of Analytic Hierarchy Process (AHP. Vulnerability of 19 urban areas in Qazvin city was studied and analyzed as a case study. Three main criteria were considered as “physical dimensions and physical vulnerability texture,” “the amount of urban texture responsibility to aid after crisis,” and “possibility of city reversibility after the crisis.” These criteria were divided into 20 subcriteria which were prioritized by a questionnaire survey. Findings. “High population density,” “urban texture of old and repairable buildings,” “lack of relief and medical services,” “a few organic texture areas,” “sidewalks with less than 6 meters width in the region,” and “lack of open spaces in the area” were concluded to be the most important reasons causing high vulnerability of urban texture in Qazvin city.

  16. The SAVI vulnerability assessment model

    International Nuclear Information System (INIS)

    Winblad, A.E.

    1987-01-01

    The assessment model ''Systematic Analysis of Vulnerability to Intrusion'' (SAVI) presented in this report is a PC-based path analysis model. It can provide estimates of protection system effectiveness (or vulnerability) against a spectrum of outsider threats including collusion with an insider adversary. It calculates one measure of system effectiveness, the probability of interruption P(I), for all potential adversary paths. SAVI can perform both theft and sabotage vulnerability analyses. For theft, the analysis is based on the assumption that adversaries should be interrupted either before they can accomplish removal of the target material from its normal location or removal from the site boundary. For sabotage, the analysis is based on the assumption that adversaries should be interrupted before completion of their sabotage task

  17. Perspectives on social vulnerability and ways to improve community resilience

    Directory of Open Access Journals (Sweden)

    Chicoș Alina

    2017-06-01

    Full Text Available Scientific recognition of the resilience concept is becoming compelling in extending the way contemporary spatial systems are analysed as well as in defining a new approach in establishing spatial planning principles and policies. In this view, our study emphasises the issue of spatial development in areas prone to earthquakes, floods and landslides. Therefore, resilience requires the assessment of vulnerable spatial components. Local governance interventions are more or less focused on risk management measures. Moreover, building safer communities through risk governance relies on different variables. Making a distinction between risk components and the predictors of increased resilience could shed light on the local decision-making process. In this paper, vulnerability addresses the lack of safety in terms of individual, household and community wellbeing when the issue of environmental restrictions emerge. In order to reduce the vulnerability of communities living in natural risk prone areas, spatial planning often turns to interdisciplinary analysis methods that allow an in-depth perspective on the interplay between social and natural elements. As such, spatial planning stands as the first step in reducing social vulnerability and should approach the less explored advantages of participatory mapping and local knowledge systems.

  18. Multi-dimensional flood vulnerability assessment using data envelopment analysis

    Science.gov (United States)

    Zahid, Zalina; Saharizan, Nurul Syuhada; Hamzah, Paezah; Hussin, Siti Aida Sheikh; Khairi, Siti Shaliza Mohd

    2017-11-01

    Malaysia has been greatly impacted by flood during monsoon seasons. Even though flood prone areas are well identified, assessment on the vulnerability of the disaster is lacking. Assessment of flood vulnerability, defined as the potential for loss when a disaster occurs, is addressed in this paper. The focus is on the development of flood vulnerability measurement in 11 states in Peninsular Malaysia using a non-parametric approach of Data Envelopment Analysis. Scores for three dimensions of flood vulnerability (Population Vulnerability, Social Vulnerability and Biophysical) were calculated using secondary data of selected input and output variables across an 11-year period from 2004 to 2014. The results showed that Johor and Pahang were the most vulnerable to flood in terms of Population Vulnerability, followed by Kelantan, the most vulnerable to flood in terms of Social Vulnerability and Kedah, Pahang and Terengganu were the most vulnerable to flood in terms of Biophysical Vulnerability among the eleven states. The results also showed that the state of Johor, Pahang and Kelantan to be most vulnerable across the three dimensions. Flood vulnerability assessment is important as it provides invaluable information that will allow the authority to identify and develop plans for flood mitigation and to reduce the vulnerability of flood at the affected regions.

  19. Risk evaluation system for facility safeguards and security planning

    International Nuclear Information System (INIS)

    Udell, C.J.; Carlson, R.L.

    1987-01-01

    The Risk Evaluation System (RES) is an integrated approach to determining safeguards and security effectiveness and risk. RES combines the planning and technical analysis into a format that promotes an orderly development of protection strategies, planning assumptions, facility targets, vulnerability and risk determination, enhancement planning, and implementation. In addition, the RES computer database program enhances the capability of the analyst to perform a risk evaluation of the facility. The computer database is menu driven using data input screens and contains an algorithm for determining the probability of adversary defeat and risk. Also, base case and adjusted risk data records can be maintained and accessed easily

  20. Optimized Planning Target Volume for Intact Cervical Cancer

    International Nuclear Information System (INIS)

    Khan, Alvin; Jensen, Lindsay G.; Sun Shuai; Song, William Y.; Yashar, Catheryn M.; Mundt, Arno J.; Zhang Fuquan; Jiang, Steve B.; Mell, Loren K.

    2012-01-01

    Purpose: To model interfraction clinical target volume (CTV) variation in patients with intact cervical cancer and design a planning target volume (PTV) that minimizes normal tissue dose while maximizing CTV coverage. Methods and Materials: We analyzed 50 patients undergoing external-beam radiotherapy for intact cervical cancer using daily online cone-beam computed tomography (CBCT). The CBCTs (n = 972) for each patient were rigidly registered to the planning CT. The CTV was delineated on the planning CT (CTV 0 ) and the set of CBCTs ({CTV 1 –CTV 25 }). Manual (n = 98) and automated (n = 668) landmarks were placed over the surface of CTV 0 with reference to defined anatomic structures. Normal vectors were extended from each landmark, and the minimum length required for a given probability of encompassing CTV 1 –CTV 25 was computed. The resulting expansions were used to generate an optimized PTV. Results: The mean (SD; range) normal vector length to ensure 95% coverage was 4.3 mm (2.7 mm; 1–16 mm). The uniform expansion required to ensure 95% probability of CTV coverage was 13 mm. An anisotropic margin of 20 mm anteriorly and posteriorly and 10 mm superiorly, inferiorly, and laterally also would have ensured a 95% probability of CTV coverage. The volume of the 95% optimized PTV (1470 cm 3 ) was significantly lower than both the anisotropic PTV (2220 cm 3 ) and the uniformly expanded PTV (2110 cm 3 ) (p 0 , 5–10 mm along the interfaces of CTV 0 with the bladder and rectum, and 10–14 mm along the anterior surface of CTV 0 at the level of the uterus. Conclusion: Optimizing PTV definition according to surface landmarking resulted in a high probability of CTV coverage with reduced PTV volumes. Our results provide data justifying planning margins to use in practice and clinical trials.

  1. Spatial vulnerability of Australian urban populations to extreme heat events

    Science.gov (United States)

    Loughnan, Margaret; Tapper, Nigel; Phan, Thu; Lynch, Kellie; McInnes, Judith

    2013-04-01

    Extreme heat events pose a risk to the health of all individuals, especially the elderly and the chronically ill, and are associated with an increased demand for healthcare services. In order to address this problem, policy makers' need information about temperatures above which mortality and morbidity of the exposed population is likely to increase, where the vulnerable groups in the community are located, and how the risks from extreme heat events are likely to change in the future. This study identified threshold temperatures for all Australian capital cities, developed a spatial index of population vulnerability, and used climate model output to predict changes in the number of days exceeding temperature thresholds in the future, as well as changes in risk related to changes in urban density and an ageing population. The study has shown that daily maximum and minimum temperatures from the Bureau of Meteorology forecasts can be used to calculate temperature thresholds for heat alert days. The key risk factors related to adverse health outcomes were found to be areas with intense urban heat islands, areas with higher proportions of older people, and areas with ethnic communities. Maps of spatial vulnerability have been developed to provide information to assist emergency managers, healthcare professionals, and ancillary services develop heatwave preparedness plans at a local scale that target vulnerable groups and address heat-related health risks. The numbers of days exceeding current heat thresholds are predicted to increase over the next 20 to 40 years in all Australian capital cities.

  2. Poster - 36: Effect of Planning Target Volume Coverage on the Dose Delivered in Lung Radiotherapy

    Energy Technology Data Exchange (ETDEWEB)

    Dekker, Chris; Wierzbicki, Marcin [McMaster University, Juravinski Cancer Centre (Canada)

    2016-08-15

    Purpose: In lung radiotherapy, breathing motion may be encompassed by contouring the internal target volume (ITV). Remaining uncertainties are included in a geometrical expansion to the planning target volume (PTV). In IMRT, the treatment is then optimized until a desired PTV fraction is covered by the appropriate dose. The resulting beams often carry high fluence in the PTV margin to overcome low lung density and to generate steep dose gradients. During treatment, the high density tumour can enter the PTV margin, potentially increasing target dose. Thus, planning lung IMRT with a reduced PTV dose may still achieve the desired ITV dose during treatment. Methods: A retrospective analysis was carried out with 25 IMRT plans prescribed to 63 Gy in 30 fractions. The plans were re-normalized to cover various fractions of the PTV by different isodose lines. For each case, the isocentre was moved using 125 shifts derived from all 3D combinations of 0 mm, (PTV margin - 1 mm), and PTV margin. After each shift, the dose was recomputed to approximate the delivered dose. Results and Conclusion: Our plans typically cover 95% of the PTV by 95% of the dose. Reducing the PTV covered to 94% did not significantly reduce the delivered ITV doses for (PTV margin - 1 mm) shifts. Target doses were reduced significantly for all other shifts and planning goals studied. Thus, a reduced planning goal will likely deliver the desired target dose as long as the ITV rarely enters the last mm of the PTV margin.

  3. Structural vulnerability in transmission systems: Cases of Colombia and Spain

    International Nuclear Information System (INIS)

    Correa, Gabriel J.; Yusta, José M.

    2014-01-01

    Highlights: • Vulnerability analysis of transmission electric systems in Colombia and Spain. • Based on scale-free graph statistic indexes. • Evaluating both current conditions and expansion plans of infrastructures. • Comparison of random error and deliberate attack tolerance evaluation. - Abstract: In this paper the authors apply methodological strategies for the structural vulnerability assessment in high voltage power networks based upon the combination of power flow models and scale-free graph statistic indexes. Thus, it is possible to study risk scenarios based on events that may trigger cascading failures within a power system. The usefulness of graph theory techniques has been validated on previous works of the authors, and may be applied in analysis of the vulnerability of different power electric networks. A case study for vulnerability analysis is carried out through methodologies that allow comparison on random error and deliberate attack tolerance evaluation in transmission electric systems from countries like Colombia and Spain. Such vulnerability assessment methodology takes into account the current conditions of the power networks (base case), as well as the impact of expansion plans into infrastructures as defined by their governments. Consequently, the authors show the advantage on the use of graph theory based techniques for vulnerability analysis of electrical power systems

  4. Chemical Safety Vulnerability Working Group report. Volume 1

    Energy Technology Data Exchange (ETDEWEB)

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

  5. Chemical Safety Vulnerability Working Group report. Volume 1

    International Nuclear Information System (INIS)

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms

  6. Integration of social vulnerability into emergency management plans: designing of evacuation routes against flood disasters

    Science.gov (United States)

    Aroca-Jimenez, Estefanía; Bodoque, Jose Maria; Garcia, Juan Antonio; Diez-Herrero, Andres

    2017-04-01

    Flash floods are highly spatio-temporal localized flood events characterized by reaching a high peak flow in a very short period of time, i.e., generally with times of concentration lower than six hours. Its short duration, which limits or even voids any warning time, means that flash floods are considered to be one of the most destructive natural hazards with the greatest capacity to generate risk, either in terms of the number of people affected globally or the proportion of individual fatalities. The above highlights the importance of a realistic and appropriate design of evacuation strategies in order to reduce flood-related losses, being evacuation planning considered of critical importance for disaster management. Traditionally, evacuation maps have been based on flood-prone areas, shelters or emergency residences location and evacuation routes information. However, evacuation plans rarely consider the spatial distribution of vulnerable population (i.e., people with special needs, mobility constraints or economic difficulties), which usually require assistance from emergency responders. The goal of this research is to elaborate an evacuation map against the occurrence of flash floods by combining geographic information (e.g. roads, health facilities location, sanitary helicopters) and social vulnerability patterns, which are previously obtained from socioeconomic variables (e.g. population, unemployment, dwelling characteristics). To do this, ArcGis Network Analyst tool is used, which allows to calculate the optimal evacuation routes. The methodology proposed here is implemented in the region of Castilla y León (94,230 km2). Urban areas prone to flash flooding are identified taking into account the following requirements: i) city centers are crossed by rivers or streams with a longitudinal slope higher than 0.01 m m-1; ii) city centers are potentially affected by flash floods; and iii) city centers are affected by an area with low or exceptional probability

  7. Urban Vulnerability in Bantul District, Indonesia—Towards Safer and Sustainable Development

    Directory of Open Access Journals (Sweden)

    R. Rijanta

    2012-08-01

    Full Text Available Assuring safer and sustainable development in seismic prone areas requires predictive measurements, i.e., hazard, vulnerability and risk assessment. This research aims to assess urban vulnerability due to seismic hazard through a risk based spatial plan. The idea is to indicate current and future potential losses due to specified hazards with given spatial and temporal units. Herein, urban vulnerability refers to the classic separation between social and physical vulnerability assessments. The research area covers six sub-districts in Bantul, Indonesia. It experienced 6.2 Mw earthquakes on May, 27th, 2006 and suffered a death toll of 5700, economic losses of up to 3.1 billion US$ and damage to nearly 80% of a 508 km2 area. The research area experienced the following regional issues: (1 seismic hazard; (2 rapid land conversion and (3 domination of low-income group. This research employs spatial multi criteria evaluations (SMCE for social vulnerability (SMCE-SV and for physical vulnerability (SMCE-PV. The research reveals that (1 SMCE-SV and SMCE-PV are empirically possible to indicate the urban vulnerability indices; and (2 integrating the urban vulnerability assessment into a spatial plan requires strategic, technical, substantial and procedural integration. In summary, without adequate knowledge and political support, any manifestation towards safer and sustainable development will remain meager and haphazard.

  8. 18F-fluorodeoxyglucose PET in definition of target volumes and radiotherapy treatment planning

    International Nuclear Information System (INIS)

    Qiao Wenli; Zhao Jinhua

    2007-01-01

    PET is a functional imaging modality, which can give some biological information of tumor. PET is more and more important in the definition of target volumes and radiotherapy treatment planning. Depending on its sensitivity and specificity, 18 F-fluorideoxyglucose 18 F-FDG PET has been shown to influence the selection of target volumes and radiotherapy treatment planning for non-small cell lung cancers, for head and neck squamous cell carcinomas or for esophageal tumors. On the other hand, for tumors such as rectal carcinomas, convincing data on the value of 18 F-FDG PET for target volume selection are still lacking. However, the application of 18 F-FDG PET in many aspects of radiotherapy is still controversy. Further researches in its clinical application are still needed to investigate whether 18 F-FDG PET for treatment planning should be routine because of the lack of prospective studies. (authors)

  9. Integrating respiratory-gated PET-based target volume delineation in liver SBRT planning, a pilot study

    International Nuclear Information System (INIS)

    Riou, Olivier; Thariat, Juliette; Serrano, Benjamin; Azria, David; Paulmier, Benoit; Villeneuve, Remy; Fenoglietto, Pascal; Artenie, Antonella; Ortholan, Cécile; Faraggi, Marc

    2014-01-01

    To assess the feasibility and benefit of integrating four-dimensional (4D) Positron Emission Tomography (PET) – computed tomography (CT) for liver stereotactic body radiation therapy (SBRT) planning. 8 patients with 14 metastases were accrued in the study. They all underwent a non-gated PET and a 4D PET centered on the liver. The same CT scan was used for attenuation correction, registration, and considered the planning CT for SBRT planning. Six PET phases were reconstructed for each 4D PET. By applying an individualized threshold to the 4D PET, a Biological Internal Target Volume (BITV) was generated for each lesion. A gated Planning Target Volume (PTVg) was created by adding 3 mm to account for set-up margins. This volume was compared to a manual Planning Target Volume (PTV) delineated with the help of a semi-automatic Biological Target Volume (BTV) obtained from the non-gated exam. A 5 mm radial and a 10 mm craniocaudal margins were applied to account for tumor motion and set-up margins to create the PTV. One undiagnosed liver metastasis was discovered thanks to the 4D PET. The semi-automatic BTV were significantly smaller than the BITV (p = 0.0031). However, after applying adapted margins, 4D PET allowed a statistically significant decrease in the PTVg as compared to the PTV (p = 0.0052). In comparison to non-gated PET, 4D PET may better define the respiratory movements of liver targets and improve SBRT planning for liver metastases. Furthermore, non respiratory-gated PET exams can both misdiagnose liver metastases and underestimate the real internal target volumes

  10. Population Health Vulnerabilities to Vector-borne Diseases ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Damming, irrigation and other forms of water management are also creating new habitats ... adaptation, particularly to improve the resilience of vulnerable populations. ... Linking research to urban planning at the ICLEI World Congress 2018.

  11. Drinking water vulnerability to climate change and alternatives for adaptation in coastal South and South East Asia.

    Science.gov (United States)

    Hoque, M A; Scheelbeek, P F D; Vineis, P; Khan, A E; Ahmed, K M; Butler, A P

    Drinking water in much of Asia, particularly in coastal and rural settings, is provided by a variety of sources, which are widely distributed and frequently managed at an individual or local community level. Coastal and near-inland drinking water sources in South and South East (SSE) Asia are vulnerable to contamination by seawater, most dramatically from tropical cyclone induced storm surges. This paper assesses spatial vulnerabilities to salinisation of drinking water sources due to meteorological variability and climate change along the (ca. 6000 km) coastline of SSE Asia. The risks of increasing climatic stresses are first considered, and then maps of relative vulnerability along the entire coastline are developed, using data from global scale land surface models, along with an overall vulnerability index. The results show that surface and near-surface drinking water in the coastal areas of the mega-deltas in Vietnam and Bangladesh-India are most vulnerable, putting more than 25 million people at risk of drinking 'saline' water. Climate change is likely to exacerbate this problem, with adverse consequences for health, such as prevalence of hypertension and cardiovascular diseases. There is a need for identifying locations that are most at risk of salinisation in order for policy makers and local officials to implement strategies for reducing these health impacts. To counter the risks associated with these vulnerabilities, possible adaptation measures are also outlined. We conclude that detailed and fine scale vulnerability assessments may become crucial for planning targeted adaptation programmes along these coasts.

  12. Utilize target motion to cover clinical target volume (ctv) - a novel and practical treatment planning approach to manage respiratory motion

    International Nuclear Information System (INIS)

    Jin Jianyue; Ajlouni, Munther; Kong Fengming; Ryu, Samuel; Chetty, Indrin J.; Movsas, Benjamin

    2008-01-01

    Purpose: To use probability density function (PDF) to model motion effects and incorporate this information into treatment planning for lung cancers. Material and methods: PDFs were calculated from the respiratory motion traces of 10 patients. Motion effects were evaluated by convolving static dose distributions with various PDFs. Based on a differential dose prescription with relatively lower dose to the clinical target volume (CTV) than to the gross tumor volume (GTV), two approaches were proposed to incorporate PDFs into treatment planning. The first approach uses the GTV-based internal target volume (ITV) as the planning target volume (PTV) to ensure full dose to the GTV, and utilizes the motion-induced dose gradient to cover the CTV. The second approach employs an inhomogeneous static dose distribution within a minimized PTV to best match the prescription dose gradient. Results: Motion effects on dose distributions were minimal in the anterior-posterior (AP) and lateral directions: a 10-mm motion only induced about 3% of dose reduction in the peripheral target region. The motion effect was remarkable in the cranial-caudal direction. It varied with the motion amplitude, but tended to be similar for various respiratory patterns. For the first approach, a 10-15 mm motion would adequately cover the CTV (presumed to be 60-70% of the GTV dose) without employing the CTV in planning. For motions 15-mm. An example of inhomogeneous static dose distribution in a reduced PTV was given, and it showed significant dose reduction in the normal tissue without compromising target coverage. Conclusions: Respiratory motion-induced dose gradient can be utilized to cover the CTV and minimize the lung dose without the need for more sophisticated technologies

  13. Vulnerable Genders, Vulnerable Loves

    DEFF Research Database (Denmark)

    Schleicher, Marianne

    2015-01-01

    This chapter analyses religious reflections on vulnerable genders and vulnerable loves from the Hebrew Bible to early Rabbinic literature. It is based on theories by inter alia Donna Haraway on complex identities, Turner and Maryanski on love as a prerequisite for survival, Michel Foucault...... on gathering knowledge and its often unpremeditated effect of recognition and inclusion, and Judith Butler on cultural intelligibility and subversion from within. With these theories as a departing point for the analysis, the chapter links the vulnerability of complex identities with the vulnerability...... of cultures which leads to the overall understanding that culture can accommodate complex identities associated with individual and cultural vulnerability as long as the overall survival of the culture is not threatened. This understanding questions the feasibility of the ethical position of thinkers...

  14. Project Plan Remote Target Fabrication Refurbishment Project

    International Nuclear Information System (INIS)

    Bell, Gary L.; Taylor, Robin D.

    2009-01-01

    In early FY2009, the DOE Office of Science - Nuclear Physics Program reinstated a program for continued production of 252 Cf and other transcurium isotopes at the Radiochemical Engineering Development Center (REDC) at Oak Ridge National Laboratory (ORNL). The FY2009 major elements of the workscope are as follows: (1) Recovery and processing of seven transuranium element targets undergoing irradiation at the High Flux Isotope Reactor (HFIR) at ORNL; (2) Development of a plan to manufacture new targets for irradiation beginning in early- to mid-FY10 to supply irradiated targets for processing Campaign 75 (TRU75); and (3) Refurbishment of the target manufacturing equipment to allow new target manufacture in early FY10 The 252 Cf product from processing Campaign 74 (recently processed and currently shipping to customers) is expected to supply the domestic demands for a period of approximately two years. Therefore it is essential that new targets be introduced for irradiation by the second quarter of FY10 (HFIR cycle 427) to maintain supply of 252 Cf; the average irradiation period is ∼10 HFIR cycles, requiring about 1.5 calendar years. The strategy for continued production of 252 Cf depends upon repairing and refurbishing the existing pellet and target fabrication equipment for one additional target production campaign. This equipment dates from the mid-1960s to the late 1980s, and during the last target fabrication campaign in 2005- 2006, a number of component failures and operations difficulties were encountered. It is expected that following the target fabrication and acceptance testing of the targets that will supply material for processing Campaign 75 a comprehensive upgrade and replacement of the remote hot-cell equipment will be required prior to subsequent campaigns. Such a major refit could start in early FY 2011 and would take about 2 years to complete. Scope and cost estimates for the repairs described herein were developed, and authorization for the work

  15. Social vulnerability assessment of flood risk using GIS-based multicriteria decision analysis. A case study of Vila Nova de Gaia (Portugal

    Directory of Open Access Journals (Sweden)

    Paulo Fernandez

    2016-07-01

    Full Text Available Over the last decade, flood disasters have affected millions of people and caused massive economic losses. Social vulnerability assessment uses a combination of several factors to represent a population's differential access to resources and its ability to cope with and respond to hazards. In this paper, social vulnerability assessment to flood risk was applied to the third most populous Portuguese municipality. The study was developed at the neighbourhood level, allowing for social vulnerability analysis at inter civil parish, intra civil parish, and municipality scales. A geographic information system-based multicriteria decision analysis (GIS-MCDA was applied to social vulnerability and allows for an increased understanding and improved monitoring of social vulnerability over space, identifying ‘hot spots’ that require adaptation policies. Mafamude, Oliveira do Douro, Vila Nova de Gaia, and Avintes civil parishes display the greatest vulnerability to flooding. According to the most pessimistic scenario 57%–68% of the area of these civil parishes is classed at a high or very high level of social vulnerability. The GIS-MCDA helps to assess what and who is at risk, and where targeted impact-reduction strategies should be implemented. The results demonstrate the importance of an urban-scale approach instead of a river basin scale to urban flood risk management plans.

  16. A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments

    Directory of Open Access Journals (Sweden)

    Yun Chen

    2018-01-01

    Full Text Available Currently, many methods are available to improve the target network’s security. The vast majority of them cannot obtain an optimal attack path and interdict it dynamically and conveniently. Almost all defense strategies aim to repair known vulnerabilities or limit services in target network to improve security of network. These methods cannot response to the attacks in real-time because sometimes they need to wait for manufacturers releasing corresponding countermeasures to repair vulnerabilities. In this paper, we propose an improved Q-learning algorithm to plan an optimal attack path directly and automatically. Based on this path, we use software-defined network (SDN to adjust routing paths and create hidden forwarding paths dynamically to filter vicious attack requests. Compared to other machine learning algorithms, Q-learning only needs to input the target state to its agents, which can avoid early complex training process. We improve Q-learning algorithm in two aspects. First, a reward function based on the weights of hosts and attack success rates of vulnerabilities is proposed, which can adapt to different network topologies precisely. Second, we remove the actions and merge them into every state that reduces complexity from O(N3 to O(N2. In experiments, after deploying hidden forwarding paths, the security of target network is boosted significantly without having to repair network vulnerabilities immediately.

  17. An Integrated Method of Supply Chains Vulnerability Assessment

    Directory of Open Access Journals (Sweden)

    Jiaguo Liu

    2016-01-01

    Full Text Available Supply chain vulnerability identification and evaluation are extremely important to mitigate the supply chain risk. We present an integrated method to assess the supply chain vulnerability. The potential failure mode of the supply chain vulnerability is analyzed through the SCOR model. Combining the fuzzy theory and the gray theory, the correlation degree of each vulnerability indicator can be calculated and the target improvements can be carried out. In order to verify the effectiveness of the proposed method, we use Kendall’s tau coefficient to measure the effect of different methods. The result shows that the presented method has the highest consistency in the assessment compared with the other two methods.

  18. Climate Vulnerability and Human Migration in Global Perspective

    Science.gov (United States)

    Grecequet, Martina; DeWaard, Jack; Hellmann, Jessica J.; Abel, Guy J.

    2018-01-01

    The relationship between climate change and human migration is not homogenous and depends critically on the differential vulnerability of population and places. If places and populations are not vulnerable, or susceptible, to climate change, then the climate–migration relationship may not materialize. The key to understanding and, from a policy perspective, planning for whether and how climate change will impact future migration patterns is therefore knowledge of the link between climate vulnerability and migration. However, beyond specific case studies, little is known about this association in global perspective. We therefore provide a descriptive, country-level portrait of this relationship. We show that the negative association between climate vulnerability and international migration holds only for countries least vulnerable to climate change, which suggests the potential for trapped populations in more vulnerable countries. However, when analyzed separately by life supporting sector (food, water, health, ecosystem services, human habitat, and infrastructure) and vulnerability dimension (exposure, sensitivity, and adaptive capacity), we detect evidence of a relationship among more, but not the most, vulnerable countries. The bilateral (i.e., country-to-country) migration show that, on average, people move from countries of higher vulnerability to lower vulnerability, reducing global risk by 15%. This finding is consistent with the idea that migration is a climate adaptation strategy. Still, ~6% of bilateral migration is maladaptive with respect to climate change, with some movement toward countries with greater climate change vulnerability. PMID:29707262

  19. Climate Vulnerability and Human Migration in Global Perspective.

    Science.gov (United States)

    Grecequet, Martina; DeWaard, Jack; Hellmann, Jessica J; Abel, Guy J

    2017-05-01

    The relationship between climate change and human migration is not homogenous and depends critically on the differential vulnerability of population and places. If places and populations are not vulnerable, or susceptible, to climate change, then the climate-migration relationship may not materialize. The key to understanding and, from a policy perspective, planning for whether and how climate change will impact future migration patterns is therefore knowledge of the link between climate vulnerability and migration. However, beyond specific case studies, little is known about this association in global perspective. We therefore provide a descriptive, country-level portrait of this relationship. We show that the negative association between climate vulnerability and international migration holds only for countries least vulnerable to climate change, which suggests the potential for trapped populations in more vulnerable countries. However, when analyzed separately by life supporting sector (food, water, health, ecosystem services, human habitat, and infrastructure) and vulnerability dimension (exposure, sensitivity, and adaptive capacity), we detect evidence of a relationship among more, but not the most, vulnerable countries. The bilateral (i.e., country-to-country) migration show that, on average, people move from countries of higher vulnerability to lower vulnerability, reducing global risk by 15%. This finding is consistent with the idea that migration is a climate adaptation strategy. Still, ~6% of bilateral migration is maladaptive with respect to climate change, with some movement toward countries with greater climate change vulnerability.

  20. SU-G-BRB-16: Vulnerabilities in the Gamma Metric

    International Nuclear Information System (INIS)

    Neal, B; Siebers, J

    2016-01-01

    Purpose: To explore vulnerabilities in the gamma index metric that undermine its wide use as a radiation therapy quality assurance tool. Methods: 2D test field pairs (images) are created specifically to achieve high gamma passing rates, but to also include gross errors by exploiting the distance-to-agreement and percent-passing components of the metric. The first set has no requirement of clinical practicality, but is intended to expose vulnerabilities. The second set exposes clinically realistic vulnerabilities. To circumvent limitations inherent to user-specific tuning of prediction algorithms to match measurements, digital test cases are manually constructed, thereby mimicking high-quality image prediction. Results: With a 3 mm distance-to-agreement metric, changing field size by ±6 mm results in a gamma passing rate over 99%. For a uniform field, a lattice of passing points spaced 5 mm apart results in a passing rate of 100%. Exploiting the percent-passing component, a 10×10 cm"2 field can have a 95% passing rate when an 8 cm"2=2.8×2.8 cm"2 highly out-of-tolerance (e.g. zero dose) square is missing from the comparison image. For clinically realistic vulnerabilities, an arc plan for which a 2D image is created can have a >95% passing rate solely due to agreement in the lateral spillage, with the failing 5% in the critical target region. A field with an integrated boost (e.g whole brain plus small metastases) could neglect the metastases entirely, yet still pass with a 95% threshold. All the failure modes described would be visually apparent on a gamma-map image. Conclusion: The %gamma<1 metric has significant vulnerabilities. High passing rates can obscure critical faults in hypothetical and delivered radiation doses. Great caution should be used with gamma as a QA metric; users should inspect the gamma-map. Visual analysis of gamma-maps may be impractical for cine acquisition.

  1. SU-G-BRB-16: Vulnerabilities in the Gamma Metric

    Energy Technology Data Exchange (ETDEWEB)

    Neal, B; Siebers, J [University of Virginia Health System, Charlottesville, VA (United States)

    2016-06-15

    Purpose: To explore vulnerabilities in the gamma index metric that undermine its wide use as a radiation therapy quality assurance tool. Methods: 2D test field pairs (images) are created specifically to achieve high gamma passing rates, but to also include gross errors by exploiting the distance-to-agreement and percent-passing components of the metric. The first set has no requirement of clinical practicality, but is intended to expose vulnerabilities. The second set exposes clinically realistic vulnerabilities. To circumvent limitations inherent to user-specific tuning of prediction algorithms to match measurements, digital test cases are manually constructed, thereby mimicking high-quality image prediction. Results: With a 3 mm distance-to-agreement metric, changing field size by ±6 mm results in a gamma passing rate over 99%. For a uniform field, a lattice of passing points spaced 5 mm apart results in a passing rate of 100%. Exploiting the percent-passing component, a 10×10 cm{sup 2} field can have a 95% passing rate when an 8 cm{sup 2}=2.8×2.8 cm{sup 2} highly out-of-tolerance (e.g. zero dose) square is missing from the comparison image. For clinically realistic vulnerabilities, an arc plan for which a 2D image is created can have a >95% passing rate solely due to agreement in the lateral spillage, with the failing 5% in the critical target region. A field with an integrated boost (e.g whole brain plus small metastases) could neglect the metastases entirely, yet still pass with a 95% threshold. All the failure modes described would be visually apparent on a gamma-map image. Conclusion: The %gamma<1 metric has significant vulnerabilities. High passing rates can obscure critical faults in hypothetical and delivered radiation doses. Great caution should be used with gamma as a QA metric; users should inspect the gamma-map. Visual analysis of gamma-maps may be impractical for cine acquisition.

  2. Living in Harmony with Disaster: Exploring Volcanic Hazard Vulnerability in Indonesia

    Directory of Open Access Journals (Sweden)

    Sea Eun Cho

    2016-08-01

    Full Text Available This article illustrates the multi-faceted notion of hazard vulnerability and the complicated relations a community has with a hazardous area based on a joint urban planning and design studio between Seoul National University and Diponegoro University in 2014. The study focused on an area in Central Java, Indonesia, surrounded by four active volcanic mountains, and explored the economic, environmental and social vulnerability associated with the site. Although initially the study focused on drawing up and improving the relocation plan, it was soon discovered that eliminating environmental vulnerability by relocating residents to new sites may in fact increase their economic vulnerability. This led the study to embrace the concept of living in harmony with disaster. In conclusion, the results of the study are discussed in terms recognizing environmental hazards as a vehicle for understanding local perceptions, and utilizing these perceptions to suggest mitigation measures that are more responsive to the site at risk.

  3. Target costing as an element of the hard coal extraction cost planning process

    Directory of Open Access Journals (Sweden)

    Katarzyna Segeth-Boniecka

    2017-09-01

    Full Text Available Target costing as an element of the hard coal extraction cost planning process Striving for the efficiency of activities is of great significance in the management of hard coal extractive enterprises, which are constantly subjected to the process of restructuring. Effective cost management is an important condition of the increase in the efficiency of the researched business entities’ activity. One of the tools whose basic objective is conscious influencing cost levels is target costing. The aim of this article is to analyse the conditions of implementing target costing in the planning of hard coal extraction costs in hard coal mines in Poland. The subject area raises a topical and important problem of the scope of solutions concerning cost analysis in hard coal mines in Poland, which has not been thoroughly researched yet. To achieve the abovementioned aim, the theoretical works of the subject area have been referenced. The mine management process is difficult and requires the application of best suited and most modern tools, including those used in the planning process of hard coal extraction costs in order to support the economic efficiency of mining operations. The use of the target costing concept in the planning of hard coal mine operations aims to support the decision-making process, so as to achieve a specified level of economic efficiency of the operations carried out in a territorially designated site of hard coal extraction.

  4. Assessing environmental vulnerability in EIA-The content and context of the vulnerability concept in an alternative approach to standard EIA procedure

    International Nuclear Information System (INIS)

    Kvaerner, Jens; Swensen, Grete; Erikstad, Lars

    2006-01-01

    In the traditional EIA procedure environmental vulnerability is only considered to a minor extent in the early stages when project alternatives are worked out. In Norway, an alternative approach to EIA, an integrated vulnerability model (IVM), emphasising environmental vulnerability and alternatives development in the early stages of EIA, has been tried out in a few pilot cases. This paper examines the content and use of the vulnerability concept in the IVM approach, and discusses the concept in an EIA context. The vulnerability concept is best suited to overview analyses and large scale spatial considerations. The concept is particularly useful in the early stages of EIA when alternatives are designed and screened. By introducing analyses of environmental vulnerability at the start of the EIA process, the environment can be a more decisive issue for the creation of project alternatives as well as improving the basis for scoping. Vulnerability and value aspects should be considered as separate dimensions. There is a need to operate with a specification between general and specific vulnerability. The concept of environmental vulnerability has proven useful in a wide range of disciplines. Different disciplines have different lengths of experience regarding vulnerability. In disciplines such as landscape planning and hydrogeology we find elements suitable as cornerstones in the further development of an interdisciplinary methodology. Further development of vulnerability criteria in different disciplines and increased public involvement in the early stages of EIA are recommended

  5. Assessing vulnerability to drought: identifying underlying factors across Europe

    Science.gov (United States)

    Urquijo, Julia; Gonzalez Tánago, Itziar; Ballesteros, Mario; De Stefano, Lucia

    2015-04-01

    Drought is considered one of the most severe and damaging natural hazards in terms of people and sectors affected and associated losses. Drought is a normal and recurrent climatic phenomenon that occurs worldwide, although its spatial and temporal characteristics vary significantly among climates. In the case of Europe, in the last thirty years, the region has suffered several drought events that have caused estimated economic damages over a €100 billion and have affected almost 20% of its territory and population. In recent years, there has been a growing awareness among experts and authorities of the need to shift from a reactive crisis approach to a drought risk management approach, as well as of the importance of designing and implementing policies, strategies and plans at country and river basin levels to deal with drought. The identification of whom and what is vulnerable to drought is a central aspect of drought risk mitigation and planning and several authors agree that societal vulnerability often determines drought risk more than the actual precipitation shortfalls. The final aim of a drought vulnerability assessment is to identify the underlying sources of drought impact, in order to develop policy options that help to enhance coping capacity and therefore to prevent drought impact. This study identifies and maps factors underlying vulnerability to drought across Europe. The identification of factors influencing vulnerability starts from the analysis of past drought impacts in four European socioeconomic sectors. This analysis, along with an extensive literature review, led to the selection of vulnerability factors that are both relevant and adequate for the European context. Adopting the IPCC model, vulnerability factors were grouped to describe exposure, sensitivity and adaptive capacity. The aggregation of these components has resulted in the mapping of vulnerability to drought across Europe at NUTS02 level. Final results have been compared with

  6. Vulnerability detection using data-flow graphs and SMT solvers

    Science.gov (United States)

    2016-10-31

    SECURITY CLASSIFICATION OF: 1. REPORT DATE (DD-MM-YYYY) 4. TITLE AND SUBTITLE 13. SUPPLEMENTARY NOTES 12. DISTRIBUTION AVAILIBILITY STATEMENT 6. AUTHORS...correctly. Developers rarely develop with consideration for eliminating vulnerabilities in source code. Source code is not always available for...as deep neural networks. We also plan to define heuristics on what type of learners and features to use with identifying different vulnerabilities

  7. New approach to analyzing vulnerability

    International Nuclear Information System (INIS)

    O'Callaghan, P.B.; Carlson, R.L.; Riedeman, G.W.

    1986-01-01

    The Westinghouse Hanford Company (WHC) has recently completed construction of the Fuel Cycle Plant (FCP) at Richland, Washington. At start-up the facility will fabricate driver fuel for the Fast Flux Test Facility in the Secure Automated Fabrication line. After construction completion, but before facility certification, the Department of Energy (DOE) Richland Operation Office requested that a vulnerability analysis be performed which assumed multiple insiders as a threat to the security system. A unique method of analyzing facility vulnerabilities was developed at the Security Applications Center (SAC), which is managed by WHC for DOE. The method that was developed verifies a previous vulnerability assessment, as well as introducing a modeling technique which analyzes security alarms in relation to delaying factors and possible insider activities. With this information it is possible to assess the relative strength or weakness of various possible routes to and from a target within a facility

  8. Flood vulnerability analysis for inland medium-sized cities: Guang’an as an example

    OpenAIRE

    Liang, Ting

    2017-01-01

    Vulnerability studies look into the impact of hazard events on socio-ecological systems. Socio-ecological vulnerability is a very complex subject because it is not only a technical matter but also a social problem. Precise assessment of socio-ecological vulnerability can help people successfully reduce potential losses caused by disasters as well as provide decision support for decision makers to take different urban planning strategies in areas of different vulnerability levels when making d...

  9. Educational interventions targeted at minors in situations of grave social vulnerability and their families

    Science.gov (United States)

    de La Caba Collado, Mariangeles; Bartau Rojas, Isabel

    2010-10-01

    The aim of this article is to outline and assess an educational intervention programme targeted at improving the skills of families and the personal and social development of children living in situations of grave social vulnerability. The sample comprised 10 families during the first phase of the intervention and six during the second. The design, intervention and assessment process of this study was carried out in two phases over a period of a year and a half. For both phases, three different groups—of men/fathers, women/mothers and children—were established. Study variables (parenting skills and children's personal and social development) were evaluated before and after the intervention in every group, as well as during the entire process. The results, taking into account the improvements reported by all the participants (social workers, group monitors, fathers, mothers, children) show that inter-professional involvement and coordination at all phases of the intervention is vital in order to achieve small but significant improvements.

  10. Targeted social care for highly vulnerable pregnant women: Protocol of the Mothers of Rotterdam cohort study

    NARCIS (Netherlands)

    M. Van Der Hulst (Marije); M.W. de Groot (Marjolein); J.P. de Graaf (Hanneke); R. Kok (Rianne); P.J. Prinzie (Peter); A. Burdorf (Alex); L.C.M. Bertens (Loes C.M.); E.A.P. Steegers (Eric)

    2018-01-01

    markdownabstractIntroduction: Social vulnerability is known to be related to ill health. When a pregnant woman is socially vulnerable, the ill health does not only affect herself, but also the health and development of her (unborn) child. To optimise care for highly vulnerable pregnant women, in

  11. Unhealthful Food-and-Beverage Advertising in Subway Stations: Targeted Marketing, Vulnerable Groups, Dietary Intake, and Poor Health.

    Science.gov (United States)

    Lucan, Sean C; Maroko, Andrew R; Sanon, Omar C; Schechter, Clyde B

    2017-04-01

    Unhealthful food-and-beverage advertising often targets vulnerable groups. The extent of such advertising in subway stations has not been reported and it is not clear how ad placement may relate to subway ridership or community demographics, or what the implications might be for diets and diet-related health in surrounding communities. Riding all subway lines (n = 7) in the Bronx, NY, USA, investigators systematically assessed all print ads (n = 1586) in all stations (n = 68) in 2012. Data about subway ridership came from the Metropolitan Transportation Authority. Demographic data on surrounding residential areas came from the U.S. Census Bureau. Data on dietary intake and diet-related conditions came from a city health-department survey. There were no ads promoting "more-healthful" food-or-beverage items (i.e., fruits, vegetables, whole grains, nuts, water or milk). There were many ads for "less-healthful" items (e.g., candies, chips, sugary cereals, frozen pizzas, "energy" drinks, coffee confections, hard alcohol, and beer). Ad placement did not relate to the number of riders entering at stations. Instead, exposure to food-or-beverage ads generally, and to "less-healthful" ads particularly (specifically ads in Spanish, directed at youth, and/or featuring minorities), was directly correlated with poverty, lower high-school graduation rates, higher percentages of Hispanics, and/or higher percentages of children in surrounding residential areas. Correlations were robust to sensitivity analyses. Additional analyses suggested correlations between ad exposures and sugary-drink consumption, fruit-and-vegetable intake, and diabetes, hypertension, and high-cholesterol rates. Subway-station ads for "less-healthful" items were located disproportionately in areas home to vulnerable populations facing diet and diet-related-health challenges. The fact that uneven ad placement did not relate to total rider counts suggests ads were not directed at the largest

  12. Developing new methodology for nuclear power plants vulnerability assessment

    International Nuclear Information System (INIS)

    Kostadinov, Venceslav

    2011-01-01

    Research highlights: → Paper presents new methodology for vulnerability assessment of nuclear power plants. → First universal quantitative risks assessment model for terrorist attack on a NPPs. → New model enhance security, reliability and safe operation of all energy infrastructure. → Significant research benefits: increased NPPs security, reliability and availability. → Useful new tool for PRA application to evaluation of terrorist threats on NPPs. - Abstract: The fundamental aim of an efficient regulatory emergency preparedness and response system is to provide sustained emergency readiness and to prevent emergency situations and accidents. But when an event occurs, the regulatory mission is to mitigate consequences and to protect people and the environment against nuclear and radiological damage. The regulatory emergency response system, which would be activated in the case of a nuclear and/or radiological emergency and release of radioactivity to the environment, is an important element of a comprehensive national regulatory system of nuclear and radiation safety. In the past, national emergency systems explicitly did not include vulnerability assessments of the critical nuclear infrastructure as an important part of a comprehensive preparedness framework. But after the huge terrorist attack on 11/09/2001, decision-makers became aware that critical nuclear infrastructure could also be an attractive target to terrorism, with the purpose of using the physical and radioactive properties of the nuclear material to cause mass casualties, property damage, and detrimental economic and/or environmental impacts. The necessity to evaluate critical nuclear infrastructure vulnerability to threats like human errors, terrorist attacks and natural disasters, as well as preparation of emergency response plans with estimation of optimized costs, are of vital importance for assurance of safe nuclear facilities operation and national security. In this paper presented

  13. Cyber security and vulnerability of 'smart' power grids

    OpenAIRE

    Jovanović, Slobodan

    2012-01-01

    Smart power grids deliver electric energy from generation to consumers using two-way Smart Meter technology (smart meters), enabling remote control of consumer energy use. However, smart power grids are increasingly very attractive targets for hackers and terrorists. This paper discusses the key characteristics of cyber security/vulnerability of smart power grids, and their communication architecture, and their vulnerability points. Then, it describes guidelines which are needed to be impleme...

  14. Focus Cities : Reducing the Vulnerability, Poverty and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Focus Cities : Reducing the Vulnerability, Poverty and Environmental Load in ... 000 lives in closely constructed houses built right up to the edge of the Rimac River. ... and the Lima Metropolitan Urban Plan will be updated in light of the results.

  15. [Health vulnerability mapping in the Community of Madrid (Spain)].

    Science.gov (United States)

    Ramasco-Gutiérrez, Milagros; Heras-Mosteiro, Julio; Garabato-González, Sonsoles; Aránguez-Ruiz, Emiliano; Aguirre Martín-Gil, Ramón

    The Public Health General Directorate of Madrid has developed a health vulnerability mapping methodology to assist regional social health teams in health planning, prioritisation and intervention based on a model of social determinants of health and an equity approach. This process began with the selection of areas with the worst social indicators in health vulnerability. Then, key stakeholders of the region jointly identified priority areas of intervention and developed a consensual plan of action. We present the outcomes of this experience and its connection with theoretical models of asset-based community development, health-integrated georeferencing systems and community health interventions. Copyright © 2016 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.

  16. Treatment planning with intensity modulated particle therapy for multiple targets in stage IV non-small cell lung cancer

    Science.gov (United States)

    Anderle, Kristjan; Stroom, Joep; Vieira, Sandra; Pimentel, Nuno; Greco, Carlo; Durante, Marco; Graeff, Christian

    2018-01-01

    Intensity modulated particle therapy (IMPT) can produce highly conformal plans, but is limited in advanced lung cancer patients with multiple lesions due to motion and planning complexity. A 4D IMPT optimization including all motion states was expanded to include multiple targets, where each target (isocenter) is designated to specific field(s). Furthermore, to achieve stereotactic treatment planning objectives, target and OAR weights plus objective doses were automatically iteratively adapted. Finally, 4D doses were calculated for different motion scenarios. The results from our algorithm were compared to clinical stereotactic body radiation treatment (SBRT) plans. The study included eight patients with 24 lesions in total. Intended dose regimen for SBRT was 24 Gy in one fraction, but lower fractionated doses had to be delivered in three cases due to OAR constraints or failed plan quality assurance. The resulting IMPT treatment plans had no significant difference in target coverage compared to SBRT treatment plans. Average maximum point dose and dose to specific volume in OARs were on average 65% and 22% smaller with IMPT. IMPT could also deliver 24 Gy in one fraction in a patient where SBRT was limited due to the OAR vicinity. The developed algorithm shows the potential of IMPT in treatment of multiple moving targets in a complex geometry.

  17. Urban vulnerability and climate change in Africa a multidisciplinary approach

    CERN Document Server

    Coly, Adrien; Fohlmeister, Sandra; Gasparini, Paolo; Jørgensen, Gertrud; Kabisch, Sigrun; Kombe, Wilbard; Lindley, Sarah; Simonis, Ingo; Yeshitela, Kumelachew

    2015-01-01

    The book presents results of CLUVA (CLimate Change and Urban Vulnerability in Africa), a large European Commission funded research project (2010-2013). The project aimed to develop a better understanding of the risks and impacts of climate change related hazards to African cities, assess their vulnerability to these risks, and identify innovative strategies for planning and governance to increase their resilience. For the first time, a systematic and groundbreaking study of this kind was applied in an inter- and trans-disciplinary approach. CLUVA was unique in that it combined: a top-down perspective of climate change modeling with a bottom-up perspective of vulnerability assessment; quantitative approaches from engineering sciences and qualitative approaches of the social sciences; a novel multi-risk modeling methodology; strategic approaches to urban and green infrastructure planning with neighborhood perspectives of adaptation. The book broadly follows the approach taken in the CLUVA project. First, the co...

  18. Evaluating the Soil Vulnerability Index (SVI), an index to characterize inherent vulnerability of croplands to runoff and leaching

    Science.gov (United States)

    Soil erosion and nutrient loss from surface runoff and sub-surface flows are critical problems for croplands in the United States. Assessing cropland vulnerability to runoff and leaching is needed for watershed or regional land use and land management planning and conservation resources allocation. ...

  19. Targeting Low Career Confidence Using the Career Planning Confidence Scale

    Science.gov (United States)

    McAuliffe, Garrett; Jurgens, Jill C.; Pickering, Worth; Calliotte, James; Macera, Anthony; Zerwas, Steven

    2006-01-01

    The authors describe the development and validation of a test of career planning confidence that makes possible the targeting of specific problem issues in employment counseling. The scale, developed using a rational process and the authors' experience with clients, was tested for criterion-related validity against 2 other measures. The scale…

  20. Assessing species vulnerability to climate change

    Science.gov (United States)

    Pacifici, Michela; Foden, Wendy B.; Visconti, Piero; Watson, James E. M.; Butchart, Stuart H. M.; Kovacs, Kit M.; Scheffers, Brett R.; Hole, David G.; Martin, Tara G.; Akçakaya, H. Resit; Corlett, Richard T.; Huntley, Brian; Bickford, David; Carr, Jamie A.; Hoffmann, Ary A.; Midgley, Guy F.; Pearce-Kelly, Paul; Pearson, Richard G.; Williams, Stephen E.; Willis, Stephen G.; Young, Bruce; Rondinini, Carlo

    2015-03-01

    The effects of climate change on biodiversity are increasingly well documented, and many methods have been developed to assess species' vulnerability to climatic changes, both ongoing and projected in the coming decades. To minimize global biodiversity losses, conservationists need to identify those species that are likely to be most vulnerable to the impacts of climate change. In this Review, we summarize different currencies used for assessing species' climate change vulnerability. We describe three main approaches used to derive these currencies (correlative, mechanistic and trait-based), and their associated data requirements, spatial and temporal scales of application and modelling methods. We identify strengths and weaknesses of the approaches and highlight the sources of uncertainty inherent in each method that limit projection reliability. Finally, we provide guidance for conservation practitioners in selecting the most appropriate approach(es) for their planning needs and highlight priority areas for further assessments.

  1. Narcissistic grandiosity and narcissistic vulnerability in psychotherapy.

    Science.gov (United States)

    Pincus, Aaron L; Cain, Nicole M; Wright, Aidan G C

    2014-10-01

    This article briefly summarizes the empirical and clinical literature underlying a contemporary clinical model of pathological narcissism. Unlike the DSM Narcissistic Personality Disorder (NPD), this clinical model identifies and differentiates between two phenotypic themes of dysfunction-narcissistic grandiosity and narcissistic vulnerability-that can be expressed both overtly and covertly in patients' ways of thinking, feeling, behaving, and participating in treatment. Clinical recognition that narcissistic patients can and often do present for psychotherapy in vulnerable states of depression, anxiety, shame, and even suicidality increases the likelihood of accurate diagnosis and effective treatment planning. This article provides case examples derived from psychotherapies with narcissistic patients to demonstrate how narcissistic grandiosity and narcissistic vulnerability concurrently present in patients who seek treatment. (PsycINFO Database Record (c) 2014 APA, all rights reserved).

  2. A Climate Change Adaptation Planning Process for Low-Lying, Communities Vulnerable to Sea Level Rise

    Directory of Open Access Journals (Sweden)

    Kristi Tatebe

    2012-09-01

    Full Text Available While the province of British Columbia (BC, Canada, provides guidelines for flood risk management, it is local governments’ responsibility to delineate their own flood vulnerability, assess their risk, and integrate these with planning policies to implement adaptive action. However, barriers such as the lack of locally specific data and public perceptions about adaptation options mean that local governments must address the need for adaptation planning within a context of scientific uncertainty, while building public support for difficult choices on flood-related climate policy and action. This research demonstrates a process to model, visualize and evaluate potential flood impacts and adaptation options for the community of Delta, in Metro Vancouver, across economic, social and environmental perspectives. Visualizations in 2D and 3D, based on hydrological modeling of breach events for existing dike infrastructure, future sea level rise and storm surges, are generated collaboratively, together with future adaptation scenarios assessed against quantitative and qualitative indicators. This ‘visioning package’ is being used with staff and a citizens’ Working Group to assess the performance, policy implications and social acceptability of the adaptation strategies. Recommendations based on the experience of the initiative are provided that can facilitate sustainable future adaptation actions and decision-making in Delta and other jurisdictions.

  3. Risk evaluation system for facility safeguards and security planning

    International Nuclear Information System (INIS)

    Udell, C.J.; Carlson, R.L.

    1987-01-01

    The Risk Evaluation System (RES) is an integrated approach to determining safeguards and security effectiveness and risk. RES combines the planning and technical analysis into a format that promotes an orderly development of protection strategies, planing assumptions, facility targets, vulnerability and risk determination, enhancement planning, and implementation. In addition, the RES computer database program enhances the capability of the analyst to perform a risk evaluation of the facility. The computer database is menu driven using data input screens and contains an algorithm for determining the probability of adversary defeat and risk. Also, base case and adjusted risk data records can be maintained and accessed easily

  4. Building capacity and wellbeing in vulnerable/marginalised mothers: A qualitative study.

    Science.gov (United States)

    Balaam, Marie-Clare; Thomson, Gill

    2018-01-19

    The persistence of health inequalities in pregnancy and infancy amongst vulnerable/marginalised groups in the UK. During pregnancy and early motherhood some women experience severe and multiple psychosocial and economic disadvantages that negatively affect their wellbeing and make them at increased risk of poor maternal and infant health outcomes. To explore vulnerable/marginalised women's views and experiences of receiving targeted support from a specialist midwifery service and/or a charity. A mixed-methods study was undertaken that involved analysis of routinely collected birth-related/outcome data and interviews with a sample of vulnerable/marginalised women who had/had not received targeted support from a specialist midwifery service and/or a charity. In this paper we present in-depth insights from the 11 women who had received targeted support. Four key themes were identified; 'enabling needs-led care and support', 'empowering through knowledge, trust and acceptance', 'the value of a supportive presence' and 'developing capabilities, motivation and confidence'. Support provided by a specialist midwifery service and/or charity improved the maternity and parenting experiences of vulnerable/marginalised women. This was primarily achieved by developing a provider-woman relationship built on mutual trust and understanding and through which needs-led care and support was provided - leading to improved confidence, skills and capacities for positive parenting and health. The collaborative, multiagency, targeted intervention provides a useful model for further research and development. It offers a creative, salutogenic and health promoting approach to provide support for the most vulnerable/marginalised women as they make the journey into parenthood. Copyright © 2017 Australian College of Midwives. Published by Elsevier Ltd. All rights reserved.

  5. Preliminary regulatory assessment of nuclear power plants vulnerabilities

    International Nuclear Information System (INIS)

    Kostadinov, V.; Petelin, S.

    2004-01-01

    Preliminary attempts to develop models for nuclear regulatory vulnerability assessment of nuclear power plants are presented. Development of the philosophy and computer tools could be new and important insight for management of nuclear operators and nuclear regulatory bodies who face difficult questions about how to assess the vulnerability of nuclear power plants and other nuclear facilities to external and internal threats. In the situation where different and hidden threat sources are dispersed throughout the world, the assessment of security and safe operation of nuclear power plants is very important. Capability to evaluate plant vulnerability to different kinds of threats, like human and natural occurrences and terrorist attacks and preparation of emergency response plans and estimation of costs are of vital importance for assurance of national security. On the basis of such vital insights, nuclear operators and nuclear regulatory bodies could plan and optimise changes in oversight procedures, organisations, equipment, hardware and software to reduce risks taking into account security and safety of nuclear power plants operation, budget, manpower, and other limitations. Initial qualitative estimations of adapted assessments for nuclear applications are shortly presented. (author)

  6. Assessing social vulnerability to climate change in human communities near public forests and grasslands: a framework for resource managers and planners

    Science.gov (United States)

    A. Paige Fischer; Travis Paveglio; Matthew Carroll; Daniel Murphy; Hannah Brenkert-Smith

    2013-01-01

    Public land management agencies have incorporated the concept of vulnerability into protocols for assessing and planning for climate change impacts on public forests and grasslands. However, resource managers and planners have little guidance for how to address the social aspects of vulnerability in these assessments and plans. Failure to assess social vulnerability to...

  7. Assess and Adapt: Coordinated Ecoregional Forest Vulnerability Assessments Covering the Upper Midwest and Northeast in Support of Climate-informed Decision-making

    Science.gov (United States)

    Swanston, C.; Janowiak, M.; Handler, S.; Butler, P.; Brandt, L.; Iverson, L.; Thompson, F.; Ontl, T.; Shannon, D.

    2016-12-01

    Forest ecosystem vulnerability assessments are rapidly becoming an integral component of forest management planning, in which there is increasing public expectation that even near-term activities explicitly incorporate information about anticipated climate impacts and risks. There is a clear desire among forest managers for targeted assessments that address critical questions about species and ecosystem vulnerabilities while delivering this information in an accessible format. We developed the Ecosystem Vulnerability Assessment Approach (EVAA), which combines multiple quantitative models, expert elicitation from scientists and land managers, and a templated report structure oriented to natural resource managers. The report structure includes relevant information on the contemporary landscape, past climate, future climate projections, impact model results, and a transparent vulnerability assessment of species and ecosystems. We have used EVAA in seven ecoregional assessments covering 246 million acres of forestland across the upper Midwest and Northeast (www.forestadaptation.org; five published, two in review). We convened a panel of local forest ecology and management experts in each assessment area to examine projected climate effects on system drivers, stressors, and dominant species, as well as the current adaptive capacity of the major ecoregional forest ecosystems. The panels provided a qualitative assessment of the vulnerability of forest ecosystems to climate change over the next century. Over 130 authors from dozens of organizations collaborated on these peer-reviewed assessment publications, which are delivered to thousands of stakeholders through live and recorded webinars, online briefs, and in-person trainings and seminars. The assessments are designed to be used with the Adaptation Workbook (www.adaptationworkbook.org), a planning tool that works at multiple scales and has generated more than 200 real-world forest adaptation demonstration projects.

  8. The vulnerability of the free aquifers using functions of time of trip

    International Nuclear Information System (INIS)

    Betancur Vargas, Teresita; Wills Betancur, Beatriz Amparo; Rueda Gallo, Orfely Maria

    1999-01-01

    The determination of an aquifers vulnerability degree represents a support instrument for hydraulic resources management. It is also important for territory ordering and planning because it guarantors groundwater conservation. Achieving the determination of procedures for vulnerability maps construction, using measurable parameters, integrated as a function, is a practical methodology with very important and vantages over traditional methodologies. It is considered that the pollutant trip time from the surface to the aquifers is a good vulnerability indicator

  9. Chemical Plants Remain Vulnerable to Terrorists: A Call to Action

    Science.gov (United States)

    Lippin, Tobi Mae; McQuiston, Thomas H.; Bradley-Bull, Kristin; Burns-Johnson, Toshiba; Cook, Linda; Gill, Michael L.; Howard, Donna; Seymour, Thomas A.; Stephens, Doug; Williams, Brian K.

    2006-01-01

    U.S. chemical plants currently have potentially catastrophic vulnerabilities as terrorist targets. The possible consequences of these vulnerabilities echo from the tragedies of the Bhopal incident in 1984 to the terrorist attacks on 11 September 2001 and, most recently, Hurricanes Katrina and Rita. Findings from a 2004 nationwide participatory research study of 125 local union leaders at sites with very large volumes of highly hazardous chemicals suggest that voluntary efforts to achieve chemical plant security are not succeeding. Study respondents reported that companies had only infrequently taken actions that are most effective in preventing or in preparing to respond to a terrorist threat. In addition, companies reportedly often failed to involve key stakeholders, including workers, local unions, and the surrounding communities, in these efforts. The environmental health community thus has an opportunity to play a key role in advocating for and supporting improvements in prevention of and preparation for terrorist attacks. Policy-level recommendations to redress chemical site vulnerabilities and the related ongoing threats to the nation’s security are as follows: a) specify detailed requirements for chemical site assessment and security; b) mandate audit inspections supported by significant penalties for cases of noncompliance; c) require progress toward achieving inherently safer processes, including the minimizing of storage of highly hazardous chemicals; d) examine and require additional effective actions in prevention, emergency preparedness, and response and remediation; e) mandate and fund the upgrading of emergency communication systems; and f) involve workers and community members in plan creation and equip and prepare them to prevent and respond effectively to an incident. PMID:16966080

  10. Assessment of vulnerability of forest ecosystems to climate change and adaptation planning in Nepal

    Science.gov (United States)

    Matin, M. A.; Chitale, V. S.

    2016-12-01

    Understanding ecosystem level vulnerability of forests and dependence of local communities on these ecosystems is a first step towards developing effective adaptation strategies. As forests are important components of livelihoods system for a large percentage of the population in the Himalayan region, they offer an important basis for creating and safeguarding more climate-resilient communities. Increased frequency, duration, and/or severity of drought and heat stress, changes in winter ecology, and pest and fire outbreaksunder climate change scenarios could fundamentally alter the composition, productivity and biogeography of forests affecting the potential ecosystem services offered and forest-based livelihoods. Hence, forest ecosystem vulnerability assessment to climate change and the development of a knowledgebase to identify and support relevant adaptation strategies is identified as an urgent need. Climate change vulnerability is measured as a function of exposure, sensitivity and the adaptive capacity of the system towards climate variability and extreme events. Effective adaptation to climate change depends on the availability of two important prerequisites: a) information on what, where, and how to adapt, and b) availability of resources to implement the adaptation measures. In the present study, we introduce the concept of two way multitier approach, which can support effective identification and implementation of adaptation measures in Nepal and the framework can be replicated in other countries in the HKH region. The assessment of overall vulnerability of forests comprises of two components: 1) understanding the relationship between exposure and sensitivity and positive feedback from adaptive capacity of forests; 2) quantifying the dependence of local communities on these ecosystems. We use climate datasets from Bioclim and biophysical products from MODIS, alongwith field datasets. We report that most of the forests along the high altitude areas and few

  11. Target volume delineation and treatment planning for particle therapy a practical guide

    CERN Document Server

    Leeman, Jonathan E; Cahlon, Oren; Sine, Kevin; Jiang, Guoliang; Lu, Jiade J; Both, Stefan

    2018-01-01

    This handbook is designed to enable radiation oncologists to treat patients appropriately and confidently by means of particle therapy. The orientation and purpose are entirely practical, in that the focus is on the physics essentials of delivery and treatment planning , illustration of the clinical target volume (CTV) and associated treatment planning for each major malignancy when using particle therapy, proton therapy in particular. Disease-specific chapters provide guidelines and concise knowledge on CTV selection and delineation and identify aspects that require the exercise of caution during treatment planning. The treatment planning techniques unique to proton therapy for each disease site are clearly described, covering beam orientation, matching/patching field techniques, robustness planning, robustness plan evaluation, etc. The published data on the use of particle therapy for a given disease site are also concisely reported. In addition to fully meeting the needs of radiation oncologists, this "kn...

  12. A new approach to analyzing vulnerability

    International Nuclear Information System (INIS)

    O'Callaghan, P.B.; Carlson, R.L.; Riedeman, G.W.

    1986-01-01

    The Westinghouse Hanford Company (WHC) has recently completed construction of the Fuel Cycle Plant (FCP) at Richland, Washington. At start-up the facility will fabricate driver fuel for the Fast Flux Test Facility in the Secure Automated Fabrication line. After construction completion, but before facility certification, the Department of Energy (DOE) Richland Operation Office requested that a vulnerability analysis be performed which assumed multiple insiders as a threat to the security system. A unique method of analyzing facility vulnerabilities was developed at the Security Applications Center (SAC), which is managed by WHC for DOE. The method that was developed verifies a previous vulnerability assessment, as well as introducing a modeling technique which analyzes security alarms in relation to delaying factors and possible insider activities. With this information it is possible to assess the relative strength or weakness of various possible routes to and from a target within a facility,

  13. Index-based groundwater vulnerability mapping models using hydrogeological settings: A critical evaluation

    International Nuclear Information System (INIS)

    Kumar, Prashant; Bansod, Baban K.S.; Debnath, Sanjit K.; Thakur, Praveen Kumar; Ghanshyam, C.

    2015-01-01

    Groundwater vulnerability maps are useful for decision making in land use planning and water resource management. This paper reviews the various groundwater vulnerability assessment models developed across the world. Each model has been evaluated in terms of its pros and cons and the environmental conditions of its application. The paper further discusses the validation techniques used for the generated vulnerability maps by various models. Implicit challenges associated with the development of the groundwater vulnerability assessment models have also been identified with scientific considerations to the parameter relations and their selections. - Highlights: • Various index-based groundwater vulnerability assessment models have been discussed. • A comparative analysis of the models and its applicability in different hydrogeological settings has been discussed. • Research problems of underlying vulnerability assessment models are also reported in this review paper

  14. Index-based groundwater vulnerability mapping models using hydrogeological settings: A critical evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Kumar, Prashant, E-mail: prashantkumar@csio.res.in [CSIR-Central Scientific Instruments Organisation, Chandigarh 160030 (India); Academy of Scientific and Innovative Research—CSIO, Chandigarh 160030 (India); Bansod, Baban K.S.; Debnath, Sanjit K. [CSIR-Central Scientific Instruments Organisation, Chandigarh 160030 (India); Academy of Scientific and Innovative Research—CSIO, Chandigarh 160030 (India); Thakur, Praveen Kumar [Indian Institute of Remote Sensing (ISRO), Dehradun 248001 (India); Ghanshyam, C. [CSIR-Central Scientific Instruments Organisation, Chandigarh 160030 (India); Academy of Scientific and Innovative Research—CSIO, Chandigarh 160030 (India)

    2015-02-15

    Groundwater vulnerability maps are useful for decision making in land use planning and water resource management. This paper reviews the various groundwater vulnerability assessment models developed across the world. Each model has been evaluated in terms of its pros and cons and the environmental conditions of its application. The paper further discusses the validation techniques used for the generated vulnerability maps by various models. Implicit challenges associated with the development of the groundwater vulnerability assessment models have also been identified with scientific considerations to the parameter relations and their selections. - Highlights: • Various index-based groundwater vulnerability assessment models have been discussed. • A comparative analysis of the models and its applicability in different hydrogeological settings has been discussed. • Research problems of underlying vulnerability assessment models are also reported in this review paper.

  15. The double tragedy of agriculture vulnerability to climate variability in Africa: How vulnerable is smallholder agriculture to rainfall variability in Ghana?

    Directory of Open Access Journals (Sweden)

    Emmanuel K. Derbile

    2016-04-01

    Full Text Available This article analysed vulnerability of smallholder agriculture to climate variability, particularly the alternating incidences of drought and heavy precipitation events in Ghana. Although there is an unmet need for understanding the linkages between climate change and livelihoods, the urgent need for climate change adaptation planning (CCAP in response to climate change makes vulnerability assessment even more compelling in development research. The data for analysis were collected from two complementary studies. These included a regional survey in the Upper West Region and an in-depth study in three selected communities in the Sissala East District. The results showed that smallholder agriculture is significantly vulnerable to climate variability in the region and that three layers of vulnerability can be identified in a ladder of vulnerability. Firstly, farmers are confronted with the double tragedy of droughts and heavy precipitation events, which adversely affect both crops and livestock. Secondly, farmers have to decide on crops for adaptation, but each option – whether indigenous crops, new early-maturing crops or genetically modified crops – predisposes farmers to a different set of risks. Finally, the overall impact is a higher-level vulnerability, namely the risk of total livelihood failure and food insecurity. The article recommended CCAP and an endogenous development (ED approach to addressing agriculture vulnerability to climate variability within the framework of decentralisation and local governance in Ghana. Keywords: Climate variability; agriculture; vulnerability; endogenous development; Ghana

  16. Automated planning of ablation targets in atrial fibrillation treatment

    Science.gov (United States)

    Keustermans, Johannes; De Buck, Stijn; Heidbüchel, Hein; Suetens, Paul

    2011-03-01

    Catheter based radio-frequency ablation is used as an invasive treatment of atrial fibrillation. This procedure is often guided by the use of 3D anatomical models obtained from CT, MRI or rotational angiography. During the intervention the operator accurately guides the catheter to prespecified target ablation lines. The planning stage, however, can be time consuming and operator dependent which is suboptimal both from a cost and health perspective. Therefore, we present a novel statistical model-based algorithm for locating ablation targets from 3D rotational angiography images. Based on a training data set of 20 patients, consisting of 3D rotational angiography images with 30 manually indicated ablation points, a statistical local appearance and shape model is built. The local appearance model is based on local image descriptors to capture the intensity patterns around each ablation point. The local shape model is constructed by embedding the ablation points in an undirected graph and imposing that each ablation point only interacts with its neighbors. Identifying the ablation points on a new 3D rotational angiography image is performed by proposing a set of possible candidate locations for each ablation point, as such, converting the problem into a labeling problem. The algorithm is validated using a leave-one-out-approach on the training data set, by computing the distance between the ablation lines obtained by the algorithm and the manually identified ablation points. The distance error is equal to 3.8+/-2.9 mm. As ablation lesion size is around 5-7 mm, automated planning of ablation targets by the presented approach is sufficiently accurate.

  17. User friendly tools to target vulnerable areas at watershed scale: evaluation of the soil vulnerability and conductivity claypan indices

    Science.gov (United States)

    One finding of the Conservation Effects Assessment Program (CEAP) watershed studies was that Best Management practices (BMPs) were not always installed where most needed: in many watersheds, only a fraction of BMPs were implemented in the most vulnerable areas. While complex computer simulation mode...

  18. Vulnerability mapping as a tool to manage the environmental impacts of oil and gas extraction.

    Science.gov (United States)

    Esterhuyse, Surina; Sokolic, Frank; Redelinghuys, Nola; Avenant, Marinda; Kijko, Andrzej; Glazewski, Jan; Plit, Lisa; Kemp, Marthie; Smit, Ansie; Vos, A Tascha; von Maltitz, Michael J

    2017-11-01

    Various biophysical and socio-economic impacts may be associated with unconventional oil and gas (UOG) extraction. A vulnerability map may assist governments during environmental assessments, spatial planning and the regulation of UOG extraction, as well as decision-making around UOG extraction in fragile areas. A regional interactive vulnerability map was developed for UOG extraction in South Africa. This map covers groundwater, surface water, vegetation, socio-economics and seismicity as mapping themes, based on impacts that may emanate from UOG extraction. The mapping themes were developed using a normative approach, where expert input during the identification and classification of vulnerability indicators may increase the acceptability of the resultant map. This article describes the development of the interactive vulnerability map for South Africa, where UOG extraction is not yet allowed and where regulations are still being developed to manage this activity. The importance and policy implications of using vulnerability maps for managing UOG extraction impacts in countries where UOG extraction is planned are highlighted in this article.

  19. Tsunami vulnerability and damage assessment in the coastal area of Rabat and Salé, Morocco

    Directory of Open Access Journals (Sweden)

    A. Atillah

    2011-12-01

    Full Text Available This study, a companion paper to Renou et al. (2011, focuses on the application of a GIS-based method to assess building vulnerability and damage in the event of a tsunami affecting the coastal area of Rabat and Salé, Morocco. This approach, designed within the framework of the European SCHEMA project (target="_blank">www.schemaproject.org is based on the combination of hazard results from numerical modelling of the worst case tsunami scenario (inundation depth based on the historical Lisbon earthquake of 1755 and the Portugal earthquake of 1969, together with vulnerability building types derived from Earth Observation data, field surveys and GIS data. The risk is then evaluated for this highly concentrated population area characterized by the implementation of a vast project of residential and touristic buildings within the flat area of the Bouregreg Valley separating the cities of Rabat and Salé. A GIS tool is used to derive building damage maps by crossing layers of inundation levels and building vulnerability. The inferred damage maps serve as a base for elaborating evacuation plans with appropriate rescue and relief processes and to prepare and consider appropriate measures to prevent the induced tsunami risk.

  20. A study on agricultural drought vulnerability at disaggregated level in a highly irrigated and intensely cropped state of India.

    Science.gov (United States)

    Murthy, C S; Yadav, Manoj; Mohammed Ahamed, J; Laxman, B; Prawasi, R; Sesha Sai, M V R; Hooda, R S

    2015-03-01

    Drought is an important global hazard, challenging the sustainable agriculture and food security of nations. Measuring agricultural drought vulnerability is a prerequisite for targeting interventions to improve and sustain the agricultural performance of both irrigated and rain-fed agriculture. In this study, crop-generic agricultural drought vulnerability status is empirically measured through a composite index approach. The study area is Haryana state, India, a prime agriculture state of the country, characterised with low rainfall, high irrigation support and stable cropping pattern. By analysing the multiyear rainfall and crop condition data of kharif crop season (June-October) derived from satellite data and soil water holding capacity and groundwater quality, nine contributing indicators were generated for 120 blocks (sub-district administrative units). Composite indices for exposure, sensitivity and adaptive capacity components were generated after assigning variance-based weightages to the respective input indicators. Agricultural Drought Vulnerability Index (ADVI) was developed through a linear combination of the three component indices. ADVI-based vulnerability categorisation revealed that 51 blocks are with vulnerable to very highly vulnerable status. These blocks are located in the southern and western parts of the state, where groundwater quality is saline and water holding capacity of soils is less. The ADVI map has effectively captured the spatial pattern of agricultural drought vulnerability in the state. Districts with large number of vulnerable blocks showed considerably larger variability of de-trended crop yields. Correlation analysis reveals that crop condition variability, groundwater quality and soil factors are closely associated with ADVI. The vulnerability index is useful to prioritise the blocks for implementation of long-term drought management plans. There is scope for improving the methodology by adding/fine-tuning the indicators and

  1. Defining Resilience and Vulnerability Based on Ontology Engineering Approach

    Science.gov (United States)

    Kumazawa, T.; Matsui, T.; Endo, A.

    2014-12-01

    It is necessary to reflect the concepts of resilience and vulnerability into the assessment framework of "Human-Environmental Security", but it is also in difficulty to identify the linkage between both concepts because of the difference of the academic community which has discussed each concept. The authors have been developing the ontology which deals with the sustainability of the social-ecological systems (SESs). Resilience and vulnerability are also the concepts in the target world which this ontology covers. Based on this point, this paper aims at explicating the semantic relationship between the concepts of resilience and vulnerability based on ontology engineering approach. For this purpose, we first examine the definitions of resilience and vulnerability which the existing literatures proposed. Second, we incorporate the definitions in the ontology dealing with sustainability of SESs. Finally, we focus on the "Water-Energy-Food Nexus Index" to assess Human-Environmental Security, and clarify how the concepts of resilience and vulnerability are linked semantically through the concepts included in these index items.

  2. Mapping vulnerability to multiple stressors: climate change and globalization in India

    Energy Technology Data Exchange (ETDEWEB)

    O' Brien, Karen; Aandahl, Guro; Tompkins, Heather [CICERO, Oslo (NO)] (and others)

    2004-12-01

    There is growing recognition in the human dimensions research community that climate change impact studies must take into account the effects of other ongoing global changes. Yet there has been no systematic methodology to study climate change vulnerability in the context of multiple stressors. Using the example of Indian agriculture, this paper presents a methodology for investigating regional vulnerability to climate change in combination with other global stressors. This method, which relies on both vulnerability mapping and local- level case studies, may be used to assess differential vulnerability for any particular sector within a nation or region, and it can serve as a basis for targeting policy interventions. (Author)

  3. Assessing the vulnerability of the evacuation emergency plan: the case of the El Hierro, Canary Island, Spain

    Science.gov (United States)

    Marrero, J. M.; Garcia, A.; Llinares, A.; Lopez, P.; Ortinz, R.

    2012-04-01

    On July 17, 2011 an unrest was detected in the El Hierro island. A serretian submarine eruption started on October 10th in the southern area of the island, two miles away from La Restinga village. The analysis and interpretation of seismic and deformation data show a large volume of intruded magma. These data also show a high probability of a new vent opening. One of the most complex volcanic hazard scenarios is a new open vent in the El Golfo Valley, in the north slope of the island, where more than 5,000 people live. In this area there are only two possible terrestrial evacuation routes: 1) HI-1 road NE direction, the fastest but most vulnerable one, very near a 1,000 meters height cliff and through a 2 km tunnel with a structural deficiency that had to be closed during high energy periods of seismic activity; and 2) HI-1 road SW direction, a mountain road with many curves, frequent small landslides and fog. The Emergency Plan of the island takes into account the entire evacuation of El Golfo Valley in case of eruption. This process will be carried out by means of an assisted evacuation. The evacuees will be transported to a temporally regrouping shelter outside the valley to organize the transport to Tenerife Island. Only those people who have a second residence or relatives outside the affected area will be able to remain in the island. The evacuation time estimated by authorities for the entire evacuation of El Golfo Valley is of about 4 hours. This is extremely low considering: the complexity of the area; the number of evacuees; the lack of preparedness by the population; and adverse weather conditions. To evaluate the Evacuation Plan vulnerability, a series of evacuation scenarios have been simulated: self-evacuation; assisted evacuation; both terrestrial evacuation routes. The warning time, the response time by the population and the evacuation time have been taken into account.

  4. Vulnerability to Climate Change in Rural Nicaragua

    Science.gov (United States)

    Byrne, T. R.; Townshend, I.; Byrne, J. M.; McDaniel, S. A.

    2013-12-01

    While there is a growing recognition of the impact that climate change may have on human development, there has been a shift in focus from an impacts-led assessment approach towards a vulnerability-led assessment approach. This research operationalizes the IPCC's definition of vulnerability in a sub-national assessment to understand how different factors that shape vulnerability to climate change vary spatially across rural Nicaragua. The research utilizes the Food and Agriculture Organization of the United Nations' (FAO UN) CropWat model to evaluate how the annual yield of two of Nicaragua's staple crops may change under projected changes in temperature and precipitation. This analysis of agricultural sensitivity under exposure to climate change is then overlain with an indicator-based assessment of adaptive capacity in rural Nicaraguan farming households. Adaptive capacity was evaluated using household survey data from the 2001 National Household Survey on Living Standards Measurement, which was provided to us by the FAO UN. The result is a map representing current vulnerability to future climate change, and can serve as a basis for targeting policy interventions in rural Nicaragua.

  5. Environmental impact assessment: Classification of ecosystems with respect to vulnerability for radioactive contamination

    International Nuclear Information System (INIS)

    Blytt, Line Diana

    1999-01-01

    This presentation recommends that an environmental impact assessment should be made ahead of any major action plan in the environment. The final document should point out to the authorities and public that expertise has been systematised in order to predict the effects of an action plan on the environment. This should be done for different scenarios and time scales. A useful tool for an environmental impact assessment is GIS, Geographic Information Systems. It can be used to identify areas and ecosystems that are vulnerable to radioactive contamination. To predict the radiation dose to humans and biota, a vulnerability assessment considers population density, land use, economic resources and the chemical and biological pathways of radionuclides in different ecosystems. Supplemented with knowledge of consumption and dietary habits a vulnerability assessment can be used to identify critical groups and to calculate doses to these groups. For ecosystems, vulnerability can be quantified by using critical loads for radioactive contamination or flux of radionuclides from an area. One criterion for critical load can be that intervention limits for food products should not be exceeded. If the critical load is low, this indicates a high vulnerability. The flux from an area can also identify vulnerability and it can be used to calculate collective dose. The vulnerability approach is a methodology that can be used to select areas that are suitable for treatment, transport and disposal of radioactive waste

  6. Implications of adopting a biodiversity-based vulnerability index versus a shoreline environmental sensitivity index on management and policy planning along coastal areas.

    Science.gov (United States)

    Harik, G; Alameddine, I; Maroun, R; Rachid, G; Bruschi, D; Astiaso Garcia, D; El-Fadel, M

    2017-02-01

    In this study, a multi-criteria index was developed to assess anthropogenic stressors along the Mediterranean coastline. The index aimed at geo-locating pollution hotspots for informed decision making related to coastal zone management. The index was integrated in a Geographical Information System based geodatabase implemented at several pilot areas along the Northern (Italy and France), Eastern (Lebanon), and Southern (Tunisia) Mediterranean coastlines. The generated stressor maps were coupled with a biodiversity richness index and an environmental sensitivity index to produce vulnerability maps that can form the basis for prioritizing management and mitigation interventions towards the identification of pollution hotspots and the promotion of sustainable coastal zone management. The results identified significant differences between the two assessment methods, which can bias prioritization in decision making and policy planning depending on stakeholders' interests. The discrepancies emphasize the need for transparency and understanding of the underlying foundations behind vulnerability indices and mapping development. Copyright © 2016 Elsevier Ltd. All rights reserved.

  7. Space Station Program threat and vulnerability analysis

    Science.gov (United States)

    Van Meter, Steven D.; Veatch, John D.

    1987-01-01

    An examination has been made of the physical security of the Space Station Program at the Kennedy Space Center in a peacetime environment, in order to furnish facility personnel with threat/vulnerability information. A risk-management approach is used to prioritize threat-target combinations that are characterized in terms of 'insiders' and 'outsiders'. Potential targets were identified and analyzed with a view to their attractiveness to an adversary, as well as to the consequentiality of the resulting damage.

  8. Development and implementation of a Bayesian-based aquifer vulnerability assessment in Florida

    Science.gov (United States)

    Arthur, J.D.; Wood, H.A.R.; Baker, A.E.; Cichon, J.R.; Raines, G.L.

    2007-01-01

    The Florida Aquifer Vulnerability Assessment (FAVA) was designed to provide a tool for environmental, regulatory, resource management, and planning professionals to facilitate protection of groundwater resources from surface sources of contamination. The FAVA project implements weights-of-evidence (WofE), a data-driven, Bayesian-probabilistic model to generate a series of maps reflecting relative aquifer vulnerability of Florida's principal aquifer systems. The vulnerability assessment process, from project design to map implementation is described herein in reference to the Floridan aquifer system (FAS). The WofE model calculates weighted relationships between hydrogeologic data layers that influence aquifer vulnerability and ambient groundwater parameters in wells that reflect relative degrees of vulnerability. Statewide model input data layers (evidential themes) include soil hydraulic conductivity, density of karst features, thickness of aquifer confinement, and hydraulic head difference between the FAS and the watertable. Wells with median dissolved nitrogen concentrations exceeding statistically established thresholds serve as training points in the WofE model. The resulting vulnerability map (response theme) reflects classified posterior probabilities based on spatial relationships between the evidential themes and training points. The response theme is subjected to extensive sensitivity and validation testing. Among the model validation techniques is calculation of a response theme based on a different water-quality indicator of relative recharge or vulnerability: dissolved oxygen. Successful implementation of the FAVA maps was facilitated by the overall project design, which included a needs assessment and iterative technical advisory committee input and review. Ongoing programs to protect Florida's springsheds have led to development of larger-scale WofE-based vulnerability assessments. Additional applications of the maps include land-use planning

  9. Road Network Vulnerability Analysis Based on Improved Ant Colony Algorithm

    Directory of Open Access Journals (Sweden)

    Yunpeng Wang

    2014-01-01

    Full Text Available We present an improved ant colony algorithm-based approach to assess the vulnerability of a road network and identify the critical infrastructures. This approach improves computational efficiency and allows for its applications in large-scale road networks. This research involves defining the vulnerability conception, modeling the traffic utility index and the vulnerability of the road network, and identifying the critical infrastructures of the road network. We apply the approach to a simple test road network and a real road network to verify the methodology. The results show that vulnerability is directly related to traffic demand and increases significantly when the demand approaches capacity. The proposed approach reduces the computational burden and may be applied in large-scale road network analysis. It can be used as a decision-supporting tool for identifying critical infrastructures in transportation planning and management.

  10. [Hegemonic masculinity, vulnerability and the prevention of HIV/AIDS].

    Science.gov (United States)

    Marques, Joilson Santana; Gomes, Romeu; do Nascimento, Elaine Ferreira

    2012-02-01

    The study aims to examine the relationship between masculinity, vulnerability and the prevention of HIV/AIDS, based on reports from young men from the so-called urban working classes, taking into account not only the meanings attributed to prevention by these subjects, but also considering the dialectical relationship between the individual and society. The conceptual framework encompasses the three main aspects of hegemonic masculinity, prevention and vulnerability. This involves qualitative research based on the perspective of dialectical hermeneutics that uses the method of interpretation of meanings. The analysis yielded two main results, namely hegemonic masculinity as a vulnerability factor, and myths and prejudices as factors of vulnerability to HIV/AIDS. By way of conclusion, it reinforces the need for discussion of prevention encompassing the need to put on the agenda the construction of the sex/gender system around which to articulate the social meanings of masculinity and femininity that influence the structural plan of affective sexual relations in general and HIV/AIDS in particular.

  11. European information on climate change impacts, vulnerability and adaptation

    Science.gov (United States)

    Jol, A.; Isoard, S.

    2010-09-01

    Vulnerability to natural and technological disasters is increasing due to a combination of intensifying land use, increasing industrial development, further urban expansion and expanding infrastructure and also climate change. At EU level the European Commission's White Paper on adaptation to climate change (published in 2009) highlights that adaptation actions should be focused on the most vulnerable areas and communities in Europe (e.g. mountains, coastal areas, river flood prone areas, Mediterranean, Arctic). Mainstreaming of climate change into existing EU policies will be a key policy, including within the Water Framework Directive, Marine Strategy Framework Directive, Nature protection and biodiversity policies, integrated coastal zone management, other (sectoral) policies (agriculture, forestry, energy, transport, health) and disaster risk prevention. 2010 is the international year on biodiversity and the Conference of Parties of the biodiversity convention will meet in autumn 2010 (Japan) to discuss amongst other post-2010 strategies, objectives and indicators. Both within the Biodiversity Convention (CBD) and the Climate Change Convention (UNFCCC) there is increasing recognition of the need for integration of biodiversity conservation into climate change mitigation and adaptation activities. Furthermore a number of European countries and also some regions have started to prepare and/or have adopted national adaptation plans or frameworks. Sharing of good practices on climate change vulnerability methods and adaptation actions is so far limited, but is essential to improve such plans, at national, sub national and local level where much of the adaptation action is already taking place and will be expanding in future, also involving increasingly the business community. The EU Clearinghouse on CC impacts, vulnerability and adaptation should address these needs and it is planned to be operational end of 2011. The EEA is expected to have a role in its

  12. Dynamic vulnerability assessment and intelligent control for sustainable power systems

    CERN Document Server

    Gonzalez-Longatt, Francisco

    2018-01-01

    Identifying, assessing, and mitigating electric power grid vulnerabilities is a growing focus in short-term operational planning of power systems. Through illustrated application, this important guide surveys state-of-the-art methodologies for the assessment and enhancement of power system security in short-term operational planning and real-time operation. The methodologies employ advanced methods from probabilistic theory, data mining, artificial intelligence, and optimization, to provide knowledge-based support for monitoring, control (preventive and corrective), and decision making tasks. Key features: Introduces behavioural recognition in wide-area monitoring and security constrained optimal power flow for intelligent control and protection and optimal grid management. Provides in-depth understanding of risk-based reliability and security assessment, dynamic vulnerability as essment methods, supported by the underpinning mathematics. Develops expertise in mitigation techniques using intelligent protect...

  13. A situational analysis of priority disaster hazards in Uganda: findings from a hazard and vulnerability analysis.

    Science.gov (United States)

    Mayega, R W; Wafula, M R; Musenero, M; Omale, A; Kiguli, J; Orach, G C; Kabagambe, G; Bazeyo, W

    2013-06-01

    Most countries in sub-Saharan Africa have not conducted a disaster risk analysis. Hazards and vulnerability analyses provide vital information that can be used for development of risk reduction and disaster response plans. The purpose of this study was to rank disaster hazards for Uganda, as a basis for identifying the priority hazards to guide disaster management planning. The study as conducted in Uganda, as part of a multi-country assessment. A hazard, vulnerability and capacity analysis was conducted in a focus group discussion of 7 experts representing key stakeholder agencies in disaster management in Uganda. A simple ranking method was used to rank the probability of occurance of 11 top hazards, their potential impact and the level vulnerability of people and infrastructure. In-terms of likelihood of occurance and potential impact, the top ranked disaster hazards in Uganda are: 1) Epidemics of infectious diseases, 2) Drought/famine, 3) Conflict and environmental degradation in that order. In terms of vulnerability, the top priority hazards to which people and infrastructure were vulnerable were: 1) Conflicts, 2) Epidemics, 3) Drought/famine and, 4) Environmental degradation in that order. Poverty, gender, lack of information, and lack of resilience measures were some of the factors promoting vulnerability to disasters. As Uganda develops a disaster risk reduction and response plan, it ought to prioritize epidemics of infectious diseases, drought/famine, conflics and environmental degradation as the priority disaster hazards.

  14. Assessing infrastructure vulnerability to major floods

    Energy Technology Data Exchange (ETDEWEB)

    Jenssen, Lars

    1998-12-31

    This thesis proposes a method for assessing the direct effects of serious floods on a physical infrastructure or utility. This method should be useful in contingency planning and in the design of structures likely to be damaged by flooding. A review is given of (1) methods of floodplain management and strategies for mitigating floods, (2) methods of risk analysis that will become increasingly important in flood management, (3) methods for hydraulic computations, (4) a variety of scour assessment methods and (5) applications of geographic information systems (GIS) to the analysis of flood vulnerability. Three computer codes were developed: CULVCAP computes the headwater level for circular and box culverts, SCOUR for assessing riprap stability and scour depths, and FASTFLOOD prepares input rainfall series and input files for the rainfall-runoff model used in the case study. A road system in central Norway was chosen to study how to analyse the flood vulnerability of an infrastructure. Finally, the thesis proposes a method for analysing the flood vulnerability of physical infrastructure. The method involves a general stage that will provide data on which parts of the infrastructure are potentially vulnerable to flooding and how to analyse them, and a specific stage which is concerned with analysing one particular kind of physical infrastructure in a study area. 123 refs., 59 figs., 17 tabs= .

  15. Moving from awareness to action: Advancing climate change vulnerability assessments and adaptation planning for Idaho and Montana National Forests

    Science.gov (United States)

    Kershner, Jessi; Woodward, Andrea; Torregrosa, Alicia

    2016-01-01

    The rugged landscapes of northern Idaho and western Montana support biodiverse ecosystems, and provide a variety of natural resources and services for human communities. However, the benefits provided by these ecosystems may be at risk as changing climate magnifies existing stressors and allows new stressors to emerge. Preparation for and response to these potential changes can be most effectively addressed through multi-stakeholder partnerships, evaluating vulnerability of important resources to climate change, and developing response and preparation strategies for managing key natural resources in a changing world. This project will support climate-smart conservation and management across forests of northern Idaho and western Montana through three main components: (1) fostering partnerships among scientists, land managers, regional landowners, conservation practitioners, and the public; (2) assessing the vulnerability of a suite of regionally important resources to climate change and other stressors; and (3) creating a portfolio of adaptation strategies and actions to help resource managers prepare for and respond to the likely impacts of climate change. The results of this project will be used to inform the upcoming land management plan revisions for national forests, helping ensure that the most effective and robust conservation and management strategies are implemented to preserve our natural resources.

  16. Intrinsic vulnerability assessment of Sette Comuni Plateau aquifer (Veneto Region, Italy).

    Science.gov (United States)

    Cucchi, Franco; Franceschini, Giuliana; Zini, Luca; Aurighi, Marina

    2008-09-01

    Maps illustrating the different degrees of vulnerability within a given area are integral to environmental protection and management policies. The assessment of the intrinsic vulnerability of karst areas is difficult since the type and stage of karst development and the related underground discharge behavior are difficult to determine and quantify. Geographic Information Systems techniques are applied to the evaluation of the vulnerability of an aquifer in the alpine karst area of the Sette Comuni Plateau, in the Veneto Region of northern Italy. The water resources of the studied aquifer are of particular importance to the local communities. This aquifer must therefore be protected from both inappropriate use as well as possible pollution. The SINTACS and SINTACS P(RO) K(ARST) vulnerability assessment methods have been utilized here to create the vulnerability map. SINTACS P(RO) K(ARST) is an adaptation of the parametric managerial model (SINTACS) to karst hydrostructures. The vulnerability map reveals vast zones (81% of the analyzed areas) with a high degree of vulnerability. The presence of well-developed karst structures in these highly vulnerable areas facilitate water percolation, thereby enhancing the groundwater vulnerability risk. Only 1.5 of the studied aquifer have extremely high-vulnerability levels, however these areas include all of the major springs utilized for human consumption. This vulnerability map of the Sette Comuni Plateau aquifer is an indispensable tool for both the effective management of water resources and as support to environmental planning in the Sette Comuni Plateau area.

  17. Radiotherapy beyond cancer: Target localization in real-time MRI and treatment planning for cardiac radiosurgery

    International Nuclear Information System (INIS)

    Ipsen, S.; Blanck, O.; Rades, D.; Oborn, B.; Bode, F.; Liney, G.; Hunold, P.; Schweikard, A.; Keall, P. J.

    2014-01-01

    Purpose: Atrial fibrillation (AFib) is the most common cardiac arrhythmia that affects millions of patients world-wide. AFib is usually treated with minimally invasive, time consuming catheter ablation techniques. While recently noninvasive radiosurgery to the pulmonary vein antrum (PVA) in the left atrium has been proposed for AFib treatment, precise target location during treatment is challenging due to complex respiratory and cardiac motion. A MRI linear accelerator (MRI-Linac) could solve the problems of motion tracking and compensation using real-time image guidance. In this study, the authors quantified target motion ranges on cardiac magnetic resonance imaging (MRI) and analyzed the dosimetric benefits of margin reduction assuming real-time motion compensation was applied. Methods: For the imaging study, six human subjects underwent real-time cardiac MRI under free breathing. The target motion was analyzed retrospectively using a template matching algorithm. The planning study was conducted on a CT of an AFib patient with a centrally located esophagus undergoing catheter ablation, representing an ideal case for cardiac radiosurgery. The target definition was similar to the ablation lesions at the PVA created during catheter treatment. Safety margins of 0 mm (perfect tracking) to 8 mm (untracked respiratory motion) were added to the target, defining the planning target volume (PTV). For each margin, a 30 Gy single fraction IMRT plan was generated. Additionally, the influence of 1 and 3 T magnetic fields on the treatment beam delivery was simulated using Monte Carlo calculations to determine the dosimetric impact of MRI guidance for two different Linac positions. Results: Real-time cardiac MRI showed mean respiratory target motion of 10.2 mm (superior–inferior), 2.4 mm (anterior–posterior), and 2 mm (left–right). The planning study showed that increasing safety margins to encompass untracked respiratory motion leads to overlapping structures even in the

  18. Radiotherapy beyond cancer: Target localization in real-time MRI and treatment planning for cardiac radiosurgery

    Energy Technology Data Exchange (ETDEWEB)

    Ipsen, S. [Radiation Physics Laboratory, Sydney Medical School, The University of Sydney, Sydney, New South Wales 2006, Australia and Institute for Robotics and Cognitive Systems, University of Luebeck, Luebeck 23562 (Germany); Blanck, O.; Rades, D. [Department of Radiation Oncology, University of Luebeck and University Medical Center Schleswig-Holstein, Campus Luebeck, Luebeck 23562 (Germany); Oborn, B. [Illawarra Cancer Care Centre (ICCC), Wollongong, New South Wales 2500, Australia and Centre for Medical Radiation Physics (CMRP), University of Wollongong, Wollongong, New South Wales 2500 (Australia); Bode, F. [Medical Department II, University of Luebeck and University Medical Center Schleswig-Holstein, Campus Luebeck, Luebeck 23562 (Germany); Liney, G. [Ingham Institute for Applied Medical Research, Liverpool Hospital, Liverpool, New South Wales 2170 (Australia); Hunold, P. [Department of Radiology and Nuclear Medicine, University of Luebeck and University Medical Center Schleswig-Holstein, Campus Luebeck, Luebeck 23562 (Germany); Schweikard, A. [Institute for Robotics and Cognitive Systems, University of Luebeck, Luebeck 23562 (Germany); Keall, P. J., E-mail: paul.keall@sydney.edu.au [Radiation Physics Laboratory, Sydney Medical School, The University of Sydney, Sydney, New South Wales 2006 (Australia)

    2014-12-15

    Purpose: Atrial fibrillation (AFib) is the most common cardiac arrhythmia that affects millions of patients world-wide. AFib is usually treated with minimally invasive, time consuming catheter ablation techniques. While recently noninvasive radiosurgery to the pulmonary vein antrum (PVA) in the left atrium has been proposed for AFib treatment, precise target location during treatment is challenging due to complex respiratory and cardiac motion. A MRI linear accelerator (MRI-Linac) could solve the problems of motion tracking and compensation using real-time image guidance. In this study, the authors quantified target motion ranges on cardiac magnetic resonance imaging (MRI) and analyzed the dosimetric benefits of margin reduction assuming real-time motion compensation was applied. Methods: For the imaging study, six human subjects underwent real-time cardiac MRI under free breathing. The target motion was analyzed retrospectively using a template matching algorithm. The planning study was conducted on a CT of an AFib patient with a centrally located esophagus undergoing catheter ablation, representing an ideal case for cardiac radiosurgery. The target definition was similar to the ablation lesions at the PVA created during catheter treatment. Safety margins of 0 mm (perfect tracking) to 8 mm (untracked respiratory motion) were added to the target, defining the planning target volume (PTV). For each margin, a 30 Gy single fraction IMRT plan was generated. Additionally, the influence of 1 and 3 T magnetic fields on the treatment beam delivery was simulated using Monte Carlo calculations to determine the dosimetric impact of MRI guidance for two different Linac positions. Results: Real-time cardiac MRI showed mean respiratory target motion of 10.2 mm (superior–inferior), 2.4 mm (anterior–posterior), and 2 mm (left–right). The planning study showed that increasing safety margins to encompass untracked respiratory motion leads to overlapping structures even in the

  19. Radiotherapy beyond cancer: target localization in real-time MRI and treatment planning for cardiac radiosurgery.

    Science.gov (United States)

    Ipsen, S; Blanck, O; Oborn, B; Bode, F; Liney, G; Hunold, P; Rades, D; Schweikard, A; Keall, P J

    2014-12-01

    Atrial fibrillation (AFib) is the most common cardiac arrhythmia that affects millions of patients world-wide. AFib is usually treated with minimally invasive, time consuming catheter ablation techniques. While recently noninvasive radiosurgery to the pulmonary vein antrum (PVA) in the left atrium has been proposed for AFib treatment, precise target location during treatment is challenging due to complex respiratory and cardiac motion. A MRI linear accelerator (MRI-Linac) could solve the problems of motion tracking and compensation using real-time image guidance. In this study, the authors quantified target motion ranges on cardiac magnetic resonance imaging (MRI) and analyzed the dosimetric benefits of margin reduction assuming real-time motion compensation was applied. For the imaging study, six human subjects underwent real-time cardiac MRI under free breathing. The target motion was analyzed retrospectively using a template matching algorithm. The planning study was conducted on a CT of an AFib patient with a centrally located esophagus undergoing catheter ablation, representing an ideal case for cardiac radiosurgery. The target definition was similar to the ablation lesions at the PVA created during catheter treatment. Safety margins of 0 mm (perfect tracking) to 8 mm (untracked respiratory motion) were added to the target, defining the planning target volume (PTV). For each margin, a 30 Gy single fraction IMRT plan was generated. Additionally, the influence of 1 and 3 T magnetic fields on the treatment beam delivery was simulated using Monte Carlo calculations to determine the dosimetric impact of MRI guidance for two different Linac positions. Real-time cardiac MRI showed mean respiratory target motion of 10.2 mm (superior-inferior), 2.4 mm (anterior-posterior), and 2 mm (left-right). The planning study showed that increasing safety margins to encompass untracked respiratory motion leads to overlapping structures even in the ideal scenario, compromising

  20. Hydrologic vulnerability of tribal reservation lands across the U.S.

    Science.gov (United States)

    Jones, C., Jr.; Leibowitz, S. G.; Sawicz, K. A.; Comeleo, R. L.; Stratton, L. E.

    2017-12-01

    We apply the hydrologic landscapes (HL) concept to assess the hydrologic vulnerability to climate of the United States (U.S.) with special emphasis on tribal lands. The basic assumption of the HL approach is that catchments that share similar physical and climatic characteristics are expected to have similar hydrologic characteristics. We map climate vulnerability by integrating a retrospective analysis of historical climate and hydrology into the HL approach, comparing this baseline of variability with future projections of temperature, precipitation, potential evapotranspiration, snow accumulation, climatic moisture, surplus water, and seasonality of the water surplus. Projections that are not within two standard deviations of the historical decadal average contribute to the vulnerability index for each metric. This allows stakeholders and/or water resource managers to understand the potential impacts of future conditions. The resulting vulnerability maps show that temperature and potential evapotranspiration are consistently projected to have high vulnerability indices across the U.S. including all tribal reservations. Precipitation vulnerability is not as spatially-uniform as temperature. Most areas with snow are projected to experience significant changes in future snow accumulation. The seasonality vulnerability map shows that mountainous areas in the West are most prone to changes in seasonality. This paper illustrates how the HL approach can help assess climatic and hydrologic vulnerability for disadvantaged groups across the U.S. By combining the HL concept and climate vulnerability analyses, we provide an approach that can assist tribal resource managers to perform vulnerability assessments and adaptation plans, which is a major priority for the tribes nationwide.

  1. US command improvements and command vulnerability

    International Nuclear Information System (INIS)

    Ball, D.; Bethe, H.A.; Blair, B.G.; Bracken, P.; Carter, A.B.; Dickinson, H.; Garwin, R.L.; Holloway, D.; Kendall, H.W.

    1988-01-01

    In essence, the United States still relies on the strategic command system erected during the 1960s and 1970s, but as we have seen, this system suffers from a number of serious weaknesses. Among these the authors emphasized the vulnerability of vital communications even before any warheads impact directly on U.S. targets, as well as the systems; heavy reliance on a relatively small number of limited-endurance aircraft as command posts and radio relays. This paper focuses on the committed improvement program, assess its impact on command vulnerability, and offer suggestions for further command improvements designed to enhance crisis stability and to facilitate ware termination should deterrence fail. The reader should note that this chapter is rather more technical than the remainder of this book

  2. Developing plan and pre-conceptual design of target system for JAERI`s high intensity neutron source

    Energy Technology Data Exchange (ETDEWEB)

    Hino, Ryutaro; Kaminaga, Masanori; Haga, Katsuhiro; Ishikura, Syuichi [Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan). Tokai Research Establishment; Nakamura, Fumito; Uchida, Shoji

    1997-11-01

    This paper presents an outline of developing plan of a target system and topics obtained by a pre-conceptual design, which aims to establish a technology base of the target system and to make clear a system concept. In the plan, two types of target - solid and mercury targets - are to be developed for a neutron scattering facility. Information obtained through the development shall be applied to designs of an irradiation and a transmutation facilities. Through the pre-conceptual design, system arrangement, scale etc. were made clear: total weight will be 12000 ton, and 26 beam lines with beam shutters will be equipped for 4 moderators. Engineering problems were also made clear through the design; high flux heat removal, dynamic stress caused by thermal shock and pressure wave, loop technology for the mercury target and a slurry moderator consisting of methane pellets and liquefied hydrogen. We are now constructing new test apparatuses and arranging computer codes for solving these problems. (author)

  3. Vulnerability of oceanic sharks as pelagic longline bycatch

    Directory of Open Access Journals (Sweden)

    A.J. Gallagher

    2014-08-01

    Full Text Available Bycatch (the unintentional catch of non-target species or sizes is consistently ranked as one of the greatest threats to marine fish populations; yet species-specific rates of bycatch survival are rarely considered in risk assessments. Regulations often require that bycatch of threatened species be released; but, if animals are already dead, their release serves no conservation purpose. We examined the survival of 12 shark species caught as bycatch in the US Atlantic pelagic longline fishery. Shark survival was evaluated in relation to fishery target (swordfish versus tuna and four operational, environmental, and biological variables to evaluate the underlying mechanisms affecting mortality. Survival estimates ranged from 33% (night shark to 97% (tiger shark with seven of the 12 species being significantly affected by at least one variable. We placed our survival results within a framework that assessed each species’ relative vulnerability by integrating survival estimates with reproductive potential and found that the bigeye thresher, dusky, night, and scalloped hammerhead shark exhibited the highest vulnerabilities to bycatch. We suggest that considering ecological and biological traits of species shows promise for designing effective conservation measures, whereas techniques that reduce fisheries interactions in the first place may be the best strategy for highly vulnerable species.

  4. Forecasting Urban Forest Ecosystem Structure, Function, and Vulnerability

    Science.gov (United States)

    James W. N. Steenberg; Andrew A. Millward; David J. Nowak; Pamela J. Robinson; Alexis Ellis

    2016-01-01

    The benefits derived from urban forest ecosystems are garnering increasing attention in ecological research and municipal planning. However, because of their location in heterogeneous and highly-altered urban landscapes, urban forests are vulnerable and commonly suffer disproportionate and varying levels of stress and disturbance. The objective of this study is to...

  5. HIV/AIDS National Strategic Plans of Sub-Saharan African countries: an analysis for gender equality and sex-disaggregated HIV targets.

    Science.gov (United States)

    Sherwood, Jennifer; Sharp, Alana; Cooper, Bergen; Roose-Snyder, Beirne; Blumenthal, Susan

    2017-12-01

    National Strategic Plans (NSPs) for HIV/AIDS are country planning documents that set priorities for programmes and services, including a set of targets to quantify progress toward national and international goals. The inclusion of sex-disaggregated targets and targets to combat gender inequality is important given the high disease burden among young women and adolescent girls in Sub-Saharan Africa, yet no comprehensive gender-focused analysis of NSP targets has been performed. This analysis quantitatively evaluates national HIV targets, included in NSPs from eighteen Sub-Saharan African countries, for sex-disaggregation. Additionally, NSP targets aimed at reducing gender-based inequality in health outcomes are compiled and inductively coded to report common themes. On average, in the eighteen countries included in this analysis, 31% of NSP targets include sex-disaggregation (range 0-92%). Three countries disaggregated a majority (>50%) of their targets by sex. Sex-disaggregation in data reporting was more common for targets related to the early phases of the HIV care continuum: 83% of countries included any sex-disaggregated targets for HIV prevention, 56% for testing and linkage to care, 22% for improving antiretroviral treatment coverage, and 11% for retention in treatment. The most common target to reduce gender inequality was to prevent gender-based violence (present in 50% of countries). Other commonly incorporated target areas related to improving women's access to family planning, human and legal rights, and decision-making power. The inclusion of sex-disaggregated targets in national planning is vital to ensure that programmes make progress for all population groups. Improving the availability and quality of indicators to measure gender inequality, as well as evaluating programme outcomes by sex, is critical to tracking this progress. This analysis reveals an urgent need to set specific and separate targets for men and women in order to achieve an equitable

  6. HIV/AIDS National Strategic Plans of Sub-Saharan African countries: an analysis for gender equality and sex-disaggregated HIV targets

    Science.gov (United States)

    Sherwood, Jennifer; Sharp, Alana; Cooper, Bergen; Roose-Snyder, Beirne; Blumenthal, Susan

    2017-01-01

    Abstract National Strategic Plans (NSPs) for HIV/AIDS are country planning documents that set priorities for programmes and services, including a set of targets to quantify progress toward national and international goals. The inclusion of sex-disaggregated targets and targets to combat gender inequality is important given the high disease burden among young women and adolescent girls in Sub-Saharan Africa, yet no comprehensive gender-focused analysis of NSP targets has been performed. This analysis quantitatively evaluates national HIV targets, included in NSPs from eighteen Sub-Saharan African countries, for sex-disaggregation. Additionally, NSP targets aimed at reducing gender-based inequality in health outcomes are compiled and inductively coded to report common themes. On average, in the eighteen countries included in this analysis, 31% of NSP targets include sex-disaggregation (range 0–92%). Three countries disaggregated a majority (>50%) of their targets by sex. Sex-disaggregation in data reporting was more common for targets related to the early phases of the HIV care continuum: 83% of countries included any sex-disaggregated targets for HIV prevention, 56% for testing and linkage to care, 22% for improving antiretroviral treatment coverage, and 11% for retention in treatment. The most common target to reduce gender inequality was to prevent gender-based violence (present in 50% of countries). Other commonly incorporated target areas related to improving women’s access to family planning, human and legal rights, and decision-making power. The inclusion of sex-disaggregated targets in national planning is vital to ensure that programmes make progress for all population groups. Improving the availability and quality of indicators to measure gender inequality, as well as evaluating programme outcomes by sex, is critical to tracking this progress. This analysis reveals an urgent need to set specific and separate targets for men and women in order to achieve

  7. Cost-effectiveness analysis of HPV vaccination: comparing the general population with socially vulnerable individuals.

    Science.gov (United States)

    Han, Kyu-Tae; Kim, Sun Jung; Lee, Seo Yoon; Park, Eun-Cheol

    2014-01-01

    After the WHO recommended HPV vaccination of the general population in 2009, government support of HPV vaccination programs was increased in many countries. However, this policy was not implemented in Korea due to perceived low cost-effectiveness. Thus, the aim of this study was to analyze the cost-utility of HPV vaccination programs targeted to high risk populations as compared to vaccination programs for the general population. Each study population was set to 100,000 people in a simulation study to determine the incremental cost-utility ratio (ICUR), then standard prevalence rates, cost, vaccination rates, vaccine efficacy, and the Quality-Adjusted Life-Years (QALYs) were applied to the analysis. In addition, sensitivity analysis was performed by assuming discounted vaccination cost. In the socially vulnerable population, QALYs gained through HPV vaccination were higher than that of the general population (General population: 1,019, Socially vulnerable population: 5,582). The results of ICUR showed that the cost of HPV vaccination was higher for the general population than the socially vulnerable population. (General population: 52,279,255 KRW, Socially vulnerable population: 9,547,347 KRW). Compared with 24 million KRW/QALYs as the social threshold, vaccination of the general population was not cost-effective. In contrast, vaccination of the socially vulnerable population was strongly cost-effective. The results suggest the importance and necessity of government support of HPV vaccination programs targeted to socially vulnerable populations because a targeted approach is much more cost-effective. The implementation of government support for such vaccination programs is a critical strategy for decreasing the burden of HPV infection in Korea.

  8. Mapping social-ecological vulnerability to inform local decision making.

    Science.gov (United States)

    Thiault, Lauric; Marshall, Paul; Gelcich, Stefan; Collin, Antoine; Chlous, Frédérique; Claudet, Joachim

    2018-04-01

    An overarching challenge of natural resource management and biodiversity conservation is that relationships between people and nature are difficult to integrate into tools that can effectively guide decision making. Social-ecological vulnerability offers a valuable framework for identifying and understanding important social-ecological linkages, and the implications of dependencies and other feedback loops in the system. Unfortunately, its implementation at local scales has hitherto been limited due at least in part to the lack of operational tools for spatial representation of social-ecological vulnerability. We developed a method to map social-ecological vulnerability based on information on human-nature dependencies and ecosystem services at local scales. We applied our method to the small-scale fishery of Moorea, French Polynesia, by combining spatially explicit indicators of exposure, sensitivity, and adaptive capacity of both the resource (i.e., vulnerability of reef fish assemblages to fishing) and resource users (i.e., vulnerability of fishing households to the loss of fishing opportunity). Our results revealed that both social and ecological vulnerabilities varied considerably through space and highlighted areas where sources of vulnerability were high for both social and ecological subsystems (i.e., social-ecological vulnerability hotspots) and thus of high priority for management intervention. Our approach can be used to inform decisions about where biodiversity conservation strategies are likely to be more effective and how social impacts from policy decisions can be minimized. It provides a new perspective on human-nature linkages that can help guide sustainability management at local scales; delivers insights distinct from those provided by emphasis on a single vulnerability component (e.g., exposure); and demonstrates the feasibility and value of operationalizing the social-ecological vulnerability framework for policy, planning, and participatory

  9. Integrated assessment for establishing an oil environmental vulnerability map: case study for the Santos Basin region, Brazil.

    Science.gov (United States)

    Romero, A F; Abessa, D M S; Fontes, R F C; Silva, G H

    2013-09-15

    The growth of maritime transport and oil exploitation activities may increase the risk of oil spills. Thus, plans and actions to prevent or mitigate impacts are needed to minimize the effects caused by oil. However, tools used worldwide to support contingency plans have not been integrated, thus leading to failure in establishing priority areas. This investigation aimed to develop indices of environmental vulnerability to oil (IEVO), by combining information about environmental sensibility to oil and results of numerical modeling of spilled oil. To achieve that, a case study concerning to oil spills scenarios in a subtropical coastal area was designed, and IEVOs were calculated and presented in maps, in order to make the information about the areas' vulnerability more easily visualized. For summer, the extension of coastline potentially affected by oil was approximately 150 km, and most of the coastline presented medium to high vulnerability. For winter, 230 km coastline would be affected, from which 75% were classified as medium to high vulnerability. Thus, IEVO maps allowed a rapid and clearer interpretation of the vulnerability of the mapped region, facilitating the planning process and the actions in response to an oil spill. Copyright © 2013 Elsevier Ltd. All rights reserved.

  10. Assessment of groundwater vulnerability by applying the modified DRASTIC model in Beihai City, China.

    Science.gov (United States)

    Wu, Xiaoyu; Li, Bin; Ma, Chuanming

    2018-05-01

    This study assesses vulnerability of groundwater to pollution in Beihai City, China, as a support of groundwater resource protection. The assessment result not only objectively reflects potential possibility of groundwater to contamination but also provides scientific basis for the planning and utilization of groundwater resources. This study optimizes the parameters consisting of natural factors and human factors upon the DRASTIC model and modifies the ratings of these parameters, based on the local environmental conditions for the study area. And a weight of each parameter is assigned by the analytic hierarchy process (AHP) to reduce the subjectivity of humans to vulnerability assessment. The resulting scientific ratings and weights of modified DRASTIC model (AHP-DRASTLE model) contribute to obtain the more realistic assessment of vulnerability of groundwater to contaminant. The comparison analysis validates the accuracy and rationality of the AHP-DRASTLE model and shows it suits the particularity of the study area. The new assessment method (AHP-DRASTLE model) can provide a guide for other scholars to assess the vulnerability of groundwater to contamination. The final vulnerability map for the AHP-DRASTLE model shows four classes: highest (2%), high (29%), low (55%), and lowest (14%). The vulnerability map serves as a guide for decision makers on groundwater resource protection and land use planning at the regional scale and that it is adapted to a specific area.

  11. Chronic subordinate colony housing paradigm: A mouse model for mechanisms of PTSD vulnerability, targeted prevention, and treatment-2016 Curt Richter Award Paper.

    Science.gov (United States)

    Reber, Stefan O; Langgartner, Dominik; Foertsch, Sandra; Postolache, Teodor T; Brenner, Lisa A; Guendel, Harald; Lowry, Christopher A

    2016-12-01

    There is considerable individual variability in vulnerability for developing posttraumatic stress disorder (PTSD); evidence suggests that this variability is related in part to genetic and environmental factors, including adverse early life experience. Interestingly, recent studies indicate that induction of chronic low-grade inflammation may be a common mechanism underlying gene and environment interactions that increase the risk for development of PTSD symptoms, and, therefore, may be a target for novel interventions for prevention or treatment of PTSD. Development of murine models with face, construct, and predictive validity would provide opportunities to investigate in detail complex genetic, environmental, endocrine, and immunologic factors that determine vulnerability to PTSD-like syndromes, and furthermore may provide mechanistic insight leading to development of novel interventions for both prevention and treatment of PTSD symptoms. Here we describe the potential use of the chronic subordinate colony housing (CSC) paradigm in mice as an adequate animal model for development of a PTSD-like syndrome and describe recent studies that suggest novel interventions for the prevention and treatment of PTSD. Copyright © 2016 Elsevier Ltd. All rights reserved.

  12. Assessing flash flood vulnerability using a multi-vulnerability approach

    Directory of Open Access Journals (Sweden)

    Karagiorgos Konstantinos

    2016-01-01

    Full Text Available In the framework of flood risk assessment, while the understanding of hazard and exposure has significantly improved over the last years, knowledge on vulnerability remains one of the challenges. Current approaches in vulnerability research are characterised by a division between social scientists and natural scientists. In order to close this gap, we present an approach that combines information on physical and social vulnerability in order to merge information on the susceptibility of elements at risk and society. With respect to physical vulnerability, the study is based on local-scale vulnerability models using nonlinear regression approaches. Modified Weibull distributions were fit to the data in order to represent the relationship between process magnitude and degree of loss. With respect to social vulnerability we conducted a door-to-door survey which resulted in particular insights on flood risk awareness and resilience strategies of exposed communities. In general, both physical and social vulnerability were low in comparison with other European studies, which may result from (a specific building regulations in the four Mediterranean test sites as well as general design principles leading to low structural susceptibility of elements at risk, and (b relatively low social vulnerability of citizens exposed. As a result it is shown that a combination of different perspectives of vulnerability will lead to a better understanding of exposure and capacities in flood risk management.

  13. A synthesized biophysical and social vulnerability assessment for Taiwan

    Science.gov (United States)

    Lee, Yung-Jaan

    2017-11-01

    Taiwan, located in the Western Pacific, is a country that is one of the most vulnerable to disasters that are associated with the changing climate; it is located within the Ring of Fire, which is the most geologically active region in the world. The environmental and geological conditions in Taiwan are sensitive and vulnerable to such disasters. Owing to increasing urbanization in Taiwan, floods and climate-related disasters have taken an increasing toll on human lives. As global warming accelerates the rising of sea levels and increasing of the frequency of extreme weather events, disasters will continue to affect socioeconomic development and human conditions. Under such circumstances, researchers and policymakers alike must recognize the importance of providing useful knowledge concerning vulnerability, disaster recovery and resilience. Strategies for reducing vulnerability and climate-related disaster risks and for increasing resilience involve preparedness, mitigation and adaptation. In the last two decades, extreme climate events have caused severe flash floods, debris flows, landslides, and other disasters and have had negative effects of many sectors, including agriculture, infrastructure and health. Since climate change is expected to have a continued impact on socio-economic development, this work develops a vulnerability assessment framework that integrates both biophysical and social vulnerability and supports synthesized vulnerability analyses to identify vulnerable areas in Taiwan. Owing to its geographical, geological and climatic features, Taiwan is susceptible to earthquakes, typhoons, droughts and various induced disasters. Therefore, Taiwan has the urgent task of establishing a framework for assessing vulnerability as a planning and policy tool that can be used to identify not only the regions that require special attention but also hotspots in which efforts should be made to reduce vulnerability and the risk of climate-related disaster. To

  14. Nurse care manager contribution to quality of care in a dual-eligible special needs plan.

    Science.gov (United States)

    Roth, Carol P; Ganz, David A; Nickles, Lorraine; Martin, David; Beckman, Robin; Wenger, Neil S

    2012-07-01

    We evaluated the quality of care provided to older patients with complex needs in a dual-eligible, community-based Medicare Special Needs Plan that used a nurse care manager model. Care provided by physicians was substantially supplemented by nurse care managers, as measured by Assessing Care of Vulnerable Elders quality indicators. We describe selected nurse care manager activities for six geriatric conditions (falls, dementia, depression, nutrition, urinary incontinence, and end-of-life care) during provision of patient care coordination and management for patients in the highest decile of clinical complexity. We identify areas of high nurse performance (i.e., falls screening, functional assessment, behavioral interventions for dementia problems, advance care planning) and areas of potential missed opportunities (i.e., follow up for new memory problems, targeted dementia counseling, nutrition, and behavioral approaches to urinary incontinence). Increasing the collaborative interaction between nurses providing care in this model and physicians has the potential to enhance nurses' contributions to primary care for vulnerable older adults.

  15. Groundwater vulnerability to pollution mapping of Ranchi district using GIS

    Science.gov (United States)

    Krishna, R.; Iqbal, J.; Gorai, A. K.; Pathak, G.; Tuluri, F.; Tchounwou, P. B.

    2015-12-01

    Groundwater pollution due to anthropogenic activities is one of the major environmental problems in urban and industrial areas. The present study demonstrates the integrated approach with GIS and DRASTIC model to derive a groundwater vulnerability to pollution map. The model considers the seven hydrogeological factors [Depth to water table ( D), net recharge ( R), aquifer media ( A), soil media ( S), topography or slope ( T), impact of vadose zone ( I) and hydraulic Conductivity( C)] for generating the groundwater vulnerability to pollution map. The model was applied for assessing the groundwater vulnerability to pollution in Ranchi district, Jharkhand, India. The model was validated by comparing the model output (vulnerability indices) with the observed nitrate concentrations in groundwater in the study area. The reason behind the selection of nitrate is that the major sources of nitrate in groundwater are anthropogenic in nature. Groundwater samples were collected from 30 wells/tube wells distributed in the study area. The samples were analyzed in the laboratory for measuring the nitrate concentrations in groundwater. A sensitivity analysis of the integrated model was performed to evaluate the influence of single parameters on groundwater vulnerability index. New weights were computed for each input parameters to understand the influence of individual hydrogeological factors in vulnerability indices in the study area. Aquifer vulnerability maps generated in this study can be used for environmental planning and groundwater management.

  16. Groundwater vulnerability to pollution mapping of Ranchi district using GIS.

    Science.gov (United States)

    Krishna, R; Iqbal, J; Gorai, A K; Pathak, G; Tuluri, F; Tchounwou, P B

    2015-12-01

    Groundwater pollution due to anthropogenic activities is one of the major environmental problems in urban and industrial areas. The present study demonstrates the integrated approach with GIS and DRASTIC model to derive a groundwater vulnerability to pollution map. The model considers the seven hydrogeological factors [Depth to water table ( D ), net recharge ( R ), aquifer media ( A ), soil media ( S ), topography or slope ( T ), impact of vadose zone ( I ) and hydraulic Conductivity( C )] for generating the groundwater vulnerability to pollution map. The model was applied for assessing the groundwater vulnerability to pollution in Ranchi district, Jharkhand, India. The model was validated by comparing the model output (vulnerability indices) with the observed nitrate concentrations in groundwater in the study area. The reason behind the selection of nitrate is that the major sources of nitrate in groundwater are anthropogenic in nature. Groundwater samples were collected from 30 wells/tube wells distributed in the study area. The samples were analyzed in the laboratory for measuring the nitrate concentrations in groundwater. A sensitivity analysis of the integrated model was performed to evaluate the influence of single parameters on groundwater vulnerability index. New weights were computed for each input parameters to understand the influence of individual hydrogeological factors in vulnerability indices in the study area. Aquifer vulnerability maps generated in this study can be used for environmental planning and groundwater management.

  17. Progress in improving provincial plans for nutrition through targeted technical assistance and local advocacy in Vietnam.

    Science.gov (United States)

    Harris, Jody; Nguyen, Phuong H; To, Quyen; Frongillo, Edward A; Menon, Purnima

    2016-12-01

    Vietnam has been decentralizing nutrition planning to provinces, which could help with local relevance and accountability. Assessment in 2009 found a continuing top-down approach, limited human capacity, and difficulty in integrating multiple sectors. Alive and Thrive (A&T) provided targeted assistance and capacity-building for 15 provincial plans for nutrition (PPNs). We aimed to (i) assess PPN content and quality improvements 2009-2014, and (ii) explain processes through which change occurred. Data consisted of interview-based assessments of provincial planning processes, annual PPN assessments, and tracking of A&T involvement. At endline, some provinces produced higher quality plans. Local planning skills improved, but capacity remained insufficient. Awareness of and support for nutrition improved, but some policy and legal environments were contradictory. Objectives were clearer, but use of data for planning remained inconsistent. Provinces became more proactive and creative, but remained constrained by slow approval processes and insufficient funding. Targeted assistance and local advocacy can improve decentralized planning, with success dependent on policy and programming contexts and ability to overcome constraints around capacity, investment, data use and remnants of centralized planning. We recommend strong engagement with planners at the national level to understand how to unblock major constraints; solutions must take into consideration the particular political, financial and administrative context. © The Author 2016. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine.

  18. Development of information security and vulnerability risk management system for J-PARC

    International Nuclear Information System (INIS)

    Ishikawa, Hiroyuki; Tate, Akihiro; Murakami, Tadashi

    2012-02-01

    In J-PARC (Japan Proton Accelerator Research Complex) we have set up intra-network (internal network, we will abbreviate it as JLAN, below) to support research activity and communication among users. In JLAN, we set up various kinds of security devices to keep JLAN secure. However, the servers which provide information or service to public are still in danger of being accessed illegally. If there is an illegal access, that may cause defacement of data or information leak. Furthermore, the victim servers are manipulated by the malicious attackers, and they themselves attack the external information equipments. Vulnerability of servers enables unauthorized access. So, vulnerability test with use of a vulnerability tool is one of the most effective ways to take measures for vulnerability of the equipments. However, it is not enough to just conduct a vulnerability test. It is also essential for information security to take measures to cover constantly for the vulnerability of servers. We focused on the points above, and developed the vulnerability testing system for security. It is not only a testing tool for the vulnerability of servers, but also management system which enables the server administrators in charge of taking measures for vulnerabilities to manage risks and handles PDCA (Plan-Do-Check-Action) cycles as countermeasure for vulnerability. In this paper, we report the technologies and ingenuities for the development of the above system. (author)

  19. Chemical Safety Vulnerability Working Group report. Volume 2

    International Nuclear Information System (INIS)

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site

  20. Chemical Safety Vulnerability Working Group report. Volume 2

    Energy Technology Data Exchange (ETDEWEB)

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

  1. Targeted Attacks Using Vulnerability CVE-2013-3897

    Directory of Open Access Journals (Sweden)

    Anatoliy Petrovich Durakovskiy

    2014-09-01

    Full Text Available This article provides an overview of the malicious code creation and implementation techniques that were used by cyber criminals to conduct targeted attacks on PCs of residents of the Republic of South Korea in September and October 2013.

  2. THE PROGRAM-TARGET PLANNING AND MANAGEMENT OF DEVELOPMENT OF MEASURING EQUIPMENT PARK

    Directory of Open Access Journals (Sweden)

    Marichev Pavel Aleksandrovich

    2018-02-01

    Full Text Available Subject: study of the Park of Measuring Equipment (PME that includes hundreds of thousands of standard samples, measuring instruments, control and measuring devices and other measuring mechanisms with different areas of application, levels of reliability, service life, levels of technical perfection and levels of technical condition. Research objectives: 1. Development of a complex of mathematical models to simulate the processes of development of PME, control indicators of PME performance as a whole, purposefully control the stages of life cycle of measuring equipment samples. 2. Development of the method which, with a sufficient degree of validity and objectivity, would solve the tasks of management of procurement and repairs both in preparation of proposals for preliminary long-term plan documents (LTPD and to ensure control over the implementation of adopted plans. Thus, the method being developed should be fairly simple to use, easily adjustable for solving problems of different dimensions, suitable for solving the optimal control problem for PME as a whole, for a part of PME, and also suitable for solving a generalized problem for certain “aggregated objects” such as the Metrology Centers. Materials and methods: the methods of mathematical simulation, methods of comparative analysis, simplex method for solving linear programming problem, methods of program-target planning were used. Results: an approach to the solution of problems of program-target planning based on solving a series of linear programming problems has been developed. The results have been presented of using the approach both for formulation of proposals into the preliminary LTPD and also for introducing revisions (amendments to annual plans, which are implemented in the framework of the state defense order. Conclusions: the described method and algorithms constitute an effective tool for solving practical problems of target-oriented management of PME performance

  3. Vulnerability tester: an Android app which finds and exploits application layer vulnerabilities of other apps

    OpenAIRE

    Μάντος, Πέτρος Λάζαρος Κάρολος; Mantos, Petros Lazaros Karolos; Μπουκικάς, Ευστάθιος; Boukikas, Efstathios

    2017-01-01

    Android is the most popular mobile operating system. Nowadays, it is used not only in smartphones but can be found at the heart of each smart device. This makes it one of the most popular targets amongst malware developers and cyber criminals. The main purpose of this dissertation is to examine possible application layer vulnerabilities that lie both in Android application components and its architecture. This was not only accomplished theoretically but also by developing from scratch an Andr...

  4. A Comparative Study on Physical Vulnerability of Urban Area against Natural Hazards: Importance of Health Promoting Approach in Civil Engineering.

    Science.gov (United States)

    Ahadnezhad Reveshty, Mohsen; Kamelifar, Mohammad Javad; Ranjbarnia, Behzad; Pashaiifar, Alireza

    2014-01-01

    Estimation of urban vulnerability to earthquakes can be consid-ered as an Ill-structured problem in urban in both unplanned and planned areas. Multi-criteria evaluation (MCE) provides a way to integrate different spatial data layers in a geographic information system to create composite maps representing risk. We utilized MCE in a raster Geographic Information System (GIS) to evaluate risk in vulnerable tissues of Tabriz, Iran zone. In this MCE physical risk factors and sub-factors were included and were weighted by experts. Afterward data entered to GIS and then the layers of the criteria were exported. The obtained results were entered to IDRISI and fuzzified. Ultimately the final map of physical vulnerability was outputted by overlaying order. Vulnerable tissues are highly consistent to non-official areas. However, the planned area which is called Valiasr is in low risky condition and this condition is desirable in crisis times. Here, we observe the preference of physical pre-planning operations. The links between urban planning and health are many and varied. Environmental, social and economic conditions in cities can have both positive and negative influences on human health and centre. Urban planning and related professions play an important role in shaping those conditions.

  5. A Comparative Study on Physical Vulnerability of Urban Area against Natural Hazards: Importance of Health Promoting Approach in Civil Engineering

    Directory of Open Access Journals (Sweden)

    Mohsen Ahadnezhad Reveshty

    2014-07-01

    Full Text Available Background: Estimation of urban vulnerability to earthquakes can be considered as an Ill-structured problem in urban in both unplanned and planned ar-eas. Multi-criteria evaluation (MCE provides a way to integrate different spatial data layers in a geographic information system to create composite maps representing risk. We utilized MCE in a raster Geographic Information System (GIS to evaluate risk in vulnerable tissues of Tabriz, Iran zone. Methods: In this MCE physical risk factors and sub-factors were included and were weighted by experts. Afterward data entered to GIS and then the layers of the criteria were exported. The obtained results were entered to IDRISI and fuzzified. Ultimately the final map of physical vulnerability was outputted by overlaying order. Results: Vulnerable tissues are highly consistent to non-official areas. How-ever, the planned area which is called Valiasr is in low risky condition and this condition is desirable in crisis times. Here, we observe the preference of physical pre-planning operations. Conclusion: The links between urban planning and health are many and varied. Environmental, social and economic conditions in cities can have both positive and negative influences on human health and centre. Urban planning and related professions play an important role in shaping those conditions.

  6. Counter-Leadership Targeting and Conflict Termination

    National Research Council Canada - National Science Library

    Taylor, Bradly

    1999-01-01

    .... Can the leader be found? And, is it legal and ethical to attack the leader? Analysis rarely has been conducted to determine whether the targeted organization is vulnerable to Counter Leadership Targeting (CLT...

  7. Importance of biometrics to addressing vulnerabilities of the U.S. infrastructure

    Science.gov (United States)

    Arndt, Craig M.; Hall, Nathaniel A.

    2004-08-01

    Human identification technologies are important threat countermeasures in minimizing select infrastructure vulnerabilities. Properly targeted countermeasures should be selected and integrated into an overall security solution based on disciplined analysis and modeling. Available data on infrastructure value, threat intelligence, and system vulnerabilities are carefully organized, analyzed and modeled. Prior to design and deployment of an effective countermeasure; the proper role and appropriateness of technology in addressing the overall set of vulnerabilities is established. Deployment of biometrics systems, as with other countermeasures, introduces potentially heightened vulnerabilities into the system. Heightened vulnerabilities may arise from both the newly introduced system complexities and an unfocused understanding of the set of vulnerabilities impacted by the new countermeasure. The countermeasure's own inherent vulnerabilities and those introduced by the system's integration with the existing system are analyzed and modeled to determine the overall vulnerability impact. The United States infrastructure is composed of government and private assets. The infrastructure is valued by their potential impact on several components: human physical safety, physical/information replacement/repair cost, potential contribution to future loss (criticality in weapons production), direct productivity output, national macro-economic output/productivity, and information integrity. These components must be considered in determining the overall impact of an infrastructure security breach. Cost/benefit analysis is then incorporated in the security technology deployment decision process. Overall security risks based on system vulnerabilities and threat intelligence determines areas of potential benefit. Biometric countermeasures are often considered when additional security at intended points of entry would minimize vulnerabilities.

  8. A Heat Vulnerability Index and Adaptation Solutions for Pittsburgh, Pennsylvania.

    Science.gov (United States)

    Bradford, Kathryn; Abrahams, Leslie; Hegglin, Miriam; Klima, Kelly

    2015-10-06

    With increasing evidence of global warming, many cities have focused attention on response plans to address their populations' vulnerabilities. Despite expected increased frequency and intensity of heat waves, the health impacts of such events in urban areas can be minimized with careful policy and economic investments. We focus on Pittsburgh, Pennsylvania and ask two questions. First, what are the top factors contributing to heat vulnerability and how do these characteristics manifest geospatially throughout Pittsburgh? Second, assuming the City wishes to deploy additional cooling centers, what placement will optimally address the vulnerability of the at risk populations? We use national census data, ArcGIS geospatial modeling, and statistical analysis to determine a range of heat vulnerability indices and optimal cooling center placement. We find that while different studies use different data and statistical calculations, all methods tested locate additional cooling centers at the confluence of the three rivers (Downtown), the northeast side of Pittsburgh (Shadyside/Highland Park), and the southeast side of Pittsburgh (Squirrel Hill). This suggests that for Pittsburgh, a researcher could apply the same factor analysis procedure to compare data sets for different locations and times; factor analyses for heat vulnerability are more robust than previously thought.

  9. Vulnerability

    NARCIS (Netherlands)

    Issa, Sahar; van der Molen, Irna; Stel, Nora

    2015-01-01

    This chapter reviews the literature on vulnerability. Together with Chapter 3, that offers a literature review specifically focused on resilience, it lays the conceptual foundations for the empirical chapters in this edited volume. Vulnerability symbolizes the susceptibility of a certain system to

  10. Emphasizing Conformal Avoidance Versus Target Definition for IMRT Planning in Head-and-Neck Cancer

    International Nuclear Information System (INIS)

    Harari, Paul M.; Song Shiyu; Tome, Wolfgang A.

    2010-01-01

    Purpose: To describe a method for streamlining the process of elective nodal volume definition for head-and-neck (H and N) intensity-modulated radiotherapy (IMRT) planning. Methods and Materials: A total of 20 patients who had undergone curative-intent RT for H and N cancer underwent comprehensive treatment planning using three distinct, plan design techniques: conventional three-field design, target-defined IMRT (TD-IMRT), and conformal avoidance IMRT (CA-IMRT). For each patient, the conventional three-field design was created first, thereby providing the 'outermost boundaries' for subsequent IMRT design. In brief, TD-IMRT involved physician contouring of the gross tumor volume, high- and low-risk clinical target volume, and normal tissue avoidance structures on consecutive 1.25-mm computed tomography images. CA-IMRT involved physician contouring of the gross tumor volume and normal tissue avoidance structures only. The overall physician time for each approach was monitored, and the resultant plans were rigorously compared. Results: The average physician working time for the design of the respective H and N treatment contours was 0.3 hour for the conventional three-field design plan, 2.7 hours for TD-IMRT, and 0.9 hour for CA-IMRT. Dosimetric analysis confirmed that the largest volume of tissue treated to an intermediate (50 Gy) and high (70 Gy) dose occurred with the conventional three-field design followed by CA-IMRT and then TD-IMRT. However, for the two IMRT approaches, comparable results were found in terms of salivary gland and spinal cord protection. Conclusion: CA-IMRT for H and N treatment offers an alternative to TD-IMRT. The overall time for physician contouring was substantially reduced (approximately threefold), yielding a more standardized elective nodal volume. Because of the complexity of H and N IMRT target design, CA-IMRT might ultimately prove a safer and more reliable method to export to general radiation oncology practitioners, particularly

  11. Impact of 18FDG-PET/CT on biological target volume (BTV) definition for treatment planning for non-small cell lung cancer patients

    International Nuclear Information System (INIS)

    Devic, Slobodan; Tomic, Nada; Faria, Sergio; Dean, Geoffrey; Lisbona, Robert; Parker, William; Kaufman, Chris; Podgorsak, Ervin B.

    2007-01-01

    This work represents our effort to test feasibility of FDG-based PET/CT on target volume delineation in radiotherapy treatment planning of NSCLC patients. Different methods have been developed to enable more precise target outlining using PET: Qualitative Visual Method, CTV=2.5 SUV units, linear SUV threshold function method, and CTV=40% Iso of Maximum Uptake Value. We are proposing reconstruction of three biological target volumes: necrotic BTV (same as PTV created by radiation oncologist using CT data), proliferating BTV (based on PET signal to background ratio 1:3) and hypoxic BTV (based on PET signal to background ratio of 1:19). Two IMRT plans were created and compared to the conventional treatment plan: 'conservative' IMRT plan delivers 52.5 Gy to the necrotic BTV and 65 Gy to the hypoxic BTV; 'radical' IMRT plan delivers 30 Gy to necrotic BTV, 52.5 Gy to proliferating BTV and 65 Gy to hypoxic BTV. Use of BTVs in IMRT plans is attractive because it increases dose to targets considered to need higher doses. It reduces considerably dose to heart and spinal cord, organs considered to limit dose escalation approaches in NSCLC treatment. 'Conservative' IMRT approach can be understood as a PET/CT-based concomitant boost to the tumor expressing the highest FDG uptake. 'Radical' plan implies deviation from the traditional uniform dose target coverage approach, with the intention of achieving better surrounding tissue sparing and ultimately allowing for dose escalation protocols relying on biologically based treatment planning

  12. Intrinsic vulnerability assessment of shallow aquifers of the sedimentary basin of southwestern Nigeria

    Directory of Open Access Journals (Sweden)

    Saheed A. Oke

    2018-03-01

    Full Text Available The shallow groundwater of the multi-layered sedimentary basin aquifer of southwestern Nigeria was assessed based on its intrinsic vulnerability property. The vulnerability evaluation involves determining the protective cover and infiltration condition of the unsaturated zone in the basin. This was achieved using the PI (P stands for protective cover effectiveness of the overlying lithology and I indicates the degree of infiltration bypass vulnerability method of the European vulnerability approach. The PI method specifically measures the protection cover and the degree to which the protective cover is bypassed. Intrinsic parameters assessed were the subsoil, lithology, topsoil, recharge and fracturing for the protective cover. The saturated hydraulic conductivity of topsoil, infiltration processes and the lateral surface and subsurface flow were evaluated for the infiltration bypassed. The results show moderate to very low vulnerability areas. Low vulnerability areas were characterised by lithology with massive sandstone and limestone, subsoils of sandy loam texture, high slopes and high depth to water table. The moderate vulnerability areas were characterised by high rainfall and high recharge, low water table, unconsolidated sandstones and alluvium lithology. The intrinsic vulnerability properties shown in vulnerability maps will be a useful tool in planning and monitoring land use activities that can be of impact in groundwater pollution.

  13. Children of a lesser god? Orphans, Vulnerable Children (OVCs) and ...

    African Journals Online (AJOL)

    Orphans, Vulnerable Children (OVCs) and poverty in Zambia: implications for social work practice. ... This paper attempts to present a conceptual linkage between a model of intervention of social protection and community practice model specifically locality development in terms of planning, organizing, decision making, ...

  14. Assessing European wild fire vulnerability

    Science.gov (United States)

    Oehler, F.; Oliveira, S.; Barredo, J. I.; Camia, A.; Ayanz, J. San Miguel; Pettenella, D.; Mavsar, R.

    2012-04-01

    Wild fire vulnerability is a measure of potential socio-economic damage caused by a fire in a specific area. As such it is an important component of long-term fire risk management, helping policy-makers take informed decisions about adequate expenditures for fire prevention and suppression, and to target those regions at highest risk. This paper presents a first approach to assess wild fire vulnerability at the European level. A conservative approach was chosen that assesses the cost of restoring the previous land cover after a potential fire. Based on the CORINE Land Cover, a restoration cost was established for each land cover class at country level, and an average restoration time was assigned according to the recovery capacity of the land cover. The damage caused by fire was then assessed by discounting the cost of restoring the previous land cover over the restoration period. Three different vulnerability scenarios were considered assuming low, medium and high fire severity causing different levels of damage. Over Europe, the potential damage of wild land fires ranges from 10 - 13, 732 Euro*ha-1*yr-1 for low fire severity, 32 - 45,772 Euro*ha-1*yr-1 for medium fire severity and 54 - 77,812 Euro*ha-1*yr-1 for high fire severity. The least vulnerable are natural grasslands, moors and heathland and sclerophyllous vegetation, while the highest cost occurs for restoring broad-leaved forest. Preliminary validation comparing these estimates with official damage assessments for past fires shows reasonable results. The restoration cost approach allows for a straightforward, data extensive assessment of fire vulnerability at European level. A disadvantage is the inherent simplification of the evaluation procedure with the underestimation of non-markets goods and services. Thus, a second approach has been developed, valuing individual wild land goods and services and assessing their annual flow which is lost for a certain period of time in case of a fire event. However

  15. Data Integration for Climate Vulnerability Mapping in West Africa

    Directory of Open Access Journals (Sweden)

    Alex de Sherbinin

    2015-11-01

    Full Text Available Vulnerability mapping reveals areas that are likely to be at greater risk of climate-related disasters in the future. Through integration of climate, biophysical, and socioeconomic data in an overall vulnerability framework, so-called “hotspots” of vulnerability can be identified. These maps can be used as an aid to targeting adaptation and disaster risk management interventions. This paper reviews vulnerability mapping efforts in West Africa conducted under the USAID-funded African and Latin American Resilience to Climate Change (ARCC project. The focus is on the integration of remotely sensed and socioeconomic data. Data inputs included a range of sensor data (e.g., MODIS NDVI, Landsat, SRTM elevation, DMSP-OLS night-time lights as well as high-resolution poverty, conflict, and infrastructure data. Two basic methods were used, one in which each layer was transformed into standardized indicators in an additive approach, and another in which remote sensing data were used to contextualize the results of composite indicators. We assess the benefits and challenges of data integration, and the lessons learned from these mapping exercises.

  16. Applicability of vulnerability maps

    International Nuclear Information System (INIS)

    Andersen, L.J.; Gosk, E.

    1989-01-01

    A number of aspects to vulnerability maps are discussed: the vulnerability concept, mapping purposes, possible users, and applicability of vulnerability maps. Problems associated with general-type vulnerability mapping, including large-scale maps, universal pollutant, and universal pollution scenario are also discussed. An alternative approach to vulnerability assessment - specific vulnerability mapping for limited areas, specific pollutant, and predefined pollution scenario - is suggested. A simplification of the vulnerability concept is proposed in order to make vulnerability mapping more objective and by this means more comparable. An extension of the vulnerability concept to the rest of the hydrogeological cycle (lakes, rivers, and the sea) is proposed. Some recommendations regarding future activities are given

  17. Biological and chemical terrorism: strategic plan for preparedness and response. Recommendations of the CDC Strategic Planning Workgroup.

    Science.gov (United States)

    2000-04-21

    The U.S. national civilian vulnerability to the deliberate use of biological and chemical agents has been highlighted by recognition of substantial biological weapons development programs and arsenals in foreign countries, attempts to acquire or possess biological agents by militants, and high-profile terrorist attacks. Evaluation of this vulnerability has focused on the role public health will have detecting and managing the probable covert biological terrorist incident with the realization that the U.S. local, state, and federal infrastructure is already strained as a result of other important public health problems. In partnership with representatives for local and state health departments, other federal agencies, and medical and public health professional associations, CDC has developed a strategic plan to address the deliberate dissemination of biological or chemical agents. The plan contains recommendations to reduce U.S. vulnerability to biological and chemical terrorism--preparedness planning, detection and surveillance, laboratory analysis, emergency response, and communication systems. Training and research are integral components for achieving these recommendations. Success of the plan hinges on strengthening the relationships between medical and public health professionals and on building new partnerships with emergency management, the military, and law enforcement professionals.

  18. Building Blocks: A Quantitative Approach for Evaluating Coastal Vulnerability

    Directory of Open Access Journals (Sweden)

    Komali Kantamaneni

    2017-11-01

    Full Text Available Climate change and associated factors such as global and regional sea-level rise; the upsurge in high-intensity flooding events; and coastal erosion are pulse and press disturbances that threaten to increase landslides in coastal regions. Under these circumstances; a rigorous framework is required to evaluate coastal vulnerability in order to plan for future climate change scenarios. A vast majority of coastal vulnerability assessments across the globe are evaluated at the macro level (city scale but not at the micro level (small town scale; particularly in the United Kingdom (UK. In order to fill this vital research gap; the current study established a coastal vulnerability index termed here as the Micro Town Coastal Vulnerability Index (MTCVI and then applied it to Barton-on-Sea; which is a small coastal town of the Hampshire region; England; UK. MTCVI was evaluated for Barton-on-Sea coastal vulnerability by integrating both novel and existing parameters. Results suggest that the entire shoreline frontage (2 km exhibits very high coastal vulnerability and is prone to various coastal hazards such as landslides; erosion; and wave intrusion. This suggests that Barton-on-Sea coastal amenities will require a substantial improvement in shoreline protection measures. In this study; GIS (geographic information system coastal vulnerability and landslide maps were generated; and these maps can be used by the local authorities; district councils; coastal engineers; and planners to improve and design coastal management strategies under the climate change scenarios. Meanwhile; the methodology used in this study could also be applied to any other suitable location in the world depending on the availability of the data.

  19. GIS based Hydrogeological Vulnerability Mapping of Groundwater Resources in Jerash Area-Jordan

    Energy Technology Data Exchange (ETDEWEB)

    Hammouri, N [Department of Earth and Environmental Sciences, Faculty of Natural Resources and Environment, Hashemite University, Zarqa (Jordan); El-Naqa, A [Department of Water Management and Environment, Faculty of Natural Resources and Environment, Hashemite University, Zarqa (Jordan)

    2008-04-15

    This paper presents groundwater vulnerability mapping for Jerash area, north Jordan generated using EPIK and DRASTIC models. These models have been implemented using GIS to delineate groundwater protection zones and to suggest a protection plan to improve groundwater quality of the major springs and wells. Most of the groundwater resources in the study area are polluted and bacteria and nitrate levels are high. Different sources of groundwater pollution have been identified. Domestic wastewater is considered as a major source of pollution. Urban runoff, fertilizers from agricultural return flows and solid waste disposal appear to be secondary sources. The most relevant vulnerability class of EPIK map is very high which accounts for about 41 % of the total area. While in the DRASTIC vulnerability map, areas with high vulnerability were only about 23 % of the total area. There is a good correlation between vulnerability maps obtained from both models with microbiological and chemical pollution evidences. There is also a good agreement between the areas classified as highly vulnerable and those that have high levels of pollution. [Spanish] El estudio de vulnerabilidad de aguas subterraneas en la region de Yerash, Jordania fue obtenido mediante las metodologias de EPIK y DRASTIC. Se uso GIS para mapear las zonas protegidas y para sugerir un plan de proteccion para mejorar la calidad del agua subterranea en los principales manantiales y pozos. Los niveles de contaminacion bacteriana y de nitratos son elevados. El efluente domestico es la fuente mas importante de contaminacion; vienen en segundo lugar la precipitacion en zonas urbanas, los fertilizantes agricolas y los desechos solidos. En el mapa de EPIK, la vulnerabilidad extrema abarca hasta 41% del area total; en cambio, en el mapa de DRASTIC las areas de alta vulnerabilidad ocupan solo un 23% del area. La correlacion de los datos de contaminacion microbiana y quimica con ambos mapas der vulnerabilidad es buena

  20. Assessing the social vulnerability to malaria in Rwanda.

    Science.gov (United States)

    Bizimana, Jean-Pierre; Twarabamenye, Emmanuel; Kienberger, Stefan

    2015-01-07

    Since 2004, malaria interventions in Rwanda have resulted in substantial decline of malaria incidence. However, this achievement is fragile as potentials for local malaria transmissions remain. The risk of getting malaria infection is partially explained by social conditions of vulnerable populations. Since vulnerability to malaria is both influenced by social and environmental factors, its complexity cannot be measured by a single value. The aim of this paper is, therefore, to apply a composite indicator approach for assessing social vulnerability to malaria in Rwanda. This assessment informs the decision-makers in targeting malaria interventions and allocating limited resources to reduce malaria burden in Rwanda. A literature review was used to conceptualize the social vulnerability to malaria and to select the appropriate vulnerability indicators. Indicators used in the index creation were classified into susceptibility and lack of resilience vulnerability domains. The main steps followed include selection of indicators and datasets, imputation of missing values, descriptive statistics, normalization and weighting of indicators, local sensitivity analysis and indicators aggregation. Correlation analysis helped to empirically evidence the association between the indicators and malaria incidence. The high values of social vulnerability to malaria are found in Gicumbi, Rusizi, Nyaruguru and Gisagara, and low values in Muhanga, Nyarugenge, Kicukiro and Nyanza. The most influential susceptibility indicators to increase malaria are population change (r = 0.729), average number of persons per bedroom (r = 0.531), number of households affected by droughts and famines (r = 0.591), and area used for irrigation (r = 0.611). The bed net ownership (r = -0.398) and poor housing wall materials (0.378) are the lack of resilience indicators that significantly correlate with malaria incidence. The developed composite index social vulnerability to malaria

  1. Promoting Ethical and Environmental Awareness in Vulnerable Communities: A Research Action Plan

    Science.gov (United States)

    Araujo, Ulisses

    2012-01-01

    Urban populations that live in the outskirts of major Latin American cities usually face conditions of vulnerability attached to complex environmental issues, such as the lack of sewerage, floods, pollution and soil and water contamination. This article reports an intervention research programme in Sao Paulo, Brazil that combines a moral education…

  2. The need for rotational margins in intensity-modulated radiotherapy and a new method for planning target volume design

    International Nuclear Information System (INIS)

    Langer, Mark Peter; Papiez, Lech; Spirydovich, Siarhei; Thai, Van

    2005-01-01

    Purpose: The effect of rotational errors on the coverage of clinical target volumes (CTVs) is examined. A new planning target volume (PTV) construction that considers the individual paths traced by movements of the target boundary points is developed. Methods and Materials: A standard uniform margin expansion was compared with a PTV constructed from the space swept out by a concave moving target. A new method formed the PTV by aggregating the separate convex hulls taken of the positions of the individual target boundary points in a sampling of CTV displacements. Results: A 0.5-cm uniform margin adequate for translations was inadequate given CTV rotation about a fixed off-center axis. A PTV formed of the target's swept-out area was 22% smaller than needed for coverage by a uniform margin, but computationally is not readily extended to translations combined with rotations about a shifting axis. Forming instead the union of convex hulls of the boundary points in a sampling of CTV displacements represented these movements in the PTV design and retained the target's concave shape. Conclusions: Planning target volumes should accommodate target rotation. The union of convex hulls of the boundary point positions in a sampling of displacements can effectively represent multiple sources of deviations while preserving target concavities

  3. Segregation reinforced by urban planning | IDRC - International ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2015-10-28

    Oct 28, 2015 ... ... What is driving urban violence? Segregated urban planning can leave a legacy of community tension and insecurity. Potential solutions? Include vulnerable communities in city planning decisions; invest in transport infrastructure; and regularly update city development plans to reflect population growth.

  4. Identification and ranking of environmental threats with ecosystem vulnerability distributions.

    Science.gov (United States)

    Zijp, Michiel C; Huijbregts, Mark A J; Schipper, Aafke M; Mulder, Christian; Posthuma, Leo

    2017-08-24

    Responses of ecosystems to human-induced stress vary in space and time, because both stressors and ecosystem vulnerabilities vary in space and time. Presently, ecosystem impact assessments mainly take into account variation in stressors, without considering variation in ecosystem vulnerability. We developed a method to address ecosystem vulnerability variation by quantifying ecosystem vulnerability distributions (EVDs) based on monitoring data of local species compositions and environmental conditions. The method incorporates spatial variation of both abiotic and biotic variables to quantify variation in responses among species and ecosystems. We show that EVDs can be derived based on a selection of locations, existing monitoring data and a selected impact boundary, and can be used in stressor identification and ranking for a region. A case study on Ohio's freshwater ecosystems, with freshwater fish as target species group, showed that physical habitat impairment and nutrient loads ranked highest as current stressors, with species losses higher than 5% for at least 6% of the locations. EVDs complement existing approaches of stressor assessment and management, which typically account only for variability in stressors, by accounting for variation in the vulnerability of the responding ecosystems.

  5. Mapping fires and American Red Cross aid using demographic indicators of vulnerability.

    Science.gov (United States)

    Lue, Evan; Wilson, John P

    2017-04-01

    Social vulnerability indicators can assist with informing disaster relief preparation. Certain demographic segments of a population may suffer disproportionately during disaster events, and a geographical understanding of them can help to determine where to place strategically logistical assets and to target disaster-awareness outreach endeavours. Records of house fire events and American Red Cross aid provision over a five-year period were mapped for the County of Los Angeles, California, United States, to examine the congruence between actual events and expectations of risk based on vulnerability theory. The geographical context provided by the data was compared with spatially-explicit indicators of vulnerability, such as age, race, and wealth. Fire events were found to occur more frequently in more vulnerable areas, and Red Cross aid was found to have an even stronger relationship to those places. The findings suggest that these indicators speak beyond vulnerability and relate to patterns of fire risk. © 2017 The Author(s). Disasters © Overseas Development Institute, 2017.

  6. Target volume definition with 18F-FDG PET-CT in radiotherapy treatment planning

    International Nuclear Information System (INIS)

    Carson, K. J.; Hanna, G. G.; Hounsell, A. R.

    2011-01-01

    There is considerable interest in using 18F -Fluorodeoxyglucose (FDG) positron emission tomography (PET) images for radiotherapy treatment planning (RTF) purposes, and in particular for defining target volumes. This is a rapidly evolving subject and this review describes the background to this application of PET imaging and discusses the issues involved. (authors)

  7. [Effect of image fusion technology of radioactive particles implantation before and after the planning target and dosimetry].

    Science.gov (United States)

    Jiang, Y L; Yu, J P; Sun, H T; Guo, F X; Ji, Z; Fan, J H; Zhang, L J; Li, X; Wang, J J

    2017-08-01

    Objective: To compare the post-implant target volumes and dosimetric evaluation with pre-plan, the gross tumor volume(GTV) by CT image fusion-based and the manual delineation of target volume in CT guided radioactive seeds implantation. Methods: A total of 10 patients treated under CT-guidance (125)I seed implantation during March 2016 to April 2016 were analyzed in Peking University Third Hospital.All patients underwent pre-operative CT simulation, pre-operative planning, implantation seeds, CT scanning after seed implantation and dosimetric evaluation of GTV.In every patient, post-implant target volumes were delineated by both two methods, and were divided into two groups. Group 1: image fusion pre-implantation simulation and post-operative CT image, then the contours of GTV were automatically performed by brachytherapy treatment planning system; Group 2: the contouring of the GTV on post-operative CT image were performed manually by three senior radiation oncologists independently. The average of three data was sets. Statistical analyses were performed using SPSS software, version 3.2.0. The paired t -test was used to compare the target volumes and D(90) parameters in two modality. Results: In Group 1, average volume of GTV in post-operation group was 12-167(73±56) cm(3). D(90) was 101-153 (142±19)Gy. In Group 2, they were 14-186(80±58)cm(3) and 96-146(122±16) Gy respectively. In both target volumes and D(90), there was no statistical difference between pre-operation and post-operation in Group 1.The D(90) was slightly lower than that of pre-plan group, but there was no statistical difference ( P =0.142); in Group 2, between pre-operation and post-operation group, there was a significant statistical difference in the GTV ( P =0.002). The difference of D(90) was similarly ( P manual delineation of target volume by maximum reduce the interference from artificial factor and metal artifacts. Further work and more cases are required in the future.

  8. CT-guided intracavitary radiotherapy for cervical cancer: Comparison of conventional point A plan with clinical target volume-based three-dimensional plan using dose-volume parameters

    International Nuclear Information System (INIS)

    Shin, Kyung Hwan; Kim, Tae Hyun; Cho, Jung Keun; Kim, Joo-Young; Park, Sung Yong; Park, Sang-Yoon; Kim, Dae Yong; Chie, Eui Kyu; Pyo, Hong Ryull; Cho, Kwan Ho

    2006-01-01

    Purpose: To perform an intracavitary radiotherapy (ICR) plan comparison between the conventional point A plan (conventional plan) and computed tomography (CT)-guided clinical target volume-based plan (CTV plan) by analysis of the quantitative dose-volume parameters and irradiated volumes of organs at risk in patients with cervical cancer. Methods and Materials: Thirty plans for 192 Ir high-dose-rate ICR after 30-40-Gy external beam radiotherapy were investigated. CT images were acquired at the first ICR session with artifact-free applicators in place. The gross tumor volume, clinical target volume (CTV), point A, and International Commission on Radiation Units and Measurements Report 38 rectal and bladder points were defined on reconstructed CT images. A fractional 100% dose was prescribed to point A in the conventional plan and to the outermost point to cover all CTVs in the CTV plan. The reference volume receiving 100% of the prescribed dose (V ref ), and the dose-volume parameters of the coverage index, conformal index, and external volume index were calculated from the dose-volume histogram. The bladder, rectal point doses, and percentage of volumes receiving 50%, 80%, and 100% of the prescribed dose were also analyzed. Results: Conventional plans were performed, and patients were categorized on the basis of whether the 100% isodose line of point A prescription dose fully encompassed the CTV (Group 1, n = 20) or not (Group 2, n = 10). The mean gross tumor volume (11.6 cm 3 ) and CTV (24.9 cm 3 ) of Group 1 were smaller than the corresponding values (23.7 and 44.7 cm 3 , respectively) for Group 2 (p = 0.003). The mean V ref for all patients was 129.6 cm 3 for the conventional plan and 97.0 cm 3 for the CTV plan (p = 0.003). The mean V ref in Group 1 decreased markedly with the CTV plan (p < 0.001). For the conventional and CTV plans in all patients, the mean coverage index, conformal index, and external volume index were 0.98 and 1.0, 0.23 and 0.34, and 3.86 and

  9. Technical Targets - A Tool to Support Strategic Planning in the Subsurface Contaminants Focus Area

    International Nuclear Information System (INIS)

    Looney, B.B.

    2002-01-01

    The Subsurface Contaminants Focus Area (SCFA) is supported by a lead laboratory consisting of technical representatives from DOE laboratories across the country. This broadly representative scientific group has developed and implemented a process to define Technical Targets to assist the SCFA in strategic planning and in managing their environmental research and development portfolio. At an initial meeting in Golden Colorado, an initial set of Technical Targets was identified using a rapid consensus based technical triage process. Thirteen Technical Targets were identified and described. Vital scientific and technical objectives were generated for each target. The targets generally fall into one of the following five strategic investment categories: Enhancing Environmental Stewardship, Eliminating Contaminant Sources, Isolating Contaminants, Controlling Contaminant Plumes, Enabling DOEs CleanUp Efforts. The resulting targets and the detail they comprise on what is, and what is not, needed to meet Environmental Management needs provide a comprehensive technically-based framework to assist in prioritizing future work and in managing the SCFA program

  10. Summary report (CORDIS) [of the European research project] PROMISING (Promotion of Measures for Vulnerable Road Users).

    NARCIS (Netherlands)

    2013-01-01

    The objective of the PROMISING-project was to capitalise on non-restrictive measures and technical developments in a number of areas to minimise the problems of vulnerable and young road users. The potential for problem reduction was specified for four target groups of vulnerable road users:

  11. Is your dam vulnerable to climate change? Using the PIEVC engineering protocol

    International Nuclear Information System (INIS)

    Bourgeois, Gilles; Dickson, Stewart; Ness, Ryan; Lapp, David

    2010-01-01

    The potential impacts of climate change on public infrastructure are currently studied to advance planning and prioritization of adaption strategies. This paper investigated the potential vulnerability of the Claireville and G. Ross Lord dams and reservoirs by considering the projected character, its magnitude and its rate of change in future local climatic conditions, the sensitivity of infrastructure to the changes, and the built-in capacity of the infrastructure to absorb any net negative consequence from the predicted changes in climatic conditions. This study used the public infrastructure engineering vulnerability (PIEV) engineering protocol to study the vulnerabilities of both facilities to current climate, as well as future climate change at the 2050 time horizon. Recommendations were provided for actions to be taken to address the potential vulnerabilities that were identified. The project determined that the two dams have the capacity to withstand the existing and projected future climate.

  12. Groundwater vulnerability mapping in Guadalajara aquifers system (Western Mexico)

    Science.gov (United States)

    Rizo-Decelis, L. David; Marín, Ana I.; Andreo, Bartolomé

    2016-04-01

    Groundwater vulnerability mapping is a practical tool to implement strategies for land-use planning and sustainable socioeconomic development coherent with groundwater protection. The objective of vulnerability mapping is to identify the most vulnerable zones of catchment areas and to provide criteria for protecting the groundwater used for drinking water supply. The delineation of protection zones in fractured aquifers is a challenging task due to the heterogeneity and anisotropy of hydraulic conductivities, which makes difficult prediction of groundwater flow organization and flow velocities. Different methods of intrinsic groundwater vulnerability mapping were applied in the Atemajac-Toluquilla groundwater body, an aquifers system that covers around 1300 km2. The aquifer supplies the 30% of urban water resources of the metropolitan area of Guadalajara (Mexico), where over 4.6 million people reside. Study area is located in a complex neotectonic active volcanic region in the Santiago River Basin (Western Mexico), which influences the aquifer system underneath the city. Previous works have defined the flow dynamics and identified the origin of recharge. In addition, the mixture of fresh groundwater with hydrothermal and polluted waters have been estimated. Two main aquifers compose the multilayer system. The upper aquifer is unconfined and consists of sediments and pyroclastic materials. Recharge of this aquifer comes from rainwater and ascending vertical fluids from the lower aquifer. The lower aquifer consists of fractured basalts of Pliocene age. Formerly, the main water source has been the upper unit, which is a porous and unconsolidated unit, which acts as a semi-isotropic aquifer. Intense groundwater usage has resulted in lowering the water table in the upper aquifer. Therefore, the current groundwater extraction is carried out from the deeper aquifer and underlying bedrock units, where fracture flow predominates. Pollution indicators have been reported in

  13. Wildfire Mitigation and Private Lands: Managing Long-Term Vulnerabilities

    Science.gov (United States)

    Brian Muller; Stacey Schulte

    2006-01-01

    Long-term management of wildfire vulnerability requires strategies that address complex interactions between fire ecology and human settlement. In this paper, we examine the integration of wildfire mitigation and land use planning in county governments in the western U.S. This research relies on data from two sources. First, we conducted a survey of land use...

  14. Planning for resource efficient cities

    DEFF Research Database (Denmark)

    Fertner, Christian; Groth, Niels Boje

    2016-01-01

    development from energy consumption are crucial for a city’s future vulnerability and resilience against changes in general resource availability. The challenge gets further complex, as resource and energy efficiency in a city is deeply interwoven with other aspects of urban development such as social...... structures and the geographical context. As cities are the main consumer of energy and resources, they are both problem and solution to tackle issues of energy efficiency and saving. Cities have been committed to this agenda, especially to meet the national and international energy targets. Increasingly......, cities act as entrepreneurs of new energy solutions acknowledging that efficient monitoring of energy and climate policies has become important to urban branding and competitiveness. This special issue presents findings from the European FP7 project ‘Planning for Energy Efficient Cities’ (PLEEC...

  15. Tsunami vulnerability assessment mapping for the west coast of Peninsular Malaysia using a geographical information system (GIS)

    International Nuclear Information System (INIS)

    Najihah, R; Effendi, D M; Hairunnisa, M A; Masiri, K

    2014-01-01

    The catastrophic Indian Ocean tsunami of 26 December 2004 raised a number of questions for scientist and politicians on how to deal with the tsunami risk and assessment in coastal regions. This paper discusses the challenges in tsunami vulnerability assessment and presents the result of tsunami disaster mapping and vulnerability assessment study for West Coast of Peninsular Malaysia. The spatial analysis was carried out using Geographical Information System (GIS) technology to demarcate spatially the tsunami affected village's boundary and suitable disaster management program can be quickly and easily developed. In combination with other thematic maps such as road maps, rail maps, school maps, and topographic map sheets it was possible to plan the accessibility and shelter to the affected people. The tsunami vulnerability map was used to identify the vulnerability of villages/village population to tsunami. In the tsunami vulnerability map, the intensity of the tsunami was classified as hazard zones based on the inundation level in meter (contour). The approach produced a tsunami vulnerability assessment map consists of considering scenarios of plausible extreme, tsunami-generating events, computing the tsunami inundation levels caused by different events and scenarios and estimating the possible range of casualties for computing inundation levels. The study provides an interactive means to identify the tsunami affected areas after the disaster and mapping the tsunami vulnerable village before for planning purpose were the essential exercises for managing future disasters

  16. Tsunami vulnerability assessment mapping for the west coast of Peninsular Malaysia using a geographical information system (GIS)

    Science.gov (United States)

    Najihah, R.; Effendi, D. M.; Hairunnisa, M. A.; Masiri, K.

    2014-02-01

    The catastrophic Indian Ocean tsunami of 26 December 2004 raised a number of questions for scientist and politicians on how to deal with the tsunami risk and assessment in coastal regions. This paper discusses the challenges in tsunami vulnerability assessment and presents the result of tsunami disaster mapping and vulnerability assessment study for West Coast of Peninsular Malaysia. The spatial analysis was carried out using Geographical Information System (GIS) technology to demarcate spatially the tsunami affected village's boundary and suitable disaster management program can be quickly and easily developed. In combination with other thematic maps such as road maps, rail maps, school maps, and topographic map sheets it was possible to plan the accessibility and shelter to the affected people. The tsunami vulnerability map was used to identify the vulnerability of villages/village population to tsunami. In the tsunami vulnerability map, the intensity of the tsunami was classified as hazard zones based on the inundation level in meter (contour). The approach produced a tsunami vulnerability assessment map consists of considering scenarios of plausible extreme, tsunami-generating events, computing the tsunami inundation levels caused by different events and scenarios and estimating the possible range of casualties for computing inundation levels. The study provides an interactive means to identify the tsunami affected areas after the disaster and mapping the tsunami vulnerable village before for planning purpose were the essential exercises for managing future disasters.

  17. Effect of clustering on attack vulnerability of interdependent scale-free networks

    International Nuclear Information System (INIS)

    Li, Rui-qi; Sun, Shi-wen; Ma, Yi-lin; Wang, Li; Xia, Cheng-yi

    2015-01-01

    In order to deeply understand the complex interdependent systems, it is of great concern to take clustering coefficient, which is an important feature of many real-world systems, into account. Previous study mainly focused on the impact of clustering on interdependent networks under random attacks, while we extend the study to the case of the more realistic attacking strategy, targeted attack. A system composed of two interdependent scale-free networks with tunable clustering is provided. The effects of coupling strength and coupling preference on attack vulnerability are explored. Numerical simulation results demonstrate that interdependent links between two networks make the entire system much more fragile to attacks. Also, it is found that clustering significantly increases the vulnerability of interdependent scale-free networks. Moreover, for fully coupled network, disassortative coupling is found to be most vulnerable to random attacks, while the random and assortative coupling have little difference. Additionally, enhancing coupling strength can greatly enhance the fragility of interdependent networks against targeted attacks. These results can not only improve the deep understanding of structural complexity of complex systems, but also provide insights into the guidance of designing resilient infrastructures.

  18. Strategic targeting of advance care planning interventions: the Goldilocks phenomenon.

    Science.gov (United States)

    Billings, J Andrew; Bernacki, Rachelle

    2014-04-01

    Strategically selecting patients for discussions and documentation about limiting life-sustaining treatments-choosing the right time along the end-of-life trajectory for such an intervention and identifying patients at high risk of facing end-of-life decisions-can have a profound impact on the value of advance care planning (ACP) efforts. Timing is important because the completion of an advance directive (AD) too far from or too close to the time of death can lead to end-of-life decisions that do not optimally reflect the patient's values, goals, and preferences: a poorly chosen target patient population that is unlikely to need an AD in the near future may lead to patients making unrealistic, hypothetical choices, while assessing preferences in the emergency department or hospital in the face of a calamity is notoriously inadequate. Because much of the currently studied ACP efforts have led to a disappointingly small proportion of patients eventually benefitting from an AD, careful targeting of the intervention should also improve the efficacy of such projects. A key to optimal timing and strategic selection of target patients for an ACP program is prognostication, and we briefly highlight prognostication tools and studies that may point us toward high-value AD interventions.

  19. Planning target volume (PTV) definition and its effects in the radiotherapy

    International Nuclear Information System (INIS)

    Poli, Maria Esmeralda Ramos

    2007-01-01

    Tills work intends to study the margins required to define a planning target volume (PTV) for adequate treatment of the mobile tumors such as prostate or those located in areas with less mobility as the ones in head and neck region, in the absence of daily localization imaging based. It is also intends to evaluate the impact caused by the PTV, in terms of dose, to the critical structures surrounding the PTV and its influence when inverse planning is used in the intensity-modulated radiation therapy (IMRT). Data from 387 prostate patients were analyzed retrospectively. Every patient in the study received daily pre-treatment localization with 2D ultrasound resulting in a total of 10,327 localizations, each comprising of an isocenter displacement in 3 directions: anterior-posterior (AP), right-left lateral (RL), and superior-inferior (SI). The mean displacement and standard deviation (SD) for each direction for each patient was computed from daily treatment records. The uncertainties (SD) in the target position were 4.4 mm (AP), 3.6 mm (RL), and 4.5 mm (SI). A study of the uncertainties in the daily positioning of 78 head and neck patients who used thermoplastic mask to immobilize them, evaluated with electronic portal imaging device (EPID), showed variations (SD) in the isocenter treatment position of 3.1 mm (AP), 1.5 mm (RL), and 4.5 mm (SI). By applying these shifts in an anthropomorphic phantom it was studied the dose-volume histograms resultant of the isocenter displacement in the daily treatment. The result showed the importance of putting margins in the clinical target volume to assure an adequate treatment and also showed that isocenter daily variation can cause an increase to the dose greater than the tolerance level to the critical organs. (author)

  20. Vulnerabilities, Influences and Interaction Paths: Failure Data for Integrated System Risk Analysis

    Science.gov (United States)

    Malin, Jane T.; Fleming, Land

    2006-01-01

    We describe graph-based analysis methods for identifying and analyzing cross-subsystem interaction risks from subsystem connectivity information. By discovering external and remote influences that would be otherwise unexpected, these methods can support better communication among subsystem designers at points of potential conflict and to support design of more dependable and diagnosable systems. These methods identify hazard causes that can impact vulnerable functions or entities if propagated across interaction paths from the hazard source to the vulnerable target. The analysis can also assess combined impacts of And-Or trees of disabling influences. The analysis can use ratings of hazards and vulnerabilities to calculate cumulative measures of the severity and importance. Identification of cross-subsystem hazard-vulnerability pairs and propagation paths across subsystems will increase coverage of hazard and risk analysis and can indicate risk control and protection strategies.

  1. VULNERABILITY OF COMPANIES

    Directory of Open Access Journals (Sweden)

    ARMEAN ANDREEA

    2013-06-01

    Full Text Available In present, the study of vulnerability of companies is increasing in every field due to the unstable economic environment influences. The object of this research is to define and identify vulnerabilities of companies and the establishment of evaluation methods at their level. This article emphasizes the importance and usefulness of one of the best known model in this way, from our point of view, namely Băileşteanu, Negrila Pattern. This pattern covers both external factors and internal ones, that increase vulnerabilities of companies, and fit the companies in which the state of vulnerability are (vitality, viability, vulnerability, high vulnerability, difficulty and high difficulty, with a matrix. The result of the research is that any company belonging to any field, can be analyzed using this model, and assigned to one of the conditions defined within.

  2. Groundwater vulnerability assessment: from overlay methods to statistical methods in the Lombardy Plain area

    Directory of Open Access Journals (Sweden)

    Stefania Stevenazzi

    2017-06-01

    Full Text Available Groundwater is among the most important freshwater resources. Worldwide, aquifers are experiencing an increasing threat of pollution from urbanization, industrial development, agricultural activities and mining enterprise. Thus, practical actions, strategies and solutions to protect groundwater from these anthropogenic sources are widely required. The most efficient tool, which helps supporting land use planning, while protecting groundwater from contamination, is represented by groundwater vulnerability assessment. Over the years, several methods assessing groundwater vulnerability have been developed: overlay and index methods, statistical and process-based methods. All methods are means to synthesize complex hydrogeological information into a unique document, which is a groundwater vulnerability map, useable by planners, decision and policy makers, geoscientists and the public. Although it is not possible to identify an approach which could be the best one for all situations, the final product should always be scientific defensible, meaningful and reliable. Nevertheless, various methods may produce very different results at any given site. Thus, reasons for similarities and differences need to be deeply investigated. This study demonstrates the reliability and flexibility of a spatial statistical method to assess groundwater vulnerability to contamination at a regional scale. The Lombardy Plain case study is particularly interesting for its long history of groundwater monitoring (quality and quantity, availability of hydrogeological data, and combined presence of various anthropogenic sources of contamination. Recent updates of the regional water protection plan have raised the necessity of realizing more flexible, reliable and accurate groundwater vulnerability maps. A comparison of groundwater vulnerability maps obtained through different approaches and developed in a time span of several years has demonstrated the relevance of the

  3. Principles of Security Vulnerability Analysis of stationary industrial installations

    International Nuclear Information System (INIS)

    Borysiewicz, M.

    2006-01-01

    Security and safety have been key priorities at facilities that manufacture, store, use, or handle hazardous chemicals, after the terrorist attacks on the United States of September 11, 2001. Security improvements may be needed, especially at sites that pose a more attractive target to terrorists due to their economic importance, perceived level of consequences, and other factors. The first step in the process of managing security risks is to identify and analyze the threats and the vulnerabilities facing a facility by conducting a Security Vulnerability Analysis (SVA). The SVA is a systematic process that evaluates the likelihood that a threat against a facility will be successful. It considers the potential severity of consequences to the facility itself, to the surrounding community and on the energy supply chain. The objective of conducting a SVA is to identify security hazards, threats, and vulnerabilities facing a facility, and to evaluate the countermeasures to provide for the protection of the public, workers, national interests, the environment, and the company. With this information security risks can be assessed and strategies can be formed to reduce vulnerabilities as required. SVA is a tool to assist management in making decisions on the need for countermeasures to address the threats and vulnerabilities. The paper provides an overview of fundamental steps of SVA for stationary industrial installations. (author)

  4. MO-C-17A-06: Online Adaptive Re-Planning to Account for Independent Motions Between Multiple Targets During Radiotherapy of Lung Cancer

    International Nuclear Information System (INIS)

    Liu, F; Tai, A; Ahunbay, E; Gore, E; Johnstone, C; Li, X

    2014-01-01

    Purpose: To quantify interfractional independent motions between multiple targets in radiotherapy (RT) of lung cancer, and to study the dosimetric benefits of an online adaptive replanning method to account for these variations. Methods: Ninety five diagnostic-quality daily CTs acquired for 9 lung cancer patients treated with IGRT using an in-room CT (CTVision, Siemens) were analyzed. On each daily CT set, contours of the targets (GTV, CTV, or involved nodes) and organs at risk were generated by populating the planning contours using an auto-segmentation tool (ABAS, Elekta) with manual editing. For each patient, an IMRT plan was generated based on the planning CT with a prescription dose of 60 Gy in 2Gy fractions. Three plans were generated and compared for each daily CT set: an IGRT (repositioning) plan by copying the original plan with the required shifts, an online adaptive plan by rapidly modifying the aperture shapes and segment weights of the original plan to conform to the daily anatomy, and a new fully re-optimized plan based on the daily CT using a planning system (Panther, Prowess). Results: The daily deviations of the distance between centers of masses of the targets from the plans varied daily from -10 to 8 mm with an average −0.9±4.1 mm (one standard deviation). The average CTV V100 are 99.0±0.7%, 97.9±2.8%, 99.0±0.6%, and 99.1±0.6%, and the lung V20 Gy 928±332 cc, 944±315 cc, 917±300 cc, and 891±295 cc for the original, repositioning, adaptive, and re-optimized plans, respectively. Wilcoxon signed-rank tests show that the adaptive plans are statistically significantly better than the repositioning plans and comparable with the reoptimized plans. Conclusion: There exist unpredictable, interfractional, relative volume changes and independent motions between multiple targets during lung cancer RT which cannot be accounted for by the current IGRT repositioning but can be corrected by the online adaptive replanning method

  5. MO-C-17A-06: Online Adaptive Re-Planning to Account for Independent Motions Between Multiple Targets During Radiotherapy of Lung Cancer

    Energy Technology Data Exchange (ETDEWEB)

    Liu, F; Tai, A; Ahunbay, E; Gore, E; Johnstone, C; Li, X [Medical College of Wisconsin, Milwaukee, WI (United States)

    2014-06-15

    Purpose: To quantify interfractional independent motions between multiple targets in radiotherapy (RT) of lung cancer, and to study the dosimetric benefits of an online adaptive replanning method to account for these variations. Methods: Ninety five diagnostic-quality daily CTs acquired for 9 lung cancer patients treated with IGRT using an in-room CT (CTVision, Siemens) were analyzed. On each daily CT set, contours of the targets (GTV, CTV, or involved nodes) and organs at risk were generated by populating the planning contours using an auto-segmentation tool (ABAS, Elekta) with manual editing. For each patient, an IMRT plan was generated based on the planning CT with a prescription dose of 60 Gy in 2Gy fractions. Three plans were generated and compared for each daily CT set: an IGRT (repositioning) plan by copying the original plan with the required shifts, an online adaptive plan by rapidly modifying the aperture shapes and segment weights of the original plan to conform to the daily anatomy, and a new fully re-optimized plan based on the daily CT using a planning system (Panther, Prowess). Results: The daily deviations of the distance between centers of masses of the targets from the plans varied daily from -10 to 8 mm with an average −0.9±4.1 mm (one standard deviation). The average CTV V100 are 99.0±0.7%, 97.9±2.8%, 99.0±0.6%, and 99.1±0.6%, and the lung V20 Gy 928±332 cc, 944±315 cc, 917±300 cc, and 891±295 cc for the original, repositioning, adaptive, and re-optimized plans, respectively. Wilcoxon signed-rank tests show that the adaptive plans are statistically significantly better than the repositioning plans and comparable with the reoptimized plans. Conclusion: There exist unpredictable, interfractional, relative volume changes and independent motions between multiple targets during lung cancer RT which cannot be accounted for by the current IGRT repositioning but can be corrected by the online adaptive replanning method.

  6. A Method to Analyze Threats and Vulnerabilities by Using a Cyber Security Test-bed of an Operating NPP

    International Nuclear Information System (INIS)

    Kim, Yong Sik; Son, Choul Woong; Lee, Soo Ill

    2016-01-01

    In order to implement cyber security controls for an Operating NPP, a security assessment should conduct in advance, and it is essential to analyze threats and vulnerabilities for a cyber security risk assessment phase. It might be impossible to perform a penetration test or scanning for a vulnerability analysis because the test may cause adverse effects on the inherent functions of ones. This is the reason why we develop and construct a cyber security test-bed instead of using real I and C systems in the operating NPP. In this paper, we propose a method to analyze threats and vulnerabilities of a specific target system by using a cyber security test-bed. The test-bed is being developed considering essential functions of the selected safety and non-safety system. This paper shows the method to analyze threats and vulnerabilities of a specific target system by using a cyber security test-bed. In order to develop the cyber security test-bed with both safety and non-safety functions, test-bed functions analysis and preliminary threats and vulnerabilities identification have been conducted. We will determine the attack scenarios and conduct the test-bed based vulnerability analysis

  7. A Method to Analyze Threats and Vulnerabilities by Using a Cyber Security Test-bed of an Operating NPP

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Yong Sik; Son, Choul Woong; Lee, Soo Ill [KHNP CRI, Daejeon (Korea, Republic of)

    2016-10-15

    In order to implement cyber security controls for an Operating NPP, a security assessment should conduct in advance, and it is essential to analyze threats and vulnerabilities for a cyber security risk assessment phase. It might be impossible to perform a penetration test or scanning for a vulnerability analysis because the test may cause adverse effects on the inherent functions of ones. This is the reason why we develop and construct a cyber security test-bed instead of using real I and C systems in the operating NPP. In this paper, we propose a method to analyze threats and vulnerabilities of a specific target system by using a cyber security test-bed. The test-bed is being developed considering essential functions of the selected safety and non-safety system. This paper shows the method to analyze threats and vulnerabilities of a specific target system by using a cyber security test-bed. In order to develop the cyber security test-bed with both safety and non-safety functions, test-bed functions analysis and preliminary threats and vulnerabilities identification have been conducted. We will determine the attack scenarios and conduct the test-bed based vulnerability analysis.

  8. Weather, climate and the future : B.C.'s plan

    International Nuclear Information System (INIS)

    2004-12-01

    This plan lays the groundwork for a comprehensive long-term response to climate change in British Columbia (BC). Three key objectives were identified: decreasing greenhouse gas (GHG) emissions and reducing vulnerability to future climate change; contributing to BC's economic revitalization by improving energy efficiency and supporting development of market opportunities; and ensuring BC's interests are protected in the implementation of national climate policies. A summary of actions was provided in the areas of sustainable energy production and sustainable forest management. Outlines of the government's plans to provide support to the BC Agriculture Council were also provided along with plans concerning infrastructure and the ways in which climate change will be incorporated into transportation planning and investment strategies. A list of government leadership and outreach actions was given, as well as details of water management plans. It was concluded that further policy developments will be required in incremental forest sinks, energy efficiency, bioenergy and fuel cell technology. Improved urban development and performance targets are necessary for public buildings. It was noted that regulatory changes to provide further incentives in these areas are necessary. Partnerships between the private sector, federal, local and regional governments will be essential for the future success of this plan. tabs., figs

  9. Evaluation of Social Vulnerability to Natural Disasters on a County Scale in Henan Province

    Institute of Scientific and Technical Information of China (English)

    Shanfeng HE; Liping DU; Xiuhua GAO

    2016-01-01

    Social vulnerability evaluation is of important significance to analyzing risks of natural disasters to human society and economy. By using expert investigation and AHP method,12 indicators from four aspects( population,economy,infrastructure and disaster prevention and mitigation capacity) are selected to assess social vulnerability to natural disasters on a county scale in Henan Province. The results show that the population vulnerability and economic vulnerability to natural disasters in the eastern region is generally higher than in the western region,while the areas with high infrastructure vulnerability are mainly located in the northwest; the disaster prevention and mitigation capacity in northwest is higher than in east and south,and this capacity of various districts is obviously higher than that of counties; in terms of the spatial pattern,social vulnerability to natural disasters is roughly higher in a belt from northeast to southwest,and lower on both sides of the belt. The results can provide scientific basis for disaster risk management and disaster prevention and mitigation planning in Henan Province.

  10. Identification and assessment of potential vulnerabilities in the poultry meat production chain to dangerous agents and substances

    NARCIS (Netherlands)

    Schwägele, F.C.; Andrée, S.; Beraquet, N.; Castrillon, M.; Winkel, C.; Garforth, D.; Cnossen, H.J.; Lucas Luijckx, N.B.; Ayalew, G.

    2009-01-01

    The specific targeted European research project ΣChain (2006) addresses existing as well as potential vulnerabilities within food chains. One of the food chains within the focus of ΣChain is dealing with poultry meat. Fundamental for the assessment of potential vulnerabilities in the chain is basic

  11. Assessing Flood Risks and Planning for Resiliency in New Jersey: A Case Study on the Use of Online Flood Mapping and Resilience Planning Tools

    Science.gov (United States)

    Auermuller, L. M.; Gatto, J.; Huch, C.

    2015-12-01

    The highly developed nature of New Jersey's coastline, barrier island and lagoon communities make them particularly vulnerable to storm surge, sea level rise and flooding. The impacts of Hurricane Sandy have enlightened coastal communities to these realities. Recognizing these vulnerabilities, the Jacques Cousteau National Research Reserve (JC NERR), Rutgers Center for Remote Sensing and Spatial Analysis (CRSSA), Rutgers Bloustein School and the Barnegat Bay Partnership (BBP) have developed web-based tools to assist NJ's coastal communities in visualizing and planning for future local impacts. NJFloodMapper and NJAdapt are two complementary interactive mapping websites that visualize different current and future flood hazards. These hazard layers can be combined with additional data including critical facilities, evacuation routes, socioeconomic and environmental data. Getting to Resilience is an online self-assessment tool developed to assist communities reduce vulnerability and increase preparedness by linking planning, mitigation, and adaptation. Through this interactive process communities will learn how their preparedness can yield valuable points through voluntary programs like FEMA's Community Rating System and Sustainable Jersey. The assessment process can also increase the community's understanding of where future vulnerabilities should be addressed through hazard mitigation planning. Since Superstorm Sandy, more than thirty communities in New Jersey have been provided technical assistance in assessing their risks and vulnerabilities to coastal hazards, and have begun to understand how to better plan and prepare for short and long-term changes along their shorelines.

  12. Environmental Health Related Socio-Spatial Inequalities: Identifying “Hotspots” of Environmental Burdens and Social Vulnerability

    Science.gov (United States)

    Shrestha, Rehana; Flacke, Johannes; Martinez, Javier; van Maarseveen, Martin

    2016-01-01

    Differential exposure to multiple environmental burdens and benefits and their distribution across a population with varying vulnerability can contribute heavily to health inequalities. Particularly relevant are areas with high cumulative burdens and high social vulnerability termed as “hotspots”. This paper develops an index-based approach to assess these multiple burdens and benefits in combination with vulnerability factors at detailed intra-urban level. The method is applied to the city of Dortmund, Germany. Using non-spatial and spatial methods we assessed inequalities and identified “hotspot” areas in the city. We found modest inequalities burdening higher vulnerable groups in Dortmund (CI = −0.020 at p vulnerability, is essential to inform environmental justice debates and to mobilize local stakeholders. Locating “hotspot” areas at this detailed spatial level can serve as a basis to develop interventions that target vulnerable groups to ensure a health conducive equal environment. PMID:27409625

  13. Framework for mapping the drivers of coastal vulnerability and spatial decision making for climate-change adaptation: A case study from Maharashtra, India.

    Science.gov (United States)

    Krishnan, Pandian; Ananthan, Pachampalayam Shanmugam; Purvaja, Ramachandran; Joyson Joe Jeevamani, Jeyapaul; Amali Infantina, John; Srinivasa Rao, Cherukumalli; Anand, Arur; Mahendra, Ranganalli Somashekharappa; Sekar, Iyyapa; Kareemulla, Kalakada; Biswas, Amit; Kalpana Sastry, Regulagedda; Ramesh, Ramachandran

    2018-05-31

    The impacts of climate change are of particular concern to the coastal region of tropical countries like India, which are exposed to cyclones, floods, tsunami, seawater intrusion, etc. Climate-change adaptation presupposes comprehensive assessment of vulnerability status. Studies so far relied either on remote sensing-based spatial mapping of physical vulnerability or on certain socio-economic aspects with limited scope for upscaling or replication. The current study is an attempt to develop a holistic and robust framework to assess the vulnerability of coastal India at different levels. We propose and estimate cumulative vulnerability index (CVI) as a function of exposure, sensitivity and adaptive capacity, at the village level, using nationally comparable and credible datasets. The exposure index (EI) was determined at the village level by decomposing the spatial multi-hazard maps, while sensitivity (SI) and adaptive capacity indices (ACI) were estimated using 23 indicators, covering social and economic aspects. The indicators were identified through the literature review, expert consultations, opinion survey, and were further validated through statistical tests. The socio-economic vulnerability index (SEVI) was constructed as a function of sensitivity and adaptive capacity for planning grassroot-level interventions and adaptation strategies. The framework was piloted in Sindhudurg, a coastal district in Maharashtra, India. It comprises 317 villages, spread across three taluks viz., Devgad, Malvan and Vengurla. The villages in Sindhudurg were ranked based on this multi-criteria approach. Based on CVI values, 92 villages (30%) in Sindhudurg were identified as highly vulnerable. We propose a decision tool for identifying villages vulnerable to changing climate, based on their level of sensitivity and adaptive capacity in a two-dimensional matrix, thus aiding in planning location-specific interventions. Here, vulnerability indicators are classified and designated as

  14. Vulnerability and controllability of networks of networks

    International Nuclear Information System (INIS)

    Liu, Xueming; Peng, Hao; Gao, Jianxi

    2015-01-01

    Network science is a highly interdisciplinary field ranging from natural science to engineering technology and it has been applied to model complex systems and used to explain their behaviors. Most previous studies have been focus on isolated networks, but many real-world networks do in fact interact with and depend on other networks via dependency connectivities, forming “networks of networks” (NON). The interdependence between networks has been found to largely increase the vulnerability of interacting systems, when a node in one network fails, it usually causes dependent nodes in other networks to fail, which, in turn, may cause further damage on the first network and result in a cascade of failures with sometimes catastrophic consequences, e.g., electrical blackouts caused by the interdependence of power grids and communication networks. The vulnerability of a NON can be analyzed by percolation theory that can be used to predict the critical threshold where a NON collapses. We review here the analytic framework for analyzing the vulnerability of NON, which yields novel percolation laws for n-interdependent networks and also shows that percolation theory of a single network studied extensively in physics and mathematics in the last 50 years is a specific limited case of the more general case of n interacting networks. Understanding the mechanism behind the cascading failure in NON enables us finding methods to decrease the vulnerability of the natural systems and design of more robust infrastructure systems. By examining the vulnerability of NON under targeted attack and studying the real interdependent systems, we find two methods to decrease the systems vulnerability: (1) protect the high-degree nodes, and (2) increase the degree correlation between networks. Furthermore, the ultimate proof of our understanding of natural and technological systems is reflected in our ability to control them. We also review the recent studies and challenges on the

  15. Vulnerability of particularly valuable areas. Summary

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2012-07-01

    This report is part of the scientific basis for the management plan for the North Sea and Skagerrak. The report focuses on the vulnerability of particularly valuable areas to petroleum activities, maritime transport, fisheries, land-based and coastal activities and long-range transboundary pollution. A working group with representatives from many different government agencies, headed by the Institute of Marine Research and the Directorate for Nature Management, has been responsible for drawing up the present report on behalf of the Expert Group for the North Sea and Skagerrak. The present report considers the 12 areas that were identified as particularly valuable during an earlier stage of the management plan process on the environment, natural resources and pollution. There are nine areas along the coast and three open sea areas in the North Sea that were identified according to the same predefined criteria as used for the management plans for the Barents Sea: Lofoten area and the Norwegian Sea. The most important criteria for particularly valuable areas are importance for biological production and importance for biodiversity.(Author)

  16. Vulnerability of particularly valuable areas. Summary

    International Nuclear Information System (INIS)

    2012-01-01

    This report is part of the scientific basis for the management plan for the North Sea and Skagerrak. The report focuses on the vulnerability of particularly valuable areas to petroleum activities, maritime transport, fisheries, land-based and coastal activities and long-range transboundary pollution. A working group with representatives from many different government agencies, headed by the Institute of Marine Research and the Directorate for Nature Management, has been responsible for drawing up the present report on behalf of the Expert Group for the North Sea and Skagerrak. The present report considers the 12 areas that were identified as particularly valuable during an earlier stage of the management plan process on the environment, natural resources and pollution. There are nine areas along the coast and three open sea areas in the North Sea that were identified according to the same predefined criteria as used for the management plans for the Barents Sea: Lofoten area and the Norwegian Sea. The most important criteria for particularly valuable areas are importance for biological production and importance for biodiversity.(Author)

  17. Spatial Modelling of Urban Physical Vulnerability to Explosion Hazards Using GIS and Fuzzy MCDA

    Directory of Open Access Journals (Sweden)

    Yasser Ebrahimian Ghajari

    2017-07-01

    Full Text Available Most of the world’s population is concentrated in accumulated spaces in the form of cities, making the concept of urban planning a significant issue for consideration by decision makers. Urban vulnerability is a major issue which arises in urban management, and is simply defined as how vulnerable various structures in a city are to different hazards. Reducing urban vulnerability and enhancing resilience are considered to be essential steps towards achieving urban sustainability. To date, a vast body of literature has focused on investigating urban systems’ vulnerabilities with regard to natural hazards. However, less attention has been paid to vulnerabilities resulting from man-made hazards. This study proposes to investigate the physical vulnerability of buildings in District 6 of Tehran, Iran, with respect to intentional explosion hazards. A total of 14 vulnerability criteria are identified according to the opinions of various experts, and standard maps for each of these criteria have been generated in a GIS environment. Ultimately, an ordered weighted averaging (OWA technique was applied to generate vulnerability maps for different risk conditions. The results of the present study indicate that only about 25 percent of buildings in the study area have a low level of vulnerability under moderate risk conditions. Sensitivity analysis further illustrates the robustness of the results obtained. Finally, the paper concludes by arguing that local authorities must focus more on risk-reduction techniques in order to reduce physical vulnerability and achieve urban sustainability.

  18. Effectiveness of Using Red-Teams to Identify Maritime Security Vulnerabilities to Terrorist Attack

    National Research Council Canada - National Science Library

    Culpepper, Anna

    2004-01-01

    .... Moreover, there have been no attacks on homeland U.S. targets since September 11. The red team concept provides an innovative method to examine these vulnerabilities from the terrorist perspective...

  19. Current status of vulnerable plaque detection.

    LENUS (Irish Health Repository)

    Sharif, Faisal

    2012-02-01

    Critical coronary stenoses have been shown to contribute to only a minority of acute coronary syndromes (ACS) and sudden cardiac death. Autopsy studies have identified a subgroup of high-risk patients with disrupted vulnerable plaque and modest stenosis. Consequently, a clinical need exists to develop methods to identify these plaques prospectively before disruption and clinical expression of disease. Recent advances in invasive and noninvasive imaging techniques have shown the potential to identify these high-risk plaques. The anatomical characteristics of the vulnerable plaque such as thin cap fibroatheroma and lipid pool can be identified with angioscopy, high frequency intravascular ultrasound, intravascular MRI, and optical coherence tomography. Efforts have also been made to recognize active inflammation in high-risk plaques using intravascular thermography. Plaque chemical composition by measuring electromagnetic radiation using spectroscopy is also an emerging technology to detect vulnerable plaques. Noninvasive imaging with MRI, CT, and PET also holds the potential to differentiate between low and high-risk plaques. However, at present none of these imaging modalities are able to detect vulnerable plaque neither has been shown to definitively predict outcome. Nevertheless in contrast, there has been a parallel development in the physiological assessment of advanced atherosclerotic coronary artery disease. Thus recent trials using fractional flow reserve in patients with modest non flow-limiting stenoses have shown that deferral of PCI with optimal medical therapy in these patients is superior to coronary intervention. Further trials are needed to provide more information regarding the natural history of high-risk but non flow-limiting plaque to establish patient-specific targeted therapy and to refine plaque stabilizing strategies in the future.

  20. A watershed-based method for environmental vulnerability assessment with a case study of the Mid-Atlantic region

    Energy Technology Data Exchange (ETDEWEB)

    Tran, Liem T., E-mail: ltran1@utk.edu [Department of Geography, University of Tennessee, Knoxville, TN (United States); O& #x27; Neill, Robert V. [OTIE and Associates, Oak Ridge, TN (United States); Smith, Elizabeth R. [U.S. Environmental Protection Agency, Office of Research and Development, National Exposure Research Laboratory, Research Triangle Park, NC (United States)

    2012-04-15

    The paper presents a method for environmental vulnerability assessment with a case study of the Mid-Atlantic region. The method is based on the concept of 'self-/peer-appraisal' of a watershed in term of vulnerability. The self-/peer-appraisal process is facilitated by two separate linear optimization programs. The analysis provided insights on the environmental conditions, in general, and the relative vulnerability pattern, in particular, of the Mid-Atlantic region. The suggested method offers a simple but effective and objective way to perform a regional environmental vulnerability assessment. Consequently the method can be used in various steps in environmental assessment and planning. - Highlights: Black-Right-Pointing-Pointer We present a method for regional environmental vulnerability assessment. Black-Right-Pointing-Pointer It is based on the self-/peer-appraisal concept in term of vulnerability. Black-Right-Pointing-Pointer The analysis is facilitated by two separate linear optimization programs. Black-Right-Pointing-Pointer The method provides insights on the regional relative vulnerability pattern.

  1. Drought vulnerability assesssment and mapping in Morocco

    Science.gov (United States)

    Imani, Yasmina; Lahlou, Ouiam; Bennasser Alaoui, Si; Naumann, Gustavo; Barbosa, Paulo; Vogt, Juergen

    2014-05-01

    basin is highly vulnerable to drought. The mountainous areas present the most favorable annual rainfall. That contributes to explain their low DVI. In the provinces that present the highest vulnerability to drought, spots presenting a lower vulnerability correspond to large irrigated perimeters. Overall, the main output of this study were to show how the DVI can allow detecting the differences in vulnerability in the different rural communes providing, therefore, a tool for more effective drought management practices. The analysis of the 4 dimensions of the DVI showed that at the river basin level, the mean annual rainfall, the percentage of irrigated lands, The Cereal / Fruit trees and market crops ratio, the land status, the farm's sizes, the adult literacy rate and the access to improved drinking water represent the major drivers of vulnerability. They may therefore be targeted in priority by mitigation and adaptation actions.

  2. Vulnerability of settlements around Mt. Cameroon volcano, Cameroon

    Science.gov (United States)

    Zogning, Appolinaire; Spinetti, Claudia; Ngouanet, Chretien; Tchoudam, David; Kouokam, Emmanuel; Thierry, Pierre; Bignami, Christian; Fabrizia Buongiorno, Maria; Ilaria Pannaccione Apa, Maria

    2010-05-01

    Located at the bottom of the Gulf of Guinea, Cameroon is exposed to a large variety of natural hazards, including volcanism. Most of the hazard are concentrated around the active volcano Mt. Cameroon which combines effusive and explosive types of activity. The threatened stakes are numerous and different exposed: people, settlements, industrial plantations, petrol refinery and many other factories and infrastructures. Until 2005, no risk management plans has been available. In 2006, the French Embassy in Cameroon, within the framework of a financial convention between Cameroon and France, put in place the GRINP (Management of Natural Risks and Civil Protection) project whose objective was to reinforce the capacity of Cameroon's civil protection department and thus, contribute to the improvement of the security of the population faced with catastrophes. The objective was to realize a Risk Prevention Plan at a local council scale, and taking into consideration the specific natural risks of each zone. The general objective of the RPP was to clearly draw land use maps for risks zones, showing the overlay of stakes with risk of different intensities. In 2008 European Commission funded the Mia-Vita project (Mitigating and Assessing Volcanic Impacts on Terrain and human Activities). The aim of the project is to improve the crisis management capabilities based on monitoring and early warning systems and secure communications; reduction of people's vulnerability and development of recovering capabilities after an event occurs for both local communities and ecological systems. Keyword: natural hazards, Mt. Cameroon, vulnerability, risk prevention plan

  3. PlanJury: probabilistic plan evaluation revisited

    Science.gov (United States)

    Witte, M.; Sonke, J.-J.; van Herk, M.

    2014-03-01

    Purpose: Over a decade ago, the 'Van Herk margin recipe paper' introduced plan evaluation through DVH statistics based on population distributions of systematic and random errors. We extended this work for structures with correlated uncertainties (e.g. lymph nodes or parotid glands), and considered treatment plans containing multiple (overlapping) dose distributions (e.g. conventional lymph node and hypo-fractionated tumor doses) for which different image guidance protocols may lead to correlated errors. Methods: A command-line software tool 'PlanJury' was developed which reads 3D dose and structure data exported from a treatment planning system. Uncertainties are specified by standard deviations and correlation coefficients. Parameters control the DVH statistics to be computed: e.g. the probability of reaching a DVH constraint, or the dose absorbed at given confidence in a (combined) volume. Code was written in C++ and parallelized using OpenMP. Testing geometries were constructed using idealized spherical volumes and dose distributions. Results: Negligible stochastic noise could be attained within two minutes computation time for a single target. The confidence to properly cover both of two targets was 90% for two synchronously moving targets, but decreased by 7% if the targets moved independently. For two partially covered organs at risk the confidence of at least one organ below the mean dose threshold was 40% for synchronous motion, 36% for uncorrelated motion, but only 20% for either of the organs separately. Two abutting dose distributions ensuring 91% confidence of proper target dose for correlated motions led to 28% lower confidence for uncorrelated motions as relative displacements between the doses resulted in cold spots near the target. Conclusions: Probabilistic plan evaluation can efficiently be performed for complicated treatment planning situations, thus providing important plan quality information unavailable in conventional PTV based evaluations.

  4. Restoration planning to guide Aichi targets in a megadiverse country.

    Science.gov (United States)

    Tobón, Wolke; Urquiza-Haas, Tania; Koleff, Patricia; Schröter, Matthias; Ortega-Álvarez, Rubén; Campo, Julio; Lindig-Cisneros, Roberto; Sarukhán, José; Bonn, Aletta

    2017-10-01

    Ecological restoration has become an important strategy to conserve biodiversity and ecosystems services. To restore 15% of degraded ecosystems as stipulated by the Convention on Biological Diversity Aichi target 15, we developed a prioritization framework to identify potential priority sites for restoration in Mexico, a megadiverse country. We used the most current biological and environmental data on Mexico to assess areas of biological importance and restoration feasibility at national scale and engaged stakeholders and experts throughout the process. We integrated 8 criteria into 2 components (i.e., biological importance and restoration feasibility) in a spatial multicriteria analysis and generated 11 scenarios to test the effect of assigning different component weights. The priority restoration sites were distributed across all terrestrial ecosystems of Mexico; 64.1% were in degraded natural vegetation and 6% were in protected areas. Our results provide a spatial guide to where restoration could enhance the persistence of species of conservation concern and vulnerable ecosystems while maximizing the likelihood of restoration success. Such spatial prioritization is a first step in informing policy makers and restoration planners where to focus local and large-scale restoration efforts, which should additionally incorporate social and monetary cost-benefit considerations. © 2017 The Authors. Conservation Biology published by Wiley Periodicals, Inc. on behalf of Society for Conservation Biology.

  5. Vulnerabilities of national parks in the American Midwest to climate and land use changes

    Science.gov (United States)

    Stroh, Esther D.; Struckhoff, Matthew A.; Shaver, David; Karstensen, Krista A.

    2016-06-08

    Many national parks in the American Midwest are surrounded by agricultural or urban areas or are in highly fragmented or rapidly changing landscapes. An environmental stressor is a physical, chemical, or biological condition that affects the functioning or productivity of species or ecosystems. Climate change is just one of many stressors on park natural resources; others include urbanization, land use change, air and water pollution, and so on. Understanding and comparing the relative vulnerability of a suite of parks to projected climate and land use changes is important for region-wide planning. A vulnerability assessment of 60 units in the 13-state U.S. National Park Service Midwestern administrative region to climate and land use change used existing data from multiple sources. Assessment included three components: individual park exposure (5 metrics), sensitivity (5 metrics), and constraints to adaptive capacity (8 metrics) under 2 future climate scenarios. The three components were combined into an overall vulnerability score. Metrics were measures of existing or projected conditions within park boundaries, within 10-kilometer buffers surrounding parks, and within ecoregions that contain or intersect them. Data were normalized within the range of values for all assessed parks, resulting in high, medium, and low relative rankings for exposure, sensitivity, constraints to adaptive capacity, and overall vulnerability. Results are consistent with assessments regarding patterns and rates of climate change nationwide but provide greater detail and relative risk for Midwestern parks. Park overall relative vulnerability did not differ between climate scenarios. Rankings for exposure, sensitivity, and constraints to adaptive capacity varied geographically and indicate regional conservation planning opportunities. The most important stressors for the most vulnerable Midwestern parks are those related to sensitivity (intrinsic characteristics of the park) and

  6. Relations of Physical Activity and Stress Vulnerability in University Students

    Science.gov (United States)

    Xu, Furong; Liu, Wenhao; Chepyator-Thomson, Jepkorir Rose; Schmidlein, Robert

    2018-01-01

    There are increased concerns about depression and anxiety among college students. Thus in need of actions to find proper intervention strategies to target this issue. The purpose of this study was to examine association between leisure-time physical activity and stress vulnerability among college students. A modified survey including physical…

  7. Target prioritization and strategy selection for active case-finding of pulmonary tuberculosis: a tool to support country-level project planning.

    Science.gov (United States)

    Nishikiori, Nobuyuki; Van Weezenbeek, Catharina

    2013-02-02

    Despite the progress made in the past decade, tuberculosis (TB) control still faces significant challenges. In many countries with declining TB incidence, the disease tends to concentrate in vulnerable populations that often have limited access to health care. In light of the limitations of the current case-finding approach and the global urgency to improve case detection, active case-finding (ACF) has been suggested as an important complementary strategy to accelerate tuberculosis control especially among high-risk populations. The present exercise aims to develop a model that can be used for county-level project planning. A simple deterministic model was developed to calculate the number of estimated TB cases diagnosed and the associated costs of diagnosis. The model was designed to compare cost-effectiveness parameters, such as the cost per case detected, for different diagnostic algorithms when they are applied to different risk populations. The model was transformed into a web-based tool that can support national TB programmes and civil society partners in designing ACF activities. According to the model output, tuberculosis active case-finding can be a costly endeavor, depending on the target population and the diagnostic strategy. The analysis suggests the following: (1) Active case-finding activities are cost-effective only if the tuberculosis prevalence among the target population is high. (2) Extensive diagnostic methods (e.g. X-ray screening for the entire group, use of sputum culture or molecular diagnostics) can be applied only to very high-risk groups such as TB contacts, prisoners or people living with human immunodeficiency virus (HIV) infection. (3) Basic diagnostic approaches such as TB symptom screening are always applicable although the diagnostic yield is very limited. The cost-effectiveness parameter was sensitive to local diagnostic costs and the tuberculosis prevalence of target populations. The prioritization of appropriate target

  8. Considering Time-Dependency of Social Vulnerability in Crisis Modeling and Management

    Science.gov (United States)

    Aubrecht, C.; Steinnocher, K.; Freire, S.; Loibl, W.; Peters-Anders, J.; Ungar, J.

    2012-04-01

    Crisis and disaster management is much more than the immediate first-response actions following an incident. In many projects the main focus has been on the phase starting at the point when an unwanted event happens and lasting until the activities return to normal routines (i.e., ad hoc reaction rather than proactive mitigation). There has been less emphasis on the other phases of the disaster management cycle such as prevention, preparedness, recovery and reconstruction, even though those phases have a strong influence on the general status of a society and its citizens. Especially the potential of a crisis to escalate into a large-scale disaster is heavily dependent on the overall level of preparedness as well as on the planning of mitigation and response actions and their timely execution. There is a need for improved decision-making support that enables modeling of different crisis scenarios and their impacts according to chosen prevention and response actions. Vulnerability describing the status of a society with respect to an imposed hazard or potential impact is considered a strongly multidisciplinary concept. A central objective of vulnerability assessment is to provide indications where and how people - and more specifically, what kind of people - might be affected by a certain impact. Results should provide decision- and policy-makers with supporting information to target response and mitigation actions adequately. For assessment of the social dimension of vulnerability, population exposure mapping is usually considered the starting point. Integration of social structure and varying aspects of resilience further differentiate situation-specific vulnerability patterns on a local scale. In a disaster risk management context, assessment of human vulnerability has generally been lagging behind hazard analysis efforts. Accurately estimating population exposure is a key component of catastrophe loss modeling, one element of effective integrated risk analysis

  9. Lessons from Red Data Books: Plant Vulnerability Increases with Floral Complexity.

    Science.gov (United States)

    Stefanaki, Anastasia; Kantsa, Aphrodite; Tscheulin, Thomas; Charitonidou, Martha; Petanidou, Theodora

    2015-01-01

    The architectural complexity of flower structures (hereafter referred to as floral complexity) may be linked to pollination by specialized pollinators that can increase the probability of successful seed set. As plant-pollinator systems become fragile, a loss of such specialized pollinators could presumably result in an increased likelihood of pollination failure. This is an issue likely to be particularly evident in plants that are currently rare. Using a novel index describing floral complexity we explored whether this aspect of the structure of flowers could be used to predict vulnerability of plant species to extinction. To do this we defined plant vulnerability using the Red Data Book of Rare and Threatened Plants of Greece, a Mediterranean biodiversity hotspot. We also tested whether other intrinsic (e.g. life form, asexual reproduction) or extrinsic (e.g. habitat, altitude, range-restrictedness) factors could affect plant vulnerability. We found that plants with high floral complexity scores were significantly more likely to be vulnerable to extinction. Among all the floral complexity components only floral symmetry was found to have a significant effect, with radial-flower plants appearing to be less vulnerable. Life form was also a predictor of vulnerability, with woody perennial plants having significantly lower risk of extinction. Among the extrinsic factors, both habitat and maximum range were significantly associated with plant vulnerability (coastal plants and narrow-ranged plants are more likely to face higher risk). Although extrinsic and in particular anthropogenic factors determine plant extinction risk, intrinsic traits can indicate a plant's proneness to vulnerability. This raises the potential threat of declining global pollinator diversity interacting with floral complexity to increase the vulnerability of individual plant species. There is potential scope for using plant-pollinator specializations to identify plant species particularly at

  10. A geographical and multi-criteria vulnerability assessment of transportation networks against extreme earthquakes

    International Nuclear Information System (INIS)

    Kermanshah, A.; Derrible, S.

    2016-01-01

    The purpose of this study is to provide a geographical and multi-criteria vulnerability assessment method to quantify the impacts of extreme earthquakes on road networks. The method is applied to two US cities, Los Angeles and San Francisco, both of which are susceptible to severe seismic activities. Aided by the recent proliferation of data and the wide adoption of Geography Information Systems (GIS), we use a data-driven approach using USGS ShakeMaps to determine vulnerable locations in road networks. To simulate the extreme earthquake, we remove road sections within “very strong” intensities provided by USGS. Subsequently, we measure vulnerability as a percentage drop in four families of metrics: overall properties (length of remaining system); topological indicators (betweenness centrality); accessibility; and travel demand using Longitudinal Employment Household Dynamics (LEHD) data. The various metrics are then plotted on a Vulnerability Surface (VS), from which the area can be assimilated to an overall vulnerability indicator. This VS approach offers a simple and pertinent method to capture the impacts of extreme earthquake. It can also be useful to planners to assess the robustness of various alternative scenarios in their plans to ensure that cities located in seismic areas are better prepared to face severe earthquakes. - Highlights: • Developed geographical and multi-criteria vulnerability assessment method. • Quantify the impacts of extreme earthquakes on transportation networks. • Data-driven approach using USGS ShakeMaps to determine vulnerable locations. • Measure vulnerability as a percentage drop in four families of metrics: ○Overall properties. ○Topological indicators. ○Accessibility. ○Travel demand using Longitudinal Employment Household Dynamics (LEHD) data. • Developed Vulnerability Surface (VS), a new pragmatic vulnerability indicator.

  11. An holistic view on aquifer vulnerability based on a distinction of different types of vulnerability

    Science.gov (United States)

    De Luca, Domenico Antonio; Lasagna, Manuela; Franchino, Elisa

    2016-04-01

    AN HOLISTIC VIEW ON AQUIFER VULNERABILITY BASED ON A DISTINCTION OF DIFFERENT TYPES OF VULNERABILITY D.A. De Luca1 , M. Lasagna1, E. Franchino1 1Department of Earth Sciences, University of Turin The concept of vulnerability is certainly useful in the field of groundwater protection. Nevertheless, within the scientific community, the definition of groundwater vulnerability is still debatable and not clear and conclusive. This is probably due to the fact that researchers often have very different experiences and education. A positive effect of it is a constant exchange of ideas, but there are also negative consequences and difficulties in deepening the issue. The different approaches are very important but they are usable only if the concept of vulnerability is standardized: thus, for the sake of clarity, a number of definitions should be laid down, based on the different types of vulnerability. These definitions can then provide the necessary holistic view for the aquifer vulnerability assessment. Nowadays vulnerability methods focus on the degree of vulnerability and the parameters needed for its evaluation, often neglecting to clarify what is the type of vulnerability the proposed methods are referred. The type of vulnerability, indeed, is both logically and hierarchically superior to the degree of vulnerability. More specifically the type of vulnerability represents the evaluation of the hydrogeological conditions considered in the vulnerability assessment and able to influence the way in which the contamination can take place. Currently the only distinction, based on of the type of vulnerability, is referred to intrinsic and specific vulnerability. Intrinsic vulnerability assesses the susceptibility of the receptor based on the natural properties of the land and subsurface; specific vulnerability also includes properties of the analyzed contaminant. This distinction is useful but not exhaustive. In addition to this, e.g., a distinction of vertical vulnerability

  12. Evolution of the vulnerability to phenomena associated with landslides and floods. Case northeastern Medellin, 1960 -1990

    International Nuclear Information System (INIS)

    Vidal G, Lina Maria

    2008-01-01

    This paper is about evolution of vulnerability to hazards related to landslides and floods in Northeast of Medellin between 1960 y 1990, connecting urban planning and politics for informal settlements with land occupation processes which have influenced forming of urban vulnerable communities. Case study analysis shows that vulnerability conditions moved following land occupation trajectories and city expansion according to intrinsic adaptation characteristics of settlement inhabitants to environmental conditions, regional processes and dynamics influenced by city politics. Due to accumulation of vulnerability it is interpreted as an environmental impact of processes that influence its configuration which is not static spatial or temporarily neither it correspond to a cause-effect approach but it is complex and connected to other urban environmental expressions

  13. To plan or not to plan: Does planning for production remove facilitation from associative priming?

    Science.gov (United States)

    Jongman, Suzanne R; Meyer, Antje S

    2017-11-01

    Theories of conversation propose that in order to have smooth transitions from one turn to the next, speakers already plan their response while listening to their interlocutor. Moreover, it has been argued that speakers align their linguistic representations (i.e. prime each other), thereby reducing the processing costs associated with concurrent listening and speaking. In two experiments, we assessed how identity and associative priming from spoken words onto picture naming were affected by a concurrent speech planning task. In a baseline (no name) condition, participants heard prime words that were identical, associatively related, or unrelated to target pictures presented two seconds after prime onset. Each prime was accompanied by a non-target picture and followed by its recorded name. The participant did not name the non-target picture. In the plan condition, the participants first named the non-target picture, instead of listening to the recording, and then the target. In Experiment 1, where the plan- and no-plan conditions were tested between participants, priming effects of equal strength were found in the plan and no-plan condition. In Experiment 2, where the two conditions were tested within participants, the identity priming effect was maintained, but the associative priming effect was only seen in the no-plan but not in the plan condition. In this experiment, participant had to decide at the onset of each trial whether or not to name the non-target picture, rendering the task more complex than in Experiment 1. These decision processes may have interfered with the processing of the primes. Thus, associative priming can take place during speech planning, but only if the cognitive load is not too high. Copyright © 2017 Elsevier B.V. All rights reserved.

  14. Obstacles to Effective Joint Targeting

    National Research Council Canada - National Science Library

    Patch, John

    2007-01-01

    No foe can beat the modern-day American military machine in combined arms warfare, yet this machine is subject to strategic targeting vulnerabilities that military and policy leaders would do well to appreciate...

  15. Vulnerability curves vs. vulnerability indicators: application of an indicator-based methodology for debris-flow hazards

    Science.gov (United States)

    Papathoma-Köhle, Maria

    2016-08-01

    The assessment of the physical vulnerability of elements at risk as part of the risk analysis is an essential aspect for the development of strategies and structural measures for risk reduction. Understanding, analysing and, if possible, quantifying physical vulnerability is a prerequisite for designing strategies and adopting tools for its reduction. The most common methods for assessing physical vulnerability are vulnerability matrices, vulnerability curves and vulnerability indicators; however, in most of the cases, these methods are used in a conflicting way rather than in combination. The article focuses on two of these methods: vulnerability curves and vulnerability indicators. Vulnerability curves express physical vulnerability as a function of the intensity of the process and the degree of loss, considering, in individual cases only, some structural characteristics of the affected buildings. However, a considerable amount of studies argue that vulnerability assessment should focus on the identification of these variables that influence the vulnerability of an element at risk (vulnerability indicators). In this study, an indicator-based methodology (IBM) for mountain hazards including debris flow (Kappes et al., 2012) is applied to a case study for debris flows in South Tyrol, where in the past a vulnerability curve has been developed. The relatively "new" indicator-based method is being scrutinised and recommendations for its improvement are outlined. The comparison of the two methodological approaches and their results is challenging since both methodological approaches deal with vulnerability in a different way. However, it is still possible to highlight their weaknesses and strengths, show clearly that both methodologies are necessary for the assessment of physical vulnerability and provide a preliminary "holistic methodological framework" for physical vulnerability assessment showing how the two approaches may be used in combination in the future.

  16. What if quality of damage data is poor: an Entity-Vulnerability approach for flood vulnerability assessment

    Science.gov (United States)

    Naso, Susanna; Chen, Albert S.; Djordjević, Slobodan; Aronica, Giuseppe T.

    2015-04-01

    for inundations of both short and long duration. At the same time we defined the classes of the variable Entity in function of both buildings' asset value and their importance for society. Once the buildings of different typologies are grouped, a GIS-based tool (using hazard information obtained from hydraulic modelling, building parcels, vulnerability curves and entity classes) is used to collocate each element at risk inside an Entity-Vulnerability matrix. The construction of a E-V matrix allow both to understand the actual situation of flood-prone area (and the possible consequences of a flood event) and to study the effectiveness of non-structural measures, just studying how their implementation modifies the distribution of elements at risk inside it. The proposed approach can be useful for authorities responsible for development and periodical review of adaptive flood risk management plans.

  17. Connecting people and place: a new framework for reducing urban vulnerability to extreme heat

    International Nuclear Information System (INIS)

    Wilhelmi, Olga V; Hayden, Mary H

    2010-01-01

    Climate change is predicted to increase the intensity and negative impacts of urban heat events, prompting the need to develop preparedness and adaptation strategies that reduce societal vulnerability to extreme heat. Analysis of societal vulnerability to extreme heat events requires an interdisciplinary approach that includes information about weather and climate, the natural and built environment, social processes and characteristics, interactions with stakeholders, and an assessment of community vulnerability at a local level. In this letter, we explore the relationships between people and places, in the context of urban heat stress, and present a new research framework for a multi-faceted, top-down and bottom-up analysis of local-level vulnerability to extreme heat. This framework aims to better represent societal vulnerability through the integration of quantitative and qualitative data that go beyond aggregate demographic information. We discuss how different elements of the framework help to focus attention and resources on more targeted health interventions, heat hazard mitigation and climate adaptation strategies.

  18. Vulnerability to Urban Heat Island in São Paulo Municipality: An Approach to Support the Mitigation Measures Implementation in Urban Planning

    Directory of Open Access Journals (Sweden)

    Juliana Siqueira-Gay

    2017-10-01

    Full Text Available In the practice of urban and environmental planning, especially in the context of adaptation to environmental changes, there is a demand for studies that integrate social, economic and environmental information of the population and related risk. Particularly in large urban centers, waterproofing and verticalization have the potential to increase local air temperature, triggering the phenomenon of heat islands. Therefore, this phenomenon has side effects such as public health problems, pollution and changes in the air circulation. In view of the risks and consequences of the urban heat islands, this paper aims to analyze the priority areas for implementing measures to mitigate the effects of the urban heat islands phenomenon in São Paulo City (Brazil. A vulnerability index was proposed considering the social and environmental dimensions, relating the capacity of adaptation, sensitivity and exposure to the occurrence of the phenomenon of urban heat islands. Besides that, measures to mitigate the effects associated with heat islands in urban planning were identified. The central regions are critical for exposure and the outskirts, for adaptive capacity and sensitivity, both considered priorities for the implementation of mitigation measures. In addition, strategies such as implementation and conservation of green spaces, preservation of water bodies, urban design change, as well as use of materials with high reflectance are also listed and partially foreseen in the Municipal Strategic Master Plan to mitigate the effects of urban heat island.

  19. The vulnerabilities of the power-grid system: renewable microgrids as an alternative source of energy.

    Science.gov (United States)

    Meyer, Victor; Myres, Charles; Bakshi, Nitin

    2010-03-01

    The objective of this paper is to analyse the vulnerabilities of current power-grid systems and to propose alternatives to using fossil fuel power generation and infrastructure solutions in the form of microgrids, particularly those from renewable energy sources. One of the key potential benefits of microgrids, apart from their inherent sustainability and ecological advantages, is increased resilience. The analysis is targeted towards the context of business process outsourcing in India. However, much of the research on vulnerabilities has been derived from the USA and as such many of the examples cite vulnerabilities in the USA and other developed economies. Nevertheless, the vulnerabilities noted are to a degree common to all grid systems, and so the analysis may be more broadly applicable.

  20. Psychological Vulnerability and Problem Gambling: The Mediational Role of Cognitive Distortions.

    Science.gov (United States)

    Lévesque, David; Sévigny, Serge; Giroux, Isabelle; Jacques, Christian

    2018-01-03

    Despite numerous studies demonstrating the influence of cognitive distortions on gambling problem severity, empirical data regarding the role of psychological vulnerability on the latter is limited. Hence, this study assesses the mediating effect of cognitive distortions between psychological vulnerability (personality and mood), and gambling problem severity. It also verifies whether the relationships between these variables differs according to the preferred gambling activity. The sample is composed of 272 male gamblers [191 poker players; 81 video lottery terminal (VLT) players] aged between 18 and 82 years (M = 35.2). Bootstrap analysis results revealed that cognitive distortions mediate the effect of narcissism on gambling problem severity for both groups. The level of depression for VLT players significantly predicted gambling problem severity, both directly and indirectly via the mediating effect of cognitive distortions. Mediation analyses also indicated that narcissism had an indirect impact on problem gambling through cognitive distortions for both groups. These findings suggest that certain vulnerabilities related to personality and mood may influence cognitive distortion intensity and gambling problem severity. In addition, psychological vulnerabilities could differ based on preferred gambling activity. These results may be useful for prevention policies, identifying high risk gamblers and planning psychological interventions.

  1. Assessing tsunami vulnerability, an example from Herakleio, Crete

    Science.gov (United States)

    Papathoma, M.; Dominey-Howes, D.; Zong, Y.; Smith, D.

    Recent tsunami have caused massive loss of life, destruction of coastal infrastructures and disruption to economic activity. To date, tsunami hazard studies have concentrated on determining the frequency and magnitude of events and in the production of simplistic flood maps. In general, such maps appear to have assumed a uniform vulnerability of population, infrastructure and business. In reality however, a complex set of factors interact to produce a pattern of vulnerability that varies spatially and temporally. A new vulnerability assessment approach is described, that incorporates multiple factors (e.g. parameters relating to the natural and built environments and socio-demographics) that contribute to tsunami vulnerability. The new methodology is applied on a coastal segment in Greece and, in particular, in Crete, westof the city of Herakleio. The results are presented within a Geographic Information System (GIS). The application of GIS ensures the approach is novel for tsunami studies, since it permits interrogation of the primary database by several different end-users. For example, the GIS may be used: (1) to determine immediate post-tsunami disaster response needs by the emergency services; (2) to preplan tsunami mitigation measures by disaster planners; (3) as a tool for local planning by the municipal authorities or; (4) as a basis for catastrophe modelling by insurance companies. We show that population density varies markedly with the time of the year and that 30% of buildings within the inundation zone are only single story thus increasing the vulnerability of their occupants. Within the high inundation depth zone, 11% of buildings are identified as in need of reinforcement and this figure rises to 50% within the medium inundation depth zone. 10% of businesses are located within the high inundation depth zone and these may need to consider their level of insurance cover to protect against primary building damage, contents loss and business interruption

  2. PLANS FOR WARM DENSE MATTER EXPERIMENTS AND IFE TARGET EXPERIMENTS ON NDCX-II

    International Nuclear Information System (INIS)

    Waldron, W.L.; Barnard, J.J.; Bieniosek, F.M.; Friedman, A.; Henestroza, E.; Leitner, M.; Logan, B.G.; Ni, P.A.; Roy, P.K.; Seidl, P.A.; Sharp, W.M.

    2008-01-01

    The Heavy Ion Fusion Science Virtual National Laboratory (HIFS-VNL) is currently developing design concepts for NDCX-II, the second phase of the Neutralized Drift Compression Experiment, which will use ion beams to explore Warm Dense Matter (WDM) and Inertial Fusion Energy (IFE) target hydrodynamics. The ion induction accelerator will consist of a new short pulse injector and induction cells from the decommissioned Advanced Test Accelerator (ATA) at Lawrence Livermore National Laboratory (LLNL). To fit within an existing building and to meet the energy and temporal requirements of various target experiments, an aggressive beam compression and acceleration schedule is planned. WDM physics and ion-driven direct drive hydrodynamics will initially be explored with 30 nC of lithium ions in experiments involving ion deposition, ablation, acceleration and stability of planar targets. Other ion sources which may deliver higher charge per bunch will be explored. A test stand has been built at Lawrence Berkeley National Laboratory (LBNL) to test refurbished ATA induction cells and pulsed power hardware for voltage holding and ability to produce various compression and acceleration waveforms. Another test stand is being used to develop and characterize lithium-doped aluminosilicate ion sources. The first experiments will include heating metallic targets to 10,000 K and hydrodynamics studies with cryogenic hydrogen targets

  3. Molecular basis for vulnerability to mitochondrial and oxidative stress in a neuroendocrine CRI-G1 cell line.

    Directory of Open Access Journals (Sweden)

    Natasha Chandiramani

    2011-01-01

    Full Text Available Many age-associated disorders (including diabetes, cancer, and neurodegenerative diseases are linked to mitochondrial dysfunction, which leads to impaired cellular bioenergetics and increased oxidative stress. However, it is not known what genetic and molecular pathways underlie differential vulnerability to mitochondrial dysfunction observed among different cell types.Starting with an insulinoma cell line as a model for a neuronal/endocrine cell type, we isolated a novel subclonal line (named CRI-G1-RS that was more susceptible to cell death induced by mitochondrial respiratory chain inhibitors than the parental CRI-G1 line (renamed CRI-G1-RR for clarity. Compared to parental RR cells, RS cells were also more vulnerable to direct oxidative stress, but equally vulnerable to mitochondrial uncoupling and less vulnerable to protein kinase inhibition-induced apoptosis. Thus, differential vulnerability to mitochondrial toxins between these two cell types likely reflects differences in their ability to handle metabolically generated reactive oxygen species rather than differences in ATP production/utilization or in downstream apoptotic machinery. Genome-wide gene expression analysis and follow-up biochemical studies revealed that, in this experimental system, increased vulnerability to mitochondrial and oxidative stress was associated with (1 inhibition of ARE/Nrf2/Keap1 antioxidant pathway; (2 decreased expression of antioxidant and phase I/II conjugation enzymes, most of which are Nrf2 transcriptional targets; (3 increased expression of molecular chaperones, many of which are also considered Nrf2 transcriptional targets; (4 increased expression of β cell-specific genes and transcription factors that specify/maintain β cell fate; and (5 reconstitution of glucose-stimulated insulin secretion.The molecular profile presented here will enable identification of individual genes or gene clusters that shape vulnerability to mitochondrial dysfunction and

  4. Assessing the integration of health center and community emergency preparedness and response planning.

    Science.gov (United States)

    Wineman, Nicole V; Braun, Barbara I; Barbera, Joseph A; Loeb, Jerod M

    2007-11-01

    To assess the state of health center integration into community preparedness, we undertook a national study of linkages between health centers and the emergency preparedness and response planning initiatives in their communities. The key objectives of this project were to gain a better understanding of existing linkages in a nationally representative sample of health centers, and identify health center demographic and experience factors that were associated with strong linkages. The objectives of the study were to gain a baseline understanding of existing health center linkages to community emergency preparedness and response systems and to identify factors that were associated with strong linkages. A 60-item questionnaire was mailed to the population of health centers supported by the Health Resources and Services Administration's Bureau of Primary Health Care in February 2005. Results were aggregated and a chi square analysis identified factors associated with stronger linkages. Overall performance on study-defined indicators of strong linkages was low: 34% had completed a hazard vulnerability analysis in collaboration with the community emergency management agency, 30% had their role documented in the community plan, and 24% participated in community-wide exercises. Stronger linkages were associated with experience responding to a disaster and a perception of high risk for experiencing a disaster. The potential for health centers to participate in an integrated response is not fully realized, and their absence from community-based planning leaves an already vulnerable population at greater risk. Community planners should be encouraged to include health centers in planning and response and centers should receive more targeted resources for community integration.

  5. Evaluating social and ecological vulnerability of coral reef fisheries to climate change.

    Directory of Open Access Journals (Sweden)

    Joshua E Cinner

    Full Text Available There is an increasing need to evaluate the links between the social and ecological dimensions of human vulnerability to climate change. We use an empirical case study of 12 coastal communities and associated coral reefs in Kenya to assess and compare five key ecological and social components of the vulnerability of coastal social-ecological systems to temperature induced coral mortality [specifically: 1 environmental exposure; 2 ecological sensitivity; 3 ecological recovery potential; 4 social sensitivity; and 5 social adaptive capacity]. We examined whether ecological components of vulnerability varied between government operated no-take marine reserves, community-based reserves, and openly fished areas. Overall, fished sites were marginally more vulnerable than community-based and government marine reserves. Social sensitivity was indicated by the occupational composition of each community, including the importance of fishing relative to other occupations, as well as the susceptibility of different fishing gears to the effects of coral bleaching on target fish species. Key components of social adaptive capacity varied considerably between the communities. Together, these results show that different communities have relative strengths and weaknesses in terms of social-ecological vulnerability to climate change.

  6. Landslide Vulnerability Assessment (LVAs: A Case Study from Kota Kinabalu, Sabah, Malaysia

    Directory of Open Access Journals (Sweden)

    Rodeano Roslee

    2016-12-01

    High Vulnerability. Results from this study indicate that a further study is needed to the areas of high to very high vulnerability only. This LVAs approach is suitable as a guideline for preliminary development planning, controlling, and managing the landslide hazard /risk in the studied area and potentially to be extended with different background environments.

  7. Hunger mapping: food insecurity and vulnerability information.

    Science.gov (United States)

    1997-12-01

    Save the Children Foundation (SCF), a nongovernmental organization (NGO), developed the "household food economy analysis" to assess the needs of an area or population facing acute food insecurity. This method considers all of the ways people secure access to food and illustrates the distribution of various food supplies in pie charts that allow comparison of the percentage contribution of each option during a normal year and a "bad" year. Data are gathered through the use of key informants, and the analysis permits identification of ways to support local initiatives and to target assistance. As a result of this work, SCF and another NGO, Helen Keller International, attended a March 1997 expert consultation organized by the UN Food and Agriculture Organization (FAO) to create a workplan for the Food Insecurity and Vulnerability Information and Mapping System (FIVIMS) called for in the World Food Summit Plan of Action. The consultation adopted use of the FAO's food and balance sheet approach, despite its limitations, and determined that indicators should be location- and time-specific as well as 1) simple and reliable, 2) readily available, 3) social and anthropometric, and 4) found at all levels. The consultation also recommended combination of the key informant and the indicator approach to data collection. Finally, the consultation identified appropriate actions that should be accomplished before the 1998 meeting of the FAO's Committee on World Food Security.

  8. Defining energy vulnerability in mobility. Measuring energy vulnerability in mobility. Acting against energy vulnerability in mobility. Discussing energy vulnerability in mobility. Task no. 4

    International Nuclear Information System (INIS)

    Jouffe, Yves; Massot, Marie-Helene; Noble, Cyprien

    2015-01-01

    Extensive expansion of urban areas generates transportation needs and energy expenses for mobility. Households already impacted by fuel poverty also suffer from energy vulnerability in their mobility. This report was prepared in the framework of the study of fuel poverty in France in the light of several indicators from existing inquiries, databases and modeling tools. The report is organised in 4 parts dealing with: the definition of energy vulnerability in mobility, its measurement, the possible remedial actions, and the discussions about energy vulnerability in mobility through working group meetings, respectively

  9. Soil erosion vulnerability in the verde river basin, southern minas gerais

    Directory of Open Access Journals (Sweden)

    Vinícius Augusto de Oliveira

    2014-06-01

    Full Text Available Soil erosion is one of the most significant environmental degradation processes. Mapping and assessment of soil erosion vulnerability is an important tool for planning and management of the natural resources. The objective of the present study was to apply the Revised Universal Soil Loss Equation (RUSLE using GIS tools to the Verde River Basin (VRB, southern Minas Gerais, in order to assess soil erosion vulnerability. A annual rainfall erosivity map was derived from the geographical model adjusted for Southeastern Brazil, calculating an annual value for each pixel. The maps of soil erodibility (K, topographic factor (LS, and use and management of soils (C were developed from soils and their uses map and the digital elevation model (DEM developed for the basin. In a GIS environment, the layers of the factors were combined to create the soil erosion vulnerability map according to RUSLE. The results showed that, in general, the soils of the VRB present a very high vulnerability to water erosion, with 58.68% of soil losses classified as "High" and "Extremely High" classes. In the headwater region of VRB, the predominant classes were "Very High" and "Extremely High" where there is predominance of Cambisols associated with extensive pastures. Furthermore, the integration of RUSLE/GIS showed an efficient tool for spatial characterization of soil erosion vulnerability in this important basin of the Minas Gerais state.

  10. Vulnerability to terrorist attacks in European electricity decarbonisation scenarios: Comparing renewable electricity imports to gas imports

    International Nuclear Information System (INIS)

    Lilliestam, Johan

    2014-01-01

    The decarbonised future European electricity system must remain secure: reliable electricity supply is a prerequisite for the functioning of modern society. Scenarios like Desertec, which partially rely on solar power imports from the Middle East and North Africa, may be attractive for decarbonisation, but raise concerns about terrorists interrupting supply by attacking the long, unprotected transmission lines in the Sahara. In this paper, I develop new methods and assess the European vulnerability to terrorist attacks in the Desertec scenario. I compare this to the vulnerability of today's system and a decarbonisation scenario in which Europe relies on gas imports for electricity generation. I show that the vulnerability of both gas and electricity imports is low, but electricity imports are more vulnerable than gas imports, due to their technical characteristics. Gas outages (and, potentially, resulting blackouts) are the very unlikely consequence even of very high-number attacks against the gas import system, whereas short blackouts are the potential consequence of a few attacks against the import electricity lines. As the impacts of all except extreme attacks are limited, terrorists cannot attack energy infrastructure and cause spectacular, fear-creating outages. Both gas and electricity import infrastructure are thus unattractive and unlikely terrorist targets. - Highlights: • A comparison of terrorism risks of importing solar power and gas for power generation. • Both scenarios show low vulnerability to terrorist attacks. • Within low vulnerabilities, gas imports are less vulnerable than electricity imports. • Causing spectacular, large and long outages is very difficult for attacker. • The attractiveness of gas and power import infrastructure as terrorist target is low

  11. LIFE Target Fabrication Research Plan Sept 2008

    Energy Technology Data Exchange (ETDEWEB)

    Miles, R; Biener, J; Kucheyev, S; Montesanti, R; Satcher, J; Spadaccini, C; Rose, K; Wang, M; Hamza, A; Alexander, N; Brown, L; Hund, J; Petzoldt, R; Sweet, W; Goodin, D

    2008-11-10

    The target-system for the baseline LIFE fast-ignition target was analyzed to establish a preliminary estimate for the costs and complexities involved in demonstrating the technologies needed to build a prototype LIFE plant. The baseline fast-ignition target upon which this analysis was developed is shown in Figure 1.0-1 below. The LIFE target-system incorporates requirements for low-cost, high throughput manufacture, high-speed, high accuracy injection of the target into the chamber, production of sufficient energy from implosion and recovery and recycle of the imploded target material residue. None of these functions has been demonstrated to date. Existing target fabrication techniques which lead to current 'hot spot' target costs of {approx}$100,000 per target and at a production rate of 2/day are unacceptable for the LIFE program. Fabrication techniques normally used for low-cost, low accuracy consumer products such as toys must be adapted to the high-accuracy LIFE target. This will be challenge. A research program resulting is the demonstration of the target-cycle technologies needed for a prototype LIFE reactor is expected to cost {approx}$51M over the course of 5 years. The effort will result in targets which will cost an estimated $0.23/target at a rep-rate of 20 Hz or about 1.73M targets/day.

  12. The physical vulnerability of elements at risk: a methodology based on fluid and classical mechanics

    Science.gov (United States)

    Mazzorana, B.; Fuchs, S.; Levaggi, L.

    2012-04-01

    The impacts of the flood events occurred in autumn 2011 in the Italian regions Liguria and Tuscany revived the engagement of the public decision makers to enhance in synergy flood control and land use planning. In this context, the design of efficient flood risk mitigation strategies and their subsequent implementation critically relies on a careful vulnerability analysis of both, the immobile and mobile elements at risk potentially exposed to flood hazards. Based on fluid and classical mechanics notions we developed computation schemes enabling for a dynamic vulnerability and risk analysis facing a broad typological variety of elements at risk. The methodological skeleton consists of (1) hydrodynamic computation of the time-varying flood intensities resulting for each element at risk in a succession of loading configurations; (2) modelling the mechanical response of the impacted elements through static, elasto-static and dynamic analyses; (3) characterising the mechanical response through proper structural damage variables and (4) economic valuation of the expected losses as a function of the quantified damage variables. From a computational perspective we coupled the description of the hydrodynamic flow behaviour and the induced structural modifications of the elements at risk exposed. Valuation methods, suitable to support a correct mapping from the value domains of the physical damage variables to the economic loss values are discussed. In such a way we target to complement from a methodological perspective the existing, mainly empirical, vulnerability and risk assessment approaches to refine the conceptual framework of the cost-benefit analysis. Moreover, we aim to support the design of effective flood risk mitigation strategies by diminishing the main criticalities within the systems prone to flood risk.

  13. A GIS Approach to Identifying Socially and Medically Vulnerable Older Adult Populations in South Florida.

    Science.gov (United States)

    Hames, Elizabeth; Stoler, Justin; Emrich, Christopher T; Tewary, Sweta; Pandya, Naushira

    2017-11-10

    We define, map, and analyze geodemographic patterns of socially and medically vulnerable older adults within the tri-county region of South Florida. We apply principal components analysis (PCA) to a set of previously identified indicators of social and medical vulnerability at the census tract level. We create and map age-stratified vulnerability scores using a geographic information system (GIS), and use spatial analysis techniques to identify patterns and interactions between social and medical vulnerability. Key factors contributing to social vulnerability in areas with higher numbers of older adults include age, large household size, and Hispanic ethnicity. Medical vulnerability in these same areas is driven by disease burden, access to emergency cardiac services, availability of nursing home and hospice beds, access to home health care, and available mental health services. Age-dependent areas of social vulnerability emerge in Broward County, whereas age-dependent areas of medical vulnerability emerge in Palm Beach County. Older-adult social and medical vulnerability interact differently throughout the study area. Spatial analysis of older adult social and medical vulnerability using PCA and GIS can help identify age-dependent pockets of vulnerability that are not easily identifiable in a populationwide analysis; improve our understanding of the dynamic spatial organization of health care, health care needs, access to care, and outcomes; and ultimately serve as a tool for health care planning. © The Author 2016. Published by Oxford University Press on behalf of The Gerontological Society of America. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  14. Better Forecasting for Better Planning: A Systems Approach.

    Science.gov (United States)

    Austin, W. Burnet

    Predictions and forecasts are the most critical features of rational planning as well as the most vulnerable to inaccuracy. Because plans are only as good as their forecasts, current planning procedures could be improved by greater forecasting accuracy. Economic factors explain and predict more than any other set of factors, making economic…

  15. MO-A-BRD-08: Radiosurgery Beyond Cancer: Real-Time Target Localization and Treatment Planning for Cardiac Radiosurgery Under MRI Guidance

    Energy Technology Data Exchange (ETDEWEB)

    Ipsen, S [University of Luebeck, Luebeck, SH (Germany); University of Sydney, Camperdown (Australia); Blanck, O [CyberKnife Zentrum Norddeutschland, Guestrow, MV (Germany); Oborn, B [Illawarra Cancer Care Centre, Wollongong, NSW (Australia); Bode, F [Medical Clinic II, Section for Electrophysiology, UKSH, Luebeck, SH (Germany); Liney, G [Ingham Institute for Applied Medical Research, Liverpool, NSW (United Kingdom); Keall, P [University of Sydney, Camperdown (Australia)

    2014-06-15

    Purpose: Atrial fibrillation (AF) is the most common cardiac arrhythmia, affecting >2.5M Americans and >4.5M Europeans. AF is usually treated with minimally-invasive, time consuming catheter ablation techniques. Radiosurgery of the pulmonary veins (PV) has been proposed for AF treatment, however is challenging due to the complex respiratory and cardiac motion patterns. We hypothesize that an MRI-linac could solve the difficult real-time targeting and adaptation problem. In this study we quantified target motion ranges on cardiac MRI and analyzed the dosimetric benefits of margin reduction assuming real-time MRI tracking was applied. Methods: For the motion study, four human subjects underwent real-time cardiac MRI under free breathing. The target motion on coronal and axial cine planes was analyzed using a template matching algorithm. For the planning study, an ablation line at each PV antrum was defined as target on an AF patient scheduled for catheter ablation. Various safety margins ranging from 0mm (perfect tracking) to 8mm (untracked motion) were added to the target defining the PTV. 30Gy single fraction IMRT plans were then generated. Finally, the influence of a 1T magnetic field on treatment beam delivery was calculated using the Geant4 Monte Carlo algorithm to simulate the dosimetric impact of MRI guidance. Results: The motion study showed the mean respiratory motion of the target area on MRI was 8.4mm (SI), 1.7mm (AP) and 0.3mm (LR). Cardiac motion was small (<2mm). The planning study showed that with increasing safety margins to encompass untracked motion, dose tolerances for OARs such as the esophagus and airways were exceeded by >100%. The magnetic field had little impact on the dose distribution. Conclusion: Our results indicate that real-time MRI tracking of the PVs seems feasible. Accurate image guidance for high-dose AF radiosurgery is essential since safety margins covering untracked target motion will result in unacceptable treatment plans.

  16. Are older people a vulnerable group? Philosophical and bioethical perspectives on ageing and vulnerability.

    Science.gov (United States)

    Bozzaro, Claudia; Boldt, Joachim; Schweda, Mark

    2018-05-01

    The elderly are often considered a vulnerable group in public and academic bioethical debates and regulations. In this paper, we examine and challenge this assumption and its ethical implications. We begin by systematically delineating the different concepts of vulnerability commonly used in bioethics, before then examining whether these concepts can be applied to old age. We argue that old age should not, in and of itself, be used as a marker of vulnerability, since ageing is a process that can develop in a variety of different ways and is not always associated with particular experiences of vulnerability. We, therefore, turn to more fundamental phenomenological considerations in order to reconstruct from a first person perspective the intricate interconnections between the experiences of ageing and vulnerability. According to this account, ageing and old age are phenomena in which the basic anthropological vulnerability of human beings can manifest itself in an increased likelihood of harm and exploitation. Thus, we plead for a combined model of vulnerability that helps to avoid problems related to the current concepts of vulnerability. We conclude first that old age as such is not a sufficient criterion for being categorized as vulnerable in applied ethics, and second that reflections on ageing can help to develop a better understanding of the central role of vulnerability in human existence and in applied ethics. © 2018 John Wiley & Sons Ltd.

  17. Climate change vulnerability to agrarian ecosystem of small Island: evidence from Sagar Island, India

    Science.gov (United States)

    Mandal, S.; Satpati, L. N.; Choudhury, B. U.; Sadhu, S.

    2018-04-01

    The present study assessed climate change vulnerability in agricultural sector of low-lying Sagar Island of Bay of Bengal. Vulnerability indices were estimated using spatially aggregated biophysical and socio-economic parameters by applying principal component analysis and equal weight method. The similarities and differences of outputs of these two methods were analysed across the island. From the integration of outputs and based on the severity of vulnerability, explicit vulnerable zones were demarcated spatially. Results revealed that life subsistence agriculture in 11.8% geographical area (2829 ha) of the island along the western coast falls under very high vulnerable zone (VHVZ VI of 84-99%) to climate change. Comparatively higher values of exposure (0.53 ± 0.26) and sensitivity (0.78 ± 0.14) subindices affirmed that the VHV zone is highly exposed to climate stressor with very low adaptive capacity (ADI= 0.24 ± 0.16) to combat vulnerability to climate change. Hence, food security for a population of >22 thousands comprising >3.7 thousand agrarian households are highly exposed to climate change. Another 17% area comprising 17.5% population covering 20% villages in north-western and eastern parts of the island also falls under high vulnerable (VI= 61%-77%) zone. Findings revealed large spatial heterogeneity in the degree of vulnerability across the island and thus, demands devising area specific planning (adaptation and mitigation strategies) to address the climate change impact implications both at macro and micro levels.

  18. Vulnerable Bullies: Perpetration of Peer Harassment Among Youths Across Sexual Orientation, Weight, and Disability Status.

    Science.gov (United States)

    Eisenberg, Marla E; Gower, Amy L; McMorris, Barbara J; Bucchianeri, Michaela M

    2015-09-01

    We examined perpetration of bullying among youths in vulnerable groups relative to youths in peer groups not categorized as vulnerable. Data were collected in 2013 from a large school-based survey of adolescents conducted in Minnesota (n = 122,180). We used the χ(2) test and logistic regression to compare measures of perpetration of physical and relational bullying, as well as experiences of victimization and perpetration (or both), across categories of sexual orientation, weight status, and disability status. Rates of physical and relational bullying perpetration were significantly higher among youths in vulnerable groups than among those not in vulnerable groups. With respect to context of victimization experiences, young men and women from vulnerable groups were overrepresented in the group comprising both perpetrators and victims. For example, odds of being both a perpetrator and a victim were 1.41 to 3.22 times higher among gay, lesbian, and bisexual youths than among heterosexual youths. Vulnerable youths, who are prone to peer harassment, may also act as perpetrators of bullying. Prevention strategies should address the particular needs of these populations; targeted programming may be appropriate.

  19. Development of whole-building energy design targets for commercial buildings: Phase 1, Planning: Volume 1, Final report

    Energy Technology Data Exchange (ETDEWEB)

    Crawley, D.B.; Briggs, R.S.; Jones, J.W.; Seaton, W.W.; Kaufman, J.E.; Deringer, J.J.; Kennett, E.W.

    1987-04-01

    This report describes background research for preparation of a plan for development of whole-building energy targets for new commercial buildings. The lead laboratory for this program is the Pacific Northwest Laboratory. A wide variety of expertise and resources from industry, academia, other government entities, and other DOE laboratories are used in planning, reviewing and conducting research activities. Cooperative and complementary research development, and technology transfer activities with other interested organizations are actively pursued.

  20. What margins should be added to the clinical target volume in radiotherapy treatment planning of lung cancer?

    International Nuclear Information System (INIS)

    Ekberg, L.; Wittgren, L.; Holmberg, O.

    1995-01-01

    When defining the planning target volume (PTV) in radiotherapy treatment planning, it is vital to add geometrical margins of normal tissue around the clinical target volume (CTV). This is to ensure that the whole CTV will receive the planned absorbed dose taking into account both set-up deviations and target movements as well as other geometrical variations in the treatment chain. The problem is our limited knowledge of how large these margins should be. To assess the size of needed margins around the CTV in conformal radiotherapy of lung cancer, electronic portal imaging was employed in 232 irradiation field set-ups of 14 patients. This was done in order to quantify the uncertainty in the execution of treatment considering patient movement and set-up displacements. For an estimation of the added geometrical variation from target movement during irradiation, fluoroscopy was used at the simulation of the irradiation fields. The set-up study showed an average systematic deviation for all individual fields of 3.1 mm and an average maximal systematic deviation (in either transversal or craniocaudal direction) of 4.8 mm. The random errors can be described by an average standard deviation of 2.8 mm for all fields in either direction. Major gradual displacements as a function of time was also detected in one of the patients. CTV-movements of several millimetres during respiration could be observed. It was also seen that heartbeats could add to CTV-movements during irradiation with an equal magnitude. The combined effect of these factors are considered when making an overall estimation of margins that should be added to the CTV

  1. A treatment planning comparison of four target volume contouring guidelines for locally advanced pancreatic cancer radiotherapy

    International Nuclear Information System (INIS)

    Fokas, Emmanouil; Eccles, Cynthia; Patel, Neel; Chu, Kwun-Ye; Warren, Samantha; McKenna, W. Gillies; Brunner, Thomas B.

    2013-01-01

    Background and purpose: Contouring of target volumes varies significantly in radiotherapy of pancreatic ductal adenocarcinoma (PDAC). There is a lack of consensus as to whether elective lymph nodes (eLN’s) should be included or not in the planning target volume (PTV). In the present study we analyzed the dosimetric coverage of the eLN’s and organs at risk (OAR) by comparing four different contouring guidelines. Methods and materials: PTVs were delineated with (Oxford and RTOG guidelines) or without (Michigan and SCALOP guidelines) including the eLNs in eleven patients with PDAC. eLNs included the peripancreatic, paraaortic, paracaval, celiac trunk, superior mesenteric and portal vein clinical target volumes (CTVs). A 3D-CRT plan (50.40 Gy in 28 fractions) was performed to analyze and compare the dosimetric coverage of all eLNs and OAR between the 4 contouring guidelines. Results: The size of Oxford and RTOG PTVs was comparable and significantly larger than the SCALOP and Michigan PTVs. Interestingly the eLNs received a significant amount of incidental dose irradiation by PTV-based plans that only aimed to treat the tumor without the eLNs. The dosimetric coverage of eLN presented a large variability according to the respective contouring methods. The difference in the size of the 4 PTVs was reflected to the dose distribution at the OAR. Conclusions: Our study provides important information regarding the impact of different contouring guidelines on the dose distribution to the eLNs and the OAR in patients with locally advanced PDAC treated with radiotherapy

  2. sPECTRA: a Precise framEwork for analyzing CrypTographic vulneRabilities in Android apps

    OpenAIRE

    Gajrani, J.; Tripathi, M.; Laxmi, V.; Gaur, M. S.; Conti, M.; Rajarajan, M.

    2017-01-01

    The majority of Android applications (apps) deals with user's personal data. Users trust these apps and allow them to access all sensitive data. Cryptography, when employed in an appropriate way, can be used to prevent misuse of data. Unfortunately, cryptographic libraries also include vulnerable cryptographic services. Since Android app developers may not be cryptographic experts, this makes apps become the target of various attacks due to cryptographic vulnerabilities. In this work, we pres...

  3. Planning magnetic resonance imaging for prostate cancer intensity-modulated radiation therapy: Impact on target volumes, radiotherapy dose and androgen deprivation administration.

    Science.gov (United States)

    Horsley, Patrick J; Aherne, Noel J; Edwards, Grace V; Benjamin, Linus C; Wilcox, Shea W; McLachlan, Craig S; Assareh, Hassan; Welshman, Richard; McKay, Michael J; Shakespeare, Thomas P

    2015-03-01

    Magnetic resonance imaging (MRI) scans are increasingly utilized for radiotherapy planning to contour the primary tumors of patients undergoing intensity-modulated radiation therapy (IMRT). These scans may also demonstrate cancer extent and may affect the treatment plan. We assessed the impact of planning MRI detection of extracapsular extension, seminal vesicle invasion, or adjacent organ invasion on the staging, target volume delineation, doses, and hormonal therapy of patients with prostate cancer undergoing IMRT. The records of 509 consecutive patients with planning MRI scans being treated with IMRT for prostate cancer between January 2010 and July 2012 were retrospectively reviewed. Tumor staging and treatment plans before and after MRI were compared. Of the 509 patients, 103 (20%) were upstaged and 44 (9%) were migrated to a higher risk category as a result of findings at MRI. In 94 of 509 patients (18%), the MRI findings altered management. Ninety-four of 509 patients (18%) had a change to their clinical target volume (CTV) or treatment technique, and in 41 of 509 patients (8%) the duration of hormone therapy was changed because of MRI findings. The use of radiotherapy planning MRI altered CTV design, dose and/or duration of androgen deprivation in 18% of patients in this large, single institution series of men planned for dose-escalated prostate IMRT. This has substantial implications for radiotherapy target volumes and doses, as well as duration of androgen deprivation. Further research is required to investigate whether newer MRI techniques can simultaneously fulfill staging and radiotherapy contouring roles. © 2014 Wiley Publishing Asia Pty Ltd.

  4. Vulnerability assessment of urban ecosystems driven by water resources, human health and atmospheric environment

    Science.gov (United States)

    Shen, Jing; Lu, Hongwei; Zhang, Yang; Song, Xinshuang; He, Li

    2016-05-01

    As ecosystem management is a hotspot and urgent topic with increasing population growth and resource depletion. This paper develops an urban ecosystem vulnerability assessment method representing a new vulnerability paradigm for decision makers and environmental managers, as it's an early warning system to identify and prioritize the undesirable environmental changes in terms of natural, human, economic and social elements. The whole idea is to decompose a complex problem into sub-problem, and analyze each sub-problem, and then aggregate all sub-problems to solve this problem. This method integrates spatial context of Geographic Information System (GIS) tool, multi-criteria decision analysis (MCDA) method, ordered weighted averaging (OWA) operators, and socio-economic elements. Decision makers can find out relevant urban ecosystem vulnerability assessment results with different vulnerable attitude. To test the potential of the vulnerability methodology, it has been applied to a case study area in Beijing, China, where it proved to be reliable and consistent with the Beijing City Master Plan. The results of urban ecosystem vulnerability assessment can support decision makers in evaluating the necessary of taking specific measures to preserve the quality of human health and environmental stressors for a city or multiple cities, with identifying the implications and consequences of their decisions.

  5. Vulnerability of damage-accumulating systems

    International Nuclear Information System (INIS)

    Lind, Niels C.

    1996-01-01

    Disastrous failures have shown that systems can be highly vulnerable. Quantified vulnerability can help designers and regulators to decide how much vulnerability is tolerable. Vulnerability of a system to a specified disturbance is defined as the ratio of the probability of failure of the disturbed system to the probability of failure of the undisturbed system. This vulnerability can be specialized to particular system types. It is adapted here to systems that are expected to deteriorate while in service due to processes such as fatigue, creep, corrosion, aging, neglect or insufficient maintenance. Application is illustrated by vulnerability to fatigue under constant and variable stress

  6. Automated planning target volume generation: an evaluation pitting a computer-based tool against human experts

    International Nuclear Information System (INIS)

    Ketting, Case H.; Austin-Seymour, Mary; Kalet, Ira; Jacky, Jon; Kromhout-Schiro, Sharon; Hummel, Sharon; Unger, Jonathan; Fagan, Lawrence M.; Griffin, Tom

    1997-01-01

    Purpose: Software tools are seeing increased use in three-dimensional treatment planning. However, the development of these tools frequently omits careful evaluation before placing them in clinical use. This study demonstrates the application of a rigorous evaluation methodology using blinded peer review to an automated software tool that produces ICRU-50 planning target volumes (PTVs). Methods and Materials: Seven physicians from three different institutions involved in three-dimensional treatment planning participated in the evaluation. Four physicians drew partial PTVs on nine test cases, consisting of four nasopharynx and five lung primaries. Using the same information provided to the human experts, the computer tool generated PTVs for comparison. The remaining three physicians, designated evaluators, individually reviewed the PTVs for acceptability. To exclude bias, the evaluators were blinded to the source (human or computer) of the PTVs they reviewed. Their scorings of the PTVs were statistically examined to determine if the computer tool performed as well as the human experts. Results: The computer tool was as successful as the human experts in generating PTVs. Failures were primarily attributable to insufficient margins around the clinical target volume and to encroachment upon critical structures. In a qualitative analysis, the human and computer experts displayed similar types and distributions of errors. Conclusions: Rigorous evaluation of computer-based radiotherapy tools requires comparison to current practice and can reveal areas for improvement before the tool enters clinical practice

  7. Climate change impact and vulnerability assessment of forests in the Indian Western Himalayan region: A case study of Himachal Pradesh, India

    Directory of Open Access Journals (Sweden)

    Sujata Upgupta

    2015-01-01

    Full Text Available Climate change impact and vulnerability assessment at state and regional levels is necessary to develop adaptation strategies for forests in the biogeographically vital Himalayan region. The present study assesses forest ecosystem vulnerability to climate change across Himachal Pradesh and presents the priority districts for vulnerability reduction under ‘current climate’ and ‘future climate’ scenarios. Vulnerability of forests under ‘current climate’ scenario is assessed by adopting indicator-based approach, while the vulnerability under ‘future climate’ scenario is assessed using climate and vegetation impact models. Based on the vulnerability index estimated to present the vulnerability of forests under current and projected climate change impacts representing climate driven vulnerability, five districts – Chamba, Kangra, Kullu, Mandi and Shimla are identified as priority forest districts for adaptation planning. Identifying vulnerable forest districts and forests will help policy makers and forest managers to prioritize resource allocation and forest management interventions, to restore health and productivity of forests and to build long-term resilience to climate change.

  8. Importance of protocol target definition on the ability to spare normal tissue: An IMRT and 3D-CRT planning comparison for intraorbital tumors

    International Nuclear Information System (INIS)

    Hein, Patrick A.; Gladstone, David J.; Bellerive, Marc R.; Hug, Eugen B.

    2005-01-01

    Purpose: We selected five intraorbital tumor sites that are frequently found in clinical practice in children diagnosed with orbital rhabdomyosarcoma and performed three-dimensional conformal radiotherapy (3D-CRT) and intensity-modulated photon radiotherapy (IMRT) planning. Results of target coverage and doses to critical structures were compared. The goal of this study was to evaluate and to document realistic expectations as to organ-sparing capabilities of modern radiation therapy planning technologies with a focus on lens-sparing irradiation. Furthermore, we investigated potential added benefits of IMRT compared with 3D-CRT and the influence of protocol volume criteria definitions on the ability to obtain normal tissue dose sparing using the orbit as an example of a complex anatomic site. Methods and Materials: The five intraorbital tumor sites were placed retrobulbar, temporal, nasal, in the upper inner and upper outer quadrant, the latter two more complex in shape. Gross tumor volume (GTV), clinical target volume (CTV), and planning target volume (PTV) were defined in image-fused computed tomography and magnetic resonance data sets. 3D-CRT and IMRT photon plans, using equal beam angles and collimation for direct comparison, were designed to 45 Gy prescription dose according to Intergroup Rhabdomyosarcoma Study Group-D9602 (IRSG-D9602) protocol (Intergroup Rhabdomyosarcoma Study V [IRS-V] protocol) for Stage I, Clinical Group 3 orbital rhabdomyosarcoma. To compare the impact of changed target definitions in IMRT planning, additional IMRT plans were generated using modified volume and dose coverage criteria. The minimum dose constraint (95%) of the PTV was substituted by a required minimum volume coverage (95%) with the prescribed dose. Dose-volume histograms (DVHs) were obtained, including target volumes, lens, optic nerves, optic chiasm, lacrimal gland, bony orbit, pituitary gland, frontal and temporal lobes. Results: Protocol target volume coverage criteria

  9. Seaside, Oregon, Tsunami Vulnerability Assessment Pilot Study

    Science.gov (United States)

    Dunbar, P. K.; Dominey-Howes, D.; Varner, J.

    2006-12-01

    The results of a pilot study to assess the risk from tsunamis for the Seaside-Gearhart, Oregon region will be presented. To determine the risk from tsunamis, it is first necessary to establish the hazard or probability that a tsunami of a particular magnitude will occur within a certain period of time. Tsunami inundation maps that provide 100-year and 500-year probabilistic tsunami wave height contours for the Seaside-Gearhart, Oregon, region were developed as part of an interagency Tsunami Pilot Study(1). These maps provided the probability of the tsunami hazard. The next step in determining risk is to determine the vulnerability or degree of loss resulting from the occurrence of tsunamis due to exposure and fragility. The tsunami vulnerability assessment methodology used in this study was developed by M. Papathoma and others(2). This model incorporates multiple factors (e.g. parameters related to the natural and built environments and socio-demographics) that contribute to tsunami vulnerability. Data provided with FEMA's HAZUS loss estimation software and Clatsop County, Oregon, tax assessment data were used as input to the model. The results, presented within a geographic information system, reveal the percentage of buildings in need of reinforcement and the population density in different inundation depth zones. These results can be used for tsunami mitigation, local planning, and for determining post-tsunami disaster response by emergency services. (1)Tsunami Pilot Study Working Group, Seaside, Oregon Tsunami Pilot Study--Modernization of FEMA Flood Hazard Maps, Joint NOAA/USGS/FEMA Special Report, U.S. National Oceanic and Atmospheric Administration, U.S. Geological Survey, U.S. Federal Emergency Management Agency, 2006, Final Draft. (2)Papathoma, M., D. Dominey-Howes, D.,Y. Zong, D. Smith, Assessing Tsunami Vulnerability, an example from Herakleio, Crete, Natural Hazards and Earth System Sciences, Vol. 3, 2003, p. 377-389.

  10. Responsibility modelling for civil emergency planning

    OpenAIRE

    Sommerville, Ian; Storer, Timothy; Lock, Russell

    2009-01-01

    This paper presents a new approach to analysing and understanding civil emergency planning based on the notion of responsibility modelling combined with HAZOPS-style analysis of information requirements. Our goal is to represent complex contingency plans so that they can be more readily understood, so that inconsistencies can be highlighted and vulnerabilities discovered. In this paper, we outline the framework for contingency planning in the United Kingdom and introduce the notion of respons...

  11. Radiotherapy planning for glioblastoma based on a tumor growth model: improving target volume delineation

    Science.gov (United States)

    Unkelbach, Jan; Menze, Bjoern H.; Konukoglu, Ender; Dittmann, Florian; Le, Matthieu; Ayache, Nicholas; Shih, Helen A.

    2014-02-01

    Glioblastoma differ from many other tumors in the sense that they grow infiltratively into the brain tissue instead of forming a solid tumor mass with a defined boundary. Only the part of the tumor with high tumor cell density can be localized through imaging directly. In contrast, brain tissue infiltrated by tumor cells at low density appears normal on current imaging modalities. In current clinical practice, a uniform margin, typically two centimeters, is applied to account for microscopic spread of disease that is not directly assessable through imaging. The current treatment planning procedure can potentially be improved by accounting for the anisotropy of tumor growth, which arises from different factors: anatomical barriers such as the falx cerebri represent boundaries for migrating tumor cells. In addition, tumor cells primarily spread in white matter and infiltrate gray matter at lower rate. We investigate the use of a phenomenological tumor growth model for treatment planning. The model is based on the Fisher-Kolmogorov equation, which formalizes these growth characteristics and estimates the spatial distribution of tumor cells in normal appearing regions of the brain. The target volume for radiotherapy planning can be defined as an isoline of the simulated tumor cell density. This paper analyzes the model with respect to implications for target volume definition and identifies its most critical components. A retrospective study involving ten glioblastoma patients treated at our institution has been performed. To illustrate the main findings of the study, a detailed case study is presented for a glioblastoma located close to the falx. In this situation, the falx represents a boundary for migrating tumor cells, whereas the corpus callosum provides a route for the tumor to spread to the contralateral hemisphere. We further discuss the sensitivity of the model with respect to the input parameters. Correct segmentation of the brain appears to be the most

  12. Radiotherapy planning for glioblastoma based on a tumor growth model: improving target volume delineation

    International Nuclear Information System (INIS)

    Unkelbach, Jan; Dittmann, Florian; Le, Matthieu; Shih, Helen A; Menze, Bjoern H; Ayache, Nicholas; Konukoglu, Ender

    2014-01-01

    Glioblastoma differ from many other tumors in the sense that they grow infiltratively into the brain tissue instead of forming a solid tumor mass with a defined boundary. Only the part of the tumor with high tumor cell density can be localized through imaging directly. In contrast, brain tissue infiltrated by tumor cells at low density appears normal on current imaging modalities. In current clinical practice, a uniform margin, typically two centimeters, is applied to account for microscopic spread of disease that is not directly assessable through imaging. The current treatment planning procedure can potentially be improved by accounting for the anisotropy of tumor growth, which arises from different factors: anatomical barriers such as the falx cerebri represent boundaries for migrating tumor cells. In addition, tumor cells primarily spread in white matter and infiltrate gray matter at lower rate. We investigate the use of a phenomenological tumor growth model for treatment planning. The model is based on the Fisher–Kolmogorov equation, which formalizes these growth characteristics and estimates the spatial distribution of tumor cells in normal appearing regions of the brain. The target volume for radiotherapy planning can be defined as an isoline of the simulated tumor cell density. This paper analyzes the model with respect to implications for target volume definition and identifies its most critical components. A retrospective study involving ten glioblastoma patients treated at our institution has been performed. To illustrate the main findings of the study, a detailed case study is presented for a glioblastoma located close to the falx. In this situation, the falx represents a boundary for migrating tumor cells, whereas the corpus callosum provides a route for the tumor to spread to the contralateral hemisphere. We further discuss the sensitivity of the model with respect to the input parameters. Correct segmentation of the brain appears to be the most

  13. The impact of high penetration of wind energy on the vulnerability of power systems

    Energy Technology Data Exchange (ETDEWEB)

    EL-Arroudi, K.; Joos, G.; McGillis, D. [McGill Univ., Montreal, PQ (Canada). Dept. of Electrical and Computer Engineering

    2006-07-01

    This paper examined the impact of higher penetrations of wind energy installations on the vulnerability of power systems. Vulnerability was defined in terms of migration of system states based on the contingencies that might occur. It was noted that both the penetration levels and physical locations of wind energy installations in power systems have a strong influence on system vulnerability. A methodology was proposed to analyze the impacts of wind energy on power system vulnerability through the construction of a decision-tree classification model at the point of common coupling (PCC) bus. The aim of the model was to determine planning criteria for wind power interconnection and to ensure that design concepts are adequate and secure. The model was built by simulating a pre-specified range of system contingencies to generate patterns at the PCC bus. Actual measurements were then compared against known patterns, from which the stress levels of disturbances were estimated. Stress levels were defined in terms of the performance level measures delineated by National Electricity Reliability Council (NERC) planning standards. The methodology is a non-parametric learning technique able to produce classifiers about given problems in order to deduce information from new, unobserved cases. A case study consisting of a 4-machine system with a total generation of 2295 MW was presented where wind-based generation accounted for 450 MW. The decision-tree classifier was constructed by simulating 120 events generated by combinations of contingencies; seasonal wind patterns and different wind production levels per season. Results showed that with a knowledge of the total penetration level and location of wind power installations, it is possible to estimate the effect of wind energy on the vulnerability of a power system. 12 refs., 6 figs.

  14. Automated Software Vulnerability Analysis

    Science.gov (United States)

    Sezer, Emre C.; Kil, Chongkyung; Ning, Peng

    Despite decades of research, software continues to have vulnerabilities. Successful exploitations of these vulnerabilities by attackers cost millions of dollars to businesses and individuals. Unfortunately, most effective defensive measures, such as patching and intrusion prevention systems, require an intimate knowledge of the vulnerabilities. Many systems for detecting attacks have been proposed. However, the analysis of the exploited vulnerabilities is left to security experts and programmers. Both the human effortinvolved and the slow analysis process are unfavorable for timely defensive measure to be deployed. The problem is exacerbated by zero-day attacks.

  15. Predicting organismal vulnerability to climate warming: roles of behaviour, physiology and adaptation

    Science.gov (United States)

    Huey, Raymond B.; Kearney, Michael R.; Krockenberger, Andrew; Holtum, Joseph A. M.; Jess, Mellissa; Williams, Stephen E.

    2012-01-01

    A recently developed integrative framework proposes that the vulnerability of a species to environmental change depends on the species' exposure and sensitivity to environmental change, its resilience to perturbations and its potential to adapt to change. These vulnerability criteria require behavioural, physiological and genetic data. With this information in hand, biologists can predict organisms most at risk from environmental change. Biologists and managers can then target organisms and habitats most at risk. Unfortunately, the required data (e.g. optimal physiological temperatures) are rarely available. Here, we evaluate the reliability of potential proxies (e.g. critical temperatures) that are often available for some groups. Several proxies for ectotherms are promising, but analogous ones for endotherms are lacking. We also develop a simple graphical model of how behavioural thermoregulation, acclimation and adaptation may interact to influence vulnerability over time. After considering this model together with the proxies available for physiological sensitivity to climate change, we conclude that ectotherms sharing vulnerability traits seem concentrated in lowland tropical forests. Their vulnerability may be exacerbated by negative biotic interactions. Whether tropical forest (or other) species can adapt to warming environments is unclear, as genetic and selective data are scant. Nevertheless, the prospects for tropical forest ectotherms appear grim. PMID:22566674

  16. Developing effective communication materials on the health effects of climate change for vulnerable groups: a mixed methods study.

    Science.gov (United States)

    Kreslake, Jennifer M; Price, Katherine M; Sarfaty, Mona

    2016-09-07

    Individuals with chronic health conditions or low socioeconomic status (SES) are more vulnerable to the health impacts of climate change. Health communication can provide information on the management of these impacts. This study tested, among vulnerable audiences, whether viewing targeted materials increases knowledge about the health impacts of climate change and strength of climate change beliefs, and whether each are associated with stronger intentions to practice recommended behaviors. Low-SES respondents with chronic conditions were recruited for an online survey in six cities. Respondents were shown targeted materials illustrating the relationship between climate change and chronic conditions. Changes in knowledge and climate change beliefs (pre- and post-test) and behavioral intentions (post-test only) were tested using McNemar tests of marginal frequencies of two binary outcomes or paired t-tests, and multivariable linear regression. Qualitative interviews were conducted among target audiences to triangulate survey findings and make recommendations on the design of messages. Respondents (N = 122) reflected the target population regarding income, educational level and prevalence of household health conditions. (1) Knowledge. Significant increases in knowledge were found regarding: groups that are most vulnerable to heat (children [p concise language, how climate change affects health conditions and how to engage in protective adaptation behaviors.

  17. Aircraft vulnerability analysis by modeling and simulation

    Science.gov (United States)

    Willers, Cornelius J.; Willers, Maria S.; de Waal, Alta

    2014-10-01

    Infrared missiles pose a significant threat to civilian and military aviation. ManPADS missiles are especially dangerous in the hands of rogue and undisciplined forces. Yet, not all the launched missiles hit their targets; the miss being either attributable to misuse of the weapon or to missile performance restrictions. This paper analyses some of the factors affecting aircraft vulnerability and demonstrates a structured analysis of the risk and aircraft vulnerability problem. The aircraft-missile engagement is a complex series of events, many of which are only partially understood. Aircraft and missile designers focus on the optimal design and performance of their respective systems, often testing only in a limited set of scenarios. Most missiles react to the contrast intensity, but the variability of the background is rarely considered. Finally, the vulnerability of the aircraft depends jointly on the missile's performance and the doctrine governing the missile's launch. These factors are considered in a holistic investigation. The view direction, altitude, time of day, sun position, latitude/longitude and terrain determine the background against which the aircraft is observed. Especially high gradients in sky radiance occur around the sun and on the horizon. This paper considers uncluttered background scenes (uniform terrain and clear sky) and presents examples of background radiance at all view angles across a sphere around the sensor. A detailed geometrical and spatially distributed radiometric model is used to model the aircraft. This model provides the signature at all possible view angles across the sphere around the aircraft. The signature is determined in absolute terms (no background) and in contrast terms (with background). It is shown that the background significantly affects the contrast signature as observed by the missile sensor. A simplified missile model is constructed by defining the thrust and mass profiles, maximum seeker tracking rate, maximum

  18. What Does Vulnerability Mean?

    Science.gov (United States)

    Parley, Fiona F

    2011-01-01

    Protection of those deemed vulnerable has received increasing attention since 2000. This article reports on care staff views of vulnerability using original data from a research study (Parley. "Vulnerability and abuse: an exploration of views of care staff working with people who have learning disabilities," PhD Thesis, 2007) in which care staff…

  19. Climate plan 2004; Plan climat 2004

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-07-01

    The Climate Plan is an action plan drawn up by the French Government to respond to the climate change challenge, first by 2010 (complying with the Kyoto Protocol target), and, secondly, beyond this date. Projections for France show that national emissions could be 10% higher than the Kyoto target in 2010 if no measures are taken. This is particularly due to increasing emissions in the sectors affecting daily life (residential-tertiary sectors, transport, etc.). For this reason, the Climate Plan contains measures affecting all sectors of the economy and the daily life of all French citizens with a view to economizing the equivalent of 54 million tonnes of CO{sub 2} each year by the year 2010, which will help to reverse the trend significantly. Beyond 2010, the Climate Plan sets out a strategy for technological research which will enable France to meet a target of reducing greenhouse gas emissions four or fivefold by 2050. (author)

  20. Redistributing vulnerabilities

    DEFF Research Database (Denmark)

    Seeberg, Jens; Padmawati, Retna Siwi

    2015-01-01

    It is widely accepted that the social distribution of vulnerability in a given society may turn hazardous events into disasters. This distributional approach draws attention to continuities that explain catastrophes by virtue of the workings of society prior to the event. In this paper, we draw...... attention to the social processes whereby vulnerability is modified and renegotiated during the post-disaster period where resources for disaster alleviation and reconstruction enter local communities. Specifically, we explore the social dynamics of house damage classification in the wake of the 2006...... Central Java earthquake, and we explore relations between citizens and the state during post-disaster house reconstruction. We argue that disastrous outcomes of catastrophic events do not follow pre-existing fault lines of vulnerability in a simple or predictable manner, and that the social process...

  1. Modelling the changing cumulative vulnerability to climate-related hazards for river basin management using a GIS-based multicriteria decision approach

    Science.gov (United States)

    Hung, Hung-Chih; Wu, Ju-Yu; Hung, Chih-Hsuan

    2017-04-01

    1. Background Asia-Pacific region is one of the most vulnerable areas of the world to climate-related hazards and extremes due to rapid urbanization and over-development in hazard-prone areas. It is thus increasingly recognized that the management of land use and reduction of hazard risk are inextricably linked. This is especially critical from the perspective of integrated river basin management. A range of studies has targeted existing vulnerability assessments. However, limited attention has been paid to the cumulative effects of multiple vulnerable factors and their dynamics faced by local communities. This study proposes a novel methodology to access the changing cumulative vulnerability to climate-related hazards, and to examine the relationship between the attraction factors relevant to the general process of urbanization and vulnerability variability with a focus on a river basin management unit. 2. Methods and data The methods applied in this study include three steps. First, using Intergovernmental Panel on Climate Change's (IPCC) approach, a Cumulative Vulnerability Assessment Framework (CVAF) is built with a goal to characterize and compare the vulnerability to climate-related hazards within river basin regions based on a composition of multiple indicators. We organize these indicator metrics into three categories: (1) hazard exposure; (2) socioeconomic sensitivity, and (3) adaptive capacity. Second, the CVAF is applied by combining a geographical information system (GIS)-based spatial statistics technique with a multicriteria decision analysis (MCDA) to assess and map the changing cumulative vulnerability, comparing conditions in 1996 and 2006 in Danshui River Basin, Taiwan. Third, to examine the affecting factors of vulnerability changing, we develop a Vulnerability Changing Model (VCM) using four attraction factors to reflect how the process of urban developments leads to vulnerability changing. The factors are transport networks, land uses

  2. Vulnerability and adaptation of US shellfisheries to ocean acidification

    Science.gov (United States)

    Ekstrom, Julia A.; Suatoni, Lisa; Cooley, Sarah R.; Pendleton, Linwood H.; Waldbusser, George G.; Cinner, Josh E.; Ritter, Jessica; Langdon, Chris; van Hooidonk, Ruben; Gledhill, Dwight; Wellman, Katharine; Beck, Michael W.; Brander, Luke M.; Rittschof, Dan; Doherty, Carolyn; Edwards, Peter E. T.; Portela, Rosimeiry

    2015-03-01

    Ocean acidification is a global, long-term problem whose ultimate solution requires carbon dioxide reduction at a scope and scale that will take decades to accomplish successfully. Until that is achieved, feasible and locally relevant adaptation and mitigation measures are needed. To help to prioritize societal responses to ocean acidification, we present a spatially explicit, multidisciplinary vulnerability analysis of coastal human communities in the United States. We focus our analysis on shelled mollusc harvests, which are likely to be harmed by ocean acidification. Our results highlight US regions most vulnerable to ocean acidification (and why), important knowledge and information gaps, and opportunities to adapt through local actions. The research illustrates the benefits of integrating natural and social sciences to identify actions and other opportunities while policy, stakeholders and scientists are still in relatively early stages of developing research plans and responses to ocean acidification.

  3. Vulnerability of teleosts caught by the pelagic tuna longline fleets in South Atlantic and Western Indian Oceans

    Science.gov (United States)

    Lucena-Frédou, Flávia; Kell, Laurie; Frédou, Thierry; Gaertner, Daniel; Potier, Michel; Bach, Pascal; Travassos, Paulo; Hazin, Fábio; Ménard, Frédéric

    2017-06-01

    Productivity and Susceptibility Analysis (PSA) is a methodology for evaluating the vulnerability of a stock based on its biological productivity and susceptibility to fishing. In this study, we evaluated the vulnerability of 60 stocks of tuna, billfishes and other teleosts caught by the tuna longline fleets operating in the South Atlantic and Indian Ocean using a semi-quantitative PSA. We (a) evaluated the vulnerability of the species in the study areas; (b) compared the vulnerability of target and non-target species and oceans; (c) analyzed the sensitivity of data entry; and (d) compared the results of the PSA to other fully quantitative assessment methods. Istiophoridae exhibited the highest scores for vulnerability. The top 10 species at risk were: Atlantic Istiophorus albicans; Indian Ocean Istiompax indica; Atlantic Makaira nigricans and Thunnus alalunga; Indian Ocean Xiphias gladius; Atlantic T. albacares, Gempylus serpens, Ranzania laevis and X. gladius; and Indian Ocean T. alalunga. All species considered at high risk were targeted or were commercialized bycatch, except for the Atlantic G. serpens and R. laevis which were discarded, and may be considered as a false positive. Those species and others at high risk should be prioritized for further assessment and/or data collection. Most species at moderate risk were bycatch species kept for sale. Conversely, species classified at low risk were mostly discarded. Overall, species at high risk were overfished and/or subjected to overfishing. Moreover, all species considered to be within extinction risk (Critically Endangered, Endangered and Vulnerable) were in the high-risk category. The good concordance between approaches corroborates the results of our analysis. PSA is not a replacement for traditional stock assessments, where a stock is assessed at regular intervals to provide management advice. It is of importance, however, where there is uncertainty about catches and life history parameters, since it can

  4. Vulnerability and risk of deltaic social-ecological systems exposed to multiple hazards.

    Science.gov (United States)

    Hagenlocher, Michael; Renaud, Fabrice G; Haas, Susanne; Sebesvari, Zita

    2018-08-01

    Coastal river deltas are hotspots of global change impacts. Sustainable delta futures are increasingly threatened due to rising hazard exposure combined with high vulnerabilities of deltaic social-ecological systems. While the need for integrated multi-hazard approaches has been clearly articulated, studies on vulnerability and risk in deltas either focus on local case studies or single hazards and do not apply a social-ecological systems perspective. As a result, vulnerabilities and risks in areas with strong social and ecological coupling, such as coastal deltas, are not fully understood and the identification of risk reduction and adaptation strategies are often based on incomplete assumptions. To overcome these limitations, we propose an innovative modular indicator library-based approach for the assessment of multi-hazard risk of social-ecological systems across and within coastal deltas globally, and apply it to the Amazon, Ganges-Brahmaputra-Meghna (GBM), and Mekong deltas. Results show that multi-hazard risk is highest in the GBM delta and lowest in the Amazon delta. The analysis reveals major differences between social and environmental vulnerability across the three deltas, notably in the Mekong and the GBM deltas where environmental vulnerability is significantly higher than social vulnerability. Hotspots and drivers of risk vary spatially, thus calling for spatially targeted risk reduction and adaptation strategies within the deltas. Ecosystems have been identified as both an important element at risk as well as an entry point for risk reduction and adaptation strategies. Copyright © 2018. Published by Elsevier B.V.

  5. The vulnerabilities in childhood and adolescence and the Brazilian public policy intervention.

    Science.gov (United States)

    Fonseca, Franciele Fagundes; Sena, Ramony Kris R; dos Santos, Rocky Lane A; Dias, Orlene Veloso; Costa, Simone de Melo

    2013-06-01

    To review and discuss childhood and adolescence vulnerabilities, as well as Brazilian public policies of intervention. A narrative review was performed, considering studies published between 1990 and 2012, found in the Virtual Health Library databases (Biblioteca Virtual em Saúde - BVS). A combination of the following descriptors was used in the search strategy: "Adolescent Health", "Child Health", "Health Public Politics" and "Vulnerability". In addition, Brazilian official documents, the Statute of the Child and the Adolescent, Guardianship Council, Bolsa Família and Saúde na Escola Programs were evaluated. The results were divided into five categories of analysis: Vulnerability of Children and Adolescents in Brazil, Public Politics of Intervention to Risk Factors in Childhood and Adolescence, the Statute of the Child and the Adolescent and Guardianship Council, Bolsa Família Program and Saúde na Escola Program. The studies show that children and adolescents are vulnerable to environmental and social situations. Vulnerabilities are exhibited in daily violence within families and schools, which results in the premature entrance of children and adolescents in the work environment and/or in the drug traffic. To deal with these problems, the Brazilian Government established the Statute of the Child and the Adolescent as well as social programs. Literature exposes the risks experienced by children and adolescents in Brazil. In the other hand, a Government endeavor was identified to eliminate or minimize the suffering of those in vulnerable situations through public policies targeted to this population group.

  6. Poverty and Vulnerability - An Interdisciplinary Approach

    OpenAIRE

    Makoka, Donald; Kaplan, Marcus

    2005-01-01

    This paper describes the concepts of poverty and vulnerability as well as the interconnections and differences between them using an interdisciplinary approach. While poverty is a static concept, vulnerability has a forward-looking dimension. We, therefore, review the methodologies that different disciplines use to measure poverty and vulnerability. In particular, the differences between vulnerability to natural disasters, vulnerability to climate change, as well as vulnerability to poverty a...

  7. Vulnerability of complex networks

    Science.gov (United States)

    Mishkovski, Igor; Biey, Mario; Kocarev, Ljupco

    2011-01-01

    We consider normalized average edge betweenness of a network as a metric of network vulnerability. We suggest that normalized average edge betweenness together with is relative difference when certain number of nodes and/or edges are removed from the network is a measure of network vulnerability, called vulnerability index. Vulnerability index is calculated for four synthetic networks: Erdős-Rényi (ER) random networks, Barabási-Albert (BA) model of scale-free networks, Watts-Strogatz (WS) model of small-world networks, and geometric random networks. Real-world networks for which vulnerability index is calculated include: two human brain networks, three urban networks, one collaboration network, and two power grid networks. We find that WS model of small-world networks and biological networks (human brain networks) are the most robust networks among all networks studied in the paper.

  8. Improvement of CT-based treatment planning models of abdominal targets using static exhale imaging

    International Nuclear Information System (INIS)

    Ten Haken, R.K.; Balter, J.M.; Lam, K.L.; McGinn, C.J.; Lawrence, T.S.

    1996-01-01

    PURPOSE: CT based models of the patient that do not account for the motion of ventilation may not accurately predict the shape and position of critical abdominal structures. Without knowledge of the patient's ventilatory status during the CT scan, a planning target volume margin for the entire range of ventilation is required both inferior and superior to abdominal target volumes to ensure coverage. Also, dose-volume histograms and normal tissue complication probability (NTCP) estimates may be uncertain. Respiratory gating technology for imaging and treatment is not yet widely available. The purpose of the current study is to explore an intermediate step to improve the veracity of the patient model and reduce the treated volume by acquiring the CT data with the patients holding their breath at normal exhale. MATERIALS AND METHODS: The ventilatory time courses of diaphragm movement for 15 patients (with no special breathing instructions) were measured using digitized movies from the fluoroscope during simulation. On repeat simulations, the reproducibility of the diaphragm position at exhale was determined. A clinical protocol was developed for treatment based on exhale CT models. CT scans were acquired at normal exhale using a spiral scanner. Typical volumes were acquired using 5 mm slice thickness and a 1:1 pitch. The scan volume was divided into 2-3 segments, to allow the patient to breathe in between. Margins were placed about intrahepatic target volumes based on the ventilatory excursion inferior to the target, and on only the reproducibility of exhale position superior to the target. RESULTS: The average patient's diaphragm was located within 2 mm of the average exhale position for 50% of the typical ventilatory cycle. For inhale, this value was reduced to 10%, and for mid ventilation, 15%. The reproducibility of exhale position over multiple breathing cycles was 2 mm (2σ), as opposed to 4 mm for inhale. Combining the variation of exhale position and the

  9. Targeting climate diversity in conservation planning to build resilience to climate change

    Science.gov (United States)

    Heller, Nicole E.; Kreitler, Jason R.; Ackerly, David; Weiss, Stuart; Recinos, Amanda; Branciforte, Ryan; Flint, Lorraine E.; Flint, Alan L.; Micheli, Elisabeth

    2015-01-01

    Climate change is raising challenging concerns for systematic conservation planning. Are methods based on the current spatial patterns of biodiversity effective given long-term climate change? Some conservation scientists argue that planning should focus on protecting the abiotic diversity in the landscape, which drives patterns of biological diversity, rather than focusing on the distribution of focal species, which shift in response to climate change. Climate is one important abiotic driver of biodiversity patterns, as different climates host different biological communities and genetic pools. We propose conservation networks that capture the full range of climatic diversity in a region will improve the resilience of biotic communities to climate change compared to networks that do not. In this study we used historical and future hydro-climate projections from the high resolution Basin Characterization Model to explore the utility of directly targeting climatic diversity in planning. Using the spatial planning tool, Marxan, we designed conservation networks to capture the diversity of climate types, at the regional and sub-regional scale, and compared them to networks we designed to capture the diversity of vegetation types. By focusing on the Conservation Lands Network (CLN) of the San Francisco Bay Area as a real-world case study, we compared the potential resilience of networks by examining two factors: the range of climate space captured, and climatic stability to 18 future climates, reflecting different emission scenarios and global climate models. We found that the climate-based network planned at the sub-regional scale captured a greater range of climate space and showed higher climatic stability than the vegetation and regional based-networks. At the same time, differences among network scenarios are small relative to the variance in climate stability across global climate models. Across different projected futures, topographically heterogeneous areas

  10. Vulnerable Bullies: Perpetration of Peer Harassment Among Youths Across Sexual Orientation, Weight, and Disability Status

    Science.gov (United States)

    Gower, Amy L.; McMorris, Barbara J.; Bucchianeri, Michaela M.

    2015-01-01

    Objectives. We examined perpetration of bullying among youths in vulnerable groups relative to youths in peer groups not categorized as vulnerable. Methods. Data were collected in 2013 from a large school-based survey of adolescents conducted in Minnesota (n = 122 180). We used the χ2 test and logistic regression to compare measures of perpetration of physical and relational bullying, as well as experiences of victimization and perpetration (or both), across categories of sexual orientation, weight status, and disability status. Results. Rates of physical and relational bullying perpetration were significantly higher among youths in vulnerable groups than among those not in vulnerable groups. With respect to context of victimization experiences, young men and women from vulnerable groups were overrepresented in the group comprising both perpetrators and victims. For example, odds of being both a perpetrator and a victim were 1.41 to 3.22 times higher among gay, lesbian, and bisexual youths than among heterosexual youths. Conclusions. Vulnerable youths, who are prone to peer harassment, may also act as perpetrators of bullying. Prevention strategies should address the particular needs of these populations; targeted programming may be appropriate. PMID:26180987

  11. Disaster Vulnerability in South Korea under a Gender Perspective

    Science.gov (United States)

    Chung, Gunhui

    2017-04-01

    The most affected natural disaster has been flooding in South Korea, however, many unexpected natural disasters cause by snow or drought have become severe due to the climate change. Therefore it is very important to analyze disaster vulnerability under the unexpected climate condition. When the natural disaster happens, in many cases, female was more damaged than male because of the cultural and physical limitations. Disaster is never gender neutral. For example, four times as many female as male died in Indonesia tsunami. Therefore, it is very important to consider gender sensitivity in the disaster vulnerability to mitigate effects on the female. In this study, the current disaster management guideline in South Korea is investigated in the gender perspective and compared to the other countries. As a result, gender analysis in the disaster preparedness and response is not implemented in South Korea. Thus, the gender balanced disaster management guideline is newly proposed. Also, the disaster vulnerability considering gendered factors are evaluated and analyzed in the urban area. Acknowledgement This research was supported by Support Program for Women in Science, Engineering and Technology through the National Research Foundation of Korea(NRF) funded by the Ministry of Science, ICT and future Planning(No. 2016H1C3A1903202)

  12. Nova target experiments

    International Nuclear Information System (INIS)

    Drake, R.P.

    1985-11-01

    The Nova laser, at the Lawrence Livermore National Laboratory, provides unique opportunities for target experiments. It has unprecedented energy on target and significant flexibility. The paper presented by John Hunt described the capabilities and the status of Nova. This paper discusses plans for future experiments using Nova, and the present status of target experiments. We plan to perform high-quality physics experiments that exploit the unique capabilities of Nova. Because this is our goal, we are fielding an extensive array of well-characterized target diagnostics to measure the emissions from the target. The first section of this paper discusses the basic target diagnostics. We are also taking care to quantify the performance of the laser

  13. Health Impacts of Climate Change in Pacific Island Countries: A Regional Assessment of Vulnerabilities and Adaptation Priorities.

    Science.gov (United States)

    McIver, Lachlan; Kim, Rokho; Woodward, Alistair; Hales, Simon; Spickett, Jeffery; Katscherian, Dianne; Hashizume, Masahiro; Honda, Yasushi; Kim, Ho; Iddings, Steven; Naicker, Jyotishma; Bambrick, Hilary; McMichael, Anthony J; Ebi, Kristie L

    2016-11-01

    Between 2010 and 2012, the World Health Organization Division of Pacific Technical Support led a regional climate change and health vulnerability assessment and adaptation planning project, in collaboration with health sector partners, in 13 Pacific island countries-Cook Islands, Federated States of Micronesia, Fiji, Kiribati, Marshall Islands, Nauru, Niue, Palau, Samoa, Solomon Islands, Tonga, Tuvalu, and Vanuatu. We assessed the vulnerabilities of Pacific island countries to the health impacts of climate change and planned adaptation strategies to minimize such threats to health. This assessment involved a combination of quantitative and qualitative techniques. The former included descriptive epidemiology, time series analyses, Poisson regression, and spatial modeling of climate and climate-sensitive disease data, in the few instances where this was possible; the latter included wide stakeholder consultations, iterative consensus building, and expert opinion. Vulnerabilities were ranked using a "likelihood versus impact" matrix, and adaptation strategies were prioritized and planned accordingly. The highest-priority climate-sensitive health risks in Pacific island countries included trauma from extreme weather events, heat-related illnesses, compromised safety and security of water and food, vector-borne diseases, zoonoses, respiratory illnesses, psychosocial ill-health, non-communicable diseases, population pressures, and health system deficiencies. Adaptation strategies relating to these climate change and health risks could be clustered according to categories common to many countries in the Pacific region. Pacific island countries are among the most vulnerable in the world to the health impacts of climate change. This vulnerability is a function of their unique geographic, demographic, and socioeconomic characteristics combined with their exposure to changing weather patterns associated with climate change, the health risks entailed, and the limited capacity

  14. Inflammation and vascular remodeling in the ventral hippocampus contributes to vulnerability to stress.

    Science.gov (United States)

    Pearson-Leary, J; Eacret, D; Chen, R; Takano, H; Nicholas, B; Bhatnagar, S

    2017-06-27

    During exposure to chronic stress, some individuals engage in active coping behaviors that promote resiliency to stress. Other individuals engage in passive coping that is associated with vulnerability to stress and with anxiety and depression. In an effort to identify novel molecular mechanisms that underlie vulnerability or resilience to stress, we used nonbiased analyses of microRNAs in the ventral hippocampus (vHPC) to identify those miRNAs differentially expressed in active (long-latency (LL)/resilient) or passive (short-latency (SL)/vulnerable) rats following chronic social defeat. In the vHPC of active coping rats, miR-455-3p level was increased, while miR-30e-3p level was increased in the vHPC of passive coping rats. Pathway analyses identified inflammatory and vascular remodeling pathways as enriched by genes targeted by these microRNAs. Utilizing several independent markers for blood vessels, inflammatory processes and neural activity in the vHPC, we found that SL/vulnerable rats exhibit increased neural activity, vascular remodeling and inflammatory processes that include both increased blood-brain barrier permeability and increased number of microglia in the vHPC relative to control and resilient rats. To test the relevance of these changes for the development of the vulnerable phenotype, we used pharmacological approaches to determine the contribution of inflammatory processes in mediating vulnerability and resiliency. Administration of the pro-inflammatory cytokine vascular endothelial growth factor-164 increased vulnerability to stress, while the non-steroidal anti-inflammatory drug meloxicam attenuated vulnerability. Collectively, these results show that vulnerability to stress is determined by a re-designed neurovascular unit characterized by increased neural activity, vascular remodeling and pro-inflammatory mechanisms in the vHPC. These results suggest that dampening inflammatory processes by administering anti-inflammatory agents reduces

  15. Elements at risk as a framework for assessing the vulnerability of communities to landslides

    Directory of Open Access Journals (Sweden)

    M. Papathoma-Köhle

    2007-12-01

    Full Text Available The assessment of the vulnerability of communities prone to landslide related disasters is a topic that is growing in importance. Few studies discuss this issue and limited research has been carried out on the relationship between types of landslide and their potential impact on buildings and infrastructure. We outline a framework to undertake an assessment of the vulnerability of buildings to landslide utilising a similar framework used for assessing the vulnerability of buildings to tsunami damage. The framework is based on the development of an "elements at risk database" that takes into consideration the characteristics and use of the buildings, their importance for the local economy and the characteristics of the inhabitants (population density, age and so forth. The attributes that affect vulnerability are imported and examined within a GIS database which is used to visualise the physical, human and economic vulnerability. The results may have important implications for disaster management and emergency planning, and the database can be used by various end-users and stakeholders such as insurance companies, local authorities and the emergency services. The approach presented here can be integrated in to a wider more detailed "Framework for Landslide Risk and Vulnerability Assessment for Communities". We illustrate the potential of this framework and present preliminary results from Lichtenstein, Baden Württemberg, Germany.

  16. Yampa River Valley sub-area contingency plan

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-08-01

    The Yampa River Valley sub-area contingency plan (Contingency Plan) has been prepared for two counties in northwestern Colorado: Moffat County and Routt County. The Contingency Plan is provided in two parts, the Contingency Plan and the Emergency Response Action Plan (ERAP). The Contingency Plan provides information that should be helpful in planning to minimize the impact of an oil spill or hazardous material incident. It contains discussions of planning and response role, hazards identification, vulnerability analysis, risk analysis, cleanup, cost recovery, training, and health and safety. It includes information on the incident command system, notifications, response capabilities, emergency response organizations, evacuation and shelter-in-place, and immediate actions.

  17. Seismic safety research program plan

    International Nuclear Information System (INIS)

    1987-05-01

    This document presents a plan for seismic research to be performed by the Structural and Seismic Engineering Branch in the Office of Nuclear Regulatory Research. The plan describes the regulatory needs and related research necessary to address the following issues: uncertainties in seismic hazard, earthquakes larger than the design basis, seismic vulnerabilities, shifts in building frequency, piping design, and the adequacy of current criteria and methods. In addition to presenting current and proposed research within the NRC, the plan discusses research sponsored by other domestic and foreign sources

  18. GIS Fuzzy Expert System for the assessment of ecosystems vulnerability to fire in managing Mediterranean natural protected areas.

    Science.gov (United States)

    Semeraro, Teodoro; Mastroleo, Giovanni; Aretano, Roberta; Facchinetti, Gisella; Zurlini, Giovanni; Petrosillo, Irene

    2016-03-01

    A significant threat to the natural and cultural heritage of Mediterranean natural protected areas (NPAs) is related to uncontrolled fires that can cause potential damages related to the loss or a reduction of ecosystems. The assessment and mapping of the vulnerability to fire can be useful to reduce landscape damages and to establish priority areas where it is necessary to plan measures to reduce the fire vulnerability. To this aim, a methodology based on an interactive computer-based system has been proposed in order to support NPA's management authority for the identification of vulnerable hotspots to fire through the selection of suitable indicators that allow discriminating different levels of sensitivity (e.g. Habitat relevance, Fragmentation, Fire behavior, Ecosystem Services, Vegetation recovery after fire) and stresses (agriculture, tourism, urbanization). In particular, a multi-criteria analysis based on Fuzzy Expert System (FES) integrated in a GIS environment has been developed in order to identify and map potential "hotspots" of fire vulnerability, where fire protection measures can be undertaken in advance. In order to test the effectiveness of this approach, this approach has been applied to the NPA of Torre Guaceto (Apulia Region, southern Italy). The most fire vulnerable areas are the patch of century-old forest characterized by high sensitivity and stress, and the wetlands and century-old olive groves due to their high sensitivity. The GIS fuzzy expert system provides evidence of its potential usefulness for the effective management of natural protected areas and can help conservation managers to plan and intervene in order to mitigate the fire vulnerability in accordance with conservation goals. Copyright © 2015 Elsevier Ltd. All rights reserved.

  19. Reducing Vulnerability of Ports and Harbors to Earthquake and Tsunami Hazards

    Science.gov (United States)

    Wood, Nathan J.; Good, James W.; Goodwin, Robert F.

    2002-01-01

    Recent scientific research suggests the Pacific Northwest could experience catastrophic earthquakes in the near future, both from distant and local sources, posing a significant threat to coastal communities. Damage could result from numerous earthquake-related hazards, such as severe ground shaking, soil liquefaction, landslides, land subsidence/uplift, and tsunami inundation. Because of their geographic location, ports and harbors are especially vulnerable to these hazards. Ports and harbors, however, are important components of many coastal communities, supporting numerous activities critical to the local and regional economy and possibly serving as vital post-event, response-recovery transportation links. A collaborative, multi-year initiative is underway to increase the resiliency of Pacific Northwest ports and harbors to earthquake and tsunami hazards, involving Oregon Sea Grant (OSG), Washington Sea Grant (WSG), the National Oceanic and Atmospheric Administration Coastal Services Center (CSC), and the U.S. Geological Survey Center for Science Policy (CSP). Specific products of this research, planning, and outreach initiative include a regional stakeholder issues and needs assessment, a community-based mitigation planning process, a Geographic Information System (GIS) — based vulnerability assessment methodology, an educational web-site and a regional data archive. This paper summarizes these efforts, including results of two pilot port-harbor community projects, one in Yaquina Bay, Oregon and the other in Sinclair Inlet, Washington. Finally, plans are outlined for outreach to other port and harbor communities in the Pacific Northwest and beyond, using "getting started" workshops and a web-based tutorial.

  20. PORT SECURITY-Threats and Vulnerabilities

    OpenAIRE

    Kusi, Bernard

    2015-01-01

    The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...

  1. A Resiliency Action Plan for the National Renewable Energy Laboratory: May 23, 2014 -- June 5, 2015

    Energy Technology Data Exchange (ETDEWEB)

    Vogel, J [Abt Environmental Research, Boulder, CO (United States); Wagner, C. [Abt Environmental Research, Boulder, CO (United States); Renfrow, S. [Abt Environmental Research, Boulder, CO (United States)

    2015-09-03

    The second stage in a two-stage project called the National Renewable Energy Laboratory (NREL) Climate Change Resiliency and Preparedness (CCRP) project is summarized in this resiliency action plan. This CCRP pilot project was funded by the U.S. Department of Energy's Sustainability Performance Office and launched in winter 2014. The resiliency action plan begins where the previous stage of the project -- the vulnerability assessment -- ended. This report discusses resiliency options to reduce the risk of the highest risk vulnerabilities that were identified in the NREL vulnerability assessment.

  2. The application of numerical debris flow modelling for the generation of physical vulnerability curves

    Czech Academy of Sciences Publication Activity Database

    Quan Luna, B.; Blahůt, Jan; van Westen, C.J.; Sterlacchini, S.; van Asch, T.W.J.; Akbas, S.O.

    2011-01-01

    Roč. 11, č. 7 (2011), s. 2047-2060 ISSN 1561-8633 Institutional research plan: CEZ:AV0Z30460519 Keywords : debris flow modelling * hazard * vulnerability curves Subject RIV: DB - Geology ; Mineralogy Impact factor: 1.983, year: 2011 http://www.nat-hazards-earth-syst-sci.net/11/2047/2011/

  3. Groundwater vulnerability assessment for the Banyas Catchment of the Syrian coastal area using GIS and the RISKE method.

    Science.gov (United States)

    Kattaa, Bassam; Al-Fares, Walid; Al Charideh, Abdul Rahman

    2010-05-01

    Vulnerability assessment to delineate areas that are more susceptible to contamination from anthropogenic sources has become an important element for sensible resource management and landuse planning. This contribution aims at estimating aquifer vulnerability by applying the RISKE model in Banyas Catchment Area (BCA), Tartous Prefecture, west Syria. An additional objective is to demonstrate the combined use of the RISKE model and a geographical information system (GIS) as an effective method for groundwater pollution risk assessment. The RISKE model uses five environmental parameters (Rock of aquifer media, Infiltration, Soil media, Karst, and Epikarst) to characterize the hydro-geological setting and evaluate aquifer vulnerability. The elevated eastern and low western part of the study area was dominated by high vulnerability classes, while the middle part was characterized by moderate vulnerability classes. Based on the vulnerability analysis, it was found that 2% and 39% of BCA is under low and high vulnerability to groundwater contamination, respectively, while more than 52% and 5% of the area of BCA can be designated as an area of moderate and very high vulnerability to groundwater contamination, respectively. The GIS technique has provided an efficient environment for analyses and high capabilities of handling a large amount of spatial data. Copyright 2009 Elsevier Ltd. All rights reserved.

  4. Earthquake and Physical and Social Vulnerability Assessment for Settlements: Case Study Avcılar District

    Directory of Open Access Journals (Sweden)

    Görün ARUN

    2010-01-01

    Full Text Available Many settled areas in Turkey and across the globe suffer economical and social losses resulting from natural disasters such as earthquakes, floods, hurricanes and landslides. In this study, a vulnerability assessment model has been developed for earthquake prone areas in Turkey. The vulnerability assessment model includes ground factors, a building’s physical conditions, building evacuation and social (demographic and socioeconomic aspects of the settlement. The ground vulnerability factor is calculated using factors such as the earthquake zone, soil classification, land sliding and liquefaction threats. The physical vulnerability factor depends on the structural and non-structural threats of the building; the building evacuation vulnerability factor includes the position and structural system of the staircase, the width and natural illumination of the evacuation route, the size and opening of the building exit doors to the street and the distance of the building to the closest open area. The social vulnerability factor considers the age group, gender, family type, education, ownership, income etc of the building users. This vulnerability assessment model is applied to a case study - that of the Avcılar district of Istanbul. Forty different reinforced concrete residential buildings (349 apartments of 1225 people are assessed using the develop checklist. In order to evaluate the checklist and to assess the importance (relevance of vulnerability factors, a questionnaire is forwarded to various related professional groups (architecture, urban planning and civil engineering. The results of the questionnaire are examined using SPSS software with factor analysis. According to the results, most of the samples in the case study area can be classified as high vulnerable.

  5. Emissions intensity targeting: From China's 12th Five Year Plan to its Copenhagen commitment

    International Nuclear Information System (INIS)

    Lu, Yingying; Stegman, Alison; Cai, Yiyong

    2013-01-01

    China is currently the world's largest single source of fossil fuel related CO 2 emissions. In response to pressure from the international community, and in recognition of its role in global climate change mitigation, the Chinese government has announced a series of climate policy commitments, in both the Copenhagen Accord and its domestic 12th 5 Year Plan, to gradually reduce emissions intensity by 2020. Emissions intensity reduction commitments differ significantly from emission level reduction commitments that are commonly adopted by developed economies. In this paper, we investigate the economic implications of China's recent commitments to reduce emissions intensity, and highlight the complexities involved in modelling intensity targets under uncertainty. Using G-Cubed, an intertemporal, computable general equilibrium model of the world economy, we show that China's emissions intensity targets could be achieved with a range of low and high growth emissions level trajectories corresponding to low and high growth GDP scenarios, which lead to different welfare consequences. - Highlights: • We investigate the economic implication of China's recent climate commitments. • We address the complexity of modelling reduction in emissions intensity. • The 2015 target gives China more flexibility towards its 2020 target. • The policy restriction is eased in high growth periods. • In low growth periods an intensity target places a further restriction on the economy

  6. Threat and vulnerability analysis and conceptual design of countermeasures for a computer center under construction

    International Nuclear Information System (INIS)

    Rozen, A.; Musacchio, J.M.

    1988-01-01

    This project involved the assessment of a new computer center to be used as the main national data processing facility of a large European bank. This building serves as the principal facility in the country with all other branches utilizing the data processing center. As such, the building is a crucial target which may attract terrorist attacks. Threat and vulnerability assessments were performed as a basis to define and overall fully-integrated security system of passive and active countermeasures for the facility. After separately assessing the range of threats and vulnerabilities, a combined matrix of threats and vulnerabilities was used to identify the crucial combinations. A set of architectural-structural passive measures was added to the active components of the security system

  7. A model for the development of mothers' perceived vulnerability of preterm infants.

    Science.gov (United States)

    Horwitz, Sarah McCue; Storfer-Isser, Amy; Kerker, Bonnie D; Lilo, Emily; Leibovitz, Ann; St John, Nick; Shaw, Richard J

    2015-06-01

    Some mothers of preterm infants continue to view them as vulnerable after their health has improved. These exaggerated perceptions of vulnerability lead to poor parent-child interactions and, subsequently, to adverse child outcomes. However, there is no theoretical model to explain why these exaggerated perceptions develop in only some mother-child dyads. Data for this study come from a randomized trial of an intervention to reduce distress in mothers of preterm infants. A total of 105 mothers older than 18 years of infants aged 25-34 weeks, weighing >600 g and with clinically significant anxiety, depression, or trauma symptoms, were recruited and randomized. Women were assessed at baseline, after intervention, and at 6 months after birth. The outcome for these analyses was perceptions of infant vulnerability as measured by the Vulnerable Baby Scale (VBS) at 6 months after birth. A theoretical model developed from the extant literature was tested using the MacArthur Mediator-Moderator Approach. A dysfunctional coping style, high depression, anxiety, or trauma symptoms in response to the preterm birth, and low social support were related to 6-month VBS scores. Maternal response to trauma was directly related to VBS, and an important precursor of maternal response to trauma was a dysfunctional coping style. This model suggests that maternal responses to trauma are critical in the formation of exaggerated perceptions of vulnerability as are dysfunctional coping styles and low social support. Women with these characteristics should be targeted for intervention to prevent poor parenting practices that result from exaggerated perceptions of vulnerability.

  8. A rainfall risk analysis thanks to an GIS based estimation of urban vulnerability

    Science.gov (United States)

    Renard, Florent; Pierre-Marie, Chapon

    2010-05-01

    heavy rains, to locate areas of risk in the urban area. The targets that share the same rank of this vulnerability index do not possess the same importance, or the same sensitivity to the flood hazard. Therefore, the second part of this work is to define the priorities and sensitivities of different targets based on the judgments of experts. Multicriteria decision methods are used to prioritize elements and are therefore adapted to the modelling of the sensitivity of the issues of greater Lyon (Griot, 2008). The purpose of these methods is the assessment of priorities between the different components of the situation. Thomas Saaty's analytic hierarchy process (1980) is the most frequently used because of its many advantages. On this basis, the formal calculations of priorities and sensitivities of the elements have been conducted. These calculations are based on the judgments of experts. Indeed, during semi-structured interview, the 38 experts in our sample delivered a verdict on issues that seem relatively more important than others by binary comparison. They carry the same manner to determine sensitivity's stakes to hazard flooding. Finally, the consistency of answers given by experts is validated by calculating a ratio of coherence, and their results are aggregated to provide functions of priority (based on the relative importance of each stakes), and functions of sensitivity (based on the relative sensitivity of each stakes). From these functions of priority and sensitivity is obtained the general function of vulnerability. The vulnerability functions allow defining the importance of the stakes of Greater Lyon and their sensitivity to hydrological hazards. The global vulnerability function is obtained from sensitivity and priority functions and shows the great importance of human issues (75 %). The vulnerability factor of environmental targets represents 12 % of the global vulnerability function, as much as the materials issues. However, it can be seen that the

  9. The Assessment of Vulnerability of Industrial Parks to Climate Change in South Korea

    Science.gov (United States)

    Ryu, J. E.; Lee, D. K.; Jung, T. Y.; Choi, K. L.; Lee, S. H.

    2014-12-01

    future, albeit slightly. Policy suggestions for the management of industrial parks were derived based on these findings by considering the regions and industries that are vulnerable to localized heavy rain if existing industrial parks are renovated or new industrial parks are planning.

  10. Department of Energy, highly enriched uranium ES ampersand H vulnerability assessment, Idaho National Engineering Laboratory site assessment team report

    International Nuclear Information System (INIS)

    1996-01-01

    In accordance with the February 22, 1996 directive issued by Secretary of Energy O'Leary on the Vulnerability Assessment of Highly Enriched Uranium (HEU) Storage, the Idaho National Engineering Laboratory conducted an assessment of the site's HEU holdings and any associated vulnerabilities. The assessment was conducted between April 25 and May 24, 1996. The scope of this assessment, as defined in the Assessment Plan, included all HEU, and any spent fuel not evaluated in the Spent Fuel Vulnerability Assessment. Addressed in this assessment were all of the holdings at the Idaho National Engineering Laboratory (INEL) except any located at Argonne National Laboratory-West (ANL-W) and the Naval Reactors Facility. Excluded from the assessment were those HEU holdings previously assessed in the Idaho National Engineering Laboratory Spent Nuclear Fuel Inventory and Vulnerability Site Assessment Report and any HEU holdings evaluated in the Plutonium Vulnerability Assessment Report

  11. Vulnerability Analyst’s Guide to Geometric Target Description

    Science.gov (United States)

    1992-09-01

    not constitute indorsement of any commercial product. Form Approved REPORT DOCUMENTATION PAGE OMB No. 0704-O,8 public reporting burden for this...46 5.3 Surrogacy ..............................................46 5.4 Specialized Targets......................................46 5.5... commercially available documents for other large-scale software. The documentation is not a BRL technical report, but can be obtained by contacting

  12. Energy vulnerability relationships

    Energy Technology Data Exchange (ETDEWEB)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  13. Kansas Water Quality Action Targeting System (KATS)

    Data.gov (United States)

    Kansas Data Access and Support Center — This system is a revision of the original KATS system developed in 1990 as a tool to aid resource managers target Kansas valuable and vulnerable water resources for...

  14. Probabilistic seismic vulnerability and risk assessment of stone masonry structures

    Science.gov (United States)

    Abo El Ezz, Ahmad

    Earthquakes represent major natural hazards that regularly impact the built environment in seismic prone areas worldwide and cause considerable social and economic losses. The high losses incurred following the past destructive earthquakes promoted the need for assessment of the seismic vulnerability and risk of the existing buildings. Many historic buildings in the old urban centers in Eastern Canada such as Old Quebec City are built of stone masonry and represent un-measurable architectural and cultural heritage. These buildings were built to resist gravity loads only and generally offer poor resistance to lateral seismic loads. Seismic vulnerability assessment of stone masonry buildings is therefore the first necessary step in developing seismic retrofitting and pre-disaster mitigation plans. The objective of this study is to develop a set of probability-based analytical tools for efficient seismic vulnerability and uncertainty analysis of stone masonry buildings. A simplified probabilistic analytical methodology for vulnerability modelling of stone masonry building with systematic treatment of uncertainties throughout the modelling process is developed in the first part of this study. Building capacity curves are developed using a simplified mechanical model. A displacement based procedure is used to develop damage state fragility functions in terms of spectral displacement response based on drift thresholds of stone masonry walls. A simplified probabilistic seismic demand analysis is proposed to capture the combined uncertainty in capacity and demand on fragility functions. In the second part, a robust analytical procedure for the development of seismic hazard compatible fragility and vulnerability functions is proposed. The results are given by sets of seismic hazard compatible vulnerability functions in terms of structure-independent intensity measure (e.g. spectral acceleration) that can be used for seismic risk analysis. The procedure is very efficient for

  15. Geomorphological hazard and tourist vulnerability along Portofino Park trails (Italy)

    Science.gov (United States)

    Brandolini, P.; Faccini, F.; Piccazzo, M.

    2006-06-01

    The many trails existing in the coastal area of Portofino Promontory are used by tourists for trekking or as pathways to small villages and beaches. The aim of this paper is to define geomorphological hazard and tourist vulnerability in this area, within the framework of the management and planning of hiking activities in Portofino Natural Park. In particular, processes triggered by gravity, running waters and wave motion, affecting the slopes and the cliff, are considered. The typology of the trails and trail maintenance are also taken into account in relation to weather conditions that can make the excursion routes dangerous for tourists. In conclusion, an operative model is applied for the definition of possible risk scenarios. This model is founded on an inventory and the quantification of geomorphological hazards and tourist vulnerability, in comparison with trail rescue data. The model can be applied to other environments and tourist areas.

  16. Identification of urban flood vulnerability in eastern Slovakia by mapping the potential natural sources of flooding - implications for territorial planning

    Directory of Open Access Journals (Sweden)

    Lenka Gaňová

    2017-12-01

    Full Text Available The aim of the presented study was to assess the distribution of flood-risk potential (FRP at the regional scale. A progressive approach integrating geographical information system (GIS with two different methods of multicriteria analysis (MCA – analytic hierarchy process (AHP and ranking method (RM was applied in the process. In the analyses, the most causative factors for flooding were taken into account, urban spatial planning, such as soil type, daily precipitation, land use, size of the catchment and average basin slope. A case study of flood vulnerability identification in the Hornád and Bodrog catchments’ areas in eastern Slovakia has been employed to illustrate two different approaches. Spatial estimation of FRP should be one of the basic steps for complex geoecological evaluation and delimitation of landscape considering water resources management, groundwater pollution, prediction of soil erosion and sediment transport and some other important landscape-ecological factors. The obtained results indicate that RM method shows better results as related to the existing floods in the recent years in Bodrog and Hornád catchment than AHP method.

  17. Construction of an integrated social vulnerability index in urban areas prone to flash flooding

    Science.gov (United States)

    Aroca-Jimenez, Estefania; Bodoque, Jose Maria; Garcia, Juan Antonio; Diez-Herrero, Andres

    2017-09-01

    Among the natural hazards, flash flooding is the leading cause of weather-related deaths. Flood risk management (FRM) in this context requires a comprehensive assessment of the social risk component. In this regard, integrated social vulnerability (ISV) can incorporate spatial distribution and contribution and the combined effect of exposure, sensitivity and resilience to total vulnerability, although these components are often disregarded. ISV is defined by the demographic and socio-economic characteristics that condition a population's capacity to cope with, resist and recover from risk and can be expressed as the integrated social vulnerability index (ISVI). This study describes a methodological approach towards constructing the ISVI in urban areas prone to flash flooding in Castilla y León (Castile and León, northern central Spain, 94 223 km2, 2 478 376 inhabitants). A hierarchical segmentation analysis (HSA) was performed prior to the principal components analysis (PCA), which helped to overcome the sample size limitation inherent in PCA. ISVI was obtained from weighting vulnerability factors based on the tolerance statistic. In addition, latent class cluster analysis (LCCA) was carried out to identify spatial patterns of vulnerability within the study area. Our results show that the ISVI has high spatial variability. Moreover, the source of vulnerability in each urban area cluster can be identified from LCCA. These findings make it possible to design tailor-made strategies for FRM, thereby increasing the efficiency of plans and policies and helping to reduce the cost of mitigation measures.

  18. System i Disaster Recovery Planning

    CERN Document Server

    Dolewski, Richard

    2008-01-01

    Mapping out all the preparations necessary for an effective disaster recovery plan and its safeguard-a continuous maintenance program-this guide is aimed at IT managers of small and medium businesses. The opening section covers the initial steps of auditing vulnerability, ranking essential IT functions, and reviewing the storage of tape backups, with the following discussion focused on the elements of the plan itself. The plan includes a mission statement, a definition of disaster, the assignment of staff to teams, methods of compensating for human error, and standards for documenting the step

  19. Strategic considerations in planning a counterevacuation

    International Nuclear Information System (INIS)

    Chester, C.V.; Cristy, G.A.; Haaland, C.M.

    1975-12-01

    The Soviet Union has highly developed plans to evacuate their population centers in a nuclear confrontation. Their plans include construction of expedient shelters in the outlying areas and continued operation of their essential industry by commuting workers. If they should successfully implement their plan, a subsequent nuclear exchange with the United States would cost them far fewer casualties than they suffered in World War II. Without a corresponding evacuation, the US could lose from 50 to 70 percent of its population. This asymmetry in vulnerability, if allowed to persist, would seriously weaken the bargaining position of the US President. To restore the balance, a great reduction in vulnerability can be achieved most economically by planning a US counterevacuation as a response to a Soviet evacuation. Russian historical experience with murderous invaders, most recently in World War II, has made authoritarian defense measures involving civilians and property in peacetime quite acceptable in their culture. In the US, widescale use of private property and civilian participation in defense activity are not feasible until the development of a grave crisis. Hence US evacuation plans must differ in several important respects from the Soviet plans. However, this preliminary study indicates that the US has ample material resources to move and shelter its population at least as effectively as the Soviet Union. Perhaps the most critical disadvantage of the US is in morale, as evidenced by the widespread misconception that effective survival measures are not possible

  20. Developing effective communication materials on the health effects of climate change for vulnerable groups: a mixed methods study

    Directory of Open Access Journals (Sweden)

    Jennifer M. Kreslake

    2016-09-01

    Full Text Available Abstract Background Individuals with chronic health conditions or low socioeconomic status (SES are more vulnerable to the health impacts of climate change. Health communication can provide information on the management of these impacts. This study tested, among vulnerable audiences, whether viewing targeted materials increases knowledge about the health impacts of climate change and strength of climate change beliefs, and whether each are associated with stronger intentions to practice recommended behaviors. Methods Low-SES respondents with chronic conditions were recruited for an online survey in six cities. Respondents were shown targeted materials illustrating the relationship between climate change and chronic conditions. Changes in knowledge and climate change beliefs (pre- and post-test and behavioral intentions (post-test only were tested using McNemar tests of marginal frequencies of two binary outcomes or paired t-tests, and multivariable linear regression. Qualitative interviews were conducted among target audiences to triangulate survey findings and make recommendations on the design of messages. Results Respondents (N = 122 reflected the target population regarding income, educational level and prevalence of household health conditions. (1 Knowledge. Significant increases in knowledge were found regarding: groups that are most vulnerable to heat (children [p < 0.001], individuals with heart disease [p < 0.001], or lung disease [p = 0.019]; and environmental conditions that increase allergy-producing pollen (increased heat [p = 0.003], increased carbon dioxide [p < 0.001]. (2 Strength of certainty that climate change is happening increased significantly between pre- and post-test (p < 0.001, as did belief that climate change affected respondents’ health (p < 0.001. (3 Behavioral intention. At post-test, higher knowledge of heat vulnerabilities and environmental conditions that trigger pollen

  1. Intravascular photoacoustic imaging: a new tool for vulnerable plaque identification.

    Science.gov (United States)

    Jansen, Krista; van Soest, Gijs; van der Steen, Antonius F W

    2014-06-01

    The vulnerable atherosclerotic plaque is believed to be at the root of the majority of acute coronary events. Even though the exact origins of plaque vulnerability remain elusive, the thin-cap fibroatheroma, characterized by a lipid-rich necrotic core covered by a thin fibrous cap, is considered to be the most prominent type of vulnerable plaque. No clinically available imaging technique can characterize atherosclerotic lesions to the extent needed to determine plaque vulnerability prognostically. Intravascular photoacoustic imaging (IVPA) has the potential to take a significant step in that direction by imaging both plaque structure and composition. IVPA is a natural extension of intravascular ultrasound that adds tissue type specificity to the images. IVPA utilizes the optical contrast provided by the differences in the absorption spectra of plaque components to image composition. Its capability to image lipids in human coronary atherosclerosis has been shown extensively ex vivo and has recently been translated to an in vivo animal model. Other disease markers that have been successfully targeted are calcium and inflammatory markers, such as macrophages and matrix metalloproteinase; the latter two through application of exogenous contrast agents. By simultaneously displaying plaque morphology and composition, IVPA can provide a powerful prognostic marker for disease progression, and as such has the potential to transform the current practice in percutaneous coronary intervention. Copyright © 2014 World Federation for Ultrasound in Medicine & Biology. Published by Elsevier Inc. All rights reserved.

  2. Vulnerability Identification Errors in Security Risk Assessments

    OpenAIRE

    Taubenberger, Stefan

    2014-01-01

    At present, companies rely on information technology systems to achieve their business objectives, making them vulnerable to cybersecurity threats. Information security risk assessments help organisations to identify their risks and vulnerabilities. An accurate identification of risks and vulnerabilities is a challenge, because the input data is uncertain. So-called ’vulnerability identification errors‘ can occur if false positive vulnerabilities are identified, or if vulnerabilities remain u...

  3. Assessment of groundwater vulnerability to nitrates from agricultural sources using a GIS-compatible logic multicriteria model.

    Science.gov (United States)

    Rebolledo, Boris; Gil, Antonia; Flotats, Xavier; Sánchez, José Ángel

    2016-04-15

    In the present study an overlay method to assess groundwater vulnerability is proposed. This new method based on multicriteria decision analysis (MCDA) was developed and validated using an appropriate case study in Aragon area (NE Spain). The Vulnerability Index to Nitrates from Agricultural Sources (VINAS) incorporates a novel Logic Scoring of Preferences (LSP) approach, and it has been developed using public geographic information from the European Union. VINAS-LSP identifies areas with five categories of vulnerability, taking into account the hydrogeological and environmental characteristics of the territory as a whole. The resulting LSP map is a regional screening tool that can provide guidance on the potential risk of nitrate pollution, as well as highlight areas where specific research and farming planning policies are required. Copyright © 2016 Elsevier Ltd. All rights reserved.

  4. Plutonium working group report on environmental, safety and health vulnerabilities associated with the Department's plutonium storage. Volume 2, Appendix B, Part 2: Hanford site assessment team report

    International Nuclear Information System (INIS)

    1994-09-01

    The Hanford Site Self Assessment of Plutonium Environmental Safety and Health (ES and H) Vulnerabilities was conducted in accordance with the US Department of Energy (DOE) Secretary's directive of February 1994. The implementation plans to carry out this directive are contained in the Project Plan and the Assessment Plan. For this assessment, vulnerabilities are defined as conditions or weaknesses that may lead to unnecessary or increased radiation exposure of the workers, release of radioactive materials to the environment, or radiation exposure of the public. The purpose for the Assessment is to evaluate environmental, safety and health vulnerabilities from plutonium operations and storage activities. Acts of sabotage or diversion of plutonium which obviously may have ES and H implications are excluded from this study because separate DOE programs evaluate those issues on a continuing basis. Security and safeguards activities which may have negative impacts on safety are included in the evaluation

  5. Fuzzing and Vulnerabilities Search

    OpenAIRE

    Stanislav Evgenyevich Kirillov; Nikolai Petrovich Lavrentiev

    2013-01-01

    Fuzzing for vulnerabilities can be very effective if we know the input data format. This work contains description of network message format recovery algorithm and the usage of restored data model in fuzzing and vulnerabilities search.

  6. Target post-evaluation of China's “12th Five-Year” oil and gas exploration and development planning and its “13th Five-Year” target prediction

    Directory of Open Access Journals (Sweden)

    Jiping Pan

    2016-03-01

    Full Text Available In the turn of 12th and 13th “Five-Year Plan” of China, the global oil and gas market changes greatly. In this regard, the target post-evaluation of the “12th Five-Year” oil and gas exploration and development planning was conducted, which is of significant importance to scientifically and reasonably making the specific “13th Five-Year” oil and gas exploration and development target planning. The post-evaluation results indicate that, in the period of “12th Five-Year Plan”, the oil and gas exploration and development targets of China were satisfactorily completed, but some deficiencies still existed. For example, the target of oil production (2 × 108 t was overfulfilled, while the target of oil reserves (65 × 108 t remained 6.4% outstanding. The target of gas reserves (3.5 × 1012 m3 was overfulfilled, while the target of gas production (1385 × 108 m3 remained 6.2% outstanding. Moreover, the targets of unconventional gases were not satisfactorily completed-shale gas being better than coalbed methane (CBM. Failures to fulfill some targets in “12th Five-Year Plan” were primarily attributed to the slowdown of oil and gas consumption growth, sharp drop of oil price, downgrading of resources, and changes of statistic basis under the new normal. The forecast results suggest that, in the period of “13th Five-Year Plan”, given USD50–70/bbl of world oil price, China's annual average incremental conventional oil and gas in place will be 10.0 × 108–12.0 × 108 t and 6000 × 108–8000 × 108 m3 respectively, annual average incremental shale gas and CBM in place will be 1000 × 108–2000 × 108 m3 and 500 × 108–1000 × 108 m3 respectively, and annual oil production will be about 2.0 × 108 t. By 2020, China's annual gas production will approach 1800 × 108–2000 × 108 m3 (shale gas: 200 × 108 m3, and CBM: 150 × 108 m3.

  7. Functionality of the Town Planning Authorities in Effecting Urban ...

    African Journals Online (AJOL)

    Any Society with law and order in place but lacks effective implementation are also vulnerable to chaos and crises. Planning Laws and Ordinances are in place to control and regulate development and also to maintain perfect health of the society through their effective implementation. This paper examines the planning laws ...

  8. Heat waves and cold spells: an analysis of policy response and perceptions of vulnerable populations in the UK

    OpenAIRE

    Johanna Wolf; W Neil Adger; Irene Lorenzoni

    2010-01-01

    Heat waves and cold spells pose ongoing seasonal risks to the health and well-being of vulnerable individuals. Current attempts to address these risks in the UK are implemented through fuel-poverty strategies and heat-wave planning. This paper examines evidence from the UK on whether heat waves and cold spells are addressed differently by public policy in the UK given that risks are mediated by similar perceptions that shape behavioural responses by vulnerable individuals. It is based on a re...

  9. Planning and delivering high doses to targets surrounding the spinal cord at the lower neck and upper mediastinal levels: static beam-segmentation technique executed with a multileaf collimator

    International Nuclear Information System (INIS)

    Neve, W. de; Wagter, C. de; Jaeger, K. de; Thienpont, M.; Colle, C.; Derycke, S.; Schelfhout, J.

    1996-01-01

    Background and purpose. It remains a technical challenge to limit the dose to the spinal cord below tolerance if, in head and neck or thyroid cancer, the planning target volume reaches to a level below the shoulders. In order to avoid these dose limitations, we developed a standard plan involving Beam Intensity Modulation (BIM) executed by a static technique of beam segmentation. In this standard plan, many machine parameters (gantry angles, couch position, relative beam and segment weights) as well as the beam segmentation rules were identical for all patients. Materials and methods. The standard plan involved: the use of static beams with a single isocenter; BIM by field segmentation executable with a standard Philips multileaf collimator; virtual simulation and dose computation on a general 3D-planning system (Sherouse's GRATIS[reg]); heuristic computation of segment intensities and optimization (improving the dose distribution and reducing the execution time) by human intelligence. The standard plan used 20 segments spread over 8 gantry angles plus 2 non-segmented wedged beams (2 gantry angles). Results. The dose that could be achieved at the lowest target voxel, without exceeding tolerance of the spinal cord (50 Gy at highest voxel) was 70-80 Gy. The in-target 3D dose-inhomogeneity was ∼25%. The shortest time of execution of a treatment (22 segments) on a patient (unpublished) was 25 min. Conclusions. A heuristic model has been developed and investigated to obtain a 3D concave dose distribution applicable to irradiate targets in the lower neck and upper mediastinal regions. The technique spares efficiently the spinal cord and allows the delivery of higher target doses than with conventional techniques. It can be planned as a standard plan using conventional 3D-planning technology. The routine clinical implementation is performed with commercially available equipment, however, at the expense of extended execution times

  10. Binational climate change vulnerability assessment of migratory birds in the Great Lakes Basins: Tools and impediments.

    Directory of Open Access Journals (Sweden)

    Robert S Rempel

    Full Text Available Climate change is a global concern, requiring international strategies to reduce emissions, however, climate change vulnerability assessments are often local in scope with assessment areas restricted to jurisdictional boundaries. In our study we explored tools and impediments to understanding and responding to the effects of climate change on vulnerability of migratory birds from a binational perspective. We apply and assess the utility of a Climate Change Vulnerability Index on 3 focal species using distribution or niche modeling frameworks. We use the distributional forecasts to explore possible changes to jurisdictional conservation responsibilities resulting from shifting distributions for: eastern meadowlark (Sturnella magna, wood thrush (Hylocichla mustelina, and hooded warbler (Setophaga citrina. We found the Climate Change Vulnerability Index to be a well-organized approach to integrating numerous lines of evidence concerning effects of climate change, and provided transparency to the final assessment of vulnerability. Under this framework, we identified that eastern meadowlark and wood thrush are highly vulnerable to climate change, but hooded warbler is less vulnerable. Our study revealed impediments to assessing and modeling vulnerability to climate change from a binational perspective, including gaps in data or modeling for climate exposure parameters. We recommend increased cross-border collaboration to enhance the availability and resources needed to improve vulnerability assessments and development of conservation strategies. We did not find evidence to suggest major shifts in jurisdictional responsibility for the 3 focal species, but results do indicate increasing responsibility for these birds in the Canadian Provinces. These Provinces should consider conservation planning to help ensure a future supply of necessary habitat for these species.

  11. Assessment of Intrinsic Vulnerability to Contamination for the Alluvial Aquifer in El-Fayoum Depression Using the Drastic Method

    International Nuclear Information System (INIS)

    Ahmed, M.A.

    2012-01-01

    Intrinsic vulnerability assessment to delineate areas that are more susceptible to contamination from anthropogenic sources has become an important element for sensible resource management and land use planning. The vulnerability for the alluvial aquifer in El-Fayoum depression was assessed by applying the Drastic model as well as utilizing sensitivity analyses to evaluate the reliability of this model. This method uses seven parameters including climatic, geological, and hydrogeological conditions controlling the seepage of pollutant substances to groundwater. Vulnerability maps were produced by applying the Generic and Agricultural models according to the Drastic charter. The resulting agricultural Drastic vulnerability map indicates that 23.3%, 22.7% and 12.4% of El-Fayoum depression is under low, low-moderate and moderately high vulnerability of groundwater contamination, respectively, while 41.6% of the area of study can be designated as an area of moderate vulnerability of groundwater contamination. Resulting maps revealed that the potential for polluting groundwater with agricultural chemicals is greater than with Generic Drastic index pollutants. Depth to water table parameter inflicted the largest impact on the intrinsic vulnerability of the alluvial aquifer in El-Fayoum depression. Both the map removal and single-parameter sensitivity analyses indicated that the vulnerability index is the least sensitive to the removal of the recharge and hydraulic conductivity parameters but is highly sensitive to the removal of depth to water parameter.

  12. Being Prepared for Climate Change: A Workbook for Developing Risk-Based Adaptation Plans

    Science.gov (United States)

    This workbook is a guide for environmental professionals to construct a climate change adaptation plan based on identifying risks and their consequences. It incorporates watershed management, vulnerability assessments and action planning.

  13. Using the Lives Saved Tool to aid country planning in meeting mortality targets: a case study from Mali

    Directory of Open Access Journals (Sweden)

    Youssouf Keita

    2017-11-01

    Full Text Available Abstract Background Mali is one of four countries implementing a National Evaluation Platform (NEP to build local capacity to answer evaluation questions for maternal, newborn, child health and nutrition (MNCH&N. In 2014-15, NEP-Mali addressed questions about the potential impact of Mali’s MNCH&N plans and strategies, and identified priority interventions to achieve targeted mortality reductions. Methods The NEP-Mali team modeled the potential impact of three intervention packages in the Lives Saved Tool (LiST from 2014 to 2023. One projection included the interventions and targets from Mali’s ten-year health strategy (PDDSS for 2014-2023, and two others modeled intervention packages that included scale up of antenatal, intrapartum, and curative interventions, as well as reductions in stunting and wasting. We modeled the change in maternal, newborn and under-five mortality rates under these three projections, as well as the number of lives saved, overall and by intervention. Results If Mali were to achieve the MNCH&N coverage targets from its health strategy, under-5 mortality would be reduced from 121 per 1000 live births to 93 per 1000, far from the target of 69 deaths per 1000. Projections 1 and 2 produced estimated mortality reductions from 121 deaths per 1000 to 70 and 68 deaths per 1000, respectively. With respect to neonatal mortality, the mortality rate would be reduced from 39 to 32 deaths per 1000 live births under the current health strategy, and to 25 per 1000 under projections 1 and 2. Conclusions This study revealed that achieving the coverage targets for the MNCH&N interventions in the 2014-23 PDDSS would likely not allow Mali to achieve its mortality targets. The NEP-Mali team was able to identify two packages of MNCH&N interventions (and targets that achieved under-5 and neonatal mortality rates at, or very near, the PDDSS targets. The Malian Ministry of Health and Public Hygiene is using these results to revise its plans

  14. Using the Lives Saved Tool to aid country planning in meeting mortality targets: a case study from Mali.

    Science.gov (United States)

    Keita, Youssouf; Sangho, Hamadoun; Roberton, Timothy; Vignola, Emilia; Traoré, Mariam; Munos, Melinda

    2017-11-07

    Mali is one of four countries implementing a National Evaluation Platform (NEP) to build local capacity to answer evaluation questions for maternal, newborn, child health and nutrition (MNCH&N). In 2014-15, NEP-Mali addressed questions about the potential impact of Mali's MNCH&N plans and strategies, and identified priority interventions to achieve targeted mortality reductions. The NEP-Mali team modeled the potential impact of three intervention packages in the Lives Saved Tool (LiST) from 2014 to 2023. One projection included the interventions and targets from Mali's ten-year health strategy (PDDSS) for 2014-2023, and two others modeled intervention packages that included scale up of antenatal, intrapartum, and curative interventions, as well as reductions in stunting and wasting. We modeled the change in maternal, newborn and under-five mortality rates under these three projections, as well as the number of lives saved, overall and by intervention. If Mali were to achieve the MNCH&N coverage targets from its health strategy, under-5 mortality would be reduced from 121 per 1000 live births to 93 per 1000, far from the target of 69 deaths per 1000. Projections 1 and 2 produced estimated mortality reductions from 121 deaths per 1000 to 70 and 68 deaths per 1000, respectively. With respect to neonatal mortality, the mortality rate would be reduced from 39 to 32 deaths per 1000 live births under the current health strategy, and to 25 per 1000 under projections 1 and 2. This study revealed that achieving the coverage targets for the MNCH&N interventions in the 2014-23 PDDSS would likely not allow Mali to achieve its mortality targets. The NEP-Mali team was able to identify two packages of MNCH&N interventions (and targets) that achieved under-5 and neonatal mortality rates at, or very near, the PDDSS targets. The Malian Ministry of Health and Public Hygiene is using these results to revise its plans and strategies.

  15. Mobile Phones and Psychosocial Therapies with Vulnerable People: a First State of the Art.

    Science.gov (United States)

    Vázquez, Maria Yolanda García; Sexto, Carlos Ferrás; Rocha, Álvaro; Aguilera, Adrián

    2016-06-01

    Mobile phones are becoming a communication tool commonly used by people all over the world; and they are started to be adopted in psychosocial therapies involving vulnerable people. We are herein presenting the results of an academic literature review. We identified scientific papers published between 2006 and 2015 resorting to academic databases available on the Internet, applying a systematic selection method based on quality criteria. Secondly, we analysed contents, highlighting the scarcity of research involving vulnerable people. The available literature specialized in psychosocial therapies offers investigation results which involve mobile phones and patients in general, focusing particularly on the clinical psychology field and, to a lesser extent, on the social work field. Particularly significant are the investigation works developed in the United States. In the present paper we introduce a first "state of the art", identifying opportunities and also the limitations surrounding the use of mobile phones in psychosocial therapies targeting the vulnerable. Issues concerning privacy and data confidentiality, and the access of vulnerable people to mobile phones and how they use them, pose significant challenges; but they offer the opportunity to reach isolated or impoverished populations, or even to facilitate access to social and healthcare services. We close this paper formulating possible orientations, hypotheses and goals to design new investigation works involving vulnerable populations.

  16. spatially identifying vulnerable areas

    African Journals Online (AJOL)

    The model structure is aimed at understanding the critical vulnerable factors that ... This paper incorporates multiple criteria and rank risk factors. ..... In terms of quantifying vulnerable areas within the country, the analysis is done based on 9 ...

  17. Adaptation Planning for the National Estuary Program

    Science.gov (United States)

    This document is a resource for coastal communities to start planning to adapt to climate change. It describes elements, such as vulnerability assessments and stakeholder outreach, and provides examples as well as suggestions for additional resources.

  18. Assessment of PlanIQ Feasibility DVH for head and neck treatment planning.

    Science.gov (United States)

    Fried, David V; Chera, Bhishamjit S; Das, Shiva K

    2017-09-01

    Designing a radiation plan that optimally delivers both target coverage and normal tissue sparing is challenging. There are limited tools to determine what is dosimetrically achievable and frequently the experience of the planner/physician is relied upon to make these determinations. PlanIQ software provides a tool that uses target and organ at risk (OAR) geometry to indicate the difficulty of achieving different points for organ dose-volume histograms (DVH). We hypothesized that PlanIQ Feasibility DVH may aid planners in reducing dose to OARs. Clinically delivered head and neck treatments (clinical plan) were re-planned (re-plan) putting high emphasis on maximally sparing the contralateral parotid gland, contralateral submandibular gland, and larynx while maintaining routine clinical dosimetric objectives. The planner was blinded to the results of the clinically delivered plan as well as the Feasibility DVHs from PlanIQ. The re-plan treatments were designed using 3-arc VMAT in Raystation (RaySearch Laboratories, Sweden). The planner was then given the results from the PlanIQ Feasibility DVH analysis and developed an additional plan incorporating this information using 4-arc VMAT (IQ plan). The DVHs across the three treatment plans were compared with what was deemed "impossible" by PlanIQ's Feasibility DVH (Impossible DVH). The impossible DVH (red) is defined as the DVH generated using the minimal dose that any voxel outside the targets must receive given 100% target coverage. The re-plans performed blinded to PlanIQ Feasibilty DVH achieved superior sparing of aforementioned OARs compared to the clinically delivered plans and resulted in discrepancies from the impossible DVHs by an average of 200-700 cGy. Using the PlanIQ Feasibility DVH led to additionalOAR sparing compared to both the re-plans and clinical plans and reduced the discrepancies from the impossible DVHs to an average of approximately 100 cGy. The dose reduction from clinical to re-plan and re-plan to

  19. Behavioral Correlates of Primates Conservation Status: Intrinsic Vulnerability to Anthropogenic Threats.

    Directory of Open Access Journals (Sweden)

    Amélie Christelle Lootvoet

    Full Text Available Behavioral traits are likely to influence species vulnerability to anthropogenic threats and in consequence, their risk of extinction. Several studies have addressed this question and have highlighted a correlation between reproductive strategies and different viability proxies, such as introduction success and local extinction risk. Yet, very few studies have investigated the effective impact of social behaviour, and evidence regarding global extinction risk remains scant. Here we examined the effects of three main behavioral factors: the group size, the social and reproductive system, and the strength of sexual selection on global extinction risk. Using Primates as biological model, we performed comparative analysis on 93 species. The conservation status as described by the IUCN Red List was considered as a proxy for extinction risk. In addition, we added previously identified intrinsic factors of vulnerability to extinction, and a measure of the strength of the human impact for each species, described by the human footprint. Our analysis highlighted a significant effect of two of the three studied behavioral traits, group size and social and reproductive system. Extinction risk is negatively correlated with mean group size, which may be due to an Allee effect resulting from the difficulties for solitary and monogamous species to find a partner at low densities. Our results also indicate that species with a flexible mating system are less vulnerable. Taking into account these behavioral variables is thus of high importance when establishing conservation plans, particularly when assessing species relative vulnerability.

  20. Fuzzing and Vulnerabilities Search

    Directory of Open Access Journals (Sweden)

    Stanislav Evgenyevich Kirillov

    2013-02-01

    Full Text Available Fuzzing for vulnerabilities can be very effective if we know the input data format. This work contains description of network message format recovery algorithm and the usage of restored data model in fuzzing and vulnerabilities search.

  1. Cumulative stress and substantiated maltreatment: the importance of caregiver vulnerability and adult partner violence.

    Science.gov (United States)

    Wekerle, Christine; Wall, Anne-Marie; Leung, Eman; Trocmé, Nico

    2007-04-01

    vulnerabilities was the best predictor of the substantiation of child abuse and neglect. This relationship was moderated by the existence of partner violence: high caregiver vulnerability and high partner violence increased the likelihood of substantiation versus non-substantiation. These results suggest that caregiver issues should be considered in tandem with partner relationships. Among child welfare cases, caregiver vulnerability and partner violence are critical targets for child maltreatment prevention and early child protective services intervention.

  2. A fuzzy multicriteria categorization of the GALDIT method to assess seawater intrusion vulnerability of coastal aquifers.

    Science.gov (United States)

    Kazakis, Nerantzis; Spiliotis, Mike; Voudouris, Konstantinos; Pliakas, Fotios-Konstantinos; Papadopoulos, Basil

    2018-04-15

    Groundwater constitutes the primary source of fresh water for >1.2 billion people living in coastal zones. However, the threat of seawater intrusion is widespread in coastal aquifers mainly due to overexploitation of groundwater. In the present study, a modified fuzzy multicriteria categorization into non-ordered categories method was developed in order to modify the standard GALDIT method and assess seawater intrusion vulnerability in a coastal aquifer of northern Greece. The method is based on six parameters: groundwater occurrence, aquifer hydraulic conductivity, groundwater level, distance from the shore, impact of the existing status of seawater intrusion, and aquifer thickness. Initially, the original method was applied and revealed a zone of high vulnerability running parallel to the coastline and covering an area of 8.6km 2 . The modified GALDIT-F method achieved higher discretization of vulnerability zones which is essential to build a rational management plan to prevent seawater intrusion. The GALDIT-F approach also distinguished an area of the aquifer that is influenced by geothermal fluids. In total, twenty-five categories were produced corresponding to different vulnerability degrees according to the initial method (High, Moderate, Low) as well as the area influenced by geothermal fluids. Finally, a road map was developed in order to adapt management strategies to GALDIT-F categories and prevent and mitigate seawater intrusion. The proposed management strategies of the coastal aquifer include managed aquifer recharge (MAR) implementation, reallocation of existing wells, optimization of pumping rates during the hydrological year, and a detailed monitoring plan. Copyright © 2017 Elsevier B.V. All rights reserved.

  3. Preventive strike vs. false targets and protection in defense strategy

    International Nuclear Information System (INIS)

    Levitin, Gregory; Hausken, Kjell

    2011-01-01

    A defender allocates its resource between defending an object passively and striking preventively against an attacker seeking to destroy the object. With no preventive strike the defender distributes its entire resource between deploying false targets, which the attacker cannot distinguish from the genuine object, and protecting the object. If the defender strikes preventively, the attacker's vulnerability depends on its protection and on the defender's resource allocated to the strike. If the attacker survives, the object's vulnerability depends on the attacker's revenge attack resource allocated to the attacked object. The optimal defense resource distribution between striking preventively, deploying the false targets and protecting the object is analyzed. Two cases of the attacker strategy are considered: when the attacker attacks all of the targets and when it chooses a number of targets to attack. An optimization model is presented for making a decision about the efficiency of the preventive strike based on the estimated attack probability, dependent on a variety of model parameters.

  4. Geomorphological hazard and tourist vulnerability along Portofino Park trails (Italy

    Directory of Open Access Journals (Sweden)

    P. Brandolini

    2006-01-01

    Full Text Available The many trails existing in the coastal area of Portofino Promontory are used by tourists for trekking or as pathways to small villages and beaches. The aim of this paper is to define geomorphological hazard and tourist vulnerability in this area, within the framework of the management and planning of hiking activities in Portofino Natural Park. In particular, processes triggered by gravity, running waters and wave motion, affecting the slopes and the cliff, are considered. The typology of the trails and trail maintenance are also taken into account in relation to weather conditions that can make the excursion routes dangerous for tourists. In conclusion, an operative model is applied for the definition of possible risk scenarios. This model is founded on an inventory and the quantification of geomorphological hazards and tourist vulnerability, in comparison with trail rescue data. The model can be applied to other environments and tourist areas.

  5. Selective vulnerability in brain hypoxia

    DEFF Research Database (Denmark)

    Cervos-Navarro, J.; Diemer, Nils Henrik

    1991-01-01

    Neuropathology, selective vulnerability, brain hypoxia, vascular factors, excitotoxicity, ion homeostasis......Neuropathology, selective vulnerability, brain hypoxia, vascular factors, excitotoxicity, ion homeostasis...

  6. Semi-inclusive DIS Experiments Using Transversely Polarized Targets in Hall-A: Current Results and Future Plans

    Directory of Open Access Journals (Sweden)

    Allada Kalyan

    2012-12-01

    Full Text Available Measurement of single (SSA and double spin asymmetries (DSA in semiinclusive DIS reactions using polarized targets provide a powerful method to probe transverse momentum dependent parton distribution functions (TMDs. In particular, the experimentally measured SSA on nucleon targets can help in extracting the transversity and Sivers distribution functions of u and d-quarks. Similarly, the measured DSA are sensitive to the quark spin-orbital correlations, and provide an access to the TMD parton distribution function (g1T. A recent experiment conducted in Hall-A Jefferson Lab using transversely polarized 3He provide first such measurements on “effective” neutron target. The measurement was performed using 5.9 GeV beam from CEBAF and measured the target SSA/DSA in the SIDIS reaction 3He↑(e, e′π±X. The kinematical range, x = 0.19 ~ 0.34, at Q2 = 1.77 ~ 2.73 (GeV/c2, was focused on the valence quark region. The results from this measurement along with our plans for future high precision measurements in Hall-A are presented.

  7. Integrated assessment on the vulnerability of animal husbandry to snow disasters under climate change in the Qinghai-Tibetan Plateau

    Science.gov (United States)

    Wei, Yanqiang; Wang, Shijin; Fang, Yiping; Nawaz, Zain

    2017-10-01

    Animal husbandry is a dominant and traditional source of livelihood and income in the Qinghai-Tibetan Plateau. The Qinghai-Tibetan Plateau is the third largest snow covered area in China and is one of the main snow disaster regions in the world. It is thus imperative to urgently address the issue of vulnerability of the animal husbandry sector to snow disasters for disaster mitigation and adaptation under growing risk of these disasters as a result of future climate change. However, there is very few literature reported on the vulnerability of animal husbandry in the Qinghai-Tibetan Plateau. This assessment aims at identifying vulnerability of animal husbandry at spatial scale and to identify the reasons for vulnerability for adaptive planning and disaster mitigation. First, historical snow disaster characteristics have been analyzed and used for the spatial weight for vulnerability assessment. Second, indicator-based vulnerability assessment model and indicator system have been established. We combined risk of snow hazard, sensitivity of livestock to disaster, physical exposure to disaster, and community capacity to adapt to snow disaster in an integrated vulnerability index. Lastly, vulnerability of animal husbandry to snow disaster on the Qinghai-Tibetan Plateau has been evaluated. Results indicate that high vulnerabilities are mainly concentrated in the eastern and central plateau and that vulnerability decreases gradually from the east to the west. Due to global warming, the vulnerability trend has eased to some extent during the last few decades. High livestock density exposure to blizzard-prone regions and shortages of livestock barn and forage are the main reasons of high vulnerability. The conclusion emphasizes the important role of the local government and community to help local pastoralists for reducing vulnerability to snow disaster and frozen hazard. The approaches presented in this paper can be used for snow disaster mitigation, resilience

  8. The relationship between parental overprotection and health-related quality of life in pediatric cancer: the mediating role of perceived child vulnerability.

    Science.gov (United States)

    Hullmann, Stephanie E; Wolfe-Christensen, Cortney; Meyer, William H; McNall-Knapp, Rene Y; Mullins, Larry L

    2010-11-01

    The current study sought to examine the relation of parental overprotection and perceived child vulnerability to parent-reported health-related quality of life in parents of children with cancer. Parents (N = 89) of children who had been diagnosed with cancer completed measures of parental overprotection, perceived child vulnerability, and parent-proxy report of health-related quality of life. After controlling for theoretically relevant covariates, parental overprotection and perceived child vulnerability were both found to be significantly related to child health-related quality of life. Additional analyses revealed that perceived child vulnerability mediated the relationship between overprotective parenting behaviors and the child's health-related quality of life. The findings highlight the need to assess for these discrete parenting variables in parents of children with cancer and to develop interventions to target parental perceptions of vulnerability.

  9. Web Application Vulnerabilities

    OpenAIRE

    Yadav, Bhanu

    2014-01-01

    Web application security has been a major issue in information technology since the evolvement of dynamic web application. The main objective of this project was to carry out a detailed study on the top three web application vulnerabilities such as injection, cross site scripting, broken authentication and session management, present the situation where an application can be vulnerable to these web threats and finally provide preventative measures against them. ...

  10. Disproportionality as a Framework to Target Pollution Reduction from Urban Landscapes

    Directory of Open Access Journals (Sweden)

    Brian Horgan

    2008-01-01

    Full Text Available New federal water quality regulations regarding impaired waters and urban stormwater, alongside a growing need to reverse eutrophication of urban lakes, are creating demand to decrease nutrient export from urban landscapes, particularly lawns. We propose that Nowak et al.’s (2006 disproportionality framework could be used to target specific households likely to generate disproportionate levels of nutrient export. The biophysical dimension would be based on landscape vulnerability (slope, soil type, proximity to lakes; the social dimension would target “inappropriate” lawn management behaviors leading to high nutrient export on these vulnerable landscapes. Understanding of lawn nutrient cycling (biophysical dimension and homeowner beliefs and attitudes (social dimension would be used to develop targeted, specific messages for homeowners practicing inappropriate management. A lawn management program developed with this disproportionality framework would probably be very effective, highly economical and fair, targeting only homeowners who are creating a disproportionate impact.

  11. Mapping human vulnerability to climate change in the Brazilian Amazon: The construction of a municipal vulnerability index.

    Science.gov (United States)

    Menezes, Júlia Alves; Confalonieri, Ulisses; Madureira, Ana Paula; Duval, Isabela de Brito; Santos, Rhavena Barbosa Dos; Margonari, Carina

    2018-01-01

    Vulnerability, understood as the propensity to be adversely affected, has attained importance in the context of climate change by helping to understand what makes populations and territories predisposed to its impacts. Conditions of vulnerability may vary depending on the characteristics of each territory studied-social, environmental, infrastructural, public policies, among others. Thus, the present study aimed to evaluate what makes the municipalities of the state of Amazonas, Brazil, vulnerable to climate change in the context of the largest tropical forest in the world, and which regions of the State are the most susceptible. A Municipal Vulnerability Index was developed, which was used to associate current socio-environmental characteristics of municipalities with climate change scenarios in order to identify those that may be most affected by climate change. The results showed that poor adaptive capacity and poverty had the most influence on current vulnerability of the municipalities of Amazonas with the most vulnerable areas being the southern, northern, and eastern regions of the state. When current vulnerability was related to future climate change projections, the most vulnerable areas were the northern, northeastern, extreme southern, and southwestern regions. From a socio-environmental and climatic point of view, these regions should be a priority for public policy efforts to reduce their vulnerability and prepare them to cope with the adverse aspects of climate change.

  12. Mapping human vulnerability to climate change in the Brazilian Amazon: The construction of a municipal vulnerability index.

    Directory of Open Access Journals (Sweden)

    Júlia Alves Menezes

    Full Text Available Vulnerability, understood as the propensity to be adversely affected, has attained importance in the context of climate change by helping to understand what makes populations and territories predisposed to its impacts. Conditions of vulnerability may vary depending on the characteristics of each territory studied-social, environmental, infrastructural, public policies, among others. Thus, the present study aimed to evaluate what makes the municipalities of the state of Amazonas, Brazil, vulnerable to climate change in the context of the largest tropical forest in the world, and which regions of the State are the most susceptible. A Municipal Vulnerability Index was developed, which was used to associate current socio-environmental characteristics of municipalities with climate change scenarios in order to identify those that may be most affected by climate change. The results showed that poor adaptive capacity and poverty had the most influence on current vulnerability of the municipalities of Amazonas with the most vulnerable areas being the southern, northern, and eastern regions of the state. When current vulnerability was related to future climate change projections, the most vulnerable areas were the northern, northeastern, extreme southern, and southwestern regions. From a socio-environmental and climatic point of view, these regions should be a priority for public policy efforts to reduce their vulnerability and prepare them to cope with the adverse aspects of climate change.

  13. Vulnerability of children: More than a question of age

    International Nuclear Information System (INIS)

    Hutton, D.

    2010-01-01

    The vulnerability of children in disasters is well-established. Children are at greater risk of the impacts of disasters because of both their age and level of physiological, anatomical, cognitive and emotional development. Frequently overlooked, however, is the influence of other social and health determinants. This article highlights the importance of family and household income in determining the ability of children to withstand the shocks of catastrophic events. Children raised in lower income families are made disadvantaged in multiple ways; by poor living and neighbourhood conditions, less stable home environments, as well as lower levels of education and health care. During disasters, lower income families and children suffer disproportionately, both because they are frequently the hardest hit but also because they have fewer resources with which to cope. The article emphasises not only the importance of understanding the vulnerability of children within a broader family context, but a continuing requirement for public health and emergency planners to integrate more fully the diverse needs of children and families into emergency preparedness policies and plans. (authors)

  14. Landscape Hazards in Yukon Communities: Geological Mapping for Climate Change Adaptation Planning

    Science.gov (United States)

    Kennedy, K.; Kinnear, L.

    2010-12-01

    Climate change is considered to be a significant challenge for northern communities where the effects of increased temperature and climate variability are beginning to affect infrastructure and livelihoods (Arctic Climate Impact Assessment, 2004). Planning for and adapting to ongoing and future changes in climate will require the identification and characterization of social, economic, cultural, political and biophysical vulnerabilities. This pilot project addresses physical landscape vulnerabilities in two communities in the Yukon Territory through community-scale landscape hazard mapping and focused investigations of community permafrost conditions. Landscape hazards are identified by combining pre-existing data from public utilities and private-sector consultants with new geophysical techniques (ground penetrating radar and electrical resistivity), shallow drilling, surficial geological mapping, and permafrost characterization. Existing landscape vulnerabilities are evaluated based on their potential for hazard (low, medium or high) under current climate conditions, as well as under future climate scenarios. Detailed hazard maps and landscape characterizations for both communities will contribute to overall adaptation plans and allow for informed development, planning and mitigation of potentially threatening hazards in and around the communities.

  15. Recruiting vulnerable populations into research: a systematic review of recruitment interventions.

    Science.gov (United States)

    UyBico, Stacy J; Pavel, Shani; Gross, Cary P

    2007-06-01

    Members of vulnerable populations are underrepresented in research studies. To evaluate and synthesize the evidence regarding interventions to enhance enrollment of vulnerable populations into health research studies. Studies were identified by searching MEDLINE, the Web of Science database, personal sources, hand searching of related journals, and article references. Studies that contained data on recruitment interventions for vulnerable populations (minority, underserved, poor, rural, urban, or inner city) and for which the parent study (study for which recruitment was taking place) was an intervention study were included. A total of 2,648 study titles were screened and 48 articles met inclusion criteria, representing 56 parent studies. Two investigators extracted data from each study. African Americans were the most frequently targeted population (82% of the studies), while 46% targeted Hispanics/Latinos. Many studies assessed 2 or more interventions, including social marketing (82% of studies), community outreach (80%), health system recruitment (52%), and referrals (28%). The methodologic rigor varied substantially. Only 40 studies (71%) incorporated a control group and 21% used statistical analysis to compare interventions. Social marketing, health system, and referral recruitment were each found to be the most successful intervention about 35-45% of the studies in which they were attempted, while community outreach was the most successful intervention in only 2 of 16 studies (13%) in which it was employed. People contacted as a result of social marketing were no less likely to enroll than people contacted through other mechanisms. Further work with greater methodologic rigor is needed to identify evidence-based strategies for increasing minority enrollment in research studies; community outreach, as an isolated strategy, may be less successful than other strategies.

  16. Research on seal control systems for international nuclear safeguard and the vulnerability assessment on the seals

    International Nuclear Information System (INIS)

    Zhang Hongjian; Liu Tianshu; Cao Fangfang; Xu Chunyan

    2014-01-01

    Safeguard seals, also called Tamper-indicating devices (TIDs), are widely used to detect tampering or unauthorized entry in the international safeguard and security systems, Seal control systems consist of seal implementing plan, seal development and the vulnerability assessment on tbe seals, effective implementing procedures and methods of the seals. The vulnerability assessment contents of safeguard seals, thermo-shrinked film seals being as an example, and seals control systems in the implementation program are researched. The seal control systems discuss task assignment, seals management flow and seals program data flow to promote applying effectively seals. The vulnerability assessment program of seals studies assurance level to some different tampering techniques and measures. The researches must promote utilizing seals effectively for nuclear security, non-proliferation of nuclear weapons, radioactive waste management, and the nuclear material accounting and control. (authors)

  17. The geography of post-disaster mental health: spatial patterning of psychological vulnerability and resilience factors in New York City after Hurricane Sandy.

    Science.gov (United States)

    Gruebner, Oliver; Lowe, Sarah R; Sampson, Laura; Galea, Sandro

    2015-06-10

    factors differently across different regional contexts. Our spatial epidemiological approach is transferable to other regions around the globe and, in the light of a changing climate, could be used to strengthen the psychosocial resources of demographic groups at greatest risk of adverse outcomes pre-disaster. In the aftermath of a disaster, the approach can be used to identify survivors at greatest risk and to plan for targeted interventions to reach them.

  18. Transformation of a virtual action plan into a motor plan in the premotor cortex.

    Science.gov (United States)

    Nakayama, Yoshihisa; Yamagata, Tomoko; Tanji, Jun; Hoshi, Eiji

    2008-10-08

    Before preparing to initiate a forthcoming motion, we often acquire information about the future action without specifying actual motor parameters. The information for planning an action at this conceptual level can be provided with verbal commands or nonverbal signals even before the associated motor targets are visible. Under these conditions, the information signifying a virtual action plan must be transformed to information that can be used for constructing a motor plan to initiate specific movements. To determine whether the premotor cortex is involved in this process, we examined neuronal activity in the dorsal premotor cortex (PMd) of monkeys performing a behavioral task designed to isolate the behavioral stages of the acquisition of information for a future action and the construction of a motor plan. We trained the animals to receive a symbolic instruction (color and shape of an instruction cue) to determine whether to select the right or left of targets to reach, despite the physical absence of targets. Subsequently, two targets appeared on a screen at different locations. The animals then determined the correct target (left or right) based on the previous instruction and prepared to initiate a reaching movement to an actual target. The experimental design dissociated the selection of the right/left at an abstract level (action plan) from the physical motor plan. Here, we show that activity of individual PMd neurons initially reflects a virtual action plan transcending motor specifics, before these neurons contribute to a transformation process that leads to activity encoding a motor plan.

  19. The role of microcredit in reducing women's vulnerabilities to multiple disasters.

    Science.gov (United States)

    Ray-Bennett, Nibedita S

    2010-01-01

    This article explores the relationship between microcredit and vulnerability reduction for women-headed households in'multiple disasters'. Here multiple disasters are understood as disasters that occur in one specific place and cause severe devastation. The case study covers the super-cyclone in 1999, floods in 2001 and 2003, and drought in 2002 in Orissa, India. The study entailed eight months fieldwork and interviews with several governmental and non-governmental officials and 12 women-headed households from different social castes. The findings suggest that microcredit is a useful tool to replace women's livelihood assets that have been lost in multiple disasters. But inefficient microcredit delivery can cause microdebts and exacerbate caste, class and gender inequalities. It is posited that microcredit delivery cannot achieve vulnerability reduction for women in multiple disasters unless it is complemented by effective financial services, integrated policy planning and disaster management between government, non-governmental organisations and the community.

  20. No Pet or Their Person Left Behind: Increasing the Disaster Resilience of Vulnerable Groups through Animal Attachment, Activities and Networks

    Directory of Open Access Journals (Sweden)

    Kirrilly Thompson

    2014-05-01

    Full Text Available Increased vulnerability to natural disasters has been associated with particular groups in the community. This includes those who are considered de facto vulnerable (children, older people, those with disabilities etc. and those who own pets (not to mention pets themselves. The potential for reconfiguring pet ownership from a risk factor to a protective factor for natural disaster survival has been recently proposed. But how might this resilience-building proposition apply to vulnerable members of the community who own pets or other animals? This article addresses this important question by synthesizing information about what makes particular groups vulnerable, the challenges to increasing their resilience and how animals figure in their lives. Despite different vulnerabilities, animals were found to be important to the disaster resilience of seven vulnerable groups in Australia. Animal attachment and animal-related activities and networks are identified as underexplored devices for disseminating or ‘piggybacking’ disaster-related information and engaging vulnerable people in resilience building behaviors (in addition to including animals in disaster planning initiatives in general. Animals may provide the kind of innovative approach required to overcome the challenges in accessing and engaging vulnerable groups. As the survival of humans and animals are so often intertwined, the benefits of increasing the resilience of vulnerable communities through animal attachment is twofold: human and animal lives can be saved together.

  1. No Pet or Their Person Left Behind: Increasing the Disaster Resilience of Vulnerable Groups through Animal Attachment, Activities and Networks.

    Science.gov (United States)

    Thompson, Kirrilly; Every, Danielle; Rainbird, Sophia; Cornell, Victoria; Smith, Bradley; Trigg, Joshua

    2014-05-07

    Increased vulnerability to natural disasters has been associated with particular groups in the community. This includes those who are considered de facto vulnerable (children, older people, those with disabilities etc.) and those who own pets (not to mention pets themselves). The potential for reconfiguring pet ownership from a risk factor to a protective factor for natural disaster survival has been recently proposed. But how might this resilience-building proposition apply to vulnerable members of the community who own pets or other animals? This article addresses this important question by synthesizing information about what makes particular groups vulnerable, the challenges to increasing their resilience and how animals figure in their lives. Despite different vulnerabilities, animals were found to be important to the disaster resilience of seven vulnerable groups in Australia. Animal attachment and animal-related activities and networks are identified as underexplored devices for disseminating or 'piggybacking' disaster-related information and engaging vulnerable people in resilience building behaviors (in addition to including animals in disaster planning initiatives in general). Animals may provide the kind of innovative approach required to overcome the challenges in accessing and engaging vulnerable groups. As the survival of humans and animals are so often intertwined, the benefits of increasing the resilience of vulnerable communities through animal attachment is twofold: human and animal lives can be saved together.

  2. Mining Bug Databases for Unidentified Software Vulnerabilities

    Energy Technology Data Exchange (ETDEWEB)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  3. An Analysis of Plan Robustness for Esophageal Tumors: Comparing Volumetric Modulated Arc Therapy Plans and Spot Scanning Proton Planning

    International Nuclear Information System (INIS)

    Warren, Samantha; Partridge, Mike; Bolsi, Alessandra; Lomax, Anthony J.; Hurt, Chris; Crosby, Thomas; Hawkins, Maria A.

    2016-01-01

    Purpose: Planning studies to compare x-ray and proton techniques and to select the most suitable technique for each patient have been hampered by the nonequivalence of several aspects of treatment planning and delivery. A fair comparison should compare similarly advanced delivery techniques from current clinical practice and also assess the robustness of each technique. The present study therefore compared volumetric modulated arc therapy (VMAT) and single-field optimization (SFO) spot scanning proton therapy plans created using a simultaneous integrated boost (SIB) for dose escalation in midesophageal cancer and analyzed the effect of setup and range uncertainties on these plans. Methods and Materials: For 21 patients, SIB plans with a physical dose prescription of 2 Gy or 2.5 Gy/fraction in 25 fractions to planning target volume (PTV)_5_0_G_y or PTV_6_2_._5_G_y (primary tumor with 0.5 cm margins) were created and evaluated for robustness to random setup errors and proton range errors. Dose–volume metrics were compared for the optimal and uncertainty plans, with P<.05 (Wilcoxon) considered significant. Results: SFO reduced the mean lung dose by 51.4% (range 35.1%-76.1%) and the mean heart dose by 40.9% (range 15.0%-57.4%) compared with VMAT. Proton plan robustness to a 3.5% range error was acceptable. For all patients, the clinical target volume D_9_8 was 95.0% to 100.4% of the prescribed dose and gross tumor volume (GTV) D_9_8 was 98.8% to 101%. Setup error robustness was patient anatomy dependent, and the potential minimum dose per fraction was always lower with SFO than with VMAT. The clinical target volume D_9_8 was lower by 0.6% to 7.8% of the prescribed dose, and the GTV D_9_8 was lower by 0.3% to 2.2% of the prescribed GTV dose. Conclusions: The SFO plans achieved significant sparing of normal tissue compared with the VMAT plans for midesophageal cancer. The target dose coverage in the SIB proton plans was less robust to random setup errors and might be

  4. An Analysis of Plan Robustness for Esophageal Tumors: Comparing Volumetric Modulated Arc Therapy Plans and Spot Scanning Proton Planning

    Energy Technology Data Exchange (ETDEWEB)

    Warren, Samantha, E-mail: samantha.warren@oncology.ox.ac.uk [Cancer Research UK/Medical Research Council Oxford Institute for Radiation Oncology, Gray Laboratories, University of Oxford, Oxford (United Kingdom); Partridge, Mike [Cancer Research UK/Medical Research Council Oxford Institute for Radiation Oncology, Gray Laboratories, University of Oxford, Oxford (United Kingdom); Bolsi, Alessandra; Lomax, Anthony J. [Centre for Proton Therapy, Paul Scherrer Institute, Villigen (Switzerland); Hurt, Chris [Wales Cancer Trials Unit, School of Medicine, Heath Park, Cardiff (United Kingdom); Crosby, Thomas [Velindre Cancer Centre, Velindre Hospital, Cardiff (United Kingdom); Hawkins, Maria A. [Cancer Research UK/Medical Research Council Oxford Institute for Radiation Oncology, Gray Laboratories, University of Oxford, Oxford (United Kingdom)

    2016-05-01

    Purpose: Planning studies to compare x-ray and proton techniques and to select the most suitable technique for each patient have been hampered by the nonequivalence of several aspects of treatment planning and delivery. A fair comparison should compare similarly advanced delivery techniques from current clinical practice and also assess the robustness of each technique. The present study therefore compared volumetric modulated arc therapy (VMAT) and single-field optimization (SFO) spot scanning proton therapy plans created using a simultaneous integrated boost (SIB) for dose escalation in midesophageal cancer and analyzed the effect of setup and range uncertainties on these plans. Methods and Materials: For 21 patients, SIB plans with a physical dose prescription of 2 Gy or 2.5 Gy/fraction in 25 fractions to planning target volume (PTV){sub 50Gy} or PTV{sub 62.5Gy} (primary tumor with 0.5 cm margins) were created and evaluated for robustness to random setup errors and proton range errors. Dose–volume metrics were compared for the optimal and uncertainty plans, with P<.05 (Wilcoxon) considered significant. Results: SFO reduced the mean lung dose by 51.4% (range 35.1%-76.1%) and the mean heart dose by 40.9% (range 15.0%-57.4%) compared with VMAT. Proton plan robustness to a 3.5% range error was acceptable. For all patients, the clinical target volume D{sub 98} was 95.0% to 100.4% of the prescribed dose and gross tumor volume (GTV) D{sub 98} was 98.8% to 101%. Setup error robustness was patient anatomy dependent, and the potential minimum dose per fraction was always lower with SFO than with VMAT. The clinical target volume D{sub 98} was lower by 0.6% to 7.8% of the prescribed dose, and the GTV D{sub 98} was lower by 0.3% to 2.2% of the prescribed GTV dose. Conclusions: The SFO plans achieved significant sparing of normal tissue compared with the VMAT plans for midesophageal cancer. The target dose coverage in the SIB proton plans was less robust to random setup

  5. TARGET PLANNING OF THE PHYSICAL EDUCATIONT

    Directory of Open Access Journals (Sweden)

    Drago Milošević

    2010-03-01

    Full Text Available The reformed educational-erudition system in Montenegro, based on the contemporary social and scientific achievements in all of the fields of the humans interests, is directed to improve the quality of life standards, especially of the children and the students in the contemporary social relationships. In that way the common responsibility of the educational-erudition institution becomes more important to be able of giving the best answers to the every day problems of the contemporary way of life. It is obvious that in that way the responsibility related to the designing, followed by the realization of the plans and programs for every educational-erudition field and at the all level of erudition and education increases, which certainly means the designing and the realization of the plan and program in the physical education, too, as an integral part of the educational-erudition field. From the physical education by itself is requested the concrete contribution in the preparation of the qualification of the children and the students for their active participation in the every day life and working in the contemporary society. Didactics-methodical scientific and practical achievements in the physical education are to be at a such level that they can successfully answer to the challanges of the modern planning and programing methodology. The science and practical experience, treated the problems of the physical education, have at disposition the numerous information about the values of the physical activities which by themselves could influence to the changes of some dimensions of the students anthropology’s status, satisfaction of their wishes and necessity, as to the application of the different forms of the physical activities in every day life and work. They induce to the conclusion that the planning and programing, in fact, is the base for teaching (out-teaching and extra-scholar activities of the physical education suitable for the students

  6. Open Source Vulnerability Database Project

    Directory of Open Access Journals (Sweden)

    Jake Kouns

    2008-06-01

    Full Text Available This article introduces the Open Source Vulnerability Database (OSVDB project which manages a global collection of computer security vulnerabilities, available for free use by the information security community. This collection contains information on known security weaknesses in operating systems, software products, protocols, hardware devices, and other infrastructure elements of information technology. The OSVDB project is intended to be the centralized global open source vulnerability collection on the Internet.

  7. High-Frequency Jet Ventilation for Complete Target Immobilization and Reduction of Planning Target Volume in Stereotactic High Single-Dose Irradiation of Stage I Non-Small Cell Lung Cancer and Lung Metastases

    International Nuclear Information System (INIS)

    Fritz, Peter; Kraus, Hans-Joerg; Muehlnickel, Werner; Sassmann, Volker; Hering, Werner; Strauch, Konstantin

    2010-01-01

    Purpose: To demonstrate the feasibility of complete target immobilization by means of high-frequency jet ventilation (HFJV); and to show that the saving of planning target volume (PTV) on the stereotactic body radiation therapy (SBRT) under HFJV, compared with SBRT with respiratory motion, can be predicted with reliable accuracy by computed tomography (CT) scans at peak inspiration phase. Methods and Materials: A comparison regarding different methods for defining the PTV was carried out in 22 patients with tumors that clearly moved with respiration. A movement span of the gross tumor volume (GTV) was defined by fusing respiration-correlated CT scans. The PTV enclosed the GTV positions with a safety margin throughout the breathing cycle. To create a PTV from CT scans acquired under HFJV, the same margins were drawn around the immobilized target. In addition, peak inspiration phase CT images (PIP-CTs) were used to approximate a target immobilized by HFJV. Results: The resulting HFJV-PTVs were between 11.6% and 45.4% smaller than the baseline values calculated as respiration-correlated CT-PTVs (median volume reduction, 25.4%). Tentative planning by means of PIP-CT PTVs predicted that in 19 of 22 patients, use of HFJV would lead to a reduction in volume of ≥20%. Using this threshold yielded a positive predictive value of 0.89, as well as a sensitivity of 0.94 and a specificity of 0.5. Conclusions: In all patients, SBRT under HFJV provided a reliable immobilization of the GTVs and achieved a reduction in PTVs, regardless of patient compliance. Tentative planning facilitated the selection of patients who could better undergo radiation in respiratory standstill, both with greater accuracy and lung protection.

  8. Social vulnerability in the flood-prone anthropogenic landscape of Northern Italy

    Science.gov (United States)

    Roder, Giulia; Sofia, Giulia; Wu, Zhifeng; Tarolli, Paolo

    2017-04-01

    The practices for reducing the impacts of floods are becoming more and more advanced, centred to the communities and reached out to vulnerable populations. Vulnerable individuals are characterised by different social and economic attributes that can alter their capacity to cope with disaster events. The Social Vulnerability Index (Cutter et al. 2003) provides an empirical basis to compare social variances in different spatial scenarios and environmental threats. This methodology has been readjusted to the flood-prone anthropogenic landscape of Northern Italy adapted to the societal and historical construction of this area. In fact, the fifteen census variables used have been contextualised by examining the economic crisis, the modification of the labour force, the gendered life expectancy, the immigration among much more. At a general consideration, the unstable economic status, the population growth, age, and ethnicity are the major social attributes affecting the residents of the floodplain. The cluster analysis performed by the calculation of univariate LISA ratifies the spatial distribution of the index (Moran's I of 0.39 showing a positive correlation) finding the main high-high clusters in the Western and the outlet of the Po River basin. This basin includes one-third of the Italian population and this anthropogenic footprint has consistently modified the basin natural and geological environment (Carminati and Martinelli 2002) to the point that the hydraulic system will be dramatically altered in the future (Dankers and Feyen 2008). The spatial identification and the inclusion of vulnerable people into the risk management planning process have been widely discussed in the Sendai Framework for Disaster Risk Reduction. For this reason, we analysed the flood risk resulting from the combination of high vulnerable areas with the highest flood hazard scenario. The hazard map, finalised in May 2015, has been provided by ISPRA Institute with a three-class flood

  9. A geometrically based method for automated radiosurgery planning

    International Nuclear Information System (INIS)

    Wagner, Thomas H.; Yi Taeil; Meeks, Sanford L.; Bova, Francis J.; Brechner, Beverly L.; Chen Yunmei; Buatti, John M.; Friedman, William A.; Foote, Kelly D.; Bouchet, Lionel G.

    2000-01-01

    Purpose: A geometrically based method of multiple isocenter linear accelerator radiosurgery treatment planning optimization was developed, based on a target's solid shape. Methods and Materials: Our method uses an edge detection process to determine the optimal sphere packing arrangement with which to cover the planning target. The sphere packing arrangement is converted into a radiosurgery treatment plan by substituting the isocenter locations and collimator sizes for the spheres. Results: This method is demonstrated on a set of 5 irregularly shaped phantom targets, as well as a set of 10 clinical example cases ranging from simple to very complex in planning difficulty. Using a prototype implementation of the method and standard dosimetric radiosurgery treatment planning tools, feasible treatment plans were developed for each target. The treatment plans generated for the phantom targets showed excellent dose conformity and acceptable dose homogeneity within the target volume. The algorithm was able to generate a radiosurgery plan conforming to the Radiation Therapy Oncology Group (RTOG) guidelines on radiosurgery for every clinical and phantom target examined. Conclusions: This automated planning method can serve as a valuable tool to assist treatment planners in rapidly and consistently designing conformal multiple isocenter radiosurgery treatment plans.

  10. Developing a probability-based model of aquifer vulnerability in an agricultural region

    Science.gov (United States)

    Chen, Shih-Kai; Jang, Cheng-Shin; Peng, Yi-Huei

    2013-04-01

    SummaryHydrogeological settings of aquifers strongly influence the regional groundwater movement and pollution processes. Establishing a map of aquifer vulnerability is considerably critical for planning a scheme of groundwater quality protection. This study developed a novel probability-based DRASTIC model of aquifer vulnerability in the Choushui River alluvial fan, Taiwan, using indicator kriging and to determine various risk categories of contamination potentials based on estimated vulnerability indexes. Categories and ratings of six parameters in the probability-based DRASTIC model were probabilistically characterized according to the parameter classification methods of selecting a maximum estimation probability and calculating an expected value. Moreover, the probability-based estimation and assessment gave us an excellent insight into propagating the uncertainty of parameters due to limited observation data. To examine the prediction capacity of pollutants for the developed probability-based DRASTIC model, medium, high, and very high risk categories of contamination potentials were compared with observed nitrate-N exceeding 0.5 mg/L indicating the anthropogenic groundwater pollution. The analyzed results reveal that the developed probability-based DRASTIC model is capable of predicting high nitrate-N groundwater pollution and characterizing the parameter uncertainty via the probability estimation processes.

  11. Can Plan Recommendations Improve the Coverage Decisions of Vulnerable Populations in Health Insurance Marketplaces?

    Directory of Open Access Journals (Sweden)

    Andrew J Barnes

    Full Text Available The Affordable Care Act's marketplaces present an important opportunity for expanding coverage but consumers face enormous challenges in navigating through enrollment and re-enrollment. We tested the effectiveness of a behaviorally informed policy tool--plan recommendations--in improving marketplace decisions.Data were gathered from a community sample of 656 lower-income, minority, rural residents of Virginia.We conducted an incentive-compatible, computer-based experiment using a hypothetical marketplace like the one consumers face in the federally-facilitated marketplaces, and examined their decision quality. Participants were randomly assigned to a control condition or three types of plan recommendations: social normative, physician, and government. For participants randomized to a plan recommendation condition, the plan that maximized expected earnings, and minimized total expected annual health care costs, was recommended.Primary data were gathered using an online choice experiment and questionnaire.Plan recommendations resulted in a 21 percentage point increase in the probability of choosing the earnings maximizing plan, after controlling for participant characteristics. Two conditions, government or providers recommending the lowest cost plan, resulted in plan choices that lowered annual costs compared to marketplaces where no recommendations were made.As millions of adults grapple with choosing plans in marketplaces and whether to switch plans during open enrollment, it is time to consider marketplace redesigns and leverage insights from the behavioral sciences to facilitate consumers' decisions.

  12. Can Plan Recommendations Improve the Coverage Decisions of Vulnerable Populations in Health Insurance Marketplaces?

    Science.gov (United States)

    Barnes, Andrew J; Hanoch, Yaniv; Rice, Thomas

    2016-01-01

    The Affordable Care Act's marketplaces present an important opportunity for expanding coverage but consumers face enormous challenges in navigating through enrollment and re-enrollment. We tested the effectiveness of a behaviorally informed policy tool--plan recommendations--in improving marketplace decisions. Data were gathered from a community sample of 656 lower-income, minority, rural residents of Virginia. We conducted an incentive-compatible, computer-based experiment using a hypothetical marketplace like the one consumers face in the federally-facilitated marketplaces, and examined their decision quality. Participants were randomly assigned to a control condition or three types of plan recommendations: social normative, physician, and government. For participants randomized to a plan recommendation condition, the plan that maximized expected earnings, and minimized total expected annual health care costs, was recommended. Primary data were gathered using an online choice experiment and questionnaire. Plan recommendations resulted in a 21 percentage point increase in the probability of choosing the earnings maximizing plan, after controlling for participant characteristics. Two conditions, government or providers recommending the lowest cost plan, resulted in plan choices that lowered annual costs compared to marketplaces where no recommendations were made. As millions of adults grapple with choosing plans in marketplaces and whether to switch plans during open enrollment, it is time to consider marketplace redesigns and leverage insights from the behavioral sciences to facilitate consumers' decisions.

  13. Tsunami survivors' perspectives on vulnerability and vulnerability reduction: evidence from Koh Phi Phi Don and Khao Lak, Thailand.

    Science.gov (United States)

    Steckley, Marylynn; Doberstein, Brent

    2011-07-01

    This paper presents the results of primary research with 40 survivors of the 2004 Indian Ocean tsunami in two communities: Khao Lak (n=20) and Koh Phi Phi Don (n=20), Thailand. It traces tsunami survivors' perceptions of vulnerability, determines whether residents felt that the tsunami affected different communities differently, identifies the populations and sub-community groups that survivors distinguished as being more vulnerable than others, highlights community-generated ideas about vulnerability reduction, and pinpoints a range of additional vulnerability reduction actions. Tsunami survivors most consistently identified the 'most vulnerable' community sub-populations as women, children, the elderly, foreigners, and the poor. In Khao Lak, however, respondents added 'Burmese migrants' to this list, whereas in Koh Phi Phi Don, they added 'Thai Muslims'. Results suggest that the two case study communities, both small, coastal, tourism-dominated communities no more than 100 kilometres apart, have differing vulnerable sub-groups and environmental vulnerabilities, requiring different post-disaster vulnerability reduction efforts. © 2011 The Author(s). Disasters © Overseas Development Institute, 2011.

  14. Plutonium working group report on environmental, safety and health vulnerabilities associated with the department's plutonium storage. Volume II, part 12: Working group assessment team report

    International Nuclear Information System (INIS)

    1994-09-01

    The Secretary of Energy's memorandum of March 15, 1994, established an initiative for a Department-wide assessment of the ES ampersand H vulnerabilities of the inventory of plutonium (Pu) in storage. Pu in intact nuclear weapons, spent fuel and transuranic (TRU) waste not colocated with other Pu was excluded from this assessment. The DOE Plutonium Vulnerability Working Group, which was formed for this purpose and produced the Project and Assessment Plans, will also manage the overall DOE complex assessments and produce a final report for the Secretary of Energy by September 30, 1994. The Project Plan and Assessment Plan for this assessment, and which established responsibilities for personnel essential to the study, were issued on April 25, 1994. This report contains the assessment of the Pantex Plant

  15. Cotton genetic resources and crop vulnerability

    Science.gov (United States)

    A report on the genetic vulnerability of cotton was provided to the National Genetic Resources Advisory Council. The report discussed crop vulnerabilities associated with emerging diseases, emerging pests, and a narrowing genetic base. To address these crop vulnerabilities, the report discussed the ...

  16. Vulnerability and resilience: a critical nexus.

    Science.gov (United States)

    Lotz, Mianna

    2016-02-01

    Not all forms of human fragility or vulnerability are unavoidable. Sometimes we knowingly and intentionally impose conditions of vulnerability on others; and sometimes we knowingly and intentionally enter into and assume conditions of vulnerability for ourselves (for example, when we decide to trust or forgive, enter into intimate relationships with others, become a parent, become a subject of medical or psychotherapeutic treatment, and the like). In this article, I propose a presently overlooked basis on which one might evaluate whether the imposition or assumption of vulnerability is acceptable, and on which one might ground a significant class of vulnerability-related obligations. Distinct from existing accounts of the importance of promoting autonomy in conditions of vulnerability, this article offers a preliminary exploration of the nature, role, and importance of resilience promotion, its relationship to autonomy promotion, and its prospects for improving human wellbeing in autonomy inhibiting conditions.

  17. Social Vulnerability to Natural Hazards in Urban Systems. An Application in Santo Domingo (Dominican Republic

    Directory of Open Access Journals (Sweden)

    Eleonora Giovene di Girasole

    2017-11-01

    Full Text Available The concept of risk has become increasingly complex, and has been used not only in relation to the natural features of a region, but also to its socio-economic context. In this conceptualization, the latter directly influences the capacity of a community to cope with, recover from, and adapt to natural hazards. Conceiving vulnerability as a measure of a socio-ecological system’s resilience, and at the same time, as a multidimensional variable that changes in space and time, makes the study of the different ways in which natural hazards impact on society all the more urgent. This is particularly true for developing countries, where risk related to natural hazards affects populations and areas that must deal with stress conditions, such as humanitarian, social and military emergencies. This article presents a methodology for the analysis of social vulnerability, defined and experimented in the context of the international cooperation project “Estudio de la amenaza sísmica y vulnerabilidad física del Gran Santo Domingo”. The methodology, implemented through the employment of a Geographic Information System, led to the elaboration of a “Social Vulnerability Index” and a “Social Vulnerability Map”. These seek to describe the current condition of vulnerability of the city of Santo Domingo de Guzmán (Distrito Nacional in the Dominican Republic (DR, and are used to define context-related vulnerability scenarios, as well as to indicate the adequate set of mitigation objectives and actions. The results highlight the importance of using social vulnerability study as the point of departure for defining seismic-risk mitigation policies, emergency management, and territorial planning in order to reduce the impacts of disasters.

  18. Vulnerability of Thai rice production to simultaneous climate and socioeconomic changes: a double exposure analysis

    Science.gov (United States)

    Sangpenchan, R.

    2011-12-01

    This research explores the vulnerability of Thai rice production to simultaneous exposure by climate and socioeconomic change -- so-called "double exposure." Both processes influence Thailand's rice production system, but the vulnerabilities associated with their interactions are unknown. To understand this double exposure, I adopts a mixed-method, qualitative-quantitative analytical approach consisting of three phases of analysis involving a Vulnerability Scoping Diagram, a Principal Component Analysis, and the EPIC crop model using proxy datasets collected from secondary data sources at provincial scales.The first and second phases identify key variables representing each of the three dimensions of vulnerability -- exposure, sensitivity, and adaptive capacity indicating that the greatest vulnerability in the rice production system occurs in households and areas with high exposure to climate change, high sensitivity to climate and socioeconomic stress, and low adaptive capacity. In the third phase, the EPIC crop model simulates rice yields associated with future climate change projected by CSIRO and MIROC climate models. Climate change-only scenarios project the decrease in yields by 10% from the current productivity during 2016-2025 and 30% during 2045-2054. Scenarios applying both climate change and improved technology and management practices show that a 50% increase in rice production is possible, but requires strong collaboration between sectors to advance agricultural research and technology and requires strong adaptive capacity in the rice production system characterized by well-developed social capital, social networks, financial capacity, and infrastructure and household mobility at the local scale. The vulnerability assessment and climate and crop adaptation simulations used here provide useful information to decision makers developing vulnerability reduction plans in the face of concurrent climate and socioeconomic change.

  19. Point Climat no. 21 'Regional wind power plans: is there enough wind to reach the Grenelle wind power targets?'

    International Nuclear Information System (INIS)

    Bordier, Cecile; Charentenay, Jeremie de

    2012-01-01

    Among the publications of CDC Climat Research, 'Climate Briefs' presents, in a few pages, hot topics in climate change policy. This issue addresses the following points: Regional wind power plans assess the wind power development potential of every French region. The aggregate regional potential largely exceeds national targets for 2020. However, achieving these targets is still far from guaranteed: the forecasted potential is theoretical, and the issues involved in implementing wind power projects on the ground will likely reduce this potential

  20. Examining occupational health and safety vulnerability among Canadian workers with disabilities.

    Science.gov (United States)

    Breslin, F Curtis; Lay, A Morgan; Jetha, Arif; Smith, Peter

    2017-05-26

    To compare workers with and without disabilities on their reported workplace hazard exposure and the presence of occupational health and safety vulnerability factors. Working-aged adults in Ontario or British Columbia were recruited to participate in a cross-sectional survey (n = 1988). Self-reported measures included demographic factors, work-related variables, perceived level of activity limitation at work, and presence of work safety vulnerability factors utilizing a novel framework. Reporting a disability at work was significantly associated with greater hazard exposure than those without a disability. In addition, those reporting a disability at work were more likely to be employed in conditions where hazard exposure was combined with inadequate policies and procedures, or hazard exposures were combined with inadequate empowerment. Work safety vulnerability is one way that health inequalities can be perpetuated even among those with disabilities who have found work. Our results suggest that employers and policy makers need to focus on assessing and addressing hazard exposures and targeting occupational health and safety resources in the workplace in a way that includes workers with disabilities. Implications for Rehabilitation Workers with disabilities experience greater hazard exposure than those without a disability. Those with moderate and severe disabilities reported occupational health and safety vulnerability, suggesting that workplace accommodations should be available to a broader range of disability levels. It appears that, above and beyond standard safety procedures, providing workplace accommodations for people with disabilities may further reduce their hazard exposure and improve their safety.

  1. Marketing communication plan. Case: EKOenergy.

    OpenAIRE

    Jäkälä, Elina

    2016-01-01

    This project-based thesis has an objective of creating a marketing communication plan for a non-profit organisation. The marketing communication plan targets other non-profit organisa-tions that the case organisation wants to cooperate with. This thesis will introduce theory about marketing communication, give information about the case organisation’s target audience and present the actual marketing communication plan. Since the case organisation and its target audience are all non-profit...

  2. Edgeware Security Risk Management: A Three Essay Thesis on Cloud, Virtualization and Wireless Grid Vulnerabilities

    Science.gov (United States)

    Brooks, Tyson T.

    2013-01-01

    This thesis identifies three essays which contribute to the foundational understanding of the vulnerabilities and risk towards potentially implementing wireless grid Edgeware technology in a virtualized cloud environment. Since communication networks and devices are subject to becoming the target of exploitation by hackers (e.g. individuals who…

  3. VT - Vermont Social Vulnerability Index

    Data.gov (United States)

    Vermont Center for Geographic Information — Social vulnerability refers to the resilience of communities when responding to or recovering from threats to public health. The Vermont Social Vulnerability Index...

  4. [Vulnerability to depression in children and adolescents: update and perspectives].

    Science.gov (United States)

    Purper-Ouakil, D; Michel, G; Mouren-Siméoni, M-C

    2002-01-01

    Depression in children and adolescents is associated with poor psychosocial functioning, high psychiatric comorbidity, risk of recurrent episodes or onset of bipolar disorder. These findings emphasize the importance of early identification of children and adolescents having elevated risk for future depression and further development, evaluation and greater availability of prevention strategies. Our review aims an update about depressive vulnerability in children and adolescents in the perspective of better identification of at-risk populations and targeting of prevention programs. Psychopathology, in particular anxiety and disruptive disorders are well identified risk-factors for later depression. Subclinical depressive symptomatology, also termed "demoralization", also identifies high-risk populations, likely to become incident cases of depression. It is still unclear whether this condition is prodromal depression, a specific clinical entity or the expression of biological and/or cognitive vulnerability. Familial risk for depressive disorders involves both genetic and psychosocial factors. Marital discord, poor communication and dysfunctional parenting practices are often present in families with affective disorders and can be implicated in increased depressive vulnerability in the offspring. Research on individual vulnerability in children and adolescents has focused on temperamental and cognitive characteristics. Temperament traits describe individual differences in reactivity and behavior. High emotionality, defined as the tendency to become upset easily and intensely has been associated with an increased risk for subsequent major depression. However, as the majority of high scorers will not become depressive cases, emotionality should not be the only criterion for selection of at-risk populations. Cognitive style including poor self esteem, low social competence and negative attributions are also associated with increased likelihood of depressive symptoms, but

  5. Numerical modeling of ADA system for vulnerable road users protection based on radar and vision sensing

    NARCIS (Netherlands)

    Garate, V.R.; Bours, R.C.H.; Kietlinski, K.

    2012-01-01

    The protection of vulnerable road users (VRU) remains one of the most challenging problems for our society and several governmental and consumer organization has set targets to reduce the VRU fatality and injury rates. The automotive industry is, therefore, developing pedestrian and cyclist

  6. Animal models to study plaque vulnerability

    NARCIS (Netherlands)

    Schapira, K.; Heeneman, S.; Daemen, M. J. A. P.

    2007-01-01

    The need to identify and characterize vulnerable atherosclerotic lesions in humans has lead to the development of various animal models of plaque vulnerability. In this review, current concepts of the vulnerable plaque as it leads to an acute coronary event are described, such as plaque rupture,

  7. Vulnerability Situations associated with Flash Flood Casualties in the United States

    Science.gov (United States)

    Terti, G.; Ruin, I.; Anquetin, S.; Gourley, J. J.

    2015-12-01

    Service issues FF warning and emergencies. This is because targeted warnings can be communicated when we can relate the location of risky incidents in space (e.g., roads, campsites, mobile homes) with specific vulnerable groups (e.g., certain age groups, gender).

  8. Japan's new basic energy plan

    International Nuclear Information System (INIS)

    Duffield, John S.; Woodall, Brian

    2011-01-01

    In June 2010, the Japanese cabinet adopted a new Basic Energy Plan (BEP). This was the third such plan that the government has approved since the passage of the Basic Act on Energy Policy in 2002, and it represents the most significant statement of Japanese energy policy in more than four years, since the publication of the New National Energy Strategy (NNES) in 2006. Perhaps more than its predecessors, moreover, the new plan establishes a number of ambitious targets as well as more detailed measures for achieving those targets. Among the targets are a doubling of Japan's 'energy independence ratio,' a doubling of the percentage of electricity generated by renewable sources and nuclear power, and a 30 percent reduction in energy-related CO 2 emissions, all by 2030. This paper explains the origins of the 2010 BEP and why it was adopted. It then describes the content of the plan and how it differs from the NNES. A third section analyzes the appropriateness of the new goals and targets contained in the BEP and their feasibility, finding that achievement of many of the targets was likely to be quite challenging even before the March 2011 earthquake, tsunami, and nuclear crisis. - Highlights: → Origins of Japan's new Basic Energy Plan. → Content of Japan's new Basic Energy Plan. → Feasibility of achieving the targets in Japan's new Basic Energy Plan. → Impact of 2011 earthquake and tsunami on Japanese energy policy.

  9. Developing an In-depth Understanding of Elderly Adult's Vulnerability to Climate Change.

    Science.gov (United States)

    Rhoades, Jason L; Gruber, James S; Horton, Bill

    2018-05-08

    Recent reports highlight the vulnerability of elderly adults to climate change, yet limited research has focused on this topic. To address this, the purpose of this study was to develop an in-depth understanding of elderly adult's vulnerability to climate change within the context of a specific community. A case study methodology utilizing a community-based action research approach was employed to engage elderly participants living in Bridgeport, CT, in exploring their vulnerability to current and predicted climate stressors with a focus on extreme heat, flooding and storms, and air pollution. This research identifies personal characteristics that interact with contextual factors to influence elderly adult's vulnerability to climate change. Personal characteristics include health, economic, and social considerations. Contextual factors include the adequacy of emergency preparedness measures, transportation resources, and coping and recovery resources. As a result of the interplay of these characteristics and factors, predicted climate changes could have serious consequences for Bridgeport's elderly adults. This research provides a contextualized and detailed illustration of how climate change could overwhelm elderly adult's adaptive capacity and highlights the need for support services to provide safeguards. The issues and concerns raised may bear similarities to other locations, especially urban settings facing similar climate stressors with similar socioeconomic conditions. The findings suggest a need for further research to improve our understanding and serve as the basis for collaborative adaptation planning that engages elderly communities with local governments and a broad coalition of partners to keep elders safe.

  10. ICMPv6 RA Flooding Vulnerability Research

    Directory of Open Access Journals (Sweden)

    Linas Jočys

    2016-06-01

    Full Text Available ICMPv6 is the newest version of internet control message protocol, whose main purpose is to send error message indicating packet processing failure. It is know that ICMPv6 is technologically vulnerable. One of those vulnerabilities is the ICMPv6 RA flooding vulnerability, which can lead to systems in Local Area Network slow down or full stop. This paper will discuss Windows (XP, 7, 8.1 and Linux Ubuntu 14 operating systems resistance to RA flooding attack research and countermeasures to minimize this vulnerability.

  11. Assessing vulnerability of urban African communities

    DEFF Research Database (Denmark)

    Karlsson Nyed, Patrik; Jean-Baptiste, Nathalie; Herslund, Lise Byskov

    2014-01-01

    East African cities are in the process of assessing their vulnerabilities to climate change, but face difficulties in capturing the complexity of the various facets of vulnerability. This holistic approach, captures four different dimensions of vulnerability to flooding - Assets, Institutions......, Attitudes and the Physical environment, with Dar es Salaam, Tanzania, as a case city. The methodology is actively involving the expertise of the stakeholders, and uses GIS to analyze and compile the data. The final output is presented as a comprehensible map, delineating the varying vulnerability...

  12. A Climate Change Vulnerability Assessment Report for the National Renewable Energy Laboratory: May 23, 2014 -- June 5, 2015

    Energy Technology Data Exchange (ETDEWEB)

    Vogel, J. [Abt Environmental Research, Boulder, CO (United States); O' Grady, M. [Abt Environmental Research, Boulder, CO (United States); Renfrow, S. [Abt Environmental Research, Boulder, CO (United States)

    2015-09-03

    The U.S. Department of Energy's (DOE's) National Renewable Energy Laboratory (NREL), in Golden, Colorado, focuses on renewable energy and energy efficiency research. Its portfolio includes advancing renewable energy technologies that can help meet the nation's energy and environmental goals. NREL seeks to better understand the potential effects of climate change on the laboratory--and therefore on its mission--to ensure its ongoing success. Planning today for a changing climate can reduce NREL's risks and improve its resiliency to climate-related vulnerabilities. This report presents a vulnerability assessment for NREL. The assessment was conducted in fall 2014 to identify NREL's climate change vulnerabilities and the aspects of NREL's mission or operations that may be affected by a changing climate.

  13. Vulnerability of dynamic genetic conservation units of forest trees in Europe to climate change.

    Science.gov (United States)

    Schueler, Silvio; Falk, Wolfgang; Koskela, Jarkko; Lefèvre, François; Bozzano, Michele; Hubert, Jason; Kraigher, Hojka; Longauer, Roman; Olrik, Ditte C

    2014-05-01

    A transnational network of genetic conservation units for forest trees was recently documented in Europe aiming at the conservation of evolutionary processes and the adaptive potential of natural or man-made tree populations. In this study, we quantified the vulnerability of individual conservation units and the whole network to climate change using climate favourability models and the estimated velocity of climate change. Compared to the overall climate niche of the analysed target species populations at the warm and dry end of the species niche are underrepresented in the network. However, by 2100, target species in 33-65 % of conservation units, mostly located in southern Europe, will be at the limit or outside the species' current climatic niche as demonstrated by favourabilities below required model sensitivities of 95%. The highest average decrease in favourabilities throughout the network can be expected for coniferous trees although they are mainly occurring within units in mountainous landscapes for which we estimated lower velocities of change. Generally, the species-specific estimates of favourabilities showed only low correlations to the velocity of climate change in individual units, indicating that both vulnerability measures should be considered for climate risk analysis. The variation in favourabilities among target species within the same conservation units is expected to increase with climate change and will likely require a prioritization among co-occurring species. The present results suggest that there is a strong need to intensify monitoring efforts and to develop additional conservation measures for populations in the most vulnerable units. Also, our results call for continued transnational actions for genetic conservation of European forest trees, including the establishment of dynamic conservation populations outside the current species distribution ranges within European assisted migration schemes. © 2013 John Wiley & Sons Ltd.

  14. Considering Vulnerability in Disaster Risk Reduction Plans: From Policy to Practice in Ladakh, India

    Directory of Open Access Journals (Sweden)

    Virginie Le Masson

    2015-05-01

    Full Text Available In Ladakh, India, a mountainous region prone to natural hazards, particularly floods, it is critical to adapt disaster risk reduction (DRR measures to the local environment. The floods that struck Ladakh in 2010 created momentum for local authorities and nongovernmental organizations (NGOs to engage in DRR initiatives in order to better prepare people to cope with and recover from emergencies. This paper analyzes the way DRR approaches in Ladakh, from the central government to the district level, take both vulnerability and capacity into account. National and state policies are integrated and reflect the vulnerability concept quite well. However, as the case of Ladakh shows, establishing policies does not guarantee that appropriate practices will follow. Although NGOs' relief efforts in 2010 were praised for building on local communities' context and capacities, most practitioners still view DRR through a hazard-focused lens. Likewise, the policy framework for DRR does not yet address the socioeconomic construction of disasters and is not translated into adequate interventions that build on lessons learned during the 2010 emergency. Development obstacles, such as corruption, may also compromise efforts to translate DRR policies into appropriate and sustainable practices. However, local development projects that enhance the resilience of local mountain communities exist and could be valued as effective DRR. Emphasis should be placed on the practical integration of DRR in sustainable development efforts in order to better tackle disasters.

  15. Recruiting Vulnerable Populations into Research: A Systematic Review of Recruitment Interventions

    Science.gov (United States)

    UyBico, Stacy J.; Pavel, Shani

    2007-01-01

    Background Members of vulnerable populations are underrepresented in research studies. Objective To evaluate and synthesize the evidence regarding interventions to enhance enrollment of vulnerable populations into health research studies. Data sources Studies were identified by searching MEDLINE, the Web of Science database, personal sources, hand searching of related journals, and article references. Studies that contained data on recruitment interventions for vulnerable populations (minority, underserved, poor, rural, urban, or inner city) and for which the parent study (study for which recruitment was taking place) was an intervention study were included. A total of 2,648 study titles were screened and 48 articles met inclusion criteria, representing 56 parent studies. Two investigators extracted data from each study. Results African Americans were the most frequently targeted population (82% of the studies), while 46% targeted Hispanics/Latinos. Many studies assessed 2 or more interventions, including social marketing (82% of studies), community outreach (80%), health system recruitment (52%), and referrals (28%). The methodologic rigor varied substantially. Only 40 studies (71%) incorporated a control group and 21% used statistical analysis to compare interventions. Social marketing, health system, and referral recruitment were each found to be the most successful intervention about 35–45% of the studies in which they were attempted, while community outreach was the most successful intervention in only 2 of 16 studies (13%) in which it was employed. People contacted as a result of social marketing were no less likely to enroll than people contacted through other mechanisms. Conclusions Further work with greater methodologic rigor is needed to identify evidence-based strategies for increasing minority enrollment in research studies; community outreach, as an isolated strategy, may be less successful than other strategies. PMID:17375358

  16. Motherhood, Marketization, and Consumer Vulnerability

    DEFF Research Database (Denmark)

    Davies, Andrea; Prothero, Andrea; Sørensen, Elin

    2010-01-01

    This article explores consumer vulnerability and the role of public policy by focusing on new mothers. Developing the consumer vulnerability model of Baker, Gentry, and Rittenburg, the authors consider how medical contexts, political and legal factors, economic resources, societal prescriptions...... a time of physical and psychological changes in mothers-to-be. This article illustrates that the extended market logic dominating contemporary mothering environments both contributes to and has the potential to exacerbate new mothers’ vulnerability, raising important challenges for public policy, both...

  17. Groundwater vulnerability mapping of Qatar aquifers

    Science.gov (United States)

    Baalousha, Husam Musa

    2016-12-01

    Qatar is one of the most arid countries in the world with limited water resources. With little rainfall and no surface water, groundwater is the only natural source of fresh water in the country. Whilst the country relies mainly on desalination of seawater to secure water supply, groundwater has extensively been used for irrigation over the last three decades, which caused adverse environmental impact. Vulnerability assessment is a widely used tool for groundwater protection and land-use management. Aquifers in Qatar are carbonate with lots of fractures, depressions and cavities. Karst aquifers are generally more vulnerable to contamination than other aquifers as any anthropogenic-sourced contaminant, especially above a highly fractured zone, can infiltrate quickly into the aquifer and spread over a wide area. The vulnerability assessment method presented in this study is based on two approaches: DRASTIC and EPIK, within the framework of Geographical Information System (GIS). Results of this study show that DRASTIC vulnerability method suits Qatar hydrogeological settings more than EPIK. The produced vulnerability map using DRASTIC shows coastal and karst areas have the highest vulnerability class. The southern part of the country is located in the low vulnerability class due to occurrence of shale formation within aquifer media, which averts downward movement of contaminants.

  18. Assessing the Vulnerability of Wheat Farmers to Drought in North of Fars Province

    Directory of Open Access Journals (Sweden)

    H. Iraji

    2016-03-01

    citizens and access to capital for agricultural inputs rank first and second in terms of vulnerability todrought.Also, by putting the dimensions of technical, economic and social vulnerability, this study extracted seven independent and distinct patterns of vulnerability. The comparison between the specifications of vulnerable and secure households during droughts shows policy for farmers who are vulnerable to drought before and after the drought, and policies to increase employment opportunities outside the farm.The findings of this study help policymakers shift from crisis management to risk management and design appropriate plans at sub-regional or farm level rather than national or regional levels.

  19. Targeted marketing and public health.

    Science.gov (United States)

    Grier, Sonya A; Kumanyika, Shiriki

    2010-01-01

    Targeted marketing techniques, which identify consumers who share common needs or characteristics and position products or services to appeal to and reach these consumers, are now the core of all marketing and facilitate its effectiveness. However, targeted marketing, particularly of products with proven or potential adverse effects (e.g., tobacco, alcohol, entertainment violence, or unhealthful foods) to consumer segments defined as vulnerable raises complex concerns for public health. It is critical that practitioners, academics, and policy makers in marketing, public health, and other fields recognize and understand targeted marketing as a specific contextual influence on the health of children and adolescents and, for different reasons, ethnic minority populations and other populations who may benefit from public health protections. For beneficial products, such understanding can foster more socially productive targeting. For potentially harmful products, understanding the nature and scope of targeted marketing influences will support identification and implementation of corrective policies.

  20. A pragmatic analysis of vulnerability in clinical research.

    Science.gov (United States)

    Wendler, David

    2017-09-01

    Identifying which subjects are vulnerable, and implementing safeguards to protect them, is widely regarded as essential to clinical research. Commentators have endorsed a number of responses to these challenges and have thereby made significant progress in understanding vulnerability in clinical research. At the same time, this literature points to a central contradiction which calls into question its potential to protect vulnerable subjects in practice. Specifically, analysis suggests that all human subjects are vulnerable and vulnerability in clinical research is comparative and context dependent, in the sense that individuals are vulnerable relative to others and in some contexts only. Yet, if everyone is vulnerable, there seems to be no point in citing the vulnerability of some individuals. Moreover, the conclusion that everyone is vulnerable seems inconsistent with the claims that vulnerability is comparative and context dependent, raising concern over whether it will be possible to develop a comprehensive account of vulnerability that is internally consistent. The solution to this dilemma lies in recognition of the fact that the practical significance of claims regarding vulnerability depends on the context in which they are used. The claims that appear to lead to the central contradiction are in fact accurate conclusions that follow from different uses of the term 'vulnerability'. The present manuscript describes this 'pragmatic' approach to vulnerability in clinical research and considers its implications for ensuring that subjects receive appropriate protection. Published 2017. This article is a U.S. Government work and is in the public domain in the USA.

  1. [Children and adolescents in street situation: contributions to an understanding of vulnerability and disaffiliation].

    Science.gov (United States)

    Gontijo, Daniela; Medeiros, Marcelo

    2009-01-01

    The concept of vulnerability is being discussed in the public health area as a potential tool toward the transformation of the health practices for allowing an articulation individual-community. Understanding health as a process of subjectivation determined by social, cultural and historical contexts, this article aims to approach the question children and adolescents in street situation on the basis of the concept of civil vulnerability, using the theoretical background presented by Robert Castel. This author understands the social marginalization lived by different individuals and social groups in a dynamic form, determined by the association of work and social insertion. As refers to children and adolescents in street situation, we believe that they are reflecting a process of intensified vulnerability (culminating in disaffiliation) to which thousands of Brazilian families are subject due to the extreme social inequalities in our country. We hope that our theoretical discussion will be able to contribute to the development of a theoretical reference in public health and to the planning and implementation of health actions directed to this population.

  2. Not the usual suspects: addressing layers of vulnerability.

    Science.gov (United States)

    Luna, Florencia; Vanderpoel, Sheryl

    2013-07-01

    This paper challenges the traditional account of vulnerability in healthcare which conceptualizes vulnerability as a list of identifiable subpopulations. This list of 'usual suspects', focusing on groups from lower resource settings, is a narrow account of vulnerability. In this article we argue that in certain circumstances middle-class individuals can be also rendered vulnerable. We propose a relational and layered account of vulnerability and explore this concept using the case study of cord blood (CB) banking. In the first section, two different approaches to 'vulnerability' are contrasted: categorical versus layered. In the second section, we describe CB banking and present a case study of CB banking in Argentina. We examine the types of pressure that middle-class pregnant women feel when considering CB collection and storage. In section three, we use the CB banking case study to critique the categorical approach to vulnerability: this model is unable to account for the ways in which these women are vulnerable. A layered account of vulnerability identifies several ways in which middle-class women are vulnerable. Finally, by utilizing the layered approach, this paper suggests how public health policies could be designed to overcome vulnerabilities. © 2013 John Wiley & Sons Ltd.

  3. LA SAFE and Isle de Jean Charles: Regional Adaptation and Community Resettlement Planning

    Science.gov (United States)

    Sanders, M.

    2017-12-01

    LA SAFE, or Louisiana's Strategic Adaptations for Future Environments, is a strategic framework for community development utilizing future projections of coastal land loss and flood risk as a determining factor in regional growth management and local planning initiatives along a 10, 25, and 50 year timeline. LA SAFE utilizes the input of passionate local citizen leaders and organizations committed to enabling community members to take proactive steps towards mitigating risk and increasing resilience against coastal issues. The project aims to acknowledge that adaptation and restoration must go hand-in-hand with addressing community growth and contraction, as well as realizing Louisiana's most vulnerable coastal communities will need to contemplate resettlement over the next 50 years. The project's outlook is to become a global leader for adaptation and cultural design and restoration. Connecting a global interest with the project and offering extensive ways for people to learn about the issues and get involved will provide an immense amount of support necessary for future coastal environments around the world. This presentation will focus on the output of a year-long planning effort across a six-parish target area encompassing several vulnerable coastal Louisiana locales. The Resettlement of Isle de Jean Charles is a federally-funded and first-of-its kind initiative marking Louisiana's first attempt to relocate a vulnerable coastal community at-scale and as a group. Due to a myriad of environmental factors, the Island has experienced 98 percent land loss since 1955, leading to many of the Island's historical inhabitants to retreat to higher, drier landscapes. In moving the community at-scale, the project seeks to inject new life into the community and its residents in relocating the community to higher, safer ground, while also developing the new community in such a way that it maximizes economic development, job training, and educational opportunities and can be a

  4. An allometric approach to quantify the extinction vulnerability of birds and mammals.

    Science.gov (United States)

    Hilbers, J P; Schipper, A M; Hendriks, A J; Verones, F; Pereira, H M; Huijbregts, M A J

    2016-03-01

    Methods to quantify the vulnerability of species to extinction are typically limited by the availability of species-specific input data pertaining to life-history characteristics and population dynamics. This lack of data hampers global biodiversity assessments and conservation planning. Here, we developed a new framework that systematically quantifies extinction risk based on allometric relationships between various wildlife demographic parameters and body size. These allometric relationships have a solid theoretical and ecological foundation. Extinction risk indicators included are (1) the probability of extinction, (2) the mean time to extinction, and (3) the critical patch size. We applied our framework to assess the global extinction vulnerability of terrestrial carnivorous and non-carnivorous birds and mammals. Irrespective of the indicator used, large-bodied species were found to be more vulnerable to extinction than their smaller counterparts. The patterns with body size were confirmed for all species groups by a comparison with IUCN data on the proportion of extant threatened species: the models correctly predicted a multimodal distribution with body size for carnivorous birds and a monotonic distribution for mammals and non-carnivorous birds. Carnivorous mammals were found to have higher extinction risks than non-carnivores, while birds were more prone to extinction than mammals. These results are explained by the allometric relationships, predicting the vulnerable species groups to have lower intrinsic population growth rates, smaller population sizes, lower carrying capacities, or larger dispersal distances, which, in turn, increase the importance of losses due to environmental stochastic effects and dispersal activities. Our study is the first to integrate population viability analysis and allometry into a novel, process-based framework that is able to quantify extinction risk of a large number of species without requiring data-intensive, species

  5. Vulnerability Assessment of Environmental and Climate Change Impacts on Water Resources in Al Jabal Al Akhdar, Sultanate of Oman

    Directory of Open Access Journals (Sweden)

    Mohammed Saif Al-Kalbani

    2014-10-01

    Full Text Available Climate change and its consequences present one of the most important threats to water resources systems which are vulnerable to such changes due to their limited adaptive capacity. Water resources in arid mountain regions, such as Al Jabal Al Akhdar; northern Sultanate of Oman, are vulnerable to the potential adverse impacts of environmental and climate change. Besides climatic change, current demographic trends, economic development and related land use changes are exerting pressures and have direct impacts on increasing demands for water resources and their vulnerability. In this study, vulnerability assessment was carried out using guidelines prepared by United Nations Environment Programme (UNEP and Peking University to evaluate four components of the water resource system: water resources stress, water development pressure, ecological health, and management capacity. The calculated vulnerability index (VI was high, indicating that the water resources are experiencing levels of stress. Ecosystem deterioration was the dominant parameter and management capacity was the dominant category driving the vulnerability on water resources. The vulnerability assessment will support policy and decision makers in evaluating options to modify existing policies. It will also help in developing long-term strategic plans for climate change mitigation and adaptation measures and implement effective policies for sustainable water resources management, and therefore the sustenance of human wellbeing in the region.

  6. Dosimetric accuracy of a treatment planning system for actively scanned proton beams and small target volumes: Monte Carlo and experimental validation

    Science.gov (United States)

    Magro, G.; Molinelli, S.; Mairani, A.; Mirandola, A.; Panizza, D.; Russo, S.; Ferrari, A.; Valvo, F.; Fossati, P.; Ciocca, M.

    2015-09-01

    This study was performed to evaluate the accuracy of a commercial treatment planning system (TPS), in optimising proton pencil beam dose distributions for small targets of different sizes (5-30 mm side) located at increasing depths in water. The TPS analytical algorithm was benchmarked against experimental data and the FLUKA Monte Carlo (MC) code, previously validated for the selected beam-line. We tested the Siemens syngo® TPS plan optimisation module for water cubes fixing the configurable parameters at clinical standards, with homogeneous target coverage to a 2 Gy (RBE) dose prescription as unique goal. Plans were delivered and the dose at each volume centre was measured in water with a calibrated PTW Advanced Markus® chamber. An EBT3® film was also positioned at the phantom entrance window for the acquisition of 2D dose maps. Discrepancies between TPS calculated and MC simulated values were mainly due to the different lateral spread modeling and resulted in being related to the field-to-spot size ratio. The accuracy of the TPS was proved to be clinically acceptable in all cases but very small and shallow volumes. In this contest, the use of MC to validate TPS results proved to be a reliable procedure for pre-treatment plan verification.

  7. Dosimetric accuracy of a treatment planning system for actively scanned proton beams and small target volumes: Monte Carlo and experimental validation

    International Nuclear Information System (INIS)

    Magro, G; Molinelli, S; Mairani, A; Mirandola, A; Panizza, D; Russo, S; Valvo, F; Fossati, P; Ciocca, M; Ferrari, A

    2015-01-01

    This study was performed to evaluate the accuracy of a commercial treatment planning system (TPS), in optimising proton pencil beam dose distributions for small targets of different sizes (5–30 mm side) located at increasing depths in water. The TPS analytical algorithm was benchmarked against experimental data and the FLUKA Monte Carlo (MC) code, previously validated for the selected beam-line. We tested the Siemens syngo ® TPS plan optimisation module for water cubes fixing the configurable parameters at clinical standards, with homogeneous target coverage to a 2 Gy (RBE) dose prescription as unique goal. Plans were delivered and the dose at each volume centre was measured in water with a calibrated PTW Advanced Markus ® chamber. An EBT3 ® film was also positioned at the phantom entrance window for the acquisition of 2D dose maps. Discrepancies between TPS calculated and MC simulated values were mainly due to the different lateral spread modeling and resulted in being related to the field-to-spot size ratio. The accuracy of the TPS was proved to be clinically acceptable in all cases but very small and shallow volumes. In this contest, the use of MC to validate TPS results proved to be a reliable procedure for pre-treatment plan verification. (paper)

  8. Dosimetric accuracy of a treatment planning system for actively scanned proton beams and small target volumes: Monte Carlo and experimental validation

    CERN Document Server

    Magro, G; Mairani, A; Mirandola, A; Panizza, D; Russo, S; Ferrari, A; Valvo, F; Fossati, P; Ciocca, M

    2015-01-01

    This study was performed to evaluate the accuracy of a commercial treatment planning system (TPS), in optimising proton pencil beam dose distributions for small targets of different sizes (5–30 mm side) located at increasing depths in water. The TPS analytical algorithm was benchmarked against experimental data and the FLUKA Monte Carlo (MC) code, previously validated for the selected beam-line. We tested the Siemens syngo® TPS plan optimisation module for water cubes fixing the configurable parameters at clinical standards, with homogeneous target coverage to a 2 Gy (RBE) dose prescription as unique goal. Plans were delivered and the dose at each volume centre was measured in water with a calibrated PTW Advanced Markus® chamber. An EBT3® film was also positioned at the phantom entrance window for the acquisition of 2D dose maps. Discrepancies between TPS calculated and MC simulated values were mainly due to the different lateral spread modeling and resulted in being related to the field-to-spot size r...

  9. The assessment of radio vulnerability in agroecosystems

    International Nuclear Information System (INIS)

    Wasserman, Maria Angelica; Viana, Aline G.; Conti, Claudio C.; Rochedo, Elaine R.; Vivone, Ronaldo J.; Bartoly, Flavia; Perez, Daniel V.

    2005-01-01

    A soil specific sequential extraction protocol, associated to soil to plant transfer factors (TF) data is proposed in this work as a methodology able to detect vulnerability of agro-ecosystems to the contamination with 137 Cs and 90 Sr. The objective is to provide parameters for environmental assessment models and to optimize emergency response planning for the main Brazilian agro-ecosystems and to other Countries with similar soil conditions. Transfer factor values were determined for reference plants, cultivated in Ferralsol, Nitisol and Acrisol that constitute great part in the national agricultural soil. The preliminary results of geochemical partition for these radionuclides were coherent with soil to plant transfer factors (TF) data. And with some soil properties recognized by the specialized literature as related with mechanisms of sorption to Cs (e.g. exchangeable K, organic matter and iron oxides content) and Sr (e.g. exchangeable Ca). Nitisol, showed lower TF for 90 Sr and 137 Cs compared with the other studied soil. In the Nitisol, it is possible that reduction in 137 Cs transfer be also associated with fixation in the internal faces of 2:1 clay mineral type. The integration of experimental methods results obtained in the laboratory with results obtained in field experiments seems to confirm the vulnerability of some Brazilian soil to the radioactivity contamination. (author)

  10. A data mining approach to derive flood-related economic vulnerability of companies

    Science.gov (United States)

    Sieg, Tobias; Kreibich, Heidi; Vogel, Kristin; Merz, Bruno

    2017-04-01

    The assessment of vulnerability gained more and more attention in flood risk research during the recent years. However, there is still not much knowledge available about flood vulnerability of companies and its influencing factors. This study follows the natural sciences concept which defines vulnerability as the degree of loss to a given element at risk resulting from flooding of a given magnitude. Machine learning algorithms like Random Forests (RFs) are promising approaches, since they consider many influencing variables and as such allow for a detailed assessment of flood vulnerability. Only these variables which are meaningful for the differentiation of a certain target variable are used by the derived models. This allows for an identification of relevant damage influencing variables and hence for a more detailed picture of flood vulnerability of companies. This study aims to identify relevant damage influencing variables by means of the variable importance provided by Random Forests. The data sets used are taken from two surveys conducted after the floods in the Elbe and Danube catchments in the years 2002 and 2013 in Germany. Damage to buildings (n = 430), equipment (n = 651) as well as goods and stock (n = 530) are taken into account. The analysis is done for the entire data set as well as for four groups of different company sectors and the corresponding data subsets. Relevant damage influencing variables separated by sector and assets are identified as, for example, the degree of contamination or precautionary measures undertaken before the flood event. The results provide insight into the damage processes and improve data-acquisition in future surveys by, for instance, asking specific questions for company sectors and assets.

  11. Population-level associations between preschool vulnerability and grade-four basic skills.

    Directory of Open Access Journals (Sweden)

    Amedeo D'Angiulli

    2009-11-01

    Full Text Available This is a predictive validity study examining the extent to which developmental vulnerability at kindergarten entry (as measured by the Early Development Instrument, EDI is associated with children's basic skills in 4th grade (as measured by the Foundation Skills Assessment, FSA.Relative risk analysis was performed on a large database linking individual-level EDI ratings to the scores the same children obtained on a provincial assessment of academic skills (FSA--Foundation Skills Assessment four years later. We found that early vulnerability in kindergarten is associated with the basic skills that underlie populations of children's academic achievement in reading, writing and math, indicating that the Early Development Instrument permits to predict achievement-related skills four years in advance.The EDI can be used to predict children's educational trends at the population level and can help select early prevention and intervention programs targeting pre-school populations at minimum cost.

  12. Coastal erosion vulnerability and risk assessment focusing in tourism beach use.

    Science.gov (United States)

    Alexandrakis, George

    2016-04-01

    It is well established that the global market for tourism services is a key source of economic growth. Especially among Mediterranean countries, the tourism sector is one of the principal sectors driving national economies. With the majority of the mass tourism activities concentrated around coastal areas, coastal erosion, inter alia, poses a significant threat to coastal economies that depend heavily on revenues from tourism. The economic implications of beach erosion were mainly focused in the cost of coastal protection measures, instead of the revenue losses from tourism. For this, the vulnerability of the coast to sea level rise and associated erosion, in terms of expected land loss and economic activity need to be identified. To achieve this, a joint environmental and economic evaluation approach of the problem can provide a managerial tool to mitigate the impact of beach erosion in tourism, through realistic cost-benefit scenarios for planning alternative protection measures. Such a multipurpose tool needs to consider social, economic and environmental factors, which relationships can be better understood when distributed and analyzed along the geographical space. The risk assessment is implemented through the estimation of the vulnerability and exposure variables of the coast in two scales. The larger scale estimates the vulnerability in a regional level, with the use environmental factors with the use of CVI. The exposure variable is estimated by the use of socioeconomic factors. Subsequently, a smaller scale focuses on highly vulnerable beaches with high social and economic value. The assessment of the natural processes to the environmental characteristics of the beach is estimated with the use of the Beach Vulnerability Index (BVI) method. As exposure variable, the value of beach width that is capitalized in revenues is implemented through a hedonic pricing model. In this econometric modelling, Beach Value is related with economic and environmental

  13. Assessing Vulnerability under Uncertainty in the Colorado River Basin: The Colorado River Basin Water Supply and Demand Study

    Science.gov (United States)

    Jerla, C.; Adams, P.; Butler, A.; Nowak, K.; Prairie, J. R.

    2013-12-01

    Spanning parts of the seven states, of Arizona, California, Colorado, New Mexico, Nevada, Utah, and Wyoming, the Colorado River is one of the most critical sources of water in the western United States. Colorado River allocations exceed the long-term supply and since the 1950s, there have been a number of years when the annual water use in the Colorado River Basin exceeded the yield. The Basin is entering its second decade of drought conditions which brings challenges that will only be compounded if projections of climate change are realized. It was against this backdrop that the Colorado River Basin Water Supply and Demand Study was conducted. The Study's objectives are to define current and future imbalances in the Basin over the next 50 years and to develop and analyze adaptation and mitigation strategies to resolve those imbalances. Long-term planning in the Basin involves the integration of uncertainty with respect to a changing climate and other uncertainties such as future demand and how policies may be modified to adapt to changing reliability. The Study adopted a scenario planning approach to address this uncertainty in which thousands of scenarios were developed to encompass a wide range of plausible future water supply and demand conditions. Using Reclamation's long-term planning model, the Colorado River Simulation System, the reliability of the system to meet Basin resource needs under these future conditions was projected both with and without additional future adaptation strategies in place. System reliability metrics were developed in order to define system vulnerabilities, the conditions that lead to those vulnerabilities, and sign posts to indicate if the system is approaching a vulnerable state. Options and strategies that reduce these vulnerabilities and improve system reliability were explored through the development of portfolios. Four portfolios, each with different management strategies, were analyzed to assess their effectiveness at

  14. Language Planning and Planned Languages: How Can Planned Languages Inform Language Planning?

    Directory of Open Access Journals (Sweden)

    Humphrey Tonkin

    2015-04-01

    Full Text Available The field of language planning (LP has largely ignored planned languages. Of classic descriptions of LP processes, only Tauli (preceded by Wüster suggests that planned languages (what Wüster calls Plansprache might bear on LP theory and practice. If LP aims "to modify the linguistic behaviour of some community for some reason," as Kaplan and Baldauf put it, creating a language de novo is little different. Language policy and planning are increasingly seen as more local and less official, and occasionally more international and cosmopolitan. Zamenhof's work on Esperanto provides extensive material, little studied, documenting the formation of the language and linking it particularly to issues of supranational LP. Defining LP decision-making, Kaplan & Baldauf begin with context and target population. Zamenhof's Esperanto came shortly before Ben-Yehuda's revived Hebrew. His target community was (mostly the world's educated elite; Ben-Yehuda's was worldwide Jewry. Both planners were driven not by linguistic interest but by sociopolitical ideology rooted in reaction to anti-Semitism and imbued with the idea of progress. Their territories had no boundaries, but were not imaginary. Function mattered as much as form (Haugen's terms, status as much as corpus. For Zamenhof, status planning involved emphasis on Esperanto's ownership by its community - a collective planning process embracing all speakers (cf. Hebrew. Corpus planning included a standardized European semantics, lexical selectivity based not simply on standardization but on representation, and the development of written, and literary, style. Esperanto was successful as linguistic system and community language, less as generally accepted lingua franca. Its terminology development and language cultivation offers a model for language revival, but Zamenhof's somewhat limited analysis of language economy left him unprepared to deal with language as power.

  15. A cross-sectional, randomized cluster sample survey of household vulnerability to extreme heat among slum dwellers in ahmedabad, india.

    Science.gov (United States)

    Tran, Kathy V; Azhar, Gulrez S; Nair, Rajesh; Knowlton, Kim; Jaiswal, Anjali; Sheffield, Perry; Mavalankar, Dileep; Hess, Jeremy

    2013-06-18

    Extreme heat is a significant public health concern in India; extreme heat hazards are projected to increase in frequency and severity with climate change. Few of the factors driving population heat vulnerability are documented, though poverty is a presumed risk factor. To facilitate public health preparedness, an assessment of factors affecting vulnerability among slum dwellers was conducted in summer 2011 in Ahmedabad, Gujarat, India. Indicators of heat exposure, susceptibility to heat illness, and adaptive capacity, all of which feed into heat vulnerability, was assessed through a cross-sectional household survey using randomized multistage cluster sampling. Associations between heat-related morbidity and vulnerability factors were identified using multivariate logistic regression with generalized estimating equations to account for clustering effects. Age, preexisting medical conditions, work location, and access to health information and resources were associated with self-reported heat illness. Several of these variables were unique to this study. As sociodemographics, occupational heat exposure, and access to resources were shown to increase vulnerability, future interventions (e.g., health education) might target specific populations among Ahmedabad urban slum dwellers to reduce vulnerability to extreme heat. Surveillance and evaluations of future interventions may also be worthwhile.

  16. Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure

    International Nuclear Information System (INIS)

    Suski, N.; Wuest, C.

    2011-01-01

    Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre

  17. Assessment of vulnerability zones for ground water pollution using GIS-DRASTIC-EC model: A field-based approach

    Science.gov (United States)

    Anantha Rao, D.; Naik, Pradeep K.; Jain, Sunil K.; Vinod Kumar, K.; Dhanamjaya Rao, E. N.

    2018-06-01

    Assessment of groundwater vulnerability to pollution is an essential pre-requisite for better planning of an area. We present the groundwater vulnerability assessment in parts of the Yamuna Nagar District, Haryana State, India in an area of about 800 km2, considered to be a freshwater zone in the foothills of the Siwalik Hill Ranges. Such areas in the Lower Himalayas form good groundwater recharge zones, and should always be free from contamination. But, the administration has been trying to promote industrialization along these foothill zones without actually assessing the environmental consequences such activities may invite in the future. GIS-DRASTIC model has been used with field based data inputs for studying the vulnerability assessment. But, we find that inclusion electrical conductivity (EC) as a model parameter makes it more robust. Therefore, we rename it as GIS-DRASTIC-EC model. The model identifies three vulnerability zones such as low, moderate and high with an areal extent of 5%, 80% and 15%, respectively. On the basis of major chemical parameters alone, the groundwater in the foothill zones apparently looks safe, but analysis with the help of GIS-DRASTIC-EC model gives a better perspective of the groundwater quality in terms of identifying the vulnerable areas.

  18. Extending Vulnerability Assessment to Include Life Stages Considerations.

    Science.gov (United States)

    Hodgson, Emma E; Essington, Timothy E; Kaplan, Isaac C

    2016-01-01

    Species are experiencing a suite of novel stressors from anthropogenic activities that have impacts at multiple scales. Vulnerability assessment is one tool to evaluate the likely impacts that these stressors pose to species so that high-vulnerability cases can be identified and prioritized for monitoring, protection, or mitigation. Commonly used semi-quantitative methods lack a framework to explicitly account for differences in exposure to stressors and organism responses across life stages. Here we propose a modification to commonly used spatial vulnerability assessment methods that includes such an approach, using ocean acidification in the California Current as an illustrative case study. Life stage considerations were included by assessing vulnerability of each life stage to ocean acidification and were used to estimate population vulnerability in two ways. We set population vulnerability equal to: (1) the maximum stage vulnerability and (2) a weighted mean across all stages, with weights calculated using Lefkovitch matrix models. Vulnerability was found to vary across life stages for the six species explored in this case study: two krill-Euphausia pacifica and Thysanoessa spinifera, pteropod-Limacina helicina, pink shrimp-Pandalus jordani, Dungeness crab-Metacarcinus magister and Pacific hake-Merluccius productus. The maximum vulnerability estimates ranged from larval to subadult and adult stages with no consistent stage having maximum vulnerability across species. Similarly, integrated vulnerability metrics varied greatly across species. A comparison showed that some species had vulnerabilities that were similar between the two metrics, while other species' vulnerabilities varied substantially between the two metrics. These differences primarily resulted from cases where the most vulnerable stage had a low relative weight. We compare these methods and explore circumstances where each method may be appropriate.

  19. Plutonium working group report on environmental, safety and health vulnerabilities associated with the department's plutonium storage. Volume II, part 10: Sandia National Laboratories - New Mexico working group assessment team report

    International Nuclear Information System (INIS)

    1994-09-01

    The Secretary of Energy's memorandum of March 15, 1994, established an initiative for a Department-wide assessment of the vulnerabilities of the inventory of plutonium in storage. Plutonium in intact nuclear weapons and spent fuel were excluded from this study. The DOE Plutonium Vulnerability Working Group, which was formed for this purpose and produced the Project and Assessment Plans, will also manage the open-quote snap-shot close-quote assessments and produce a final report for the Secretary by September 30, 1994. The Project Plan and Assessment Plan to accomplish this study, and which established responsibilities for personnel essential to the study, were issued on April 25, 1994

  20. Community clusters of tsunami vulnerability in the US Pacific Northwest

    Science.gov (United States)

    Wood, Nathan J.; Jones, Jeanne M.; Spielman, Seth; Schmidtlein, Mathew C.

    2015-01-01

    Many coastal communities throughout the world are threatened by local (or near-field) tsunamis that could inundate low-lying areas in a matter of minutes after generation. Although the hazard and sustainability literature often frames vulnerability conceptually as a multidimensional issue involving exposure, sensitivity, and resilience to a hazard, assessments often focus on one element or do not recognize the hazard context. We introduce an analytical framework for describing variations in population vulnerability to tsunami hazards that integrates (i) geospatial approaches to identify the number and characteristics of people in hazard zones, (ii) anisotropic path distance models to estimate evacuation travel times to safety, and (iii) cluster analysis to classify communities with similar vulnerability. We demonstrate this approach by classifying 49 incorporated cities, 7 tribal reservations, and 17 counties from northern California to northern Washington that are directly threatened by tsunami waves associated with a Cascadia subduction zone earthquake. Results suggest three primary community groups: (i) relatively low numbers of exposed populations with varied demographic sensitivities, (ii) high numbers of exposed populations but sufficient time to evacuate before wave arrival, and (iii) moderate numbers of exposed populations but insufficient time to evacuate. Results can be used to enhance general hazard-awareness efforts with targeted interventions, such as education and outreach tailored to local demographics, evacuation training, and/or vertical evacuation refuges.

  1. Addressing water resources risk in England and Wales: Long term infrastructure planning in a private, regulated industry

    Science.gov (United States)

    Turner, Sean

    2015-04-01

    interconnectivity in the system (water transfer capability as proportion of demand), and the proportion of the target demand that can be drafted from climate-independent supply sources (such as plentiful groundwater supplies or desalination). The reservoir capacities are then adjusted such that all systems are perfectly and equally balanced under current design standards (Deployable Output equals demand) before being subjected to comprehensive reliability, resilience, vulnerability analysis using stochastically-derived replicates of the inflow sequences. Results indicate significant discrepancies in performance, highlighting major deficiencies with the currently-accepted planning metrics as a means to measuring and comparing water shortage risk across supply systems. These discrepancies are evident in both regions examined. The work highlights a need for a reassessment of the prescribed planning methodology to better reflect aspects of water shortage risk, particularly resilience and vulnerability.

  2. Using Outreach and Engagement Efforts to Inform the Makah Tribe's Climate Adaptation Plan

    Science.gov (United States)

    Nelson, L. K.; Chang, M.; Howk, F.

    2017-12-01

    The Makah Tribe views climate change as one of the biggest challenges to their natural resource management, threatening their livelihoods, economy, and culture. As part of their work towards climate adaptation planning, the Makah Tribal Council and tribal natural resource managers prioritized early community outreach and engagement efforts in order to accomplish three goals: continually update and inform the tribal community about the Tribe's climate adaptation efforts; gather community input and priorities for the Makah Climate Adaptation Plan; and provide a series of targeted educational events to inform the tribal community about projected climate change impacts to our resources. Our first community climate event, the Makah Climate Change Awareness Dinner, was held on February 8, 2017. At this event, we provided an overview of the Makah Tribe's Climate Vulnerability Assessment and administered an initial climate survey that gathered information regarding community members' observed environmental changes, knowledge about climate change and impacts, and any concerns and priorities to include in the Tribe's adaptation plan. We developed a framework for incorporating community engagement into climate adaptation planning and used results of our community survey to ensure community concerns were being addressed in the plan in addition to risks identified in western science. We also used survey results to inform a series of educational events to address knowledge gaps in the community and requested topics. These are two of next steps that the Makah Tribe is pursuing towards climate adaptation planning.

  3. Mechanisms of power in participatory rural planning

    DEFF Research Database (Denmark)

    Johansen, Pia Heike; Chandler, Thomas Lund

    2015-01-01

    that in such an assessment of power it is needed also to drawn in the social context because different social contexts will be more or less vulnerable to different mechanisms of power. The paper takes the stand the rural settings are especially vulnerable to dis-engagement of local citizens, sub-ordination of the rural...... by the urban privilege to define the rural qualities and creation of local conflicts and that mechanisms of power that cause such unintended outcomes of rural planning projects should be uncovered. Inspired by Foucault's interpretation of power the paper carries out a grounded theory inspired analysis...

  4. Hospital evacuation; planning, assessment, performance and evaluation

    OpenAIRE

    Nero C Wabo; P Örtenwall; A Khorram-Manesh

    2012-01-01

    Objective: Malfunction in hospitals' complex internal systems, or extern threats, may result in a hospital evacuation. Factors contributing to such evacuation must be identified, analyzed and action plans should be prepared. Our aims in this study were 1) to evaluate the use of risk and vulnerability analysis as a basis for hospital evacuation plan, 2) to identify risks/hazards triggering an evacuation and evaluate the respond needed and 3) to propose a template with main key points for plann...

  5. Business Continuity Planning for Nursing Schools: Preparation for Potential Disasters.

    Science.gov (United States)

    Zerwic, Julie J; Rosen, Denise

    2016-01-01

    Nursing schools are vulnerable to disasters, ranging from pandemics to weather emergencies, fires, and acts of terrorism. To ensure minimal disruptions to teaching, provision of care, research, and other critical missions, nursing faculty and administrative leaders should develop a business continuity plan. The business continuity plan can help faculty, students, and administration identify critical functions and alternative plans if an emergency occurs. We offer our experience as a guide for other nursing schools.

  6. Chemical Safety Vulnerability Working Group report. Volume 3

    Energy Technology Data Exchange (ETDEWEB)

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

  7. Chemical Safety Vulnerability Working Group report. Volume 3

    International Nuclear Information System (INIS)

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports

  8. Modeling Coastal Vulnerability through Space and Time.

    Science.gov (United States)

    Hopper, Thomas; Meixler, Marcia S

    2016-01-01

    Coastal ecosystems experience a wide range of stressors including wave forces, storm surge, sea-level rise, and anthropogenic modification and are thus vulnerable to erosion. Urban coastal ecosystems are especially important due to the large populations these limited ecosystems serve. However, few studies have addressed the issue of urban coastal vulnerability at the landscape scale with spatial data that are finely resolved. The purpose of this study was to model and map coastal vulnerability and the role of natural habitats in reducing vulnerability in Jamaica Bay, New York, in terms of nine coastal vulnerability metrics (relief, wave exposure, geomorphology, natural habitats, exposure, exposure with no habitat, habitat role, erodible shoreline, and surge) under past (1609), current (2015), and future (2080) scenarios using InVEST 3.2.0. We analyzed vulnerability results both spatially and across all time periods, by stakeholder (ownership) and by distance to damage from Hurricane Sandy. We found significant differences in vulnerability metrics between past, current and future scenarios for all nine metrics except relief and wave exposure. The marsh islands in the center of the bay are currently vulnerable. In the future, these islands will likely be inundated, placing additional areas of the shoreline increasingly at risk. Significant differences in vulnerability exist between stakeholders; the Breezy Point Cooperative and Gateway National Recreation Area had the largest erodible shoreline segments. Significant correlations exist for all vulnerability (exposure/surge) and storm damage combinations except for exposure and distance to artificial debris. Coastal protective features, ranging from storm surge barriers and levees to natural features (e.g. wetlands), have been promoted to decrease future flood risk to communities in coastal areas around the world. Our methods of combining coastal vulnerability results with additional data and across multiple time

  9. Off-site relations and emergency planning or the importance of being earnest

    International Nuclear Information System (INIS)

    Dunkle, M.K.

    1987-01-01

    Emergency planning is and will continue to be a vulnerable spot for the nuclear industry. Emergency planning issues can be reopened at any time during the life of the plant and this represents a threat that continues for the life of the plant. The area of planning in which utilities find themselves most vulnerable is off-site relations with the state and local government officials, the public, and even the news media. Utilities face two very basic challenges in developing and maintaining good off-site relations for emergency preparedness: (1) utility managers must understand and be capable of working with the myriad of personalities and dynamics in the emergency preparedness arena. (2) Emergency preparedness is an emotional issue and a technical subject not well understood by the average citizen. The public looks to well-founded emergency plans and strong leaders to effect them. With these, a sound communications strategy, and a good plant record, a utility stands a chance of achieving the real key to success, credibility

  10. Social vulnerability assessment: a growing practice in Europe?

    Science.gov (United States)

    Tapsell, S.; McC arthy, S.

    2012-04-01

    This paper builds upon work on social vulnerability from the CapHaz-Net consortium, an ongoing research project funded by the European Commission in its 7th Framework Programme. The project focuses on the social dimensions of natural hazards, as well as on regional practices of risk prevention and management, and aims at improving the resilience of European societies to natural hazards, paying particular attention to social capacity building. The topic of social vulnerability is one of seven themes being addressed in the project. There are various rationales for examining the relevance of social vulnerability to natural hazards. Vulnerability assessment has now been accepted as a requirement for the effective development of emergency management capability, and assessment of social vulnerability has been recognised as being integral to understanding the risk to natural hazards. The aim of our research was to examine social vulnerability, how it might be understood in the context of natural hazards in Europe, and how social vulnerability can be addressed to increase social capacity. The work comprised a review of research on social vulnerability to different natural hazards within Europe and included concepts and definitions of social vulnerability (and related concepts), the purpose of vulnerability assessment and who decides who is vulnerable, different approaches to assessing or measuring social vulnerability (such as the use of 'classical' quantitative vulnerability indicators and qualitative community-based approaches, along with the advantages and disadvantages of both), conceptual frameworks for assessing social vulnerability and three case studies of social vulnerability studies within Europe: flash floods in the Italian Alps, fluvial flooding in Germany and heat waves in Spain. The review reveals variable application of social vulnerability analysis across Europe and there are indications why this might be the case. Reasons could range from the scale of

  11. Climate plan 2004

    International Nuclear Information System (INIS)

    2004-01-01

    The Climate Plan is an action plan drawn up by the French Government to respond to the climate change challenge, first by 2010 (complying with the Kyoto Protocol target), and, secondly, beyond this date. Projections for France show that national emissions could be 10% higher than the Kyoto target in 2010 if no measures are taken. This is particularly due to increasing emissions in the sectors affecting daily life (residential-tertiary sectors, transport, etc.). For this reason, the Climate Plan contains measures affecting all sectors of the economy and the daily life of all French citizens with a view to economizing the equivalent of 54 million tonnes of CO 2 each year by the year 2010, which will help to reverse the trend significantly. Beyond 2010, the Climate Plan sets out a strategy for technological research which will enable France to meet a target of reducing greenhouse gas emissions four or fivefold by 2050. (author)

  12. Cross‐disease comparison of amyotrophic lateral sclerosis and spinal muscular atrophy reveals conservation of selective vulnerability but differential neuromuscular junction pathology

    Science.gov (United States)

    Nijssen, Jik; Frost‐Nylen, Johanna

    2015-01-01

    Neuromuscular junctions are primary pathological targets in the lethal motor neuron diseases spinal muscular atrophy (SMA) and amyotrophic lateral sclerosis (ALS). Synaptic pathology and denervation of target muscle fibers has been reported prior to the appearance of clinical symptoms in mouse models of both diseases, suggesting that neuromuscular junctions are highly vulnerable from the very early stages, and are a key target for therapeutic intervention. Here we examined neuromuscular pathology longitudinally in three clinically relevant muscle groups in mouse models of ALS and SMA in order to assess their relative vulnerabilities. We show for the first time that neuromuscular junctions of the extraocular muscles (responsible for the control of eye movement) were resistant to degeneration in endstage SMA mice, as well as in late symptomatic ALS mice. Tongue muscle neuromuscular junctions were also spared in both animal models. Conversely, neuromuscular junctions of the lumbrical muscles of the hind‐paw were vulnerable in both SMA and ALS, with a loss of neuronal innervation and shrinkage of motor endplates in both diseases. Thus, the pattern of selective vulnerability was conserved across these two models of motor neuron disease. However, the first evidence of neuromuscular pathology occurred at different timepoints of disease progression, with much earlier evidence of presynaptic involvement in ALS, progressing to changes on the postsynaptic side. Conversely, in SMA changes appeared concomitantly at the neuromuscular junction, suggesting that mechanisms of neuromuscular disruption are distinct in these diseases. J. Comp. Neurol. 524:1424–1442, 2016. © 2015 The Authors The Journal of Comparative Neurology Published by Wiley Periodicals, Inc. PMID:26502195

  13. Clinical variability of target volume description and treatment plans in conformal radiotherapy in muscle invasive bladder cancer

    International Nuclear Information System (INIS)

    Logue, John P; Sharrock, Carole L; Cowan, Richard A.; Read, Graham; Marrs, Julie; Mott, David

    1996-01-01

    Purpose/Objective: The delineation of tumor and the production of a treatment plan to encompass this is the prime step in radiotherapy planning. Conformal radiotherapy is developing rapidly and although plentiful research has addressed the implementation of the radiotherapy prescription, scant attention has been made to the fundamental step of production, by the clinician, of an appropriate target volume. As part of an ongoing randomized trial of conformal radiotherapy, in bladder cancer, we have therefore assessed the interphysician variability of radiologists and radiation oncologists (RO) in assessing Gross Tumor Volume(GTV) (ICRU 50) and the adherence of the radiation oncologists to the study protocol of producing a Planning Target Volume (PTV). Materials and Methods: Four patients with T3 carcinoma of bladder who had been entered into the trial were identified. The clinical details, MR scans and CT scans were made available. Eight RO and 3 dedicated diagnostic oncology radiologists were invited to directly outline the GTV onto CT images on a planning computer consul. The RO in addition created a PTV following the trial protocol of 15mm margin around the GTV. Three RO sub-specialized in Urological radiotherapy; all RO had completed training. Volumes were produced, for each clinician, and comparison of these volumes and their isocenters were analyzed. In addition the margins allowed were measured and compared. Results: There was a maximum variation ratio (largest to smallest volume outlined) of the GTV in the four cases of 1.74 among radiologists and 3.74 among oncologists. There was a significant difference (p=0.01) in mean GTV between RO and the radiologists. The mean GTV of the RO exceeded the radiologists by a factor of 1.29 with a mean difference of 13.4 cm 3 The between observer variance within speciality comprised only 9.9% of the total variance in the data having accounted for case and observers speciality. The variation ratio in PTV among oncologists

  14. Development and assessment of indices to determine stream fish vulnerability to climate change and habitat alteration

    Science.gov (United States)

    Sievert, Nicholas A.; Paukert, Craig P.; Tsang, Yin-Phan; Infante, Dana M.

    2016-01-01

    measure of validation. Our indices classified species identified as being in need of conservation by the state of Missouri as highly vulnerable. The distribution of vulnerable species in Missouri showed consistent patterns between indices, with the more forest-dominated, groundwater fed streams in the Ozark subregion generally having higher numbers and proportions of vulnerable species per site than subregions that were agriculturally dominated with more overland flow. These results suggest that both indices will identify similar habitats as conservation action targets despite discrepancies in the classification of vulnerable species. Our vulnerability assessment provides a framework that can be refined and used in other regions.

  15. A vulnerability-centric requirements engineering framework : Analyzing security attacks, countermeasures, and requirements based on vulnerabilities

    NARCIS (Netherlands)

    Elahi, G.; Yu, E.; Zannone, N.

    2010-01-01

    Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a methodological framework for security requirements

  16. Sexual Education of Women in Vulnerable Sectors

    Directory of Open Access Journals (Sweden)

    Lynett Carolina Vásquez Veracochea

    2018-05-01

    Full Text Available This article provides a description of a multidisciplinary work with the objective of proposing the development of guiding strategies necessary to inform and promote sexual and reproductive education to women in the Manuel Monge Municipality of the Yaracuy, Venezuela state; allowing an active contribution to society to counteract adolescent pregnancies, extreme poverty and the eradication of gender violence, seeking the empowerment of women in vulnerable sectors based on knowledge of their rights. The methodology used from the research was the participation action with a qualitative paradigm approach for the perception of the actors, a previous design for the collection of information, planning of knowledge strategies that would allow to elaborate semi-structured interviewing activities to three key informants of the focus groups, with work plans, practical workshops, health days and active listening to establish criteria for resources in obtaining results. The technique of data interpretation allows ordering the information of how, where, when and why clearly in order to establish a relationship between categories, and other data collected to provide an integral accompaniment to the woman towards the achievement of the proposed objectives.

  17. Nuclear Targeting Terms for Engineers and Scientists

    Energy Technology Data Exchange (ETDEWEB)

    St Ledger, John W. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-02-01

    The Department of Defense has a methodology for targeting nuclear weapons, and a jargon that is used to communicate between the analysts, planners, aircrews, and missile crews. The typical engineer or scientist in the Department of Energy may not have been exposed to the nuclear weapons targeting terms and methods. This report provides an introduction to the terms and methodologies used for nuclear targeting. Its purpose is to prepare engineers and scientists to participate in wargames, exercises, and discussions with the Department of Defense. Terms such as Circular Error Probable, probability of hit and damage, damage expectancy, and the physical vulnerability system are discussed. Methods for compounding damage from multiple weapons applied to one target are presented.

  18. Assessing Hazard Vulnerability, Habitat Conservation, and Restoration for the Enhancement of Mainland China's Coastal Resilience

    Science.gov (United States)

    Sajjad, Muhammad; Li, Yangfan; Tang, Zhenghong; Cao, Ling; Liu, Xiaoping

    2018-03-01

    Worldwide, humans are facing high risks from natural hazards, especially in coastal regions with high population densities. Rising sea levels due to global warming are making coastal communities' infrastructure vulnerable to natural disasters. The present study aims to provide a coupling approach of vulnerability and resilience through restoration and conservation of lost or degraded coastal natural habitats to reclamation under different climate change scenarios. The integrated valuation of ecosystems and tradeoffs model is used to assess the current and future vulnerability of coastal communities. The model employed is based on seven different biogeophysical variables to calculate a natural hazard index and to highlight the criticality of the restoration of natural habitats. The results show that roughly 25% of the coastline and more than 5 million residents are in highly vulnerable coastal areas of mainland China, and these numbers are expected to double by 2100. Our study suggests that restoration and conservation in recently reclaimed areas have the potential to reduce this vulnerability by 45%. Hence, natural habitats have proved to be a great defense against coastal hazards and should be prioritized in coastal planning and development. The findings confirm that natural habitats are critical for coastal resilience and can act as a recovery force of coastal functionality loss. Therefore, we recommend that the Chinese government prioritizes restoration (where possible) and conservation of the remaining habitats for the sake of coastal resilience to prevent natural hazards from escalating into disasters.

  19. Timeliness of abnormal screening and diagnostic mammography follow-up at facilities serving vulnerable women.

    Science.gov (United States)

    Goldman, L Elizabeth; Walker, Rod; Hubbard, Rebecca; Kerlikowske, Karla

    2013-04-01

    Whether timeliness of follow-up after abnormal mammography differs at facilities serving vulnerable populations, such as women with limited education or income, in rural areas, and racial/ethnic minorities is unknown. We examined receipt of diagnostic evaluation after abnormal mammography using 1998-2006 Breast Cancer Surveillance Consortium-linked Medicare claims. We compared whether time to recommended breast imaging or biopsy depended on whether women attended facilities serving vulnerable populations. We characterized a facility by the proportion of mammograms performed on women with limited education or income, in rural areas, or racial/ethnic minorities. We analyzed 30,874 abnormal screening examinations recommended for follow-up imaging across 142 facilities and 10,049 abnormal diagnostic examinations recommended for biopsy across 114 facilities. Women at facilities serving populations with less education or more racial/ethnic minorities had lower rates of follow-up imaging (4%-5% difference, Pfacilities serving more rural and low-income populations had lower rates of biopsy (4%-5% difference, Pfacilities serving vulnerable populations had longer times until biopsy than those at facilities serving nonvulnerable populations (21.6 vs. 15.6 d; 95% confidence interval for mean difference 4.1-7.7). The proportion of women receiving recommended imaging within 11 months and biopsy within 3 months varied across facilities (interquartile range, 85.5%-96.5% for imaging and 79.4%-87.3% for biopsy). Among Medicare recipients, follow-up rates were slightly lower at facilities serving vulnerable populations, and among those women who returned for diagnostic evaluation, time to follow-up was slightly longer at facilities that served vulnerable population. Interventions should target variability in follow-up rates across facilities, and evaluate effectiveness particularly at facilities serving vulnerable populations.

  20. Assessing the physical vulnerability of check dams through an empirical damage index

    Directory of Open Access Journals (Sweden)

    Andrea Dell'Agnese

    2013-06-01

    Full Text Available A comprehensive analysis of flood risk in mountain streams has to include an assessment of the vulnerability of the protection systems, in addition to an assessment of the vulnerability of the constructed environment on alluvial fans and floodplains. Structures forming the protection systems are of a dual nature, i.e. they are designed to mitigate natural process-related hazards and, on the other hand, are prone to be damaged during their lifecycle by the same processes they should mitigate. Therefore, their effectiveness declines over time. Hence, the knowledge of how effectively control structures perform is essential for risk management. A procedure was developed to assess the physical vulnerability of check dams based on empirical evidence collected in South Tyrol, Northern Italy. A damage index defined on pre- and postevent comparisons of check dam conditions was evaluated for 362 structures in 18 mountain streams along with the relevant processes and the structural characteristics affecting it. Although the available dataset did not allow conclusive functional relationships between damage index and impact variables to be established, it was possible to assess the average expected residual functionality of check dams according to structure characteristics, and event type and intensity. These results may help plan appropriate check dam maintenance.

  1. Vulnerability assessment to Drought in Various Provinces, approach towards risk management in the country

    Directory of Open Access Journals (Sweden)

    F. Nasrnia

    2016-05-01

    can considerably reduce the harmful effects of drought. According to the results, Semnan, Tehran and Gilan provinces jointly are economically vulnerable. On the other hand, in terms of criteria for social vulnerability, provinces of Fars, Khuzestan and Gilan were the most social vulnerable and Isfahan, Kermanshah and Ilam are the least vulnerable. Also, according to the results the province of Khuzestan, Fars and Khorasan were the most; and Yazd, Bushehr and Kohgiluyeh Boyer were the least physical vulnerability. Conclusion: In this study, in order to assess vulnerability to drought in various provinces, , after determining the hierarchy and collect relevant data, the importance of each criteria and sub-criteria were determined. In order to determine the importance of different aspects of vulnerability (the economic, social and physical Fuzzy AHP method was used in each dimension. According to the results of this study, the province of Khuzestan, Fars and Khorasan are the most and Yazd, Bushehr and Kohgiluyeh Boyer were the least physical vulnerability. Since different provinces ‌have significant differences in vulnerability to drought and vulnerability in various aspects of economic, social and physical, in order to achieve drought management based on risk management, recommended in policy and planning make attention the effects of drought in the various provinces.

  2. Reducing risk where tectonic plates collide—U.S. Geological Survey subduction zone science plan

    Science.gov (United States)

    Gomberg, Joan S.; Ludwig, Kristin A.; Bekins, Barbara; Brocher, Thomas M.; Brock, John C.; Brothers, Daniel; Chaytor, Jason D.; Frankel, Arthur; Geist, Eric L.; Haney, Matt; Hickman, Stephen H.; Leith, William S.; Roeloffs, Evelyn A.; Schulz, William H.; Sisson, Thomas W.; Wallace, Kristi; Watt, Janet; Wein, Anne M.

    2017-06-19

    The U.S. Geological Survey (USGS) serves the Nation by providing reliable scientific information and tools to build resilience in communities exposed to subduction zone earthquakes, tsunamis, landslides, and volcanic eruptions. Improving the application of USGS science to successfully reduce risk from these events relies on whole community efforts, with continuing partnerships among scientists and stakeholders, including researchers from universities, other government labs and private industry, land-use planners, engineers, policy-makers, emergency managers and responders, business owners, insurance providers, the media, and the general public.Motivated by recent technological advances and increased awareness of our growing vulnerability to subduction-zone hazards, the USGS is uniquely positioned to take a major step forward in the science it conducts and products it provides, building on its tradition of using long-term monitoring and research to develop effective products for hazard mitigation. This science plan provides a blueprint both for prioritizing USGS science activities and for delineating USGS interests and potential participation in subduction zone science supported by its partners.The activities in this plan address many USGS stakeholder needs:High-fidelity tools and user-tailored information that facilitate increasingly more targeted, neighborhood-scale decisions to mitigate risks more cost-effectively and ensure post-event operability. Such tools may include maps, tables, and simulated earthquake ground-motion records conveying shaking intensity and frequency. These facilitate the prioritization of retrofitting of vulnerable infrastructure;Information to guide local land-use and response planning to minimize development in likely hazardous zones (for example, databases, maps, and scenario documents to guide evacuation route planning in communities near volcanoes, along coastlines vulnerable to tsunamis, and built on landslide-prone terrain);New tools

  3. Vulnerability of Oyster Resource Users to Ecological Change: Case Study from Terrebonne Parish, Louisiana

    Science.gov (United States)

    Humphries, A.; La Peyre, M.; Hall, S.; Dowty Beech, R.

    2016-02-01

    Knowledge of vulnerability provides the foundation for developing actions that minimize impacts on people while maximizing the sustainability of ecosystem goods and services including fisheries. As a result, it is becoming increasingly important to determine if resource-dependent people are vulnerable to ecological change as anthropogenic and climate-induced stressors affect resources in different ways. In coastal Louisiana, the current era of rapid marsh loss and abrupt environmental variation (e.g., sediment diversions) has the potential to undermine oyster-associated livelihoods for those most vulnerable. To evaluate vulnerability, we examined dimensions of social sensitivity and adaptive capacity using semi-structured interviews with three stakeholder groups in the oyster fishery of Terrebonne Parish, Louisiana. Results indicate that oyster owners/operators are highly dependent, and thus sensitive, to changes in the ecological conditions of the fishery due to high levels of occupational identity; however they are likely adaptable, reflected in their willingness to learn about new practices and evolve over time. In contrast, oyster fishers that do not own any portion of the business in which they operate are bad at coping with change and frequently hold negative or fatalistic views on financial planning. Overall, oyster resource users most vulnerable to ecological change will be those with high levels of stewardship, open-minded values, and a balanced perception of environment, as well as low to moderate levels of personal and financial buffers and trust. These results suggest that resource users with higher sensitivity to change are not necessarily most vulnerable because sensitivity may be offset by adaptive capacity. In other words, while sensitivity may determine the potential impact of a climate- or human-induced ecological change to the oyster fishery, adaptive capacity can be a major influence on what impacts actually eventuate.

  4. Assessment of groundwater vulnerability to contamination in Irbid govern orate, the north of Jordan

    International Nuclear Information System (INIS)

    Nawafleh, A.; Awawdeh, M.; Salameh, E.

    2011-01-01

    The main aquifers in northern Jordan showed little signs of contamination when modeled by the DRASTIC method, mainly due to topography and an invariably deep water table. Most of A7/B2 and B4/B5 aquifers are classified with low vulnerability and small regions classified as moderately vulnerable (0.20% and 0.80% respectivily). The dominance of low vulnerability in the study area is mainly attributed to the fact than DRASTIC assumes a very low vulnerability (rating value = 1) when water depths are greater than 30 m. Additionaly, DRASTIC does not demonstrate the capacity of satisfactorily outlining karst morphology. Both map removal and single-parameter sensitivity anayers showed that depth to water table and topography are the most decisive parameters in deteermining aquifer vulnerability. Net recharge, hydraulic conductivity, topography and depth to water table contribute significantly to the variation of the vulnerability index across the study area with the variation index being 75%. 71.5%. 66% and 63% respectively. These are higher than the theoretical topography have effective weights of 34%. 26% and 24%. respectively. These are higher than the theoretical weights assigned by the model (13%. 21.7% and 4.3% respectively). Wel AD1296 and spring AD0654 are the most contaminated water resources. The former is located within the vicinity of the Ramtha wastewater treatment plan and the latter is located within areas of agricultural activities and intensive cesspool usage. DRASTIC did not accurately predict the high concentrations of some chemicals, which highlight the need for new research into procedures for parmeter quantification and weighting. further investigations are also required in order to understand the mechanisms of groundwater recharge and contaminant transport in such aquifers. (authors).

  5. Climate Change Vulnerability of Army Installations Attributable to Listed and At-Risk Species

    Science.gov (United States)

    2017-07-12

    T2 ]) (NatureServe 2011), a challenge that will be exacerbated by cli- mate change (Dawson et al. 2011, Ellenwood et al. 2012, Shaw et al. 2021, Urban...stakeholders on climate change chal- lenges. Each of these goals was evaluated in relation to DoD’s plans and operations, training and testing, built...mitigation strategies based on the mag- nitudes of the evaluated factors were summarized. 1.4 Scope The climate change vulnerability assessments within

  6. A measure of vulnerability and damage tolerance

    International Nuclear Information System (INIS)

    Lind, Niels C.

    1995-01-01

    The purpose of the paper is to present probabilistic definitions of 'vulnerability' and 'damage tolerance'. A new measure of damage is also proposed. Disastrous failures, such as of the Titanic or the Chernobyl reactor, have revealed that some systems can be highly vulnerable. A seemingly insignificant damage can reduce such a system's resistance severely. Attempts to write design code requirements for damage tolerance or structural integrity have not been successful so far. One reason is that these ideas have not been defined with the necessary precision. The suggested definitions aim to be general, applicable to all engineered systems, and readily specializable to particular system types. Vulnerability is defined as the ratio of the failure probability of the damaged system to the failure probability of the undamaged system. It is argued that 'vulnerability' and 'damage tolerance' are complementary concepts. Damage tolerance is defined as the reciprocal of vulnerability. Vulnerability and damage tolerance both concern hypothetical future damage. A damage factor, applicable for the analysis of an existing structure in an assessed state of damage, is defined analogous to vulnerability. Application is illustrated by examples

  7. SU-E-J-88: Margin Reduction of Level II/III Planning Target Volume for Image-Guided Simultaneous Integrated Boost Head-And-Neck Treatment

    International Nuclear Information System (INIS)

    Can, S; Neylon, J; Qi, S; Santhanam, A; Low, D

    2014-01-01

    Purpose: To investigate the feasibility of improved normal tissue sparing for head-and-neck (H'N) image-guided radiotherapy (IGRT) by employing tighter CTV-to-PTV margins for target level II/III though a GPU-based deformable image registration and dose accumulation framework. Methods: Ten H'N simultaneous integrated boost cases treated on TomoTherapy were retrospectively analyzed. Weekly kVCT scans in addition to daily MVCT scans were acquired for each patient. Reduced margin plans were generated with 0- mm margin for level II and III PTV (while 3-5 mm margin for PTV1) and compared with the standard margin plan using 3-5mm margin to all CTV1-3 (reference plan). An in-house developed GPU-based 3D image deformation tool was used to register and deform the weekly KVCTs with the planning CT and determine the delivered mean/minimum/maximum dose, dose volume histograms (DVHs), etc. Results: Compared with the reference plans, the averaged cord maximum, the right and left parotid doses reduced by 22.7 %, 16.5 %, and 9 % respectively in the reduced margin plans. The V95 for PTV2 and PTV3 were found within 2 and 5% between the reference and tighter margin plans. For the reduced margin plans, the averaged cumulative mean doses were consistent with the planned dose for PTV1, PTV2 and PTV3 within 1.5%, 1.7% and 1.4%. Similar dose variations of the delivered dose were seen for the reference and tighter margin plans. The delivered maximum and mean doses for the cord were 3.55 % and 2.37% higher than the planned doses; a 5 % higher cumulative mean dose for the parotids was also observed for the delivered dose than the planned doses in both plans. Conclusion: By imposing tighter CTV-to-PTV margins for level II and III targets for H'N irradiation, acceptable cumulative doses were achievable when coupled with weekly kVCT guidance while improving normal structure sparing

  8. Indicator-based model to assess vulnerability to landslides in urban areas. Case study of Husi city (Eastern Romania)

    Science.gov (United States)

    Grozavu, Adrian; Ciprian Margarint, Mihai; Catalin Stanga, Iulian

    2013-04-01

    maps (slope, aspect, shading), realized based on the topographical plans and maps (1:1000, 1:5000). The second step was to realize the spatial inventory of elements at risk (vector format), based on the General Urban Plan (1:5000), the orthorectified aerial images (2009, resolution: 0.5 meters) and field investigations. All elements have been classified using attribute databases: residential buildings (single or multiple dwellings), other buildings according to their functionality, main and secondary roads, special transport network etc. Data about population have been added in order to assess the intrinsic value of each element and the number of potentially affected peoples. The study also took into account issues as preparedness and preventive measures (risk prevention plans, reinforcing structures, draining wells etc.), coping ability (network geometry and connectivity, emergency services accessibility) and recovering capacity (e.g. the existence of insurance policies). According to their importance and functionality, a distinct rank (ri … rn) was assigned to each element at risk (i1…in) showing the level of vulnerability. The rank values were assigned mainly on the expert knowledge and they range from 1 (limited damages, no affected people) to 5 (several households and people affected, dysfunctions in the urban system). The vulnerability index (Vi) was obtained combining the rank with the role of vulnerability factors (Fi), according to their degree of influence: the number of people that would be affected, the potential material and economic damages, the relationship with the neighboring exposed elements, the existence of the preventing, coping and recovering measures etc. Thus, the general equation of vulnerability has the form of weighted geometric mean: Vi=ri•Fi = ri•(w1F1 • w2F2 • … • wmFm). It must be noted that the weighting coefficients (wi) have subunitary or supraunitary value according to their role in diminishing or increasing the

  9. Assessing the Security Vulnerabilities of Correctional Facilities

    Energy Technology Data Exchange (ETDEWEB)

    Morrison, G.S.; Spencer, D.S.

    1998-10-27

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  10. Drug abuse: vulnerability and transition to addiction.

    Science.gov (United States)

    Le Moal, M

    2009-05-01

    Intrinsic vulnerability is central to the transition of recreational drug use to misuse. Several factors contribute to vulnerability, inherent or acquired, and they account for the huge individual differences observed concerning the propensity to enter in the addiction process. Some of the multifactional causes for a vulnerable phenotype will be examined: genetic factors, age and gender influences, various comorbidities and epidemiological observations. Stress-induced vulnerability will be particularly reviewed because it provides a good model for a pathophysiological research and for relating environmental events to biological consequences of drug vulnerability, namely through the striato-cortical dopamine system. Experimental studies are generally blind concerning these historical factors that contribute vulnerability and a critical evaluation of current animal models is needed. The transition of the last stage of the process, addiction, is conceptualized as a progression from homeostasis to allostasis and then, to pathology.

  11. Taxonomy of USA east coast fishing communities in terms of social vulnerability and resilience

    Energy Technology Data Exchange (ETDEWEB)

    Pollnac, Richard B., E-mail: pollnac3@gmail.com [Department of Marine Affairs, University of Rhode Island, 1 Greenhouse Rd., Kingston, RI 02881 (United States); Seara, Tarsila, E-mail: tarsila.seara@noaa.gov [National Marine Fisheries Service, NOAA, Northeast Fisheries Science Center, Social Sciences Branch, 28 Tarzwell Dr., Narragansett, RI 02882 (United States); Colburn, Lisa L., E-mail: lisa.l.colburn@noaa.gov [National Marine Fisheries Service, NOAA, Northeast Fisheries Science Center, Social Sciences Branch, 28 Tarzwell Dr., Narragansett, RI 02882 (United States); Jepson, Michael, E-mail: michael.jepson@noaa.gov [National Marine Fisheries Service, NOAA, Southeast Fisheries Science Center, Social Sciences Branch, 263 13th Avenue South, Saint Petersburg, FL 33701 (United States)

    2015-11-15

    Increased concern with the impacts that changing coastal environments can have on coastal fishing communities led to a recent effort by NOAA Fisheries social scientists to develop a set of indicators of social vulnerability and resilience for the U.S. Southeast and Northeast coastal communities. A goal of the NOAA Fisheries social vulnerability and resilience indicator program is to support time and cost effective use of readily available data in furtherance of both social impact assessments of proposed changes to fishery management regulations and climate change adaptation planning. The use of the indicators to predict the response to change in coastal communities would be enhanced if community level analyses could be grouped effectively. This study examines the usefulness of combining 1130 communities into 35 relevant subgroups by comparing results of a numerical taxonomy with data collected by interview methods, a process herein referred to as “ground-truthing.” The validation of the taxonomic method by the method of ground-truthing indicates that the clusters are adequate to be used to select communities for in-depth research. - Highlights: • We develop a taxonomy of fishing communities based on vulnerability indicators. • We validate the community clusters through the use of surveys (“ground-truthing”). • Clusters differ along important aspects of fishing community vulnerability. • Clustering communities allows for accurate and timely social impact assessments.

  12. Taxonomy of USA east coast fishing communities in terms of social vulnerability and resilience

    International Nuclear Information System (INIS)

    Pollnac, Richard B.; Seara, Tarsila; Colburn, Lisa L.; Jepson, Michael

    2015-01-01

    Increased concern with the impacts that changing coastal environments can have on coastal fishing communities led to a recent effort by NOAA Fisheries social scientists to develop a set of indicators of social vulnerability and resilience for the U.S. Southeast and Northeast coastal communities. A goal of the NOAA Fisheries social vulnerability and resilience indicator program is to support time and cost effective use of readily available data in furtherance of both social impact assessments of proposed changes to fishery management regulations and climate change adaptation planning. The use of the indicators to predict the response to change in coastal communities would be enhanced if community level analyses could be grouped effectively. This study examines the usefulness of combining 1130 communities into 35 relevant subgroups by comparing results of a numerical taxonomy with data collected by interview methods, a process herein referred to as “ground-truthing.” The validation of the taxonomic method by the method of ground-truthing indicates that the clusters are adequate to be used to select communities for in-depth research. - Highlights: • We develop a taxonomy of fishing communities based on vulnerability indicators. • We validate the community clusters through the use of surveys (“ground-truthing”). • Clusters differ along important aspects of fishing community vulnerability. • Clustering communities allows for accurate and timely social impact assessments

  13. A Conceptual Framework for Vulnerability Assessment of Climate Change Impact on Critical Oil and Gas Infrastructure in the Niger Delta

    Directory of Open Access Journals (Sweden)

    Justin Udie

    2018-02-01

    Full Text Available The impact of climate change on the Niger Delta is severe, as extreme weather events have inflicted various degrees of stress on critical oil/gas infrastructure. Typically, assets managers and government agencies lack a clear framework for evaluating the vulnerability of these systems. This paper presents a participatory framework for the vulnerability assessment of critical oil/gas infrastructure to climate change impacts in the Niger Delta context. Through a critical review of relevant literature and triangulating observational and exploratory data from the field, this paper has developed a conceptual framework with three elements: (1 a preliminary scoping activity; (2 the vulnerability assessment; and (3 mainstreaming the results into institutional asset management codes. Scoping involves the definition of research aims and objectives, review of prevailing climate burdens and impacts, exploratory investigation, screening for new (planned assets and selection of relevant infrastructure. The emphasis on screening for planned infrastructure is to facilitate the incorporation of sustainable adaptive capacities into the original design of identified systems. A conceptual framework for vulnerability assessment is presented as a robust systematic iterative model for the evaluation of selected assets using an appropriate methodology. In this study, analytic hierarchy process (AHP is applied while mainstreaming as part of the research framework is emphasised to aid commercial implementation from an expert-based perspective. The study recommends the use of other suitable methodologies and systematic approaches to test the flexibility of the framework.

  14. Multiple operating system rotation environment moving target defense

    Science.gov (United States)

    Evans, Nathaniel; Thompson, Michael

    2016-03-22

    Systems and methods for providing a multiple operating system rotation environment ("MORE") moving target defense ("MTD") computing system are described. The MORE-MTD system provides enhanced computer system security through a rotation of multiple operating systems. The MORE-MTD system increases attacker uncertainty, increases the cost of attacking the system, reduces the likelihood of an attacker locating a vulnerability, and reduces the exposure time of any located vulnerability. The MORE-MTD environment is effectuated by rotation of the operating systems at a given interval. The rotating operating systems create a consistently changing attack surface for remote attackers.

  15. Target Allocation Methodology for China's Provinces: Energy Intensity in the 12th FIve-Year Plan

    Energy Technology Data Exchange (ETDEWEB)

    Ohshita, Stephanie; Price, Lynn

    2011-03-21

    Experience with China's 20% energy intensity improvement target during the 11th Five-Year Plan (FYP) (2006-2010) has shown the challenges of rapidly setting targets and implementing measures to meet them. For the 12th FYP (2011-2015), there is an urgent need for a more scientific methodology to allocate targets among the provinces and to track physical and economic indicators of energy and carbon saving progress. This report provides a sectoral methodology for allocating a national energy intensity target - expressed as percent change in energy per unit gross domestic product (GDP) - among China's provinces in the 12th FYP. Drawing on international experience - especially the European Union (EU) Triptych approach for allocating Kyoto carbon targets among EU member states - the methodology here makes important modifications to the EU approach to address an energy intensity rather than a CO{sub 2} emissions target, and for the wider variation in provincial energy and economic structure in China. The methodology combines top-down national target projections and bottom-up provincial and sectoral projections of energy and GDP to determine target allocation of energy intensity targets. Total primary energy consumption is separated into three end-use sectors - industrial, residential, and other energy. Sectoral indicators are used to differentiate the potential for energy saving among the provinces. This sectoral methodology is utilized to allocate provincial-level targets for a national target of 20% energy intensity improvement during the 12th FYP; the official target is determined by the National Development and Reform Commission. Energy and GDP projections used in the allocations were compared with other models, and several allocation scenarios were run to test sensitivity. The resulting allocations for the 12th FYP offer insight on past performance and offer somewhat different distributions of provincial targets compared to the 11th FYP. Recommendations for

  16. Safeguard Vulnerability Analysis Program (SVAP)

    International Nuclear Information System (INIS)

    Gilman, F.M.; Dittmore, M.H.; Orvis, W.J.; Wahler, P.S.

    1980-01-01

    This report gives an overview of the Safeguard Vulnerability Analysis Program (SVAP) developed at Lawrence Livermore National Laboratory. SVAP was designed as an automated method of analyzing the safeguard systems at nuclear facilities for vulnerabilities relating to the theft or diversion of nuclear materials. SVAP addresses one class of safeguard threat: theft or diversion of nuclear materials by nonviolent insiders, acting individually or in collusion. SVAP is a user-oriented tool which uses an interactive input medium for preprocessing the large amounts of safeguards data. Its output includes concise summary data as well as detailed vulnerability information

  17. Vulnerability of multiple-barrier systems

    International Nuclear Information System (INIS)

    Lind, N.C.

    1996-01-01

    'Vulnerability' is defined as the ratio of the probability of failure of a damaged system to the probability of failure of the undamaged system. This definition applies to all engineered systems and can be specialized to particular system types. Some disastrous failures (e.g., Chernobyl) have shown that systems can be highly vulnerable. open-quotes Defense in depthclose quotes is a powerful design principle, reducing vulnerability when the consequences of failure can be catastrophic. In the nuclear industry, defense in depth is widely used in radiation protection, reactor control, and shutdown systems. A multiple-barrier system is a simple example of a system that has defense in depth. The idea is that the system is not vulnerable. It cannot fail if one barrier fails because there is another to take its place. This idea is untenable in waste management, but a quantified vulnerability of a system can help owners, designers, and regulators decide how much defense in depth is desirable or enough. Many multiple-barrier systems can be modeled as systems of components physically in a series, each individually able to prevent failure. Components typically have bimodal distributions of the service time to failure, as illustrated by an example of application to a hypothetical nuclear fuel waste repository

  18. Ecosystems Vulnerability Challenge and Prize Competition

    Science.gov (United States)

    Smith, J. H.; Frame, M. T.; Ferriter, O.; Recker, J.

    2014-12-01

    Stimulating innovation and private sector entrepreneurship is an important way to advance the preparedness of communities, businesses and individuals for the impacts of climate change on certain aspects of ecosystems, such as: fire regimes; water availability; carbon sequestration; biodiversity conservation; weather-related hazards, and the spread of invasive species. The creation of tools is critical to help communities and natural resource managers better understand the impacts of climate change on ecosystems and the potential resulting implications for ecosystem services and conservation efforts. The Department of the Interior is leading an interagency effort to develop the Ecosystems Vulnerability theme as part of the President's Climate Action Plan. This effort will provide seamless access to relevant datasets that can help address such issues as: risk of wildfires to local communities and federal lands; water sensitivity to climate change; and understanding the role of ecosystems in a changing climate. This session will provide an overview of the proposed Ecosystem Vulnerability Challenge and Prize Competition, outlining the intended audience, scope, goals, and overall timeline. The session will provide an opportunity for participants to offer new ideas. Through the Challenge, access will be made available to critical datasets for software developers, engineers, scientists, students, and researchers to develop and submit applications addressing critical science issues facing our Nation today. Application submission criteria and guidelines will also be discussed. The Challenge will be open to all sectors and organizations (i.e. federal, non-federal, private sector, non-profits, and universities) within the United States. It is anticipated the Challenge will run from early January 2015 until spring of 2015.

  19. Fluctuation between grandiose and vulnerable narcissism.

    Science.gov (United States)

    Gore, Whitney L; Widiger, Thomas A

    2016-10-01

    Current literature on narcissistic personality disorder has emphasized a distinction between grandiose and vulnerable narcissism. Some researchers have further suggested that narcissistic persons fluctuate between grandiose and vulnerable narcissism. However, this perception has been confined largely to clinical experience with no systematic research testing the hypothesis. Clinicians and clinical psychology professors in the current study identified 143 persons who fit a description of either a grandiose or a vulnerable narcissist and indicated the extent to which these persons ever demonstrated traits of the complementary variant. The results supported the fluctuation hypothesis, particularly for episodes of vulnerable narcissism in persons identified as a grandiose narcissist. Correlations of the grandiose and vulnerable narcissism traits with a brief five-factor model measure corroborated past trait descriptions of the 2 respective variants of narcissism. The results of the current study are compared with existing cross-sectional and longitudinal research, and suggestions for future research are provided. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  20. Socio-Economic Vulnerability to Climate Change in California

    Science.gov (United States)

    Heberger, M. G.; Cooley, H.; Moore, E.; Garzon, C.

    2011-12-01

    The western United States faces a range of impacts from global climate change, including increases in extreme heat, wildfires, and coastal flooding and erosion; changes are also likely to occur in air quality, water availability, and the spread of infectious diseases. To date, a great deal of research has been done to forecast the physical effects of climate change, while less attention has been given to the factors make different populations more or less vulnerable to harm from such changes. For example, mortality rates from Hurricane Audrey, which struck the coast of Louisiana in 1957, were more than eight times higher among blacks than among whites. While disaster events may not discriminate, impacts on human populations are shaped by "intervening conditions" that determine the human impact of the flood and the specific needs for preparedness, response, and recovery. In this study, we analyze the potential impacts of climate change by using recent downscaled climate model outputs, creating a variety of statistics and visualizations to communicate potential impacts to community groups and decision makers, after several meetings with these groups to ask, "What types of information are most useful to you for planning?" We relate climate impacts to social vulnerability - defined as the intersection of the exposure, sensitivity, and adaptive capacity of a person or group of people - with a focus on the U.S. state of California. Understanding vulnerability factors and the populations that exhibit these factors are critical for crafting effective climate change policies and response strategies. It is also important to the emerging study of climate justice, which is the concept that no group of people should disproportionately bear the burden of climate impacts or the costs of mitigation and adaptation.

  1. Methods to Secure Databases Against Vulnerabilities

    Science.gov (United States)

    2015-12-01

    for several languages such as C, C++, PHP, Java and Python [16]. MySQL will work well with very large databases. The documentation references...using Eclipse and connected to each database management system using Python and Java drivers provided by MySQL , MongoDB, and Datastax (for Cassandra...tiers in Python and Java . Problem MySQL MongoDB Cassandra 1. Injection a. Tautologies Vulnerable Vulnerable Not Vulnerable b. Illegal query

  2. Feature-based plan adaptation for fast treatment planning in scanned ion beam therapy

    International Nuclear Information System (INIS)

    Chen Wenjing; Gemmel, Alexander; Rietzel, Eike

    2013-01-01

    We propose a plan adaptation method for fast treatment plan generation in scanned ion beam therapy. Analysis of optimized treatment plans with carbon ions indicates that the particle number modulation of consecutive rasterspots in depth shows little variation throughout target volumes with convex shape. Thus, we extract a depth-modulation curve (DMC) from existing reference plans and adapt it for creation of new plans in similar treatment situations. The proposed method is tested with seven CT serials of prostate patients and three digital phantom datasets generated with the MATLAB code. Plans are generated with a treatment planning software developed by GSI using single-field uniform dose optimization for all the CT datasets to serve as reference plans and ‘gold standard’. The adapted plans are generated based on the DMC derived from the reference plans of the same patient (intra-patient), different patient (inter-patient) and phantoms (phantom-patient). They are compared with the reference plans and a re-positioning strategy. Generally, in 1 min on a standard PC, either a physical plan or a biological plan can be generated with the adaptive method provided that the new target contour is available. In all the cases, the V95 values of the adapted plans can achieve 97% for either physical or biological plans. V107 is always 0 indicating no overdosage, and target dose homogeneity is above 0.98 in all cases. The dose received by the organs at risk is comparable to the optimized plans. The plan adaptation method has the potential for on-line adaptation to deal with inter-fractional motion, as well as fast off-line treatment planning, with either the prescribed physical dose or the RBE-weighted dose. (paper)

  3. Determining Vulnerability Importance in Environmental Impact Assessment

    International Nuclear Information System (INIS)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-01

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: ► The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. ► The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. ► A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. ► Results in Colombia highlight the usefulness and objectivity of this method.

  4. Global exposure and vulnerability to multi-sector development and climate change hotspots

    Science.gov (United States)

    Byers, Edward; Gidden, Matthew; Leclère, David; Balkovic, Juraj; Burek, Peter; Ebi, Kristie; Greve, Peter; Grey, David; Havlik, Petr; Hillers, Astrid; Johnson, Nils; Kahil, Taher; Krey, Volker; Langan, Simon; Nakicenovic, Nebjosa; Novak, Robert; Obersteiner, Michael; Pachauri, Shonali; Palazzo, Amanda; Parkinson, Simon; Rao, Narasimha D.; Rogelj, Joeri; Satoh, Yusuke; Wada, Yoshihide; Willaarts, Barbara; Riahi, Keywan

    2018-05-01

    Understanding the interplay between multiple climate change risks and socioeconomic development is increasingly required to inform effective actions to manage these risks and pursue sustainable development. We calculate a set of 14 impact indicators at different levels of global mean temperature (GMT) change and socioeconomic development covering water, energy and land sectors from an ensemble of global climate, integrated assessment and impact models. The analysis includes changes in drought intensity and water stress index, cooling demand change and heat event exposure, habitat degradation and crop yield, amongst others. To investigate exposure to multi-sector climate impacts, these are combined with gridded socioeconomic projections of population and those ‘vulnerable to poverty’ from three Shared Socioeconomic Pathways (SSP) (income populations vulnerable to poverty, the exposure is an order of magnitude greater (8–32x) in the high poverty and inequality scenarios (SSP3) compared to sustainable socioeconomic development (SSP1). Whilst 85%–95% of global exposure falls to Asian and African regions, they have 91%–98% of the exposed and vulnerable population (depending on SSP/GMT combination), approximately half of which in South Asia. In higher warming scenarios, African regions have growing proportion of the global exposed and vulnerable population, ranging from 7%–17% at 1.5 °C, doubling to 14%–30% at 2 °C and again to 27%–51% at 3 °C. Finally, beyond 2 °C and at higher risk thresholds, the world’s poorest are disproportionately impacted, particularly in cases (SSP3) of high inequality in Africa and southern Asia. Sustainable development that reduces poverty, mitigates emissions and meets targets in the water, energy and land sectors has the potential for order-of-magnitude scale reductions in multi-sector climate risk for the most vulnerable.

  5. An integrated risk and vulnerability assessment framework for climate change and malaria transmission in East Africa.

    Science.gov (United States)

    Onyango, Esther Achieng; Sahin, Oz; Awiti, Alex; Chu, Cordia; Mackey, Brendan

    2016-11-11

    Malaria is one of the key research concerns in climate change-health relationships. Numerous risk assessments and modelling studies provide evidence that the transmission range of malaria will expand with rising temperatures, adversely impacting on vulnerable communities in the East African highlands. While there exist multiple lines of evidence for the influence of climate change on malaria transmission, there is insufficient understanding of the complex and interdependent factors that determine the risk and vulnerability of human populations at the community level. Moreover, existing studies have had limited focus on the nature of the impacts on vulnerable communities or how well they are prepared to cope. In order to address these gaps, a systems approach was used to present an integrated risk and vulnerability assessment framework for studies of community level risk and vulnerability to malaria due to climate change. Drawing upon published literature on existing frameworks, a systems approach was applied to characterize the factors influencing the interactions between climate change and malaria transmission. This involved structural analysis to determine influential, relay, dependent and autonomous variables in order to construct a detailed causal loop conceptual model that illustrates the relationships among key variables. An integrated assessment framework that considers indicators of both biophysical and social vulnerability was proposed based on the conceptual model. A major conclusion was that this integrated assessment framework can be implemented using Bayesian Belief Networks, and applied at a community level using both quantitative and qualitative methods with stakeholder engagement. The approach enables a robust assessment of community level risk and vulnerability to malaria, along with contextually relevant and targeted adaptation strategies for dealing with malaria transmission that incorporate both scientific and community perspectives.

  6. The public transportation system security and emergency preparedness planning guide

    Science.gov (United States)

    2003-01-01

    Recent events have focused renewed attention on the vulnerability of the nation's critical infrastructure to major events, including terrorism. The Public Transportation System Security and Emergency Preparedness Planning Guide has been prepared to s...

  7. Development of whole-building energy design targets for commercial buildings: Phase 1, Planning: Volume 2, Technical report

    Energy Technology Data Exchange (ETDEWEB)

    Crawley, D.B.; Briggs, R.S.; Jones, J.W.; Seaton, W.W.; Kaufman, J.E.; Deringer, J.J.; Kennett, E.W.

    1987-08-01

    This is the second volume of the Phase 1 report and discusses the 10 tasks performed in Phase 1. The objective of this research is to develop a methodology for setting energy design targets to provide voluntary guidelines for the buildings industry. The whole-building energy targets project is being conducted at the Pacific Northwest Laboratory (PNL) for the US Department of Energy (DOE) to encourage the construction of energy-efficient buildings by informing designers and owners about cost-effective goals for energy use in new commercial buildings. The outcome of this research will be a flexible methodology for setting such targets. The tasks are listed and discussed in this report as follows: Task 1 - Develop Detailed Project Goals and Objectives; Task 2 - Establish Buildings-Industry Liaison; Task 3 - Develop Approaches to the Energy Targets Model, Building Operations, and Climate; Task 4 - Develop an Approach for Treating Economic Considerations; Task 5 - Develop an Approach for Treating Energy Sources; Task 6 - Collect Energy-Use Data; Task 7 - Survey Energy Expert Opinion; Task 8 - Evaluation Procedure Specification and Integration; Task 9 - Phase 1 Report Development; and Task 10 - Phase 1 Review Planning.

  8. Analysis of Zero-Day Vulnerabilities in Java

    OpenAIRE

    Marius Popa

    2013-01-01

    The zero-day vulnerability is a security lack of the computer system that is unknown to software vendor. This kind of vulnerability permits building attack strategies for gaining the access to the resources and data of a computer system. The main issue of the topic is how a computer system can be protected by zero-day vulnerabilities using the actual security procedures and tools for identifying the potential attacks that exploit the vulnerabilities unknown to computer users and software prov...

  9. Spent Fuel Working Group report on inventory and storage of the Department`s spent nuclear fuel and other reactor irradiated nuclear materials and their environmental, safety and health vulnerabilities. Volume 2, Working Group Assessment Team reports; Vulnerability development forms; Working group documents

    Energy Technology Data Exchange (ETDEWEB)

    1993-11-01

    The Secretary of Energy`s memorandum of August 19, 1993, established an initiative for a Department-wide assessment of the vulnerabilities of stored spent nuclear fuel and other reactor irradiated nuclear materials. A Project Plan to accomplish this study was issued on September 20, 1993 by US Department of Energy, Office of Environment, Health and Safety (EH) which established responsibilities for personnel essential to the study. The DOE Spent Fuel Working Group, which was formed for this purpose and produced the Project Plan, will manage the assessment and produce a report for the Secretary by November 20, 1993. This report was prepared by the Working Group Assessment Team assigned to the Hanford Site facilities. Results contained in this report will be reviewed, along with similar reports from all other selected DOE storage sites, by a working group review panel which will assemble the final summary report to the Secretary on spent nuclear fuel storage inventory and vulnerability.

  10. Coastal vulnerability assessment using Fuzzy Logic and Bayesian Belief Network approaches

    Science.gov (United States)

    Valentini, Emiliana; Nguyen Xuan, Alessandra; Filipponi, Federico; Taramelli, Andrea

    2017-04-01

    Natural hazards such as sea surge are threatening low-lying coastal plains. In order to deal with disturbances a deeper understanding of benefits deriving from ecosystem services assessment, management and planning can contribute to enhance the resilience of coastal systems. In this frame assessing current and future vulnerability is a key concern of many Systems Of Systems SOS (social, ecological, institutional) that deals with several challenges like the definition of Essential Variables (EVs) able to synthesize the required information, the assignment of different weight to be attributed to each considered variable, the selection of method for combining the relevant variables. It is widely recognized that ecosystems contribute to human wellbeing and then their conservation increases the resilience capacities and could play a key role in reducing climate related risk and thus physical and economic losses. A way to fully exploit ecosystems potential, i.e. their so called ecopotential (see H2020 EU funded project "ECOPOTENTIAL"), is the Ecosystem based Adaptation (EbA): the use of ecosystem services as part of an adaptation strategy. In order to provide insight in understanding regulating ecosystem services to surge and which variables influence them and to make the best use of available data and information (EO products, in situ data and modelling), we propose a multi-component surge vulnerability assessment, focusing on coastal sandy dunes as natural barriers. The aim is to combine together eco-geomorphological and socio-economic variables with the hazard component on the base of different approaches: 1) Fuzzy Logic; 2) Bayesian Belief Networks (BBN). The Fuzzy Logic approach is very useful to get a spatialized information and it can easily combine variables coming from different sources. It provides information on vulnerability moving along-shore and across-shore (beach-dune transect), highlighting the variability of vulnerability conditions in the spatial

  11. The Tsunami Vulnerability Assessment of Urban Environments through Freely Available Datasets: The Case Study of Napoli City (Southern Italy

    Directory of Open Access Journals (Sweden)

    Ines Alberico

    2015-09-01

    Full Text Available The analysis of tsunami catalogues and of data published on the NOAA web site pointed out that in the Mediterranean basin, from 2000 B.C. to present, about 480 tsunamis occurred, of which at least a third involved the Italian peninsula. Within this framework, a GIS-aided procedure that takes advantage of spatial analysis to apply the Papathoma Tsunami Vulnerability Assessment model of urban environments is presented, with the main purpose of assessing the vulnerability of wide areas at spatial resolution of the census district. The method was applied to the sector of Napoli city enclosed between Posillipo Hill and the Somma-Vesuvio volcano because of the high population rates (apex value of 5000 inh/km2 and potential occurrence of hazardous events such as earthquakes, volcanic eruptions and mass failures that can trigger tsunamis. The vulnerability status of the urban environment was depicted on a map. About 21% of the possibly inundated area, corresponding with the lowlands along the shoreline, shows a very high tsunami vulnerability. High vulnerability characterizes 26% of inundable zones while medium-low vulnerability typifies a wide area of the Sebeto-Volla plain, ca 800 m away from the shoreline. This map represents a good tool to plan the actions aimed at reducing risk and promoting resilience of the territory.

  12. Security Events and Vulnerability Data for Cybersecurity Risk Estimation.

    Science.gov (United States)

    Allodi, Luca; Massacci, Fabio

    2017-08-01

    Current industry standards for estimating cybersecurity risk are based on qualitative risk matrices as opposed to quantitative risk estimates. In contrast, risk assessment in most other industry sectors aims at deriving quantitative risk estimations (e.g., Basel II in Finance). This article presents a model and methodology to leverage on the large amount of data available from the IT infrastructure of an organization's security operation center to quantitatively estimate the probability of attack. Our methodology specifically addresses untargeted attacks delivered by automatic tools that make up the vast majority of attacks in the wild against users and organizations. We consider two-stage attacks whereby the attacker first breaches an Internet-facing system, and then escalates the attack to internal systems by exploiting local vulnerabilities in the target. Our methodology factors in the power of the attacker as the number of "weaponized" vulnerabilities he/she can exploit, and can be adjusted to match the risk appetite of the organization. We illustrate our methodology by using data from a large financial institution, and discuss the significant mismatch between traditional qualitative risk assessments and our quantitative approach. © 2017 Society for Risk Analysis.

  13. Detailed statistical analysis plan for the target temperature management after out-of-hospital cardiac arrest trial

    DEFF Research Database (Denmark)

    Nielsen, Niklas; Winkel, Per; Cronberg, Tobias

    2013-01-01

    Animal experimental studies and previous randomized trials suggest an improvement in mortality and neurological function with temperature regulation to hypothermia after cardiac arrest. According to a systematic review, previous trials were small, had a risk of bias, evaluated select populations......, and did not treat hyperthermia in the control groups. The optimal target temperature management (TTM) strategy is not known. To prevent outcome reporting bias, selective reporting and data-driven results, we present the a priori defined detailed statistical analysis plan as an update to the previously...

  14. Gene expression levels of matrix metalloproteinases in human atherosclerotic plaques and evaluation of radiolabeled inhibitors as imaging agents for plaque vulnerability

    International Nuclear Information System (INIS)

    Müller, Adrienne; Krämer, Stefanie D.; Meletta, Romana; Beck, Katharina; Selivanova, Svetlana V.; Rancic, Zoran; Kaufmann, Philipp A.; Vos, Bernhard; Meding, Jörg; Stellfeld, Timo; Heinrich, Tobias K.; Bauser, Marcus; Hütter, Joachim; Dinkelborg, Ludger M.; Schibli, Roger; Ametamey, Simon M.

    2014-01-01

    Introduction: Atherosclerotic plaque rupture is the primary cause for myocardial infarction and stroke. During plaque progression macrophages and mast cells secrete matrix-degrading proteolytic enzymes, such as matrix metalloproteinases (MMPs). We studied levels of MMPs and tissue inhibitor of metalloproteinases-3 (TIMP-3) in relation to the characteristics of carotid plaques. We evaluated in vitro two radiolabeled probes targeting active MMPs towards non-invasive imaging of rupture-prone plaques. Methods: Human carotid plaques obtained from endarterectomy were classified into stable and vulnerable by visual and histological analysis. MMP-1, MMP-2, MMP-8, MMP-9, MMP-10, MMP-12, MMP-14, TIMP-3, and CD68 levels were investigated by quantitative polymerase chain reaction. Immunohistochemistry was used to localize MMP-2 and MMP-9 with respect to CD68-expressing macrophages. Western blotting was applied to detect their active forms. A fluorine-18-labeled MMP-2/MMP-9 inhibitor and a tritiated selective MMP-9 inhibitor were evaluated by in vitro autoradiography as potential lead structures for non-invasive imaging. Results: Gene expression levels of all MMPs and CD68 were elevated in plaques. MMP-1, MMP-9, MMP-12 and MMP-14 were significantly higher in vulnerable than stable plaques. TIMP-3 expression was highest in stable and low in vulnerable plaques. Immunohistochemistry revealed intensive staining of MMP-9 in vulnerable plaques. Western blotting confirmed presence of the active form in plaque lysates. In vitro autoradiography showed binding of both inhibitors to stable and vulnerable plaques. Conclusions: MMPs differed in their expression patterns among plaque phenotypes, providing possible imaging targets. The two tested MMP-2/MMP-9 and MMP-9 inhibitors may be useful to detect atherosclerotic plaques, but not the vulnerable lesions selectively

  15. Compact or spread-out cities: Urban planning, taxation, and the vulnerability to transportation shocks

    International Nuclear Information System (INIS)

    Gusdorf, Francois; Hallegatte, Stephane

    2007-01-01

    This paper shows that cities made more compact by transportation taxation are more robust than spread-out cities to shocks in transportation costs. Such a shock, indeed, entails negative transition effects that are caused by housing infrastructure inertia and are magnified in low-density cities. Distortions due to a transportation tax, however, have in absence of shock detrimental consequences that need to be accounted for. The range of beneficial tax levels can, therefore, be identified as a function of the possible magnitude of future shocks in transportation costs. These taxation levels, which can reach significant values, reduce city vulnerability and prevent lock-ins in under-optimal situations

  16. Developing a Comprehensive and Integrated Vulnerability Assessment Methodology for the Defense Department's Critical Infrastructure Protection (CIP) Program. A Report Supporting CIP Program Outread and Education

    National Research Council Canada - National Science Library

    2003-01-01

    ...) strategy for Outreach, Education, and Training. It seeks to help those interested in understanding the Defense Department's current concepts and plans for developing CIP-specific vulnerability assessments...

  17. Global analysis of urban surface water supply vulnerability

    International Nuclear Information System (INIS)

    Padowski, Julie C; Gorelick, Steven M

    2014-01-01

    This study presents a global analysis of urban water supply vulnerability in 71 surface-water supplied cities, with populations exceeding 750 000 and lacking source water diversity. Vulnerability represents the failure of an urban supply-basin to simultaneously meet demands from human, environmental and agricultural users. We assess a baseline (2010) condition and a future scenario (2040) that considers increased demand from urban population growth and projected agricultural demand. We do not account for climate change, which can potentially exacerbate or reduce urban supply vulnerability. In 2010, 35% of large cities are vulnerable as they compete with agricultural users. By 2040, without additional measures 45% of cities are vulnerable due to increased agricultural and urban demands. Of the vulnerable cities in 2040, the majority are river-supplied with mean flows so low (1200 liters per person per day, l/p/d) that the cities experience ‘chronic water scarcity’ (1370 l/p/d). Reservoirs supply the majority of cities facing individual future threats, revealing that constructed storage potentially provides tenuous water security. In 2040, of the 32 vulnerable cities, 14 would reduce their vulnerability via reallocating water by reducing environmental flows, and 16 would similarly benefit by transferring water from irrigated agriculture. Approximately half remain vulnerable under either potential remedy. (letter)

  18. Functional avoidance of lung in plan optimization with an aperture-based inverse planning system

    International Nuclear Information System (INIS)

    St-Hilaire, Jason; Lavoie, Caroline; Dagnault, Anne; Beaulieu, Frederic; Morin, Francis; Beaulieu, Luc; Tremblay, Daniel

    2011-01-01

    Purpose: To implement SPECT-based optimization in an anatomy-based aperture inverse planning system for the functional avoidance of lung in thoracic irradiation. Material and methods: SPECT information has been introduced as a voxel-by-voxel modulation of lung importance factors proportionally to the local perfusion count. Fifteen cases of lung cancer have been retrospectively analyzed by generating angle-optimized non-coplanar plans, comparing a purely anatomical approach and our functional approach. Planning target volume coverage and lung sparing have been compared. Statistical significance was assessed by a Wilcoxon matched pairs test. Results: For similar target coverage, perfusion-weighted volume receiving 10 Gy was reduced by a median of 2.2% (p = 0.022) and mean perfusion-weighted lung dose, by a median of 0.9 Gy (p = 0.001). A separate analysis of patients with localized or non-uniform hypoperfusion could not show which would benefit more from SPECT-based treatment planning. Redirection of dose sometimes created overdosage regions in the target volume. Plans consisted of a similar number of segments and monitor units. Conclusions: Angle optimization and SPECT-based modulation of importance factors allowed for functional avoidance of the lung while preserving target coverage. The technique could be also applied to implement PET-based modulation inside the target volume, leading to a safer dose escalation.

  19. Automatic planning of head and neck treatment plans

    DEFF Research Database (Denmark)

    Hazell, Irene; Bzdusek, Karl; Kumar, Prashant

    2016-01-01

    radiation dose planning (dosimetrist) and potentially improve the overall plan quality. This study evaluates the performance of the Auto-Planning module that has recently become clinically available in the Pinnacle3 radiation therapy treatment planning system. Twenty-six clinically delivered head and neck...... as the previously delivered clinical plans. For all patients, the Auto-Planning tool produced clinically acceptable head and neck treatment plans without any manual intervention, except for the initial target and OAR delineations. The main benefit of the method is the likely improvement in the overall treatment......Treatment planning is time-consuming and the outcome depends on the person performing the optimization. A system that automates treatment planning could potentially reduce the manual time required for optimization and could also pro-vide a method to reduce the variation between persons performing...

  20. A Framework for Disaster Vulnerability in a Small Island in the Southwest Pacific: A Case Study of Emae Island, Vanuatu

    Institute of Scientific and Technical Information of China (English)

    Guy Jackson; Karen McNamara; Bradd Witt

    2017-01-01

    The societal costs of disasters around the world are continuing to increase and Pacific Island countries are considered some of the most vulnerable.This is primarily due to a combination of high hazard exposure coupled with a range of social,economic,physical,and political vulnerabilities.This article contributes to the growing body of work that aims to understand the causal factors of disaster vulnerability,but with a specific focus on small island developing states.The article first develops a framework for understanding disaster vulnerability,drawing on extensive literature and the well-established Methods for the Improvement of Vulnerability in Europe (MOVE) framework,and second,applies this adapted framework using empirically-derived data from fieldwork on Emae Island,Vanuatu to provide a working understanding of the causal elements of disaster vulnerability.Drawn from a significant body of scholarship at the time,the MOVE framework was primarily developed as a heuristic tool in which disaster vulnerability is considered to be a function of exposure,susceptibility (socially,economically,physically,culturally,environmentally,institutionally),and a lack of resilience.We posit that this adapted framework for small islands should also include historical susceptibility,and we prefer livelihood resilience (as capabilities,social capital,knowledge,participation,and human rights) over lack of resilience.We maintain that understanding disaster vulnerability holistically,which is inclusive of both strengths and drawbacks,is crucial to ensure that limited resources can target the causal factors that produce vulnerability and help safeguard and improve livelihoods in both the short and long term.