Determining Vulnerability Importance in Environmental Impact Assessment
International Nuclear Information System (INIS)
Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat
2012-01-01
The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: ► The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. ► The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. ► A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. ► Results in Colombia highlight the usefulness and objectivity of this method.
Oil vulnerability index of oil-importing countries
International Nuclear Information System (INIS)
Gupta, Eshita
2008-01-01
This paper assesses the relative oil vulnerability of 26 net oil-importing countries for the year 2004 on the basis of various indicators - the ratio of value of oil imports to gross domestic product (GDP), oil consumption per unit of GDP, GDP per capita and oil share in total energy supply, ratio of domestic reserves to oil consumption, exposure to geopolitical oil market concentration risks as measured by net oil import dependence, diversification of supply sources, political risk in oil-supplying countries, and market liquidity. The approach using the principal component technique has been adopted to combine these individual indicators into a composite index of oil vulnerability. Such an index captures the relative sensitivity of various economies towards developments of the international oil market, with a higher index indicating higher vulnerability. The results show that there are considerable differences in the values of individual indicators of oil vulnerability and overall oil vulnerability index among the countries (both inter and intraregional). (author)
Oil vulnerability index of oil-importing countries
Energy Technology Data Exchange (ETDEWEB)
Gupta, Eshita [The Energy and Resources Institute, Darbari Seth Block, Habitat Place, New Delhi 110 003 (India)
2008-03-15
This paper assesses the relative oil vulnerability of 26 net oil-importing countries for the year 2004 on the basis of various indicators - the ratio of value of oil imports to gross domestic product (GDP), oil consumption per unit of GDP, GDP per capita and oil share in total energy supply, ratio of domestic reserves to oil consumption, exposure to geopolitical oil market concentration risks as measured by net oil import dependence, diversification of supply sources, political risk in oil-supplying countries, and market liquidity. The approach using the principal component technique has been adopted to combine these individual indicators into a composite index of oil vulnerability. Such an index captures the relative sensitivity of various economies towards developments of the international oil market, with a higher index indicating higher vulnerability. The results show that there are considerable differences in the values of individual indicators of oil vulnerability and overall oil vulnerability index among the countries (both inter and intraregional). (author)
A pragmatic analysis of vulnerability in clinical research.
Wendler, David
2017-09-01
Identifying which subjects are vulnerable, and implementing safeguards to protect them, is widely regarded as essential to clinical research. Commentators have endorsed a number of responses to these challenges and have thereby made significant progress in understanding vulnerability in clinical research. At the same time, this literature points to a central contradiction which calls into question its potential to protect vulnerable subjects in practice. Specifically, analysis suggests that all human subjects are vulnerable and vulnerability in clinical research is comparative and context dependent, in the sense that individuals are vulnerable relative to others and in some contexts only. Yet, if everyone is vulnerable, there seems to be no point in citing the vulnerability of some individuals. Moreover, the conclusion that everyone is vulnerable seems inconsistent with the claims that vulnerability is comparative and context dependent, raising concern over whether it will be possible to develop a comprehensive account of vulnerability that is internally consistent. The solution to this dilemma lies in recognition of the fact that the practical significance of claims regarding vulnerability depends on the context in which they are used. The claims that appear to lead to the central contradiction are in fact accurate conclusions that follow from different uses of the term 'vulnerability'. The present manuscript describes this 'pragmatic' approach to vulnerability in clinical research and considers its implications for ensuring that subjects receive appropriate protection. Published 2017. This article is a U.S. Government work and is in the public domain in the USA.
Factors Contributing to Exacerbating Vulnerabilities in Global Clinical Trials
da Silva, Ricardo E.; Amato, Angélica A.; Guilhem, Dirce B.; de Carvalho, Marta R.; Lima, Elisangela da C.; Novaes, Maria Rita C. G.
2018-01-01
Background: Although policies and guidelines make use of the concept of vulnerability, few define it. The European Union's directive for clinical trials does not include explanations for or the reasoning behind the designation of certain groups as vulnerable. Emerging economies from lower middle-income countries have, in recent years, had the largest average annual growth rate, as well as increase, in number of clinical trials registered in the US government's database. Nevertheless, careful supervision of research activities has to be ensured. Objective: To describe and analyze the features of the clinical trials involving vulnerable populations in various countries classified by development status and geographic region. Methods: Retrospective study that involved analysis of data obtained from the International Clinical Trials Registry Platform (ICTRP) database between 01/2014 and 12/2014 from countries with (i) highest trial densities during 2005 to 2012, (ii) highest average growth rate in clinical trials, and (iii) greatest trial capabilities. Results: Statistical analysis of this study showed that patients incapable of giving consent personally are 11.4 times more likely to be vulnerable patients than patients who are capable, and that patients in upper-middle-income countries are 1.7 times more likely to be vulnerable patients than patients from high-income countries when participating in global clinical trials. Malaysia (21%), Egypt (20%), Turkey (19%), Israel (18%), and Brazil (17%) had the highest percentages of vulnerable populations involving children. Conclusions: Although the inability to provide consent personally was a factor associated with vulnerability, arbitrary criteria may have been considered when classifying the populations of clinical trials as vulnerable. The EU Clinical Trials Register should provide guidance regarding exactly what aspects or factors should be taken into account to frame given populations as vulnerable, because
International Nuclear Information System (INIS)
Lilliestam, Johan
2014-01-01
The decarbonised future European electricity system must remain secure: reliable electricity supply is a prerequisite for the functioning of modern society. Scenarios like Desertec, which partially rely on solar power imports from the Middle East and North Africa, may be attractive for decarbonisation, but raise concerns about terrorists interrupting supply by attacking the long, unprotected transmission lines in the Sahara. In this paper, I develop new methods and assess the European vulnerability to terrorist attacks in the Desertec scenario. I compare this to the vulnerability of today's system and a decarbonisation scenario in which Europe relies on gas imports for electricity generation. I show that the vulnerability of both gas and electricity imports is low, but electricity imports are more vulnerable than gas imports, due to their technical characteristics. Gas outages (and, potentially, resulting blackouts) are the very unlikely consequence even of very high-number attacks against the gas import system, whereas short blackouts are the potential consequence of a few attacks against the import electricity lines. As the impacts of all except extreme attacks are limited, terrorists cannot attack energy infrastructure and cause spectacular, fear-creating outages. Both gas and electricity import infrastructure are thus unattractive and unlikely terrorist targets. - Highlights: • A comparison of terrorism risks of importing solar power and gas for power generation. • Both scenarios show low vulnerability to terrorist attacks. • Within low vulnerabilities, gas imports are less vulnerable than electricity imports. • Causing spectacular, large and long outages is very difficult for attacker. • The attractiveness of gas and power import infrastructure as terrorist target is low
[Clinical trials: vulnerability and ethical relativism].
Lima, Cristina
2005-01-01
Research in human beings is an important chapter of medical ethics. In recent years, investigation has been taken over by profit driven corporations that must guarantee the medical and commercial application of results. This new model of investigation has generated conflicts of interest in doctor-patient, researcher-subject relationship. The inevitable debate and media reaction has led. These trials of controversial design to regions of the globe where the vulnerability of the populations continues to allow their undertaking. This article includes a historical perspective on experimentation in human beings and the conditions that led to its regulation: the Nuremberg CODE, followed by the Helsinky Declaration in its different versions, and the Belmont Report, that defend the subject according to the ethic of principles used in western medicine. There is then a review of the attempts to change international regulation to reintroduce clinical trials with placebo--which since 1996 is only permitted where there are no therapeutic or diagnostic methods--on populations that would otherwise have no access to treatment. This then leads on to the issue of double standards in medical investigation defended by many investigators and some official entities. The article concludes that it may be prudent to allow local ethical commissions to approve deviation from the established norm if such is necessary to resolve urgent questions of health in the country, but it is unacceptable that any such emergency is used as a reason to reduce the ethical prerequisites, in clinical trials. It also concludes that true urgency is in making available to all who need it the effective products already in existence. Furthermore, that the acceptance of ethical relativism can result in the exploitation of vulnerable third world populations for research programmes that cannot be undertaken in their sponsoring countries due to the ethical restrictions in place.
International Nuclear Information System (INIS)
Nicholson, Charles D.; Barker, Kash; Ramirez-Marquez, Jose E.
2016-01-01
This work develops and compares several flow-based vulnerability measures to prioritize important network edges for the implementation of preparedness options. These network vulnerability measures quantify different characteristics and perspectives on enabling maximum flow, creating bottlenecks, and partitioning into cutsets, among others. The efficacy of these vulnerability measures to motivate preparedness options against experimental geographically located disruption simulations is measured. Results suggest that a weighted flow capacity rate, which accounts for both (i) the contribution of an edge to maximum network flow and (ii) the extent to which the edge is a bottleneck in the network, shows most promise across four instances of varying network sizes and densities. - Highlights: • We develop new flow-based measures of network vulnerability. • We apply these measures to determine the importance of edges after disruptions. • Networks of varying size and density are explored.
Importance of biometrics to addressing vulnerabilities of the U.S. infrastructure
Arndt, Craig M.; Hall, Nathaniel A.
2004-08-01
Human identification technologies are important threat countermeasures in minimizing select infrastructure vulnerabilities. Properly targeted countermeasures should be selected and integrated into an overall security solution based on disciplined analysis and modeling. Available data on infrastructure value, threat intelligence, and system vulnerabilities are carefully organized, analyzed and modeled. Prior to design and deployment of an effective countermeasure; the proper role and appropriateness of technology in addressing the overall set of vulnerabilities is established. Deployment of biometrics systems, as with other countermeasures, introduces potentially heightened vulnerabilities into the system. Heightened vulnerabilities may arise from both the newly introduced system complexities and an unfocused understanding of the set of vulnerabilities impacted by the new countermeasure. The countermeasure's own inherent vulnerabilities and those introduced by the system's integration with the existing system are analyzed and modeled to determine the overall vulnerability impact. The United States infrastructure is composed of government and private assets. The infrastructure is valued by their potential impact on several components: human physical safety, physical/information replacement/repair cost, potential contribution to future loss (criticality in weapons production), direct productivity output, national macro-economic output/productivity, and information integrity. These components must be considered in determining the overall impact of an infrastructure security breach. Cost/benefit analysis is then incorporated in the security technology deployment decision process. Overall security risks based on system vulnerabilities and threat intelligence determines areas of potential benefit. Biometric countermeasures are often considered when additional security at intended points of entry would minimize vulnerabilities.
Vulnerability, Borderline Personality Disorders. Clinical and ...
African Journals Online (AJOL)
Borderline personality disorder and vulnerability are difficult to assess and are rather elusive to define. A case study material is presented from a cognitive analytical model. An attempt of the dominant features of cognitive analytical therapy and discussion of vulnerability in relation to personality disorder is provided.
U.S. oil-import vulnerability: The technical replacement capability
International Nuclear Information System (INIS)
1991-10-01
The report examines the changes that have taken place in world oil markets and the U.S. economy since 1984 and provides revised estimates of the technical oil replacement potential that might be attained in the event of a severe and long lasting cutoff of imported oil. The analysis focuses on technologies that are commercially available today or will be within the next 5 years and that are among the most cost-effective methods for replacing oil use in applicable sectors. It also considers the economic impacts of adopting an aggressive oil replacement strategy in a severe oil emergency. The report presents a variety of policy options that could help accelerate the adoption of oil replacement technologies in preparation for, or in response to, a severe supply disruption, or as part of a long-term national policy to reduce import vulnerability. The report concludes that U.S. capability to replace lost oil imports is shrinking. Market forces alone will not be sufficient to overcome the substantial economic and social dislocations that could result from a prolonged major oil disruption
Emerging Technology Update Intravascular Photoacoustic Imaging of Vulnerable Atherosclerotic Plaque.
Wu, Min; Fw van der Steen, Antonius; Regar, Evelyn; van Soest, Gijs
2016-10-01
The identification of vulnerable atherosclerotic plaques in the coronary arteries is emerging as an important tool for guiding atherosclerosis diagnosis and interventions. Assessment of plaque vulnerability requires knowledge of both the structure and composition of the plaque. Intravascular photoacoustic (IVPA) imaging is able to show the morphology and composition of atherosclerotic plaque. With imminent improvements in IVPA imaging, it is becoming possible to assess human coronary artery disease in vivo . Although some challenges remain, IVPA imaging is on its way to being a powerful tool for visualising coronary atherosclerotic features that have been specifically associated with plaque vulnerability and clinical syndromes, and thus such imaging might become valuable for clinical risk assessment in the catheterisation laboratory.
Energy vulnerability relationships
Energy Technology Data Exchange (ETDEWEB)
Shaw, B.R.; Boesen, J.L.
1998-02-01
The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.
U.S. oil import vulnerability: The technical replacement capability. Summary
International Nuclear Information System (INIS)
1991-10-01
The report examines the changes that have taken place in world oil markets and the U.S. economy since 1984 and provides revised estimates of the technical oil replacement potential that might be attained in the event of a severe and long lasting cutoff of imported oil. The analysis focuses on technologies that are commercially available today or will be within the next 5 years and that are among the most cost-effective methods for replacing oil use in applicable sectors. It also considers the economic impacts of adopting an aggressive oil replacement strategy in a severe oil emergency. The report presents a variety of policy options that could help accelerate the adoption of oil replacement technologies in preparation for, or in response to, a severe supply disruption, or as part of a long-term national policy to reduce import vulnerability. The report's conclusion that U.S. capability to replace lost oil imports is shrinking should be sobering to those who believe that there are quick and easy technological solutions, or that market forces alone will be sufficient to overcome the substantial economic and social dislocations that could result from a prolonged major oil disruption
Koleva, Yordanka Nikolova
Chronic diseases are increasingly recognized as major contributors to the global burden of disease. Individuals with chronic disease are particularly vulnerable during mass emergencies as they may suffer an interruption in their therapeutic programs, leading to life-threatening conditions and complications. Based on the individual and community risk factors framework, three categories are defined as the most vulnerable to extreme natural events: physically, psychologically, and socially vulnerable. Complex emergencies that occurred in the recent decade have provided evidence that these groups suffer more pronounced effects than others. Individuals seeking community support during emergencies have been predominantly medically dependent, elderly, children, people with chronic health conditions, and lower socioeconomic status. The purpose of this study was to investigate the effect of health-related vulnerability on shelter operations, and to estimate the burden of chronic disease on community resources following catastrophic events. A comprehensive survey data collection conducted by the United States Public Health Service in 2005 was used to evaluate clinical services for populations with health conditions accommodated by Louisiana temporary disaster shelters. Correlation and multiple regression analyses determined the relationship between shelter characteristics and the factors predicting shelters' needs for short-term assistance. Significant predictors were identified in all three explored domains: structural shelter characteristics (sponsor, interpreter needed); clinical characteristics (access to health providers, clinic on site, staff had no days off); population characteristics (census, compromised mental health alone, or in combination with chronic conditions and diseases with epidemic potential). Shelters sponsored by faith-based organizations were less likely to be in risk of rapid resource depletion. Shelters with large census demonstrated association with
The Importance of Recognition of Consumer Vulnerability in the Time of Scheduled Obsolescence
Batista, Daniela Ferreira Dias
2016-01-01
This article was prepared with the objective of favoring reflections on the need to implement the principle of consumer vulnerability, especially with the so-called programmed obsolescence, a common practice of suppliers that make available on the market goods with unilaterally determined "validities" that do not Correspond with their actual useful life, but with the possibility of becoming outdated. The importance of the theme is evidenced in the day-to-day life of the current society in whi...
Directory of Open Access Journals (Sweden)
Matis Dumitru
2012-07-01
Full Text Available This empirical study comprises items related to the operationalization of the concept True and Fair View in day to day accounting issues in Romanian accounting environment, demarche based on which we were interested in assessing the vulnerability of the concept and also the importance attributed by Romanian practitioners. If the vulnerability is high and the importance attributed low, the concept True and Fair View `s importance as an overall basis of accounting is limited, fact that will affect the quality of accounting information. The categories approached were chosen based on their implication related to the operationalization of the concept. The company’s financial directors are responsible for ensuring that the financial statements give True and Fair View and in the same manner the expert accountants must consider it important in order to prepare the financial statements in accordance to its requirements and finally the financial auditors must assess its existence, otherwise if this principle is neglected the companies would consequently present spurious results of their activity. All the categories above asserted that the concept doesn’t have only a symbolic role at the national level and their implication in achieving its requirements can be characterized by a proactive attitude. When it comes to assessing the potential vulnerability of TFV, our respondents agreed that items like legislative ambiguity and accounting estimates have the potential to affect TFV construct in the practical side of accounting.
Wekerle, Christine; Wall, Anne-Marie; Leung, Eman; Trocmé, Nico
2007-04-01
Our goal is to assess the effect of caregiver vulnerabilities, singly and in combination, on the substantiation of child abuse (physical, sexual) and neglect, while controlling for relevant background variables. We test the moderator role of adult partner violence in qualifying the relationship between caregiver vulnerabilities and maltreatment substantiation. Secondary analyses of the 1998 Canadian Incidence Study of Reported Child Maltreatment (CIS) are used to predict child protective service investigation substantiation versus non-substantiation from a range of caregiver vulnerability factors. Involvement in partner violence was examined as a moderator in the relation between caregiver vulnerabilities and maltreatment substantiation. The CIS is an epidemiological survey of first-reported cases to child protective services, using a random sample of child welfare agencies across Canada. Child welfare workers completed a research form on the child, primary caregiver, family, perpetrator, severity and type of maltreatment, as well as services and court outcomes. All maltreatment classifications were assigned according to the Canadian legal definition of child abuse and neglect. Hierarchical logistic regression analyses were used, with stepped entry of: (1) demographic factors, socioeconomic disadvantage, and caregiver's own history of maltreatment; (2) caregiver vulnerability factors; (3) involvement in partner violence; (4) the interaction between caregiver vulnerability and partner violence. Caregiver substance abuse was found to be the single most potent kind of caregiver vulnerability in predicting maltreatment substantiation. When the total number of vulnerabilities was used as the predictor, prediction across all types of maltreatment increased, especially for substantiated neglect. Analyses also showed that the presence of partner violence in the home exacerbated the effect of caregiver vulnerability on substantiation. The total number of caregiver
The Relationship between Grandiose and Vulnerable (Hypersensitive Narcissism
Directory of Open Access Journals (Sweden)
Emanuel Jauk
2017-09-01
Full Text Available Narcissistic grandiosity is characterized by overt expressions of feelings of superiority and entitlement, while narcissistic vulnerability reflects hypersensitivity and introversive self-absorbedness. Clinical evidence suggests that grandiosity is accompanied by vulnerable aspects, pointing to a common foundation. Subclinical personality research, however, views grandiose and vulnerable narcissism as independent traits. Grandiose narcissism displays substantial correlation with extraversion, while vulnerable narcissism correlates highly with introversion. We investigated if (1 controlling for intro-/extraversion might reveal a “common core” of grandiose and vulnerable narcissism, and if (2 the correlation between both aspects might be higher at higher levels of narcissism. Latent variable structural equation modeling and segmented regression analysis confirmed these hypotheses in a large non-clinical sample (N = 1,006. Interindividual differences in intro-/extraversion mask the common core of grandiose and vulnerable narcissism. The association between both aspects increases at high levels (upper 10% of grandiose narcissism, which suggests a possible transition to clinically relevant (pathological narcissism.
The Relationship between Grandiose and Vulnerable (Hypersensitive) Narcissism
Jauk, Emanuel; Weigle, Elena; Lehmann, Konrad; Benedek, Mathias; Neubauer, Aljoscha C.
2017-01-01
Narcissistic grandiosity is characterized by overt expressions of feelings of superiority and entitlement, while narcissistic vulnerability reflects hypersensitivity and introversive self-absorbedness. Clinical evidence suggests that grandiosity is accompanied by vulnerable aspects, pointing to a common foundation. Subclinical personality research, however, views grandiose and vulnerable narcissism as independent traits. Grandiose narcissism displays substantial correlation with extraversion, while vulnerable narcissism correlates highly with introversion. We investigated if (1) controlling for intro-/extraversion might reveal a “common core” of grandiose and vulnerable narcissism, and if (2) the correlation between both aspects might be higher at higher levels of narcissism. Latent variable structural equation modeling and segmented regression analysis confirmed these hypotheses in a large non-clinical sample (N = 1,006). Interindividual differences in intro-/extraversion mask the common core of grandiose and vulnerable narcissism. The association between both aspects increases at high levels (upper 10%) of grandiose narcissism, which suggests a possible transition to clinically relevant (pathological) narcissism. PMID:28955288
Directory of Open Access Journals (Sweden)
ARMEAN ANDREEA
2013-06-01
Full Text Available In present, the study of vulnerability of companies is increasing in every field due to the unstable economic environment influences. The object of this research is to define and identify vulnerabilities of companies and the establishment of evaluation methods at their level. This article emphasizes the importance and usefulness of one of the best known model in this way, from our point of view, namely Băileşteanu, Negrila Pattern. This pattern covers both external factors and internal ones, that increase vulnerabilities of companies, and fit the companies in which the state of vulnerability are (vitality, viability, vulnerability, high vulnerability, difficulty and high difficulty, with a matrix. The result of the research is that any company belonging to any field, can be analyzed using this model, and assigned to one of the conditions defined within.
Fluctuation between grandiose and vulnerable narcissism.
Gore, Whitney L; Widiger, Thomas A
2016-10-01
Current literature on narcissistic personality disorder has emphasized a distinction between grandiose and vulnerable narcissism. Some researchers have further suggested that narcissistic persons fluctuate between grandiose and vulnerable narcissism. However, this perception has been confined largely to clinical experience with no systematic research testing the hypothesis. Clinicians and clinical psychology professors in the current study identified 143 persons who fit a description of either a grandiose or a vulnerable narcissist and indicated the extent to which these persons ever demonstrated traits of the complementary variant. The results supported the fluctuation hypothesis, particularly for episodes of vulnerable narcissism in persons identified as a grandiose narcissist. Correlations of the grandiose and vulnerable narcissism traits with a brief five-factor model measure corroborated past trait descriptions of the 2 respective variants of narcissism. The results of the current study are compared with existing cross-sectional and longitudinal research, and suggestions for future research are provided. (PsycINFO Database Record (c) 2016 APA, all rights reserved).
Narcissistic grandiosity and narcissistic vulnerability in psychotherapy.
Pincus, Aaron L; Cain, Nicole M; Wright, Aidan G C
2014-10-01
This article briefly summarizes the empirical and clinical literature underlying a contemporary clinical model of pathological narcissism. Unlike the DSM Narcissistic Personality Disorder (NPD), this clinical model identifies and differentiates between two phenotypic themes of dysfunction-narcissistic grandiosity and narcissistic vulnerability-that can be expressed both overtly and covertly in patients' ways of thinking, feeling, behaving, and participating in treatment. Clinical recognition that narcissistic patients can and often do present for psychotherapy in vulnerable states of depression, anxiety, shame, and even suicidality increases the likelihood of accurate diagnosis and effective treatment planning. This article provides case examples derived from psychotherapies with narcissistic patients to demonstrate how narcissistic grandiosity and narcissistic vulnerability concurrently present in patients who seek treatment. (PsycINFO Database Record (c) 2014 APA, all rights reserved).
Predicting Polylepis distribution: vulnerable and increasingly important Andean woodlands
Directory of Open Access Journals (Sweden)
Brian R. Zutta
2012-11-01
Full Text Available Polylepis woodlands are a vital resource for preserving biodiversity and hydrological functions, which will be altered by climate change and challenge the sustainability of local human communities. However, these highaltitude Andean ecosystems are becoming increasingly vulnerable due to anthropogenic pressure including fragmentation, deforestation and the increase in livestock. Predicting the distribution of native woodlands has become increasingly important to counteract the negative effects of climate change through reforestation and conservation. The objective of this study was to develop and analyze the distribution models of two species that form extensive woodlands along the Andes, namely Polylepis sericea and P. weberbaueri. This study utilized the program Maxent, climate and remotely sensed environmental layers at 1 km resolution. The predicted distribution model for P. sericea indicated that the species could be located in a variety of habitats along the Andean Cordillera, while P. weberbaueri was restricted to the high elevations of southern Peru and Bolivia. For both species, elevation and temperature metrics were the most significant factors for predicted distribution. Further model refinement of Polylepis and other Andean species using increasingly available satellite data demonstrate the potential to help define areas of diversity and improve conservation strategies for the Andes.
van der Wilt, Gert J; Grutters, Janneke P C; Maas, Angela H E M; Rolden, Herbert J A
2018-02-05
The participation of vulnerable patients in clinical research poses apparent ethical dilemmas. Depending on the nature of the vulnerability, their participation may challenge the ethical principles of autonomy, non-maleficence, or justice. On the other hand, non-participation may preclude the building of a knowledge base that is a prerequisite for defining the optimal clinical management of vulnerable patients. Such clinical uncertainty may also incur substantial economic costs. We present the participation of pre-menopausal women with atrial fibrillation in trials of novel oral anticoagulant drugs as a case study. Due to their non-participation in pivotal trials, it is uncertain whether for them, the risks that are associated with these drugs are outweighed by the advantages compared with conventional treatment. We addressed the question whether research of this new class of drugs in this subgroup would be appropriate from both, an ethical as well an economic perspective. We used the method of specifying norms as a wider framework to resolve the apparent ethical dilemma, while incorporating the question whether research of oral anticoagulants in premenopausal women with atrial fibrillation can be justified on economic grounds. For the latter, the results of a value-of-information analysis were used. Further clinical research on NOACs in premenopausal women with atrial fibrillation can be justified on both, ethical and economic grounds. Addressing apparent ethical dilemmas by invoking a method such as specifying norms can improve the quality of public practical reasoning. As such, the method should also prove valuable to committees that have formally been granted the authority to review trial protocols and proposals for scientific research.
Vulnerability and resilience: a critical nexus.
Lotz, Mianna
2016-02-01
Not all forms of human fragility or vulnerability are unavoidable. Sometimes we knowingly and intentionally impose conditions of vulnerability on others; and sometimes we knowingly and intentionally enter into and assume conditions of vulnerability for ourselves (for example, when we decide to trust or forgive, enter into intimate relationships with others, become a parent, become a subject of medical or psychotherapeutic treatment, and the like). In this article, I propose a presently overlooked basis on which one might evaluate whether the imposition or assumption of vulnerability is acceptable, and on which one might ground a significant class of vulnerability-related obligations. Distinct from existing accounts of the importance of promoting autonomy in conditions of vulnerability, this article offers a preliminary exploration of the nature, role, and importance of resilience promotion, its relationship to autonomy promotion, and its prospects for improving human wellbeing in autonomy inhibiting conditions.
Kroenke, Kurt; Monahan, Patrick O; Kean, Jacob
2015-09-01
Measures for assessing patient-reported outcomes (PROs) that may have initially been developed for research are increasingly being recommended for use in clinical practice as well. Although psychometric rigor is essential, this article focuses on pragmatic characteristics of PROs that may enhance uptake into clinical practice. Three sources were drawn on in identifying pragmatic criteria for PROs: (1) selected literature review including recommendations by other expert groups; (2) key features of several model public domain PROs; and (3) the authors' experience in developing practical PROs. Eight characteristics of a practical PRO include: (1) actionability (i.e., scores guide diagnostic or therapeutic actions/decision making); (2) appropriateness for the relevant clinical setting; (3) universality (i.e., for screening, severity assessment, and monitoring across multiple conditions); (4) self-administration; (5) item features (number of items and bundling issues); (6) response options (option number and dimensions, uniform vs. varying options, time frame, intervals between options); (7) scoring (simplicity and interpretability); and (8) accessibility (nonproprietary, downloadable, available in different languages and for vulnerable groups, and incorporated into electronic health records). Balancing psychometric and pragmatic factors in the development of PROs is important for accelerating the incorporation of PROs into clinical practice. Published by Elsevier Inc.
Does physical activity protect against drug abuse vulnerability?
Bardo, Michael T; Compton, Wilson M
2015-08-01
The current review examined recent literature to determine our state of knowledge about the potential ability of physical activity serve as a protectant against drug abuse vulnerability. Both preclinical and clinical studies were examined using either associational or random assignment study designs. In addition to examining drug use as an outcome variable, the potential neural mediators linking physical activity and drug abuse vulnerability were examined. Several important conclusions may be drawn. First, the preclinical evidence is solid in showing that physical activity in various forms is able to serve as both a preventive and treatment intervention that reduces drug use, although voluntary alcohol drinking appears to be an exception to this conclusion. Second, the clinical evidence provides some evidence, albeit mixed, to suggest a beneficial effect of physical activity on tobacco dependent individuals. In contrast, there exists only circumstantial evidence that physical activity may reduce use of drugs other than nicotine, and there is essentially no solid information from random control studies to know if physical activity may prevent initiation of problem use. Finally, both preclinical and clinical evidence shows that various brain systems are altered by physical activity, with the medial prefrontal cortex (mPFC) serving as one potential node that may mediate the putative link between physical activity and drug abuse vulnerability. It is concluded that novel neurobehavioral approaches taking advantage of novel techniques for assessing the physiological impact of physical activity are needed and can be used to inform the longitudinal random control studies that will answer definitively the question posed. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Responsiveness and minimal clinically important change
DEFF Research Database (Denmark)
Christiansen, David Høyrup; Frost, Poul; Falla, Deborah
2015-01-01
Study Design A prospective cohort study nested in a randomized controlled trial. Objectives To determine and compare responsiveness and minimal clinically important change of the modified Constant score (CS) and the Oxford Shoulder Score (OSS). Background The OSS and the CS are commonly used...... to assess shoulder outcomes. However, few studies have evaluated the measurement properties of the OSS and CS in terms of responsiveness and minimal clinically important change. Methods The study included 126 patients who reported having difficulty returning to usual activities 8 to 12 weeks after...... were observed for the CS and the OSS. Minimal clinically important change ROC values were 6 points for the OSS and 11 points for the CS, with upper 95% cutoff limits of 12 and 22 points, respectively. Conclusion The CS and the OSS were both suitable for assessing improvement after decompression surgery....
Bechard, Melanie; VanderLaan, Doug P; Wood, Hayley; Wasserman, Lori; Zucker, Kenneth J
2017-10-03
For adolescents with gender dysphoria, it has become common to be offered hormonal treatment to either delay or suppress pubertal development and/or to masculinize or feminize the body. At the same time, it has been our clinical impression that the psychological vulnerability of at least some of these youth has been overlooked. Fifty consecutive referrals of adolescents with a DSM-IV-TR diagnosis of gender identity disorder (GID) constituted the sample. Information obtained at intake was coded for the presence or absence of 15 psychosocial and psychological vulnerability factors. The mean number of psychosocial/psychological vulnerability factors coded as present was 5.56 (range, 0-13). Over half of the sample had six or more of the vulnerability factors. The number of factors coded as present was significantly correlated with behavioral and emotional problems on the Youth Self-Report Form and the Child Behavior Checklist, but not with demographic variables or IQ. The findings supported the clinical impression that a large percentage of adolescents referred for gender dysphoria have a substantial co-occurring history of psychosocial and psychological vulnerability, thus supporting a "proof of principle" for the importance of a comprehensive psychologic/psychiatric assessment that goes beyond an evaluation of gender dysphoria per se.
Vulnerable Genders, Vulnerable Loves
DEFF Research Database (Denmark)
Schleicher, Marianne
2015-01-01
This chapter analyses religious reflections on vulnerable genders and vulnerable loves from the Hebrew Bible to early Rabbinic literature. It is based on theories by inter alia Donna Haraway on complex identities, Turner and Maryanski on love as a prerequisite for survival, Michel Foucault...... on gathering knowledge and its often unpremeditated effect of recognition and inclusion, and Judith Butler on cultural intelligibility and subversion from within. With these theories as a departing point for the analysis, the chapter links the vulnerability of complex identities with the vulnerability...... of cultures which leads to the overall understanding that culture can accommodate complex identities associated with individual and cultural vulnerability as long as the overall survival of the culture is not threatened. This understanding questions the feasibility of the ethical position of thinkers...
Ahadnezhad Reveshty, Mohsen; Kamelifar, Mohammad Javad; Ranjbarnia, Behzad; Pashaiifar, Alireza
2014-01-01
Estimation of urban vulnerability to earthquakes can be consid-ered as an Ill-structured problem in urban in both unplanned and planned areas. Multi-criteria evaluation (MCE) provides a way to integrate different spatial data layers in a geographic information system to create composite maps representing risk. We utilized MCE in a raster Geographic Information System (GIS) to evaluate risk in vulnerable tissues of Tabriz, Iran zone. In this MCE physical risk factors and sub-factors were included and were weighted by experts. Afterward data entered to GIS and then the layers of the criteria were exported. The obtained results were entered to IDRISI and fuzzified. Ultimately the final map of physical vulnerability was outputted by overlaying order. Vulnerable tissues are highly consistent to non-official areas. However, the planned area which is called Valiasr is in low risky condition and this condition is desirable in crisis times. Here, we observe the preference of physical pre-planning operations. The links between urban planning and health are many and varied. Environmental, social and economic conditions in cities can have both positive and negative influences on human health and centre. Urban planning and related professions play an important role in shaping those conditions.
Directory of Open Access Journals (Sweden)
Mohsen Ahadnezhad Reveshty
2014-07-01
Full Text Available Background: Estimation of urban vulnerability to earthquakes can be considered as an Ill-structured problem in urban in both unplanned and planned ar-eas. Multi-criteria evaluation (MCE provides a way to integrate different spatial data layers in a geographic information system to create composite maps representing risk. We utilized MCE in a raster Geographic Information System (GIS to evaluate risk in vulnerable tissues of Tabriz, Iran zone. Methods: In this MCE physical risk factors and sub-factors were included and were weighted by experts. Afterward data entered to GIS and then the layers of the criteria were exported. The obtained results were entered to IDRISI and fuzzified. Ultimately the final map of physical vulnerability was outputted by overlaying order. Results: Vulnerable tissues are highly consistent to non-official areas. How-ever, the planned area which is called Valiasr is in low risky condition and this condition is desirable in crisis times. Here, we observe the preference of physical pre-planning operations. Conclusion: The links between urban planning and health are many and varied. Environmental, social and economic conditions in cities can have both positive and negative influences on human health and centre. Urban planning and related professions play an important role in shaping those conditions.
Memory Vulnerability Diagnosis for Binary Program
Directory of Open Access Journals (Sweden)
Tang Feng-Yi
2016-01-01
Full Text Available Vulnerability diagnosis is important for program security analysis. It is a further step to understand the vulnerability after it is detected, as well as a preparatory step for vulnerability repair or exploitation. This paper mainly analyses the inner theories of major memory vulnerabilities and the threats of them. And then suggests some methods to diagnose several types of memory vulnerabilities for the binary programs, which is a difficult task due to the lack of source code. The diagnosis methods target at buffer overflow, use after free (UAF and format string vulnerabilities. We carried out some tests on the Linux platform to validate the effectiveness of the diagnosis methods. It is proved that the methods can judge the type of the vulnerability given a binary program.
Modelling farm vulnerability to flooding: A step toward vulnerability mitigation policies appraisal
Brémond, P.; Abrami, G.; Blanc, C.; Grelot, F.
2009-04-01
Recent catastrophic flood events such as Elbe in 2002 or Rhône in 2003 have shown limits of flood management policies relying on dykes protection: worsening of flood impacts downstream, increased damage by dykes rupture. Those events, among others, contributes to radical changes on the philosophy of flood prevention, with the promotion of new orientations for mitigating flood exposition. Two new trends may have a significant impact on rural areas: floodplain restoration and vulnerability mitigation. The Rhône River program, which is an contract of objectives signed between French Government and local collectivites, is highly illustrative of these new trends and their impact on agricultural sector. In this program, it appears that areas to be concerned by floodplain restoration are agricultural ones, because their supposed vulnerability to flood is expected to be less important to urban areas. As a consequence, agricultural sector is particularly concerned by planned actions on mitigation of assets vulnerability, an important part of the program (financial support of European Union of 7.5 Million euros). Mitigation of agricultural assets vulnerability reveals particularly interesting for two following reasons. Firstly, it is a way to maintain agricultural activities in floodplains yet existing, without promoting flood protection. Secondly, in case of floodplain restoration, vulnerability mitigation is a way for local authorities to compensate over-flooding impacts. In practice, local authorities may financially support farmers for implementing measures to mitigate their farm vulnerability. On the Rhône River, an important work has already been done to identify farm vulnerability to flooding, and propose measures to mitigate it. More than 3 000 farms exposed to flood risk have been identified representing 88 690 ha of agricultural areas which is estimated to generate damage between 400 and 800 Million euros depending on the season of occurrence for a catastrophic
Motherhood, Marketization, and Consumer Vulnerability
DEFF Research Database (Denmark)
Davies, Andrea; Prothero, Andrea; Sørensen, Elin
2010-01-01
This article explores consumer vulnerability and the role of public policy by focusing on new mothers. Developing the consumer vulnerability model of Baker, Gentry, and Rittenburg, the authors consider how medical contexts, political and legal factors, economic resources, societal prescriptions...... a time of physical and psychological changes in mothers-to-be. This article illustrates that the extended market logic dominating contemporary mothering environments both contributes to and has the potential to exacerbate new mothers’ vulnerability, raising important challenges for public policy, both...
Bos, Henny M. W.; Boschloo, Lynn; Schoevers, Robert A.; Sandfort, Theo G. M.
Background: The aim of this study was to compare clinical expressions (severity and loneliness), lifestyle factors (substance use), and vulnerability indicators (stressful childhood experiences) in patients with any same-sex attraction versus heterosexual patients diagnosed with depression and/or
Bos, H.M.W.; Boschloo, L.; Schoevers, R.A.; Sandfort, T.G.M.
2015-01-01
Background: The aim of this study was to compare clinical expressions (severity and loneliness), lifestyle factors (substance use), and vulnerability indicators (stressful childhood experiences) in patients with any same-sex attraction versus heterosexual patients diagnosed with depression and/or
The importance of assessing climate change vulnerability to address species conservation
Karen E. Bagne; Megan M. Friggens; Sharon J. Coe; Deborah M. Finch
2014-01-01
Species conservation often prioritizes attention on a small subset of "special status" species at high risk of extinction, but actions based on current lists of special status species may not effectively moderate biodiversity loss if climate change alters threats. Assessments of climate change vulnerability may provide a method to enhance identification of...
[The Helsinki Declaration: relativism and vulnerability].
Diniz, D; Corrêa, M
2001-01-01
The Helsinki Declaration is a crucial ethical landmark for clinical research involving human beings. Since the Declaration was issued, a series of revisions and modifications have been introduced into the original text, but they have not altered its humanist approach or its international force for regulating clinical research. A proposal for an extensive revision of the Declaration's underlying ethical principles has been debated for the past four years. If the proposal is approved, international clinical research involving human beings will be modified, further increasing the vulnerability of certain social groups. This article discusses the historical process involved in passing the Helsinki Declaration and the most recent debate on the new draft. The article analyzes the new text's social implications for underdeveloped countries, arguing for a political approach to the vulnerability concept.
Treatment of Patients in the Vulnerable Phase (at Discharge or Early After Discharge
Directory of Open Access Journals (Sweden)
Yuri Lopatin
2017-01-01
Full Text Available The clinical course of heart failure includes a period in which the patient is at increased risk of death or rehospitalisation for HF. This period is termed the “vulnerable phase” and occurs during the peri-acute HF phase, due to microenvironmental changes in the cardiovascular system. Typically, the vulnerability phase starts from the onset of an acute HF event leading to admission, continues through a peri-discharge period and lasts up to 6 months after discharge.These poor post-discharge outcomes also represent a significant socioeconomic burden. This articles reviews treatments that are beneficial in this important phase.
An holistic view on aquifer vulnerability based on a distinction of different types of vulnerability
De Luca, Domenico Antonio; Lasagna, Manuela; Franchino, Elisa
2016-04-01
AN HOLISTIC VIEW ON AQUIFER VULNERABILITY BASED ON A DISTINCTION OF DIFFERENT TYPES OF VULNERABILITY D.A. De Luca1 , M. Lasagna1, E. Franchino1 1Department of Earth Sciences, University of Turin The concept of vulnerability is certainly useful in the field of groundwater protection. Nevertheless, within the scientific community, the definition of groundwater vulnerability is still debatable and not clear and conclusive. This is probably due to the fact that researchers often have very different experiences and education. A positive effect of it is a constant exchange of ideas, but there are also negative consequences and difficulties in deepening the issue. The different approaches are very important but they are usable only if the concept of vulnerability is standardized: thus, for the sake of clarity, a number of definitions should be laid down, based on the different types of vulnerability. These definitions can then provide the necessary holistic view for the aquifer vulnerability assessment. Nowadays vulnerability methods focus on the degree of vulnerability and the parameters needed for its evaluation, often neglecting to clarify what is the type of vulnerability the proposed methods are referred. The type of vulnerability, indeed, is both logically and hierarchically superior to the degree of vulnerability. More specifically the type of vulnerability represents the evaluation of the hydrogeological conditions considered in the vulnerability assessment and able to influence the way in which the contamination can take place. Currently the only distinction, based on of the type of vulnerability, is referred to intrinsic and specific vulnerability. Intrinsic vulnerability assesses the susceptibility of the receptor based on the natural properties of the land and subsurface; specific vulnerability also includes properties of the analyzed contaminant. This distinction is useful but not exhaustive. In addition to this, e.g., a distinction of vertical vulnerability
Listeriosis in Mexico: Clinical and epidemiological importance
Directory of Open Access Journals (Sweden)
Gloria Castañeda-Ruelas
2014-11-01
Full Text Available Listeriosis is caused by Listeria monocytogenes, an important food-borne disease due to its clinical forms, high mortality rate, and the economic impact in both clinical and food production industries. In Mexico, the lack of epidemiological surveillance systems leads to the need of accurate data on the incidence of listeriosis and its association with food-borne disease. In this paper, we present data about the presence of this bacterium in food, reports related to clinical cases of listeriosis, and information of diseases in which L. monocytogenes may be involved. However, in most of these cases the etiology was not established. Given this, there´s a need to inform and warn the appropriate entities, to define strategies for the mandatory search of L. monocytogenes through the whole food production chain and clinical suspects, for the epidemiological importance and control of listeriosis in Mexico.
Botbol-Baum, Mylène
2016-12-29
In this introduction I will draw an overview of theories associated with the notion of care from feminist studies to clinical theory by articulating the concept of vulnerability to that of capability in Amartya Sen and showing the roots of capability theory in Aristotle and anti-utilitarian theories.
Taback, I.
1979-01-01
The discussion of vulnerability begins with a description of some of the electrical characteristics of fibers before definiting how vulnerability calculations are done. The vulnerability results secured to date are presented. The discussion touches on post exposure vulnerability. After a description of some shock hazard work now underway, the discussion leads into a description of the planned effort and some preliminary conclusions are presented.
An Extreme-Value Approach to Anomaly Vulnerability Identification
Everett, Chris; Maggio, Gaspare; Groen, Frank
2010-01-01
The objective of this paper is to present a method for importance analysis in parametric probabilistic modeling where the result of interest is the identification of potential engineering vulnerabilities associated with postulated anomalies in system behavior. In the context of Accident Precursor Analysis (APA), under which this method has been developed, these vulnerabilities, designated as anomaly vulnerabilities, are conditions that produce high risk in the presence of anomalous system behavior. The method defines a parameter-specific Parameter Vulnerability Importance measure (PVI), which identifies anomaly risk-model parameter values that indicate the potential presence of anomaly vulnerabilities, and allows them to be prioritized for further investigation. This entails analyzing each uncertain risk-model parameter over its credible range of values to determine where it produces the maximum risk. A parameter that produces high system risk for a particular range of values suggests that the system is vulnerable to the modeled anomalous conditions, if indeed the true parameter value lies in that range. Thus, PVI analysis provides a means of identifying and prioritizing anomaly-related engineering issues that at the very least warrant improved understanding to reduce uncertainty, such that true vulnerabilities may be identified and proper corrective actions taken.
Mining Bug Databases for Unidentified Software Vulnerabilities
Energy Technology Data Exchange (ETDEWEB)
Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen
2012-06-01
Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.
The influence of social comparison on cognitive bias modification and emotional vulnerability.
Standage, Helen; Harris, Jemma; Fox, Elaine
2014-02-01
The Cognitive Bias Modification (CBM) paradigm was devised to test predictions that cognitive biases have a causal influence on emotional status. Increasingly, however, researchers are testing the potential clinical applications of CBM. Although generally successful in reducing emotional vulnerability in clinical populations, the impact of CBM interventions has been somewhat variable. The aim of the current experiment was to investigate whether social comparison processing might be an important moderator of CBM. Healthy participants were presented with 80 valenced scenarios devised to induce a positive or negative interpretative bias. Critically, participants answered a series of questions designed to establish whether they assimilated or contrasted themselves with the valenced descriptions. The induction of an interpretation bias that was congruent with the valence of the training scenarios was successful only for participants who tended to assimilate the valenced scenarios, and not for those participants who tended to evaluate themselves against the scenarios. Furthermore, the predicted influence of CBM on emotional outcomes occurred only for those who had an assimilative rather than evaluative orientation toward CBM training material. Of key importance, results indicated that "evaluators" showed increased emotional vulnerability following positive CBM training. This result has both theoretical and clinical implications in suggesting that the success of CBM is dependent upon the way in which participants socially compare themselves with CBM training material. PsycINFO Database Record (c) 2014 APA, all rights reserved.
Bourantas, Christos V; Garcia-Garcia, Hector M; Farooq, Vasim; Maehara, Akiko; Xu, Ke; Généreux, Philippe; Diletti, Roberto; Muramatsu, Takashi; Fahy, Martin; Weisz, Giora; Stone, Gregg W; Serruys, Patrick W
2013-12-01
This study sought to determine the clinical and angiographic variables that would identify patients with high-risk "vulnerable" coronary plaques. In the PROSPECT (Providing Regional Observations to Study Predictors of Events in the Coronary Tree) study, in patients successfully treated for acute coronary syndrome (ACS), plaque composition, plaque burden, and minimal luminal area as detected by 3-vessel radiofrequency intravascular ultrasound (IVUS) imaging were associated with an increased risk of developing future events from untreated atherosclerotic lesions (vulnerable plaques). Whether baseline demographic and angiographic findings can be used to identify patients most likely to have vulnerable coronary plaques has not been examined. On the basis of 3-vessel radiofrequency IVUS imaging, patents in the PROSPECT trial were classified in 2 groups according to whether or not one or more untreated high-risk plaques were present, defined as having ≥2 high-risk features (a thin-cap fibroatheroma, plaque burden ≥70%, and/or minimal luminal area ≤4 mm(2)). The high-risk group (those with one or more high-risk lesions) had higher Framingham risk score (7.5 ± 3.4 vs. 6.9 ± 3.3; p = 0.04), more extensive coronary artery disease, and more nonculprit lesion-related cardiovascular events during the 3-year follow-up (hazard ratio: 2.63; 95% confidence interval: 1.62 to 3.66; p < 0.0001). However, demographic factors had poor discrimination in detecting high-risk patients (area under the curve 0.55), and discrimination was only slightly improved when angiographic variables were entered into the model (area under the curve 0.64). Clinical and angiographic characteristics had poor predictive accuracy in identifying patients with untreated high-risk plaques related to future adverse events. This finding highlights the potential value of comprehensive 3-vessel imaging assessment (either invasive or noninvasive) to evaluate plaque phenotype for more accurate risk
Directory of Open Access Journals (Sweden)
Woi-Hyun S. Hong
2009-09-01
Conclusion: This research adds to the understanding of the importance of nurses' interventions toward health promotion with the vulnerable population. This preliminary analysis suggests that the ACHIS provide a clinical information system for collecting, storing, processing, retrieving, and managing clinical data in a data repository. [Asian Nursing Research 2009;3(3:130–138
Clinical importance of the anterior choroidal artery: a review of the literature.
Yu, Jing; Xu, Ning; Zhao, Ying; Yu, Jinlu
2018-01-01
The anterior choroidal artery (AChA) is a critical artery in brain physiology and function. The AChA is involved in many diseases, including aneurysm, brain infarct, Moyamoya disease (MMD), brain tumor, arteriovenous malformation (AVM), etc. The AChA is vulnerable to damage during the treatment of these diseases and is thus a very important vessel. However, a comprehensive systematic review of the importance of the AChA is currently lacking. In this study, we used the PUBMED database to perform a literature review of the AChA to increase our understanding of its role in neurophysiology. Although the AChA is a small thin artery, it supplies an extremely important region of the brain. The AChA consists of cisternal and plexal segments, and the point of entry into the choroidal plexus is known as the plexal point. During treatment for aneurysms, tumors, AVM or AVF, the AChA cisternal segments should be preserved as a pathway to prevent the infarction of the AChA target region in the brain. In MMD, a dilated AChA provides collateral flow for posterior circulation. In brain infarcts, rapid treatment is necessary to prevent brain damage. In Parkinson disease (PD), the role of the AChA is unclear. In trauma, the AChA can tear and result in intracranial hematoma. In addition, both chronic and non-chronic branch vessel occlusions in the AChA are clinically silent and should not deter aneurysm treatment with flow diversion. Based on the data available, the AChA is a highly essential vessel.
Menezes, Júlia Alves; Confalonieri, Ulisses; Madureira, Ana Paula; Duval, Isabela de Brito; Santos, Rhavena Barbosa Dos; Margonari, Carina
2018-01-01
Vulnerability, understood as the propensity to be adversely affected, has attained importance in the context of climate change by helping to understand what makes populations and territories predisposed to its impacts. Conditions of vulnerability may vary depending on the characteristics of each territory studied-social, environmental, infrastructural, public policies, among others. Thus, the present study aimed to evaluate what makes the municipalities of the state of Amazonas, Brazil, vulnerable to climate change in the context of the largest tropical forest in the world, and which regions of the State are the most susceptible. A Municipal Vulnerability Index was developed, which was used to associate current socio-environmental characteristics of municipalities with climate change scenarios in order to identify those that may be most affected by climate change. The results showed that poor adaptive capacity and poverty had the most influence on current vulnerability of the municipalities of Amazonas with the most vulnerable areas being the southern, northern, and eastern regions of the state. When current vulnerability was related to future climate change projections, the most vulnerable areas were the northern, northeastern, extreme southern, and southwestern regions. From a socio-environmental and climatic point of view, these regions should be a priority for public policy efforts to reduce their vulnerability and prepare them to cope with the adverse aspects of climate change.
Directory of Open Access Journals (Sweden)
Júlia Alves Menezes
Full Text Available Vulnerability, understood as the propensity to be adversely affected, has attained importance in the context of climate change by helping to understand what makes populations and territories predisposed to its impacts. Conditions of vulnerability may vary depending on the characteristics of each territory studied-social, environmental, infrastructural, public policies, among others. Thus, the present study aimed to evaluate what makes the municipalities of the state of Amazonas, Brazil, vulnerable to climate change in the context of the largest tropical forest in the world, and which regions of the State are the most susceptible. A Municipal Vulnerability Index was developed, which was used to associate current socio-environmental characteristics of municipalities with climate change scenarios in order to identify those that may be most affected by climate change. The results showed that poor adaptive capacity and poverty had the most influence on current vulnerability of the municipalities of Amazonas with the most vulnerable areas being the southern, northern, and eastern regions of the state. When current vulnerability was related to future climate change projections, the most vulnerable areas were the northern, northeastern, extreme southern, and southwestern regions. From a socio-environmental and climatic point of view, these regions should be a priority for public policy efforts to reduce their vulnerability and prepare them to cope with the adverse aspects of climate change.
Knappe, Susanne; Beesdo-Baum, Katja; Fehm, Lydia; Stein, Murray B; Lieb, Roselind; Wittchen, Hans-Ulrich
2011-01-01
To compare different social fears and social phobia subtypes with regard to clinical (age of onset, avoidance, impairment, comorbidities) and vulnerability factors (behavioural inhibition (BI), parental psychopathology and parental rearing) among community youth. Fears of 6 social situations and Social Phobia (SP), along with their clinical features, were assessed using the Munich-Composite International Diagnostic Interview (DIA-X/M-CIDI) in a population-based sample of N = 3021 14-24 year olds that were followed up for 10 years. BI and parental rearing were assessed using self-report questionnaires. Parental psychopathology was assessed directly in parents via DIA-X/M-CIDI, supplemented by offsprings' family history reports. In the total sample, 20.0%, 11.6%, 11.7% reported fear of 1, 2, 3 or more social situations, respectively; rates were 24.2%, 18.7%, and 57.1% in SP-cases (6.6% of the total sample). Exploring the factorial structure indicated rather unidimensionality of social fears than mutual distinction of social fears by interaction vs. performance situations. Except for fear of taking tests and public speaking, social fears rarely occurred in isolation. Social fears of both interaction and performance situations were associated with severe avoidance (vs. fear of either situation; Odds Ratios, OR = 1.5, 95%CI: 1.1-1.9) and impairment (OR = 3.6, 95%CI: 2.6-4.9), and more comorbid anxiety and depressive disorders (OR range 3.2-5.8, p > .001). Fear of interaction situations was associated with higher BI (vs. performance-related fears, OR range 1.2-2.1, p social fears differ in their clinical and vulnerability factors from performance-related social fears. The current DSM-IV specifier of "generalized" SP may fall short of adequately denoting these differences. Fear of taking tests appears to be conceptually and, possibly, etiologically distinct from other social fears, and may be better placed in another category (e.g., as a type of specific phobia
A socioeconomic profile of vulnerable land to desertification in Italy.
Salvati, Luca
2014-01-01
Climate changes, soil vulnerability, loss in biodiversity, and growing human pressure are threatening Mediterranean-type ecosystems which are increasingly considered as a desertification hotspot. In this region, land vulnerability to desertification strongly depends on the interplay between natural and anthropogenic factors. The present study proposes a multivariate exploratory analysis of the relationship between the spatial distribution of land vulnerability to desertification and the socioeconomic contexts found in three geographical divisions of Italy (north, center and south) based on statistical indicators. A total of 111 indicators describing different themes (demography, human settlements, labor market and human capital, rural development, income and wealth) were used to discriminate vulnerable from non-vulnerable areas. The resulting socioeconomic profile of vulnerable areas in northern and southern Italy diverged significantly, the importance of demographic and economic indicators being higher in southern Italy than in northern Italy. On the contrary, human settlement indicators were found more important to discriminate vulnerable and non-vulnerable areas in northern Italy, suggesting a role for peri-urbanization in shaping the future vulnerable areas. An in-depth knowledge of the socioeconomic characteristics of vulnerable land may contribute to scenarios' modeling and the development of more effective policies to combat desertification. © 2013 Elsevier B.V. All rights reserved.
Categorisation of typical vulnerability patterns in global drylands
Sietz, D.; Lûdeke, M.K.B.; Walther, C.
2011-01-01
Drylands display specific vulnerability-creating mechanisms which threaten ecosystems and human well-being. The upscaling of successful interventions to reduce vulnerability arises as an important, but challenging aim, since drylands are not homogenous. To support this aim, we present the first
Chuah, Joon Hao; Lok, Benjamin; Black, Erik
2013-04-01
Health sciences students often practice and are evaluated on interview and exam skills by working with standardized patients (people that role play having a disease or condition). However, standardized patients do not exist for certain vulnerable populations such as children and the intellectually disabled. As a result, students receive little to no exposure to vulnerable populations before becoming working professionals. To address this problem and thereby increase exposure to vulnerable populations, we propose using virtual humans to simulate members of vulnerable populations. We created a mixed reality pediatric patient that allowed students to practice pediatric developmental exams. Practicing several exams is necessary for students to understand how to properly interact with and correctly assess a variety of children. Practice also increases a student's confidence in performing the exam. Effective practice requires students to treat the virtual child realistically. Treating the child realistically might be affected by how the student and virtual child physically interact, so we created two object interaction interfaces - a natural interface and a mouse-based interface. We tested the complete mixed reality exam and also compared the two object interaction interfaces in a within-subjects user study with 22 participants. Our results showed that the participants accepted the virtual child as a child and treated it realistically. Participants also preferred the natural interface, but the interface did not affect how realistically participants treated the virtual child.
Europe's vulnerability to energy crises
Energy Technology Data Exchange (ETDEWEB)
NONE
2008-01-15
The growing dependency of Europe as a whole on energy imports and anticipated further increases in energy prices reinforce the concerns about meeting the energy demand in the future. The objective of the Study is to identify the threats leading to potential energy crises and suggest solutions for facing, in an appropriate way, the related key challenges. In addition, the Study intends to develop a number of indicators effective enough to assess the level of different types of vulnerability, as well the overall vulnerability of a country or region, including threats to physical disruption, higher energy prices etc. The use of vulnerability indicators is highly recommended for all WEC-European countries, as well as to policy makers and market players.
Multi-dimensional flood vulnerability assessment using data envelopment analysis
Zahid, Zalina; Saharizan, Nurul Syuhada; Hamzah, Paezah; Hussin, Siti Aida Sheikh; Khairi, Siti Shaliza Mohd
2017-11-01
Malaysia has been greatly impacted by flood during monsoon seasons. Even though flood prone areas are well identified, assessment on the vulnerability of the disaster is lacking. Assessment of flood vulnerability, defined as the potential for loss when a disaster occurs, is addressed in this paper. The focus is on the development of flood vulnerability measurement in 11 states in Peninsular Malaysia using a non-parametric approach of Data Envelopment Analysis. Scores for three dimensions of flood vulnerability (Population Vulnerability, Social Vulnerability and Biophysical) were calculated using secondary data of selected input and output variables across an 11-year period from 2004 to 2014. The results showed that Johor and Pahang were the most vulnerable to flood in terms of Population Vulnerability, followed by Kelantan, the most vulnerable to flood in terms of Social Vulnerability and Kedah, Pahang and Terengganu were the most vulnerable to flood in terms of Biophysical Vulnerability among the eleven states. The results also showed that the state of Johor, Pahang and Kelantan to be most vulnerable across the three dimensions. Flood vulnerability assessment is important as it provides invaluable information that will allow the authority to identify and develop plans for flood mitigation and to reduce the vulnerability of flood at the affected regions.
A model for the development of mothers' perceived vulnerability of preterm infants.
Horwitz, Sarah McCue; Storfer-Isser, Amy; Kerker, Bonnie D; Lilo, Emily; Leibovitz, Ann; St John, Nick; Shaw, Richard J
2015-06-01
Some mothers of preterm infants continue to view them as vulnerable after their health has improved. These exaggerated perceptions of vulnerability lead to poor parent-child interactions and, subsequently, to adverse child outcomes. However, there is no theoretical model to explain why these exaggerated perceptions develop in only some mother-child dyads. Data for this study come from a randomized trial of an intervention to reduce distress in mothers of preterm infants. A total of 105 mothers older than 18 years of infants aged 25-34 weeks, weighing >600 g and with clinically significant anxiety, depression, or trauma symptoms, were recruited and randomized. Women were assessed at baseline, after intervention, and at 6 months after birth. The outcome for these analyses was perceptions of infant vulnerability as measured by the Vulnerable Baby Scale (VBS) at 6 months after birth. A theoretical model developed from the extant literature was tested using the MacArthur Mediator-Moderator Approach. A dysfunctional coping style, high depression, anxiety, or trauma symptoms in response to the preterm birth, and low social support were related to 6-month VBS scores. Maternal response to trauma was directly related to VBS, and an important precursor of maternal response to trauma was a dysfunctional coping style. This model suggests that maternal responses to trauma are critical in the formation of exaggerated perceptions of vulnerability as are dysfunctional coping styles and low social support. Women with these characteristics should be targeted for intervention to prevent poor parenting practices that result from exaggerated perceptions of vulnerability.
Groundwater Vulnerability Assessment of the Tarkwa Mining Area ...
African Journals Online (AJOL)
In view of the extensive mining in the Tarkwa area, quality of groundwater has become an important issue. This study estimates aquifer vulnerability by applying the SINTACS model which uses seven environmental parameters to evaluate aquifer vulnerability and geographical information system (GIS) in the Tarkwa mining ...
Assessing flash flood vulnerability using a multi-vulnerability approach
Directory of Open Access Journals (Sweden)
Karagiorgos Konstantinos
2016-01-01
Full Text Available In the framework of flood risk assessment, while the understanding of hazard and exposure has significantly improved over the last years, knowledge on vulnerability remains one of the challenges. Current approaches in vulnerability research are characterised by a division between social scientists and natural scientists. In order to close this gap, we present an approach that combines information on physical and social vulnerability in order to merge information on the susceptibility of elements at risk and society. With respect to physical vulnerability, the study is based on local-scale vulnerability models using nonlinear regression approaches. Modified Weibull distributions were fit to the data in order to represent the relationship between process magnitude and degree of loss. With respect to social vulnerability we conducted a door-to-door survey which resulted in particular insights on flood risk awareness and resilience strategies of exposed communities. In general, both physical and social vulnerability were low in comparison with other European studies, which may result from (a specific building regulations in the four Mediterranean test sites as well as general design principles leading to low structural susceptibility of elements at risk, and (b relatively low social vulnerability of citizens exposed. As a result it is shown that a combination of different perspectives of vulnerability will lead to a better understanding of exposure and capacities in flood risk management.
Current status of vulnerable plaque detection.
LENUS (Irish Health Repository)
Sharif, Faisal
2012-02-01
Critical coronary stenoses have been shown to contribute to only a minority of acute coronary syndromes (ACS) and sudden cardiac death. Autopsy studies have identified a subgroup of high-risk patients with disrupted vulnerable plaque and modest stenosis. Consequently, a clinical need exists to develop methods to identify these plaques prospectively before disruption and clinical expression of disease. Recent advances in invasive and noninvasive imaging techniques have shown the potential to identify these high-risk plaques. The anatomical characteristics of the vulnerable plaque such as thin cap fibroatheroma and lipid pool can be identified with angioscopy, high frequency intravascular ultrasound, intravascular MRI, and optical coherence tomography. Efforts have also been made to recognize active inflammation in high-risk plaques using intravascular thermography. Plaque chemical composition by measuring electromagnetic radiation using spectroscopy is also an emerging technology to detect vulnerable plaques. Noninvasive imaging with MRI, CT, and PET also holds the potential to differentiate between low and high-risk plaques. However, at present none of these imaging modalities are able to detect vulnerable plaque neither has been shown to definitively predict outcome. Nevertheless in contrast, there has been a parallel development in the physiological assessment of advanced atherosclerotic coronary artery disease. Thus recent trials using fractional flow reserve in patients with modest non flow-limiting stenoses have shown that deferral of PCI with optimal medical therapy in these patients is superior to coronary intervention. Further trials are needed to provide more information regarding the natural history of high-risk but non flow-limiting plaque to establish patient-specific targeted therapy and to refine plaque stabilizing strategies in the future.
Groundwater vulnerability assessment in karstic aquifers using COP method.
Bagherzadeh, Somayeh; Kalantari, Nasrollah; Nobandegani, Amir Fadaei; Derakhshan, Zahra; Conti, Gea Oliveri; Ferrante, Margherita; Malekahmadi, Roya
2018-05-02
Access to safe and reliable drinking water is amongst the important indicators of development in each society, and water scarcity is one of the challenges and limitations affecting development at national and regional levels and social life and economic activity areas. Generally, there are two types of drinking water sources: the first type is surface waters, including lakes, rivers, and streams and the second type is groundwaters existing in aquifers. Amongst aquifers, karst aquifers play an important role in supplying water sources of the world. Therefore, protecting these aquifers from pollution sources is of paramount importance. COP method is amongst the methods to investigate the intrinsic vulnerability of this type of aquifers, so that areas susceptible to contamination can be determined before being contaminated and these sources can be protected. In the present study, COP method was employed in order to spot the regions that are prone to contamination in the region. This method uses the properties of overlying geological layers above the water table (O factor), the concentration of flow (C factor), and precipitation (P factor) over the aquifer, as the parameters to assess the intrinsic vulnerability of groundwater resources. In this regard, geographical information system (GIS) and remote sensing (RS) were utilized to prepare the mentioned factors and the intrinsic vulnerability map was obtained. The results of COP method indicated that the northwest and the west of the region are highly and very vulnerable. This study indicated that regions with low vulnerability were observed in eastern areas, which accounted for 15.6% of the area. Moderate vulnerability was 40% and related to the northeast and southeast of the area. High vulnerability was 38.2% and related to western and southwestern regions. Very high vulnerability was 6.2% and related to the northwest of the area. By means of the analysis of sensitivity of the model, it was determined that the focus
Relating plant height to demographic rates and extinction vulnerability
Jonge, de Melinda M.J.; Hilbers, Jelle P.; Jongejans, Eelke; Ozinga, Wim A.; Hendriks, A.J.; Huijbregts, Mark A.J.
2018-01-01
To prioritize conservation efforts, it is important to know which plant species are most vulnerable to extinction. Intrinsic extinction vulnerabilities depend on demographic parameters, but for many species these demographic parameters are lacking. Body size has been successfully used as proxy of
The Vulnerability of Some Networks including Cycles via Domination Parameters
Directory of Open Access Journals (Sweden)
Tufan Turaci
2016-01-01
Full Text Available Let G=(V(G,E(G be an undirected simple connected graph. A network is usually represented by an undirected simple graph where vertices represent processors and edges represent links between processors. Finding the vulnerability values of communication networks modeled by graphs is important for network designers. The vulnerability value of a communication network shows the resistance of the network after the disruption of some centers or connection lines until a communication breakdown. The domination number and its variations are the most important vulnerability parameters for network vulnerability. Some variations of domination numbers are the 2-domination number, the bondage number, the reinforcement number, the average lower domination number, the average lower 2-domination number, and so forth. In this paper, we study the vulnerability of cycles and related graphs, namely, fans, k-pyramids, and n-gon books, via domination parameters. Then, exact solutions of the domination parameters are obtained for the above-mentioned graphs.
An Integrated Method of Supply Chains Vulnerability Assessment
Directory of Open Access Journals (Sweden)
Jiaguo Liu
2016-01-01
Full Text Available Supply chain vulnerability identification and evaluation are extremely important to mitigate the supply chain risk. We present an integrated method to assess the supply chain vulnerability. The potential failure mode of the supply chain vulnerability is analyzed through the SCOR model. Combining the fuzzy theory and the gray theory, the correlation degree of each vulnerability indicator can be calculated and the target improvements can be carried out. In order to verify the effectiveness of the proposed method, we use Kendall’s tau coefficient to measure the effect of different methods. The result shows that the presented method has the highest consistency in the assessment compared with the other two methods.
Modeling Coastal Vulnerability through Space and Time.
Hopper, Thomas; Meixler, Marcia S
2016-01-01
Coastal ecosystems experience a wide range of stressors including wave forces, storm surge, sea-level rise, and anthropogenic modification and are thus vulnerable to erosion. Urban coastal ecosystems are especially important due to the large populations these limited ecosystems serve. However, few studies have addressed the issue of urban coastal vulnerability at the landscape scale with spatial data that are finely resolved. The purpose of this study was to model and map coastal vulnerability and the role of natural habitats in reducing vulnerability in Jamaica Bay, New York, in terms of nine coastal vulnerability metrics (relief, wave exposure, geomorphology, natural habitats, exposure, exposure with no habitat, habitat role, erodible shoreline, and surge) under past (1609), current (2015), and future (2080) scenarios using InVEST 3.2.0. We analyzed vulnerability results both spatially and across all time periods, by stakeholder (ownership) and by distance to damage from Hurricane Sandy. We found significant differences in vulnerability metrics between past, current and future scenarios for all nine metrics except relief and wave exposure. The marsh islands in the center of the bay are currently vulnerable. In the future, these islands will likely be inundated, placing additional areas of the shoreline increasingly at risk. Significant differences in vulnerability exist between stakeholders; the Breezy Point Cooperative and Gateway National Recreation Area had the largest erodible shoreline segments. Significant correlations exist for all vulnerability (exposure/surge) and storm damage combinations except for exposure and distance to artificial debris. Coastal protective features, ranging from storm surge barriers and levees to natural features (e.g. wetlands), have been promoted to decrease future flood risk to communities in coastal areas around the world. Our methods of combining coastal vulnerability results with additional data and across multiple time
Energy Vulnerability and EU-Russia Energy Relations
Directory of Open Access Journals (Sweden)
Edward Hunter Christie
2009-08-01
Full Text Available The concept of energy vulnerability is reviewed and discussed with a focus on Russia’s foreign energy relations, in particular those with European countries. A definition and a conceptual framework for quantifying energy vulnerability are proposed in the context of a review of recent research on energy vulnerability indices. In particular it is suggested that source country diversification should be reflected using the expected shortfall measure used in financial economics, rather than the Herfindahl-Hirschman or Shannon-Wiener indices, and that the former should then enter a calibrated function in order to yield expected economic loss. The issues of asymmetric failure probabilities and accidental versus intentional supply disruptions are then discussed with examples of recent Russian actions. Energy vulnerability measurement and modelling should ultimately inform policy. In particular, member states should legislate that no energy infrastructure project by one or more member states may increase the energy vulnerability of another member state. Additionally, European environmental policies, notably the EU ETS, should be amended so as to account for induced changes in energy vulnerability. Finally, member states should increase the level of transparency and disclosure with respect to gas import statistics and gas supply contracts.
Social Vulnerability and Ebola Virus Disease in Rural Liberia.
Stanturf, John A; Goodrick, Scott L; Warren, Melvin L; Charnley, Susan; Stegall, Christie M
2015-01-01
The Ebola virus disease (EVD) epidemic that has stricken thousands of people in the three West African countries of Liberia, Sierra Leone, and Guinea highlights the lack of adaptive capacity in post-conflict countries. The scarcity of health services in particular renders these populations vulnerable to multiple interacting stressors including food insecurity, climate change, and the cascading effects of disease epidemics such as EVD. However, the spatial distribution of vulnerable rural populations and the individual stressors contributing to their vulnerability are unknown. We developed a Social Vulnerability Classification using census indicators and mapped it at the district scale for Liberia. According to the Classification, we estimate that districts having the highest social vulnerability lie in the north and west of Liberia in Lofa, Bong, Grand Cape Mount, and Bomi Counties. Three of these counties together with the capital Monrovia and surrounding Montserrado and Margibi counties experienced the highest levels of EVD infections in Liberia. Vulnerability has multiple dimensions and a classification developed from multiple variables provides a more holistic view of vulnerability than single indicators such as food insecurity or scarcity of health care facilities. Few rural Liberians are food secure and many cannot reach a medical clinic in Liberia may be warranted. We demonstrate how social vulnerability index approaches can be applied in the context of disease outbreaks, and our methods are relevant elsewhere.
Issa, Sahar; van der Molen, Irna; Stel, Nora
2015-01-01
This chapter reviews the literature on vulnerability. Together with Chapter 3, that offers a literature review specifically focused on resilience, it lays the conceptual foundations for the empirical chapters in this edited volume. Vulnerability symbolizes the susceptibility of a certain system to
Urban Vulnerability Assessment Using AHP
Directory of Open Access Journals (Sweden)
Alireza Rezaei
2018-01-01
Full Text Available Purpose. Physical expansion of urban areas and cities is of great importance nowadays. Irreparable damages will thus be caused by lack of proper planning against natural disasters. Crisis management will therefore guide through prevention, preparedness, disaster relief, and recovery by planning an appropriate program. Methodology. Principal processes of crisis management against earthquake in Iran were evaluated and discussed. Multicriteria earthquake crisis management was then proposed by means of Analytic Hierarchy Process (AHP. Vulnerability of 19 urban areas in Qazvin city was studied and analyzed as a case study. Three main criteria were considered as “physical dimensions and physical vulnerability texture,” “the amount of urban texture responsibility to aid after crisis,” and “possibility of city reversibility after the crisis.” These criteria were divided into 20 subcriteria which were prioritized by a questionnaire survey. Findings. “High population density,” “urban texture of old and repairable buildings,” “lack of relief and medical services,” “a few organic texture areas,” “sidewalks with less than 6 meters width in the region,” and “lack of open spaces in the area” were concluded to be the most important reasons causing high vulnerability of urban texture in Qazvin city.
Unified communication to reach vulnerable mothers.
Tezcan, B; Von Rege, I; Henkson, H; Oteng-Ntim, E
2011-01-01
The feasibility of using a mobile text to reach vulnerable patient groups was assessed in this study. A total of 121 pregnant or postnatal women were randomly asked to complete a questionnaire. The questionnaire was given to them in the antenatal clinic, postnatal ward, antenatal ward or in the day assessment unit at St Thomas' Hospital, London. The forms were collected and analysed using an Excel database. The results of this survey show that mobile technology is readily available for 97% of the obstetric population. In mothers from vulnerable groups and in mothers from deprived areas, 61% possessed 3rd generation mobile technology. The majority of mothers surveyed wanted their care supplemented by the use of their mobile phones.
Modelling self-assessed vulnerability to HIV and its associated ...
African Journals Online (AJOL)
Background: Globally, individuals' self-assessment of vulnerability to HIV infection is important to maintain safer sexual behaviour and reduce risky behaviours. However, determinants of self-perceived risk of HIV infection are not well documented and differ. We assessed the level of self-perceived vulnerability to HIV ...
Nadeau, Christopher P.; Fuller, Angela K.
2016-01-01
Conservation organizations worldwide are investing in climate change vulnerability assessments. Most vulnerability assessment methods focus on either landscape features or species traits that can affect a species vulnerability to climate change. However, landscape features and species traits likely interact to affect vulnerability. We compare a landscape-based assessment, a trait-based assessment, and an assessment that combines landscape variables and species traits for 113 species of birds, herpetofauna, and mammals in the northeastern United States. Our aim is to better understand which species traits and landscape variables have the largest influence on assessment results and which types of vulnerability assessments are most useful for different objectives. Species traits were most important for determining which species will be most vulnerable to climate change. The sensitivity of species to dispersal barriers and the species average natal dispersal distance were the most important traits. Landscape features were most important for determining where species will be most vulnerable because species were most vulnerable in areas where multiple landscape features combined to increase vulnerability, regardless of species traits. The interaction between landscape variables and species traits was important when determining how to reduce climate change vulnerability. For example, an assessment that combines information on landscape connectivity, climate change velocity, and natal dispersal distance suggests that increasing landscape connectivity may not reduce the vulnerability of many species. Assessments that include landscape features and species traits will likely be most useful in guiding conservation under climate change.
Applicability of vulnerability maps
International Nuclear Information System (INIS)
Andersen, L.J.; Gosk, E.
1989-01-01
A number of aspects to vulnerability maps are discussed: the vulnerability concept, mapping purposes, possible users, and applicability of vulnerability maps. Problems associated with general-type vulnerability mapping, including large-scale maps, universal pollutant, and universal pollution scenario are also discussed. An alternative approach to vulnerability assessment - specific vulnerability mapping for limited areas, specific pollutant, and predefined pollution scenario - is suggested. A simplification of the vulnerability concept is proposed in order to make vulnerability mapping more objective and by this means more comparable. An extension of the vulnerability concept to the rest of the hydrogeological cycle (lakes, rivers, and the sea) is proposed. Some recommendations regarding future activities are given
Thomasgard, M
1998-01-01
While a parental perception of child vulnerability to illness/injury is often used interchangeably with parental overprotection, research suggests that these constructs are independent. Distinct parental psychological characteristics were hypothesized for each construct. The parents of 871 children, ages 22-72 months, completed a four-part protocol (clinical background data, Child Vulnerability Scale, Parent Protection Scale, and Brief Symptom Inventory). A distinct parent symptom profile was found for perceived child vulnerability (somatization, obsessive-compulsiveness, and anxiety). Overprotection was associated with phobic anxiety, psychoticism, and paranoid ideation. These findings provide further support for the differentiation of these constructs.
Pattern of Clinical Medication Seeking for Import Malaria by Migrant Workers
Directory of Open Access Journals (Sweden)
Muhammad Mahmudi
2015-05-01
Full Text Available Number of malaria cases in Kabupaten Trenggalek in 2014 is 89 cases, and 83 cases are import malaria from migrant workers. Import malaria is transmitted across two areas and affects the clinical medication seeking. This research wants to describe the pattern of clinical medication seeking for import malaria by migrant workers in Puskesmas Pandean working area. This was cross sectional study with descriptive quantitative approach. Research’s sample is 26 import malaria sufferers in 2013–2015 who has chosen purposively with inclusion criteria. Interview had used to get information about characteristics, place felt the symptom, first clinical medication seeking (place and time, clinical diagnosis, medication follow up, and recovery status. The result of the research shows 100% respondent is man and the age about 20-30 years old (53,8 who is working as agricultural laborers outside Java. Mostly of respondent feel the malaria symptoms in their working place (53,8%. The day seeks clinical medication at day three after symptom (34, 6%. Respondents that feel the symptom in Puskesmas Pandean working area chose Puskesmas as clinical medication place (42,3%, and hospital (19,2% for them whose experience the malaria symptom in their working area. Puskesmas is chosen as clinical diagnosis place (69% and only 11,5% respondent got medication follow up. Puskesmas is chosen as intermediate clinical medication place (60% for 19,2% respondent that is not recovered well, although 20% go to Dukun. All of respondent chose the clinical medication as their prime medication. Need to make medication follow up visitation well complete. Keyword: pattern, clinical medication, import malaria, migrant worker
Directory of Open Access Journals (Sweden)
F. Nasrnia
2016-05-01
deal with drought in the community and reflect the effects of drought on people's ability to cope with the event. The physical vulnerability is related to the characteristics and the structure of society, infrastructure and services that are the result of the damage caused by drought. In the present study, the economic dimension of vulnerability, including GDP per capita, value added in agriculture, value added in industry and the impact of drought on the GDP. Under the criteria of social vulnerability, population density, population growth, the rate of literacy, vulnerable populations, the costs of health and safety and the impact of drought on employment were considered. The physical dimensions of vulnerability include the rate of irrigated land and road density since the objective of this study was to assess vulnerability to drought in various provinces of the country, the required data for all provinces except for Alborz province was collected in 1391 from intelligence sources. To determine the importance of different dimensions of vulnerability as well as the sub-phase in each dimension, the questionnaire was used for paired comparisons. As for the tens of experts, specialists and professionals who have expertise using the Delphi method is incorporated. In general, the importance of physical vulnerability is more than economic and social vulnerability. On the other hand, according to the results the economic and social vulnerability is important, too. The results of this study showed that the importance of the physical vulnerability was more than the economic and social vulnerability and economic vulnerability and social importance were the same. In the economic vulnerability sub-criteria of per capita GDP, in the social vulnerability sub-criteria of population density and in the physical vulnerability sub-criteria of road density have the most importance. These findings may reflect the fact that when drought occurs, access to infrastructure, services and markets
Importance of training on clinical thinking and clinical competence to interventional radiologists
International Nuclear Information System (INIS)
Xu Ke; Zhong Hongshan
2010-01-01
Although the history of Interventional Radiology is no longer than 50 years, interventional techniques have been dramatically developed. Interventional radiologists have been responsible for much of the medical innovations and development of the minimally invasive procedures that are commonplace today to treat many complicated diseases as physicians. But the education backgrounds of interventional radiologist in China are different. Therefore, we should be aware that the job of an interventional radiologist is totally different from that of a diagnostic radiologist. It is very important to train interventional radiologists for improving their clinical thinking and clinical competence. Herein, we propose our suggestions on how to improve the clinical thinking and clinical competence of interventional radiologists. In this paper we also systemically introduce the accurate and proper treatment procedures which should be strictly followed in clinical work and,meanwhile, the perioperative patients care is emphasized. (authors)
Risky Business: Applying Ethical Standards to Social Media Use with Vulnerable Populations
Directory of Open Access Journals (Sweden)
Hillary Rose Dolinsky
2015-07-01
Full Text Available Social media is changing how those in the helping professions offer clinical, medical, or educational services, provide referrals, administer therapeutic interventions, and conduct research. Non-profits and government organizations working with vulnerable populations need to consider the possibility of ethical mistakes when using social media. A comparison of Facebook strategies used with the National Youth in Transition Database (NYTD mandate to engage and locate current and former youth in the child welfare system was conducted. Facebook practices and strategies were examined based on the National Association of Social Workers (NASW Code of Ethics and the Association of Social Work Boards (ASWB Standards for Technology and Social Work Practice. The ethical standards examined include: obtaining consent, preserving confidentiality, verifying youth identity online, and avoiding disclosure of foster care affiliation. Findings demonstrate the importance of providing guidelines and best practices when adopting social media tools for interacting with vulnerable populations.
Households' vulnerability and responses to shocks: evidence from rural Kenya
Ndirangu, L.
2007-01-01
Key words: Vulnerability, HIV/AIDS, weather shocks, risk management, coping strategies, rural households, gender. Empirical investigation on household’s responses to sources of vulnerability is important for designing and implementation of social policies. The design of an effective
The vulnerability of the free aquifers using functions of time of trip
International Nuclear Information System (INIS)
Betancur Vargas, Teresita; Wills Betancur, Beatriz Amparo; Rueda Gallo, Orfely Maria
1999-01-01
The determination of an aquifers vulnerability degree represents a support instrument for hydraulic resources management. It is also important for territory ordering and planning because it guarantors groundwater conservation. Achieving the determination of procedures for vulnerability maps construction, using measurable parameters, integrated as a function, is a practical methodology with very important and vantages over traditional methodologies. It is considered that the pollutant trip time from the surface to the aquifers is a good vulnerability indicator
Social Vulnerability and Ebola Virus Disease in Rural Liberia.
Directory of Open Access Journals (Sweden)
John A Stanturf
Full Text Available The Ebola virus disease (EVD epidemic that has stricken thousands of people in the three West African countries of Liberia, Sierra Leone, and Guinea highlights the lack of adaptive capacity in post-conflict countries. The scarcity of health services in particular renders these populations vulnerable to multiple interacting stressors including food insecurity, climate change, and the cascading effects of disease epidemics such as EVD. However, the spatial distribution of vulnerable rural populations and the individual stressors contributing to their vulnerability are unknown. We developed a Social Vulnerability Classification using census indicators and mapped it at the district scale for Liberia. According to the Classification, we estimate that districts having the highest social vulnerability lie in the north and west of Liberia in Lofa, Bong, Grand Cape Mount, and Bomi Counties. Three of these counties together with the capital Monrovia and surrounding Montserrado and Margibi counties experienced the highest levels of EVD infections in Liberia. Vulnerability has multiple dimensions and a classification developed from multiple variables provides a more holistic view of vulnerability than single indicators such as food insecurity or scarcity of health care facilities. Few rural Liberians are food secure and many cannot reach a medical clinic in <80 minutes. Our results illustrate how census and household survey data, when displayed spatially at a sub-county level, may help highlight the location of the most vulnerable households and populations. Our results can be used to identify vulnerability hotspots where development strategies and allocation of resources to address the underlying causes of vulnerability in Liberia may be warranted. We demonstrate how social vulnerability index approaches can be applied in the context of disease outbreaks, and our methods are relevant elsewhere.
Lovrić, Robert; Prlić, Nada; Zec, Davor; Pušeljić, Silvija; Žvanut, Boštjan
2015-01-01
The students' assessment of clinical faculty competencies and the faculty members' self-assessment can provide important information about nursing clinical education. The aim of this study was to identify the differences between the students' assessment of the clinical faculty member's competencies and the faculty member's self-assessment. These differences can reveal interesting insights relevant for improving clinical practice.
Vulnerability to shocks in the global seafood trade network
Gephart, Jessica A.; Rovenskaya, Elena; Dieckmann, Ulf; Pace, Michael L.; Brännström, Åke
2016-03-01
Trade can allow countries to overcome local or regional losses (shocks) to their food supply, but reliance on international food trade also exposes countries to risks from external perturbations. Countries that are nutritionally or economically dependent on international trade of a commodity may be adversely affected by such shocks. While exposure to shocks has been studied in financial markets, communication networks, and some infrastructure systems, it has received less attention in food-trade networks. Here, we develop a forward shock-propagation model to quantify how trade flows are redistributed under a range of shock scenarios and assess the food-security outcomes by comparing changes in national fish supplies to indices of each country’s nutritional fish dependency. Shock propagation and distribution among regions are modeled on a network of historical bilateral seafood trade data from UN Comtrade using 205 reporting territories grouped into 18 regions. In our model exposure to shocks increases with total imports and the number of import partners. We find that Central and West Africa are the most vulnerable to shocks, with their vulnerability increasing when a willingness-to-pay proxy is included. These findings suggest that countries can reduce their overall vulnerability to shocks by reducing reliance on imports and diversifying food sources. As international seafood trade grows, identifying these types of potential risks and vulnerabilities is important to build a more resilient food system.
SU-G-BRB-16: Vulnerabilities in the Gamma Metric
International Nuclear Information System (INIS)
Neal, B; Siebers, J
2016-01-01
Purpose: To explore vulnerabilities in the gamma index metric that undermine its wide use as a radiation therapy quality assurance tool. Methods: 2D test field pairs (images) are created specifically to achieve high gamma passing rates, but to also include gross errors by exploiting the distance-to-agreement and percent-passing components of the metric. The first set has no requirement of clinical practicality, but is intended to expose vulnerabilities. The second set exposes clinically realistic vulnerabilities. To circumvent limitations inherent to user-specific tuning of prediction algorithms to match measurements, digital test cases are manually constructed, thereby mimicking high-quality image prediction. Results: With a 3 mm distance-to-agreement metric, changing field size by ±6 mm results in a gamma passing rate over 99%. For a uniform field, a lattice of passing points spaced 5 mm apart results in a passing rate of 100%. Exploiting the percent-passing component, a 10×10 cm"2 field can have a 95% passing rate when an 8 cm"2=2.8×2.8 cm"2 highly out-of-tolerance (e.g. zero dose) square is missing from the comparison image. For clinically realistic vulnerabilities, an arc plan for which a 2D image is created can have a >95% passing rate solely due to agreement in the lateral spillage, with the failing 5% in the critical target region. A field with an integrated boost (e.g whole brain plus small metastases) could neglect the metastases entirely, yet still pass with a 95% threshold. All the failure modes described would be visually apparent on a gamma-map image. Conclusion: The %gamma<1 metric has significant vulnerabilities. High passing rates can obscure critical faults in hypothetical and delivered radiation doses. Great caution should be used with gamma as a QA metric; users should inspect the gamma-map. Visual analysis of gamma-maps may be impractical for cine acquisition.
SU-G-BRB-16: Vulnerabilities in the Gamma Metric
Energy Technology Data Exchange (ETDEWEB)
Neal, B; Siebers, J [University of Virginia Health System, Charlottesville, VA (United States)
2016-06-15
Purpose: To explore vulnerabilities in the gamma index metric that undermine its wide use as a radiation therapy quality assurance tool. Methods: 2D test field pairs (images) are created specifically to achieve high gamma passing rates, but to also include gross errors by exploiting the distance-to-agreement and percent-passing components of the metric. The first set has no requirement of clinical practicality, but is intended to expose vulnerabilities. The second set exposes clinically realistic vulnerabilities. To circumvent limitations inherent to user-specific tuning of prediction algorithms to match measurements, digital test cases are manually constructed, thereby mimicking high-quality image prediction. Results: With a 3 mm distance-to-agreement metric, changing field size by ±6 mm results in a gamma passing rate over 99%. For a uniform field, a lattice of passing points spaced 5 mm apart results in a passing rate of 100%. Exploiting the percent-passing component, a 10×10 cm{sup 2} field can have a 95% passing rate when an 8 cm{sup 2}=2.8×2.8 cm{sup 2} highly out-of-tolerance (e.g. zero dose) square is missing from the comparison image. For clinically realistic vulnerabilities, an arc plan for which a 2D image is created can have a >95% passing rate solely due to agreement in the lateral spillage, with the failing 5% in the critical target region. A field with an integrated boost (e.g whole brain plus small metastases) could neglect the metastases entirely, yet still pass with a 95% threshold. All the failure modes described would be visually apparent on a gamma-map image. Conclusion: The %gamma<1 metric has significant vulnerabilities. High passing rates can obscure critical faults in hypothetical and delivered radiation doses. Great caution should be used with gamma as a QA metric; users should inspect the gamma-map. Visual analysis of gamma-maps may be impractical for cine acquisition.
Exploring the Sports Experiences of Socially Vulnerable Youth
Directory of Open Access Journals (Sweden)
Sabina Super
2017-06-01
Full Text Available Sports participation is considered beneficial for the development of socially vulnerable youth, not only in terms of physical health but also in terms of cognitive, social and emotional health. Despite the strong belief that sports clubs offer a setting for positive youth development, there is limited knowledge about how socially vulnerable youths experience their participation in these clubs. Interviews were conducted with 22 socially vulnerable youths that play a sport at a local sports club. An inductive content analysis was conducted and three themes were discovered that are included in the positive and negative sports experiences: the extent to which the youths experienced visibility of their skills, the extent to which the youths felt confident while playing their sport, and the extent to which the youths felt that sport was a challenge they liked to take on. More importantly, there was a fragile balance within each of the themes and the sports coaches played an important role in installing and maintaining a supportive environment in which the youths could have meaningful, consistent and balanced sports experiences. It is not self-evident that for socially vulnerable youth sports experiences are positive and supporting.
International Nuclear Information System (INIS)
Dimastromatteo, Julien
2010-01-01
Cardiovascular diseases are the leading cause of mortality worldwide. Coronary events are mainly caused by coronary plaque rupture or erosion. However, at present, there is no noninvasive tool available for the detection of vulnerable plaques. The first part of thesis is about evaluation of new radiotracers for the detection of atherosclerotic vulnerable plaques. 99m Tc-B2702p, 20 derivatives, 99m Tc-VP and 99m Tc-VINP28 were evaluated in an experimental model of atherosclerosis (ApoE-/- mice with left carotid artery ligation). 99m Tc- B2702p1 is a potentially useful radiotracer for the in vivo molecular imaging of VCAM-1 expression in atherosclerotic plaques. Myocardial angiogenesis is an important post infarction phenomenon. Angiogenic therapy improves experimentally cardiac parameters. However, clinical trials using the same therapy are more controversial. At present, clinical imaging tools don't allow us to assess angiogenesis therapy. The second part of thesis is about validation of 99m Tc-RAFT-RGD in the detection of myocardial angiogenesis. 99m Tc-RAFT-RGD allow us to perform noninvasive molecular imaging of myocardial angiogenesis in an experimental model. (author)
Vulnerability and the bioethics through the experiences of illness
Directory of Open Access Journals (Sweden)
Rolim-Neto Leite Modesto
2012-03-01
Full Text Available Background: Vulnerable people are relatively or absolutely incapable of protecting their own interests. Vulnerability is an anthropological attribute of human beings due to the simple fact of being alive. Brazilian society has long been established as a matter through the eyes of social scientists. In the name of it, the vulnerability in the doctor-patient context is now being a much-discussed issue. Purpose: This study aims to analyze the current studies regarding the insertion of vulnerability in the health issue, reflexively dealing with the ethical matters involved, as well as with the narratives’ insertion in this process. Methods: This article is based on data extracted from Scientific Electronic Library Online (Scielo and on secondary data from textbooks about vulnerability, ethics, physician-patient relationship and narratives. Results and discussion: Doctors are faced with dilemmas in clinical practice: moral, ethical, legal, social, religious and economic. On these occasions, question their own values. By listening carefully to the stories of patients, health professionals broaden their perspectives, organize and integrate complex situations, which assists in conducting these difficult situations. Conclusion: Reflect the concept of vulnerability raises (re think health practices, particularly in bringing to light the social experience of illness and hospitalization of the patient.
Vulnerability and the bioethics through the experiences of illness
Directory of Open Access Journals (Sweden)
Rolim-Neto Leite Modesto
2012-01-01
Full Text Available Background: Vulnerable people are relatively or absolutely incapable of protecting their own interests. Vulnerability is an anthropological attribute of human beings due to the simple fact of being alive. Brazilian society has long been established as a matter through the eyes of social scientists. In the name of it, the vulnerability in the doctor-patient context is now being a much-discussed issue. Purpose: This study aims to analyze the current studies regarding the insertion of vulnerability in the health issue, reflexively dealing with the ethical matters involved, as well as with the narratives’ insertion in this process. Methods: This article is based on data extracted from Scientific Electronic Library Online (Scielo and on secondary data from textbooks about vulnerability, ethics, physician-patient relationship and narratives. Results and discussion: Doctors are faced with dilemmas in clinical practice: moral, ethical, legal, social, religious and economic. On these occasions, question their own values. By listening carefully to the stories of patients, health professionals broaden their perspectives, organize and integrate complex situations, which assists in conducting these difficult situations. Conclusion: Reflect the concept of vulnerability raises (re think health practices, particularly in bringing to light the social experience of illness and hospitalization of the patient.
Analyses Of Two End-User Software Vulnerability Exposure Metrics
Energy Technology Data Exchange (ETDEWEB)
Jason L. Wright; Miles McQueen; Lawrence Wellman
2012-08-01
The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.
Vulnerable narcissism is associated with severity of depressive symptoms in dysthymic patients.
Erkoreka, Leire; Navarro, Bárbara
2017-11-01
Pathological narcissism involves grandiose and vulnerable presentations. Narcissism, and specifically the vulnerable presentation, has been associated to depression, although empirical research studying this relationship is limited. Dysthymia is characterized by a greater treatment resistance and poorer prognosis than other chronic depressive disorders. The presence of dysfunctional personality traits may explain it. We aim to explore the association between vulnerable narcissistic traits and severity of depressive symptoms in a sample of dysthymic patients. To that end, 80 dysthymic outpatients were evaluated. The treating psychiatrist collected sociodemographic and clinical data and completed the Clinical Global Impression-Severity Scale. Patients completed the Beck Depression Inventory (BDI) and the Hypersensitive Narcissism Scale (HSNS), that respectively assess severity of depressive symptoms and vulnerable narcissism. We tested for potential confounders and conducted a regression analysis to explore whether severity of vulnerable narcissism was associated with greater depressive symptoms. HSNS was found to be the principal predictor of BDI, and along with age, accounted for 23% of the variance in BDI. An assessment of personality functioning is therefore recommended in chronically depressed patients that have been refractory to standard treatments. Psychotherapies that address personality disturbance should be included in the treatment when necessary. Copyright © 2017 Elsevier B.V. All rights reserved.
Europe's vulnerability to energy crises
Energy Technology Data Exchange (ETDEWEB)
NONE
2008-01-15
The growing dependency of Europe as a whole on energy imports and anticipated further increases in energy prices reinforce the concerns about meeting the energy demand in the future. The objective of the Study is to identify the threats leading to potential energy crises and suggest solutions for facing, in an appropriate way, the related key challenges. In addition, the Study intends to develop a number of indicators effective enough to assess the level of different types of vulnerability, as well the overall vulnerability of a country or region, including threats to physical disruption, higher energy prices etc. The use of vulnerability indicators is highly recommended for all WEC-European countries, as well as to policy makers and market players.
Detecting Network Vulnerabilities Through Graph TheoreticalMethods
Energy Technology Data Exchange (ETDEWEB)
Cesarz, Patrick; Pomann, Gina-Maria; Torre, Luis de la; Villarosa, Greta; Flournoy, Tamara; Pinar, Ali; Meza Juan
2007-09-30
Identifying vulnerabilities in power networks is an important problem, as even a small number of vulnerable connections can cause billions of dollars in damage to a network. In this paper, we investigate a graph theoretical formulation for identifying vulnerabilities of a network. We first try to find the most critical components in a network by finding an optimal solution for each possible cutsize constraint for the relaxed version of the inhibiting bisection problem, which aims to find loosely coupled subgraphs with significant demand/supply mismatch. Then we investigate finding critical components by finding a flow assignment that minimizes the maximum among flow assignments on all edges. We also report experiments on IEEE 30, IEEE 118, and WSCC 179 benchmark power networks.
Windows Server 2012 vulnerabilities and security
Directory of Open Access Journals (Sweden)
Gabriel R. López
2015-09-01
Full Text Available This investigation analyses the history of the vulnerabilities of the base system Windows Server 2012 highlighting the most critic vulnerabilities given every 4 months since its creation until the current date of the research. It was organized by the type of vulnerabilities based on the classification of the NIST. Next, given the official vulnerabilities of the system, the authors show how a critical vulnerability is treated by Microsoft in order to countermeasure the security flaw. Then, the authors present the recommended security approaches for Windows Server 2012, which focus on the baseline software given by Microsoft, update, patch and change management, hardening practices and the application of Active Directory Rights Management Services (AD RMS. AD RMS is considered as an important feature since it is able to protect the system even though it is compromised using access lists at a document level. Finally, the investigation of the state of the art related to the security of Windows Server 2012 shows an analysis of solutions given by third parties vendors, which offer security products to secure the base system objective of this study. The recommended solution given by the authors present the security vendor Symantec with its successful features and also characteristics that the authors considered that may have to be improved in future versions of the security solution.
Preliminary regulatory assessment of nuclear power plants vulnerabilities
International Nuclear Information System (INIS)
Kostadinov, V.; Petelin, S.
2004-01-01
Preliminary attempts to develop models for nuclear regulatory vulnerability assessment of nuclear power plants are presented. Development of the philosophy and computer tools could be new and important insight for management of nuclear operators and nuclear regulatory bodies who face difficult questions about how to assess the vulnerability of nuclear power plants and other nuclear facilities to external and internal threats. In the situation where different and hidden threat sources are dispersed throughout the world, the assessment of security and safe operation of nuclear power plants is very important. Capability to evaluate plant vulnerability to different kinds of threats, like human and natural occurrences and terrorist attacks and preparation of emergency response plans and estimation of costs are of vital importance for assurance of national security. On the basis of such vital insights, nuclear operators and nuclear regulatory bodies could plan and optimise changes in oversight procedures, organisations, equipment, hardware and software to reduce risks taking into account security and safety of nuclear power plants operation, budget, manpower, and other limitations. Initial qualitative estimations of adapted assessments for nuclear applications are shortly presented. (author)
Terminological Ontologies for Risk and Vulnerability Analysis
DEFF Research Database (Denmark)
Madsen, Bodil Nistrup; Erdman Thomsen, Hanne
2014-01-01
Risk and vulnerability analyses are an important preliminary stage in civil contingency planning. The Danish Emergency Management Agency has developed a generic model and a set of tools that may be used in the preparedness planning, i.e. for identifying and describing society’s critical functions......, for formulating threat scenarios and for assessing consequences. Terminological ontologies, which are systems of domain specific concepts comprising concept relations and characteristics, are useful, both when describing the central concepts of risk and vulnerability analysis (meta concepts), and for further...
Selective neuronal vulnerability to oxidative stress in the brain
Directory of Open Access Journals (Sweden)
Xinkun Wang
2010-03-01
Full Text Available Oxidative stress (OS, caused by the imbalance between the generation and detoxification of reactive oxygen and nitrogen species (ROS/RNS, plays an important role in brain aging, neurodegenerative diseases, and other related adverse conditions, such as ischemia. While ROS/RNS serve as signaling molecules at physiological levels, an excessive amount of these molecules leads to oxidative modification and, therefore, dysfunction of proteins, nucleic acids, and lipids. The response of neurons to this pervasive stress, however, is not uniform in the brain. While many brain neurons can cope with a rise in OS, there are select populations of neurons in the brain that are vulnerable. Because of their selective vulnerability, these neurons are usually the first to exhibit functional decline and cell death during normal aging, or in age-associated neurodegenerative diseases, such as Alzheimer’s disease. Understanding the molecular and cellular mechanisms of selective neuronal vulnerability (SNV to OS is important in the development of future intervention approaches to protect such vulnerable neurons from the stresses of the aging process and the pathological states that lead to neurodegeneration. In this review, the currently known molecular and cellular factors that contribute to SNV to OS are summarized. Included among the major underlying factors are high intrinsic OS, high demand for ROS/RNS-based signaling, low ATP production, mitochondrial dysfunction, and high inflammatory response in vulnerable neurons. The contribution to the selective vulnerability of neurons to OS by other intrinsic or extrinsic factors, such as deficient DNA damage repair, low calcium-buffering capacity, and glutamate excitotoxicity, are also discussed.
The importance of intuition in the occupational medicine clinical consultation.
Philipp, R; Philipp, E; Thorne, P
1999-01-01
Clinical consultation involves unspoken elements which flow between doctor and patient. They are vital ingredients of successful patient management but are not easily measured, objective or evidence-based. These elements include empathy and intuition for what the patient is experiencing and trying to express, or indeed suppressing. Time is needed to explore the instinctive feeling for what is important, particularly in present day society which increasingly recognizes the worth of psychosocial factors. This time should be available in the occupational health consultation. In this paper the importance of intuition and its essential value in the clinical interview are traced through history. Differences between intuition and empathy are explored and the use of intuition as a clinical tool is examined.
Kocks, J. W. H.; Tuinenga, M. G.; Uil, S. M.; van den Berg, J. W. K.; Stahl, E.; van der Molen, T.
2006-01-01
Background: Patient-reported outcomes ( PRO) questionnaires are being increasingly used in COPD clinical studies. The challenge facing investigators is to determine what change is significant, ie what is the minimal clinically important difference (MCID). This study aimed to identify the MCID for
Monitoring the Vulnerability of Energy Supply System
International Nuclear Information System (INIS)
Gnansonounou, E.
2006-01-01
Due to the increasing complexity of the world evolution, the public decision makers, the energy supply industry and the consumers in industrialised countries are more and more sensitive to the vulnerability of energy supply. The emergence of new big consumer countries and the perspective of oil and gas depletion at the end of the current century raise the concerns about how to share fairly the remaining resources for the common and sustainable development of the mankind. Erratic energy prices discourage investment and delay the energy transition. Voluntary measures are needed mainly in industrialised countries in order to develop alternative and sustainable energy sources and to avoid world struggle for energy procurement. In this contribution a synthetic energy vulnerability index is defined for monitoring energy supply vulnerability. The proposed index is based on energy intensity, oil and gas import dependency, CO 2 content of primary energy supply, electricity supply vulnerability and non-diversity in transport fuels. The preliminary assessment of this synthetic index for selected industrialised countries provides promising results that need however further refinement.(author)
Rockfall vulnerability assessment for reinforced concrete buildings
Mavrouli, O.; Corominas, J.
2010-10-01
The vulnerability of buildings to the impact of rockfalls is a topic that has recently attracted increasing attention in the scientific literature. The quantification of the vulnerability, when based on empirical or heuristic approaches requires data recorded from historical rockfalls, which are not always available. This is the reason why appropriate alternatives are required. The use of analytical and numerical models can be one of them. In this paper, a methodology is proposed for the analytical evaluation of the vulnerability of reinforced concrete buildings. The vulnerability is included in the risk equation by incorporating the uncertainty of the impact location of the rock block and the subsequent damage level. The output is a weighted vulnerability that ranges from 0 to 1 and expresses the potential damage that a rock block causes to a building in function of its velocity and size. The vulnerability is calculated by the sum of the products of the probability of block impact on each element of the building and its associated damage state, the latter expressed in relative recovery cost terms. The probability of exceeding a specific damage state such as non-structural, local, partial, extensive or total collapse is also important for the quantification of risk and to this purpose, several sets of fragility curves for various rock diameters and increasing velocities have been prepared. An example is shown for the case of a simple reinforced concrete building and impact energies from 0 to 4075 kJ.
Vulnerability analysis of a PWR to an external event
International Nuclear Information System (INIS)
Aruety, S.; Ilberg, D.; Hertz, Y.
1980-01-01
The Vulnerability of a Nuclear Power Plant (NPP) to external events is affected by several factors such as: the degree of redundancy of the reactor systems, subsystems and components; the separation of systems provided in the general layout; the extent of the vulnerable area, i.e., the area which upon being affected by an external event will result in system failure; and the time required to repair or replace the systems, when allowed. The present study offers a methodology, using Probabilistic Safety Analysis, to evaluate the relative importance of the above parameters in reducing the vulnerability of reactor safety systems. Several safety systems of typical PWR's are analyzed as examples. It was found that the degree of redundancy and physical separation of the systems has the most prominent effect on the vulnerability of the NPP
How Should We Treat the Vulnerable?: Qualitative Study of Authoritative Ethics Documents.
Zagorac, Ivana
2016-01-01
The aim of this study is to explore what actual guidance is provided by authoritative ethics documents regarding the recognition and protection of the vulnerable. The documents included in this analysis are the Belmont Report, the Declaration of Helsinki, The Council for International Organizations of Medical Sciences (CIOMS) Guidelines, and the UNESCO Universal Declaration on Bioethics and Human Rights, including its supplementary report on vulnerability. A qualitative analysis of these documents was conducted in light of three questions: what is vulnerability, who are the vulnerable, and how should the vulnerable be protected? The results show significant differences among the documents regarding the first two questions. None of the documents provides any guidance on the third question (how to protect the vulnerable). These results suggest a great discrepancy between the acknowledged importance of the concept of vulnerability and a general understanding of the scope, content, and practical implications of vulnerability.
Beauchaine, Theodore P; Constantino, John N
2017-09-11
In psychopathology research, endophenotypes are a subset of biomarkers that indicate genetic vulnerability independent of clinical state. To date, an explicit expectation is that endophenotypes be specific to single disorders. We evaluate this expectation considering recent advances in psychiatric genetics, recognition that transdiagnostic vulnerability traits are often more useful than clinical diagnoses in psychiatric genetics, and appreciation for etiological complexity across genetic, neural, hormonal and environmental levels of analysis. We suggest that the disorder-specificity requirement of endophenotypes be relaxed, that neural functions are preferable to behaviors as starting points in searches for endophenotypes, and that future research should focus on interactive effects of multiple endophenotypes on complex psychiatric disorders, some of which are 'phenocopies' with distinct etiologies.
Clinical importance of electromagnetic fields
International Nuclear Information System (INIS)
Ruppe, I.
1993-01-01
The clinical importance of most of the electromagnetic fields is not highly. Mostly they only have thermal effects, produced by energy-absorption. About 1 C increase of whole-body-temperature is valid for tolerable limit. For measuring is used the SAR-Value (Specific Absorption Rate) in W/kg body mass. SAR = 0,8W/kg for the whole body is valid to be safety. For the evaluation of possible other effects of electromagnetic fields the scientific knowledges are till now not sufficient to allow a final statement. That could be impacts of electromagnetic fields to conduction or switch processes in the nerves or brains, in the framwork of cellular regulations, in the genetic reactions are occurig is little, but if is necessary to find it out in scinentific investigations. (orig.) [de
Rethinking vulnerability analysis and governance with emphasis on a participatory approach.
Rossignol, Nicolas; Delvenne, Pierre; Turcanu, Catrinel
2015-01-01
This article draws on vulnerability analysis as it emerged as a complement to classical risk analysis, and it aims at exploring its ability for nurturing risk and vulnerability governance actions. An analysis of the literature on vulnerability analysis allows us to formulate a three-fold critique: first, vulnerability analysis has been treated separately in the natural and the technological hazards fields. This separation prevents vulnerability from unleashing the full range of its potential, as it constrains appraisals into artificial categories and thus already closes down the outcomes of the analysis. Second, vulnerability analysis focused on assessment tools that are mainly quantitative, whereas qualitative appraisal is a key to assessing vulnerability in a comprehensive way and to informing policy making. Third, a systematic literature review of case studies reporting on participatory approaches to vulnerability analysis allows us to argue that participation has been important to address the above, but it remains too closed down in its approach and would benefit from embracing a more open, encompassing perspective. Therefore, we suggest rethinking vulnerability analysis as one part of a dynamic process between opening-up and closing-down strategies, in order to support a vulnerability governance framework. © 2014 Society for Risk Analysis.
Papathoma-Köhle, Maria
2016-08-01
The assessment of the physical vulnerability of elements at risk as part of the risk analysis is an essential aspect for the development of strategies and structural measures for risk reduction. Understanding, analysing and, if possible, quantifying physical vulnerability is a prerequisite for designing strategies and adopting tools for its reduction. The most common methods for assessing physical vulnerability are vulnerability matrices, vulnerability curves and vulnerability indicators; however, in most of the cases, these methods are used in a conflicting way rather than in combination. The article focuses on two of these methods: vulnerability curves and vulnerability indicators. Vulnerability curves express physical vulnerability as a function of the intensity of the process and the degree of loss, considering, in individual cases only, some structural characteristics of the affected buildings. However, a considerable amount of studies argue that vulnerability assessment should focus on the identification of these variables that influence the vulnerability of an element at risk (vulnerability indicators). In this study, an indicator-based methodology (IBM) for mountain hazards including debris flow (Kappes et al., 2012) is applied to a case study for debris flows in South Tyrol, where in the past a vulnerability curve has been developed. The relatively "new" indicator-based method is being scrutinised and recommendations for its improvement are outlined. The comparison of the two methodological approaches and their results is challenging since both methodological approaches deal with vulnerability in a different way. However, it is still possible to highlight their weaknesses and strengths, show clearly that both methodologies are necessary for the assessment of physical vulnerability and provide a preliminary "holistic methodological framework" for physical vulnerability assessment showing how the two approaches may be used in combination in the future.
Elements at risk as a framework for assessing the vulnerability of communities to landslides
Directory of Open Access Journals (Sweden)
M. Papathoma-Köhle
2007-12-01
Full Text Available The assessment of the vulnerability of communities prone to landslide related disasters is a topic that is growing in importance. Few studies discuss this issue and limited research has been carried out on the relationship between types of landslide and their potential impact on buildings and infrastructure. We outline a framework to undertake an assessment of the vulnerability of buildings to landslide utilising a similar framework used for assessing the vulnerability of buildings to tsunami damage. The framework is based on the development of an "elements at risk database" that takes into consideration the characteristics and use of the buildings, their importance for the local economy and the characteristics of the inhabitants (population density, age and so forth. The attributes that affect vulnerability are imported and examined within a GIS database which is used to visualise the physical, human and economic vulnerability. The results may have important implications for disaster management and emergency planning, and the database can be used by various end-users and stakeholders such as insurance companies, local authorities and the emergency services. The approach presented here can be integrated in to a wider more detailed "Framework for Landslide Risk and Vulnerability Assessment for Communities". We illustrate the potential of this framework and present preliminary results from Lichtenstein, Baden Württemberg, Germany.
Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem.
Williams, Patricia Ah; Woodward, Andrew J
2015-01-01
The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve. A review of the factors that contribute to such a potentially insecure environment, together with the identification of the vulnerabilities, is important for understanding why these vulnerabilities persist and what the solution space should look like. This multifaceted problem must be viewed from a systemic perspective if adequate protection is to be put in place and patient safety concerns addressed. This requires technical controls, governance, resilience measures, consolidated reporting, context expertise, regulation, and standards. It is evident that a coordinated, proactive approach to address this complex challenge is essential. In the interim, patient safety is under threat.
Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem
Williams, Patricia AH; Woodward, Andrew J
2015-01-01
The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve. A review of the factors that contribute to such a potentially insecure environment, together with the identification of the vulnerabilities, is important for understanding why these vulnerabilities persist and what the solution space should look like. This multifaceted problem must be viewed from a systemic perspective if adequate protection is to be put in place and patient safety concerns addressed. This requires technical controls, governance, resilience measures, consolidated reporting, context expertise, regulation, and standards. It is evident that a coordinated, proactive approach to address this complex challenge is essential. In the interim, patient safety is under threat. PMID:26229513
Naso, Susanna; Chen, Albert S.; Djordjević, Slobodan; Aronica, Giuseppe T.
2015-04-01
The classical approach to flood defence, aimed at reducing the probability of flooding through hard defences, has been substituted by flood risk management approach which accepts the idea of coping with floods and aims at reducing not only the probability of flooding, but also the consequences. In this view, the concept of vulnerability becomes central, such as the (non-structural) measures for its increment. On 22 November 2011, an exceptional rainstorm hit the Longano catchment (North-East part of Sicily, Italy) producing local heavy rainfall, mud-debris flow and flash flooding. The flash flood involved property, buildings, roads and more than 100 commercial estates have suffered severe damages. Some days after the event, the municipality provided people forms to describe the damages that occurred on their properties. Unfortunately, the lack of common guidelines in compiling them, their coarseness and the impossibility to have monetary information on them (such us damage data from previous events), did not allow the implementation of a detailed damage analysis. What we're developing in this work is a method for a qualitative evaluation of the consequences of floods, based on vulnerability curves for structures and classes of entities at risk. The difficulty in deriving the vulnerability curves for different building typologies, as function of the water depth, was due to the lack of quantitative information both on damages caused by previous events and on buildings' value. To solve the problem we submitted a questionnaire to a team of experts asking for an estimation of building damages to different hypothetical inundation depths. What we wanted to obtain was deriving the vulnerability data from technicians' experience, believing in the fundamental importance of the collaboration among research and professional engineers. Through the elaboration and the synthesis of the experts' estimations we derived the vulnerability curves for different building typologies and
Hierarchical statistical modeling of xylem vulnerability to cavitation.
Ogle, Kiona; Barber, Jarrett J; Willson, Cynthia; Thompson, Brenda
2009-01-01
Cavitation of xylem elements diminishes the water transport capacity of plants, and quantifying xylem vulnerability to cavitation is important to understanding plant function. Current approaches to analyzing hydraulic conductivity (K) data to infer vulnerability to cavitation suffer from problems such as the use of potentially unrealistic vulnerability curves, difficulty interpreting parameters in these curves, a statistical framework that ignores sampling design, and an overly simplistic view of uncertainty. This study illustrates how two common curves (exponential-sigmoid and Weibull) can be reparameterized in terms of meaningful parameters: maximum conductivity (k(sat)), water potential (-P) at which percentage loss of conductivity (PLC) =X% (P(X)), and the slope of the PLC curve at P(X) (S(X)), a 'sensitivity' index. We provide a hierarchical Bayesian method for fitting the reparameterized curves to K(H) data. We illustrate the method using data for roots and stems of two populations of Juniperus scopulorum and test for differences in k(sat), P(X), and S(X) between different groups. Two important results emerge from this study. First, the Weibull model is preferred because it produces biologically realistic estimates of PLC near P = 0 MPa. Second, stochastic embolisms contribute an important source of uncertainty that should be included in such analyses.
Improving tag/seal technologies: the vulnerability assessment component
International Nuclear Information System (INIS)
Jones, J.L.
1996-01-01
The Department of Energy (DOE), specifically the Office of Nonproliferation and National Security, has sponsored the development of numerous tag and seal technologies for high-security/high-valued applications. One important component in this technology development effort has been the continuous integration of vulnerability assessments. The Idaho National Engineering Laboratory (INEL) has been the lead laboratory for vulnerability assessments of fiber-optic-based tag/seal technologies. This paper presents a brief historical overview and the current status of the DOE high-security tag/seal development program and discusses INEL's adversarial role and assessment philosophy. Verification testing criteria used to define ''successful'' tampering attempts/attacks are discussed. Finally, the advantages of integrating a vulnerability assessment into the development of commercial security tag/seals are presented
Vulnerability Management for an Enterprise Resource Planning System
Goel, Shivani; Kiran, Ravi; Garg, Deepak
2012-09-01
Enterprise resource planning (ERP) systems are commonly used in technical educational institutions(TEIs). ERP systems should continue providing services to its users irrespective of the level of failure. There could be many types of failures in the ERP systems. There are different types of measures or characteristics that can be defined for ERP systems to handle the levels of failure. Here in this paper, various types of failure levels are identified along with various characteristics which are concerned with those failures. The relation between all these is summarized. The disruptions causing vulnerabilities in TEIs are identified .A vulnerability management cycle has been suggested along with many commercial and open source vulnerability management tools. The paper also highlights the importance of resiliency in ERP systems in TEIs.
Giant U waves: an important clinical clue
Directory of Open Access Journals (Sweden)
Verma N
2011-04-01
Full Text Available Nitin Verma, Vincent M Figueredo, Allan M Greenspan, Gregg S PressmanAlbert Einstein Medical Center, Philadelphia, PA, USAAbstract: Electrocardiographic U waves are a common clinical finding, and yet are poorly understood by many physicians. They can be seen in many clinical conditions, most importantly hypokalemia and ischemic heart disease. Over the years, many theories have been put forth to explain their origin. While still not completely understood, it now appears that mechanoelectrical interactions are responsible for normal U waves. Pathologic U waves may be seen in ischemic heart disease where they sometimes point to acute ischemic events. The large U waves of hypokalemia are most likely not true U waves but rather the terminal deflection in a bifid T wave.Keywords: U waves, hypokalemia, myocardial ischemia, electrocardiogram
Vulnerability Analysis of Urban Drainage Systems: Tree vs. Loop Networks
Directory of Open Access Journals (Sweden)
Chi Zhang
2017-03-01
Full Text Available Vulnerability analysis of urban drainage networks plays an important role in urban flood management. This study analyzes and compares the vulnerability of tree and loop systems under various rainfall events to structural failure represented by pipe blockage. Different pipe blockage scenarios, in which one of the pipes in an urban drainage network is assumed to be blocked individually, are constructed and their impacts on the network are simulated under different storm events. Furthermore, a vulnerability index is defined to measure the vulnerability of the drainage systems before and after the implementation of adaptation measures. The results obtained indicate that the tree systems have a relatively larger proportion of critical hydraulic pipes than the loop systems, thus the vulnerability of tree systems is substantially greater than that of the loop systems. Furthermore, the vulnerability index of tree systems is reduced after they are converted into a loop system with the implementation of adaptation measures. This paper provides an insight into the differences in the vulnerability of tree and loop systems, and provides more evidence for development of adaptation measures (e.g., tanks to reduce urban flooding.
Orth, Helen Grete; Schicktanz, Silke
2017-08-01
Outsourcing clinical trials sponsored by pharmaceutical companies from industrialized countries to low- (middle)-income countries - summarized as transnational biomedical research (TBR) - has lead to many concerns about ethical standards. Whether study participants are particularly vulnerable is one of those concerns. However, the concept of vulnerability is still vague and varies in its definition. Despite the fact that important international ethical guidelines such as the Declaration of Helsinki by the World Medical Association or the Ethical Guidelines for Biomedical Research Involving Human Subjects by the Council of International Organizations of Medical Sciences refer to vulnerability as ethical principle, each of their approaches are different. To overcome these shortcomings, we analyze and unite different approaches of vulnerability and develop practical criteria in order to operationalize the concept especially for the context of TBR. These criteria refer to the context of a study as well as the characteristics and the current living situation of study participants. Based on a case study of an HIV-vaccine-trial conducted in India we demonstrate how those criteria can be applied in a retrospective way to identify potential ethical conflicts. The criteria can also indicate a prospective function for ethical pre-assessment. For this, we provide an outlook for three major topics: 1. Vulnerability as a normative concept: Different ways of protection; 2. The relevance of transparency and 3. Vulnerability as an instrument to increase decision participation of human subjects. © 2016 John Wiley & Sons Ltd.
Full Text Available ... or vulnerable patients (such as children). A DSMB's role is to review data from a clinical trial ... a Clinical Trial If you're interested in learning more about, or taking part in, clinical trials, ...
Clinical and diagnostic importance of proteinuria: A review | Oni ...
African Journals Online (AJOL)
Clinical and diagnostic importance of proteinuria: A review. ... shown that diabetis mellitus, cardiovascular disease and hypertension could provoke secondary ... Proteinuria is also significant in some non-pathological cases such as pregnancy
International Nuclear Information System (INIS)
Jouffe, Yves; Massot, Marie-Helene; Noble, Cyprien
2015-01-01
Extensive expansion of urban areas generates transportation needs and energy expenses for mobility. Households already impacted by fuel poverty also suffer from energy vulnerability in their mobility. This report was prepared in the framework of the study of fuel poverty in France in the light of several indicators from existing inquiries, databases and modeling tools. The report is organised in 4 parts dealing with: the definition of energy vulnerability in mobility, its measurement, the possible remedial actions, and the discussions about energy vulnerability in mobility through working group meetings, respectively
A synthesized biophysical and social vulnerability assessment for Taiwan
Lee, Yung-Jaan
2017-11-01
Taiwan, located in the Western Pacific, is a country that is one of the most vulnerable to disasters that are associated with the changing climate; it is located within the Ring of Fire, which is the most geologically active region in the world. The environmental and geological conditions in Taiwan are sensitive and vulnerable to such disasters. Owing to increasing urbanization in Taiwan, floods and climate-related disasters have taken an increasing toll on human lives. As global warming accelerates the rising of sea levels and increasing of the frequency of extreme weather events, disasters will continue to affect socioeconomic development and human conditions. Under such circumstances, researchers and policymakers alike must recognize the importance of providing useful knowledge concerning vulnerability, disaster recovery and resilience. Strategies for reducing vulnerability and climate-related disaster risks and for increasing resilience involve preparedness, mitigation and adaptation. In the last two decades, extreme climate events have caused severe flash floods, debris flows, landslides, and other disasters and have had negative effects of many sectors, including agriculture, infrastructure and health. Since climate change is expected to have a continued impact on socio-economic development, this work develops a vulnerability assessment framework that integrates both biophysical and social vulnerability and supports synthesized vulnerability analyses to identify vulnerable areas in Taiwan. Owing to its geographical, geological and climatic features, Taiwan is susceptible to earthquakes, typhoons, droughts and various induced disasters. Therefore, Taiwan has the urgent task of establishing a framework for assessing vulnerability as a planning and policy tool that can be used to identify not only the regions that require special attention but also hotspots in which efforts should be made to reduce vulnerability and the risk of climate-related disaster. To
Mapping social-ecological vulnerability to inform local decision making.
Thiault, Lauric; Marshall, Paul; Gelcich, Stefan; Collin, Antoine; Chlous, Frédérique; Claudet, Joachim
2018-04-01
An overarching challenge of natural resource management and biodiversity conservation is that relationships between people and nature are difficult to integrate into tools that can effectively guide decision making. Social-ecological vulnerability offers a valuable framework for identifying and understanding important social-ecological linkages, and the implications of dependencies and other feedback loops in the system. Unfortunately, its implementation at local scales has hitherto been limited due at least in part to the lack of operational tools for spatial representation of social-ecological vulnerability. We developed a method to map social-ecological vulnerability based on information on human-nature dependencies and ecosystem services at local scales. We applied our method to the small-scale fishery of Moorea, French Polynesia, by combining spatially explicit indicators of exposure, sensitivity, and adaptive capacity of both the resource (i.e., vulnerability of reef fish assemblages to fishing) and resource users (i.e., vulnerability of fishing households to the loss of fishing opportunity). Our results revealed that both social and ecological vulnerabilities varied considerably through space and highlighted areas where sources of vulnerability were high for both social and ecological subsystems (i.e., social-ecological vulnerability hotspots) and thus of high priority for management intervention. Our approach can be used to inform decisions about where biodiversity conservation strategies are likely to be more effective and how social impacts from policy decisions can be minimized. It provides a new perspective on human-nature linkages that can help guide sustainability management at local scales; delivers insights distinct from those provided by emphasis on a single vulnerability component (e.g., exposure); and demonstrates the feasibility and value of operationalizing the social-ecological vulnerability framework for policy, planning, and participatory
A flood vulnerability index for coastal cities and its use in assessing climate change impacts
Balica, S.F.; Wright, N.G.; Van der Meulen, F.
2012-01-01
Worldwide, there is a need to enhance our understanding of vulnerability and to develop methodologies and tools to assess vulnerability. One of the most important goals of assessing coastal flood vulnerability, in particular, is to create a readily understandable link between the theoretical
[Vulnerability to depression in children and adolescents: update and perspectives].
Purper-Ouakil, D; Michel, G; Mouren-Siméoni, M-C
2002-01-01
Depression in children and adolescents is associated with poor psychosocial functioning, high psychiatric comorbidity, risk of recurrent episodes or onset of bipolar disorder. These findings emphasize the importance of early identification of children and adolescents having elevated risk for future depression and further development, evaluation and greater availability of prevention strategies. Our review aims an update about depressive vulnerability in children and adolescents in the perspective of better identification of at-risk populations and targeting of prevention programs. Psychopathology, in particular anxiety and disruptive disorders are well identified risk-factors for later depression. Subclinical depressive symptomatology, also termed "demoralization", also identifies high-risk populations, likely to become incident cases of depression. It is still unclear whether this condition is prodromal depression, a specific clinical entity or the expression of biological and/or cognitive vulnerability. Familial risk for depressive disorders involves both genetic and psychosocial factors. Marital discord, poor communication and dysfunctional parenting practices are often present in families with affective disorders and can be implicated in increased depressive vulnerability in the offspring. Research on individual vulnerability in children and adolescents has focused on temperamental and cognitive characteristics. Temperament traits describe individual differences in reactivity and behavior. High emotionality, defined as the tendency to become upset easily and intensely has been associated with an increased risk for subsequent major depression. However, as the majority of high scorers will not become depressive cases, emotionality should not be the only criterion for selection of at-risk populations. Cognitive style including poor self esteem, low social competence and negative attributions are also associated with increased likelihood of depressive symptoms, but
Putting the puzzle together: Reducing vulnerability through people-focused planning
International Nuclear Information System (INIS)
Hutton, D.
2009-01-01
Supporting and integrating vulnerable persons into emergency management has emerged as an increasing priority in emergency management in Canada. Events such as the 2003 European heat wave and Hurricane Katrina have shown that disasters almost always have the harshest affects on the frail elderly, people with disabilities, the disadvantaged and the least able. While it is neither possible-nor the role of emergency management-to eliminate or reduce many factors that make people vulnerable to hazards, it is important that emergency managers work closely with communities to not only identify risks and vulnerabilities, but also to build on the resources and capacities that enable people to effectively prepare for, respond to and recover from threats of all types. To this end, emergency management must take into account the level of capacities and resources that a community has to prepare for emergencies and disasters, in addition to people's vulnerabilities to extreme events. To be successful, people must be viewed not as a part of the problem to be solved or managed during an emergency, but rather a part of the solution to building more resilient and disaster-resistant societies. This requires 'people-focused' planning methodologies that move beyond planning for to planning with all segments of society, including the most vulnerable and marginalised groups that are more readily overlooked. This not only begins to ensure that emergency planning and response capacities can effectively address the diverse needs of all people, but is also an important step to empowering the most vulnerable to prepare themselves for emergencies and other critical events. (authors)
The importance of dialogue in student nurses' clinical education.
Haugan, Grethe; Sørensen, Ann-Hallfrid; Hanssen, Ingrid
2012-05-01
Develop in-hospital tutorials where the hospital unit's nurse preceptor, the college teacher and student nurses discuss clinical experiences and together acquire knowledge. Literary research combined with examples from a clinical tutorial/discussion group project with B.A. student nurses, clinical nurses and college teacher. Clinical reflection groups may be an important step towards accomplishing stability in a collaborative effort between hospital and college to help students become knowledgeable, perceptive, reflecting, caring and effective nurses. The teacher's role in clinical practice is changing. The learning method described in this text, however resource-demanding, furthers close collaboration between hospital and college, and success depends on the educator's and clinician's collective competency. Our experience is that all parties concerned found that they gained a more holistic view of nurse education through participating in a forum focused on students' experiences through patient histories. Copyright © 2011 Elsevier Ltd. All rights reserved.
Public health importance of lassa fever epidemiology, clinical ...
African Journals Online (AJOL)
The public health importance of Lassa fever can not be over emphasized if one considers the high infectivity and mortality rates associated with the disease. This study dealt extensively on the epidemiology, clinical features and current management of Lassa fever through literature review. The aim of this study is to sensitise ...
Environmental Groundwater Vulnerability Assessment in Urban Water Mines (Porto, NW Portugal
Directory of Open Access Journals (Sweden)
Maria José Afonso
2016-11-01
Full Text Available A multidisciplinary approach was developed to estimate urban groundwater vulnerability to contamination combining hydrogeology, hydrogeochemistry, subterranean hydrogeotechnics, groundwater ecotoxicology and isotope tracers. Paranhos and Salgueiros spring waters in Porto City were used as a case study. Historical and current vulnerability scenarios were compared using hydrogeological GIS-based modelling. Potential contamination sources were mapped around the spring galleries. Most of these were point sources and their potential contamination load was moderate. The ecotoxicological assessment indicated a low acute toxicity potential. Groundwater radionuclides appeared to be mainly controlled by geological factors and biomineralisation. Vulnerability maps suggest that most of the area has a moderate to low vulnerability to contamination. However, some surface sources such as sewage systems cause contamination and contribute to increased vulnerability. This integrated approach was demonstrated to be adequate for a better knowledge of urban hydrogeological processes and their dynamics, and highlighted the importance of a vulnerability assessment in urban areas.
Bozzaro, Claudia; Boldt, Joachim; Schweda, Mark
2018-05-01
The elderly are often considered a vulnerable group in public and academic bioethical debates and regulations. In this paper, we examine and challenge this assumption and its ethical implications. We begin by systematically delineating the different concepts of vulnerability commonly used in bioethics, before then examining whether these concepts can be applied to old age. We argue that old age should not, in and of itself, be used as a marker of vulnerability, since ageing is a process that can develop in a variety of different ways and is not always associated with particular experiences of vulnerability. We, therefore, turn to more fundamental phenomenological considerations in order to reconstruct from a first person perspective the intricate interconnections between the experiences of ageing and vulnerability. According to this account, ageing and old age are phenomena in which the basic anthropological vulnerability of human beings can manifest itself in an increased likelihood of harm and exploitation. Thus, we plead for a combined model of vulnerability that helps to avoid problems related to the current concepts of vulnerability. We conclude first that old age as such is not a sufficient criterion for being categorized as vulnerable in applied ethics, and second that reflections on ageing can help to develop a better understanding of the central role of vulnerability in human existence and in applied ethics. © 2018 John Wiley & Sons Ltd.
Free and Open Source Software for land degradation vulnerability assessment
Imbrenda, Vito; Calamita, Giuseppe; Coluzzi, Rosa; D'Emilio, Mariagrazia; Lanfredi, Maria Teresa; Perrone, Angela; Ragosta, Maria; Simoniello, Tiziana
2013-04-01
Nowadays the role of FOSS software in scientific research is becoming increasingly important. Besides the important issues of reduced costs for licences, legality and security there are many other reasons that make FOSS software attractive. Firstly, making the code opened is a warranty of quality permitting to thousands of developers around the world to check the code and fix bugs rather than rely on vendors claims. FOSS communities are usually enthusiastic about helping other users for solving problems and expand or customize software (flexibility). Most important for this study, the interoperability allows to combine the user-friendly QGIS with the powerful GRASS-GIS and the richness of statistical methods of R in order to process remote sensing data and to perform geo-statistical analysis in one only environment. This study is focused on the land degradation (i.e. the reduction in the capacity of the land to provide ecosystem goods and services and assure its functions) and in particular on the estimation of the vulnerability levels in order to suggest appropriate policy actions to reduce/halt land degradation impacts, using the above mentioned software. The area investigated is the Basilicata Region (Southern Italy) where large natural areas are mixed with anthropized areas. To identify different levels of vulnerability we adopted the Environmentally Sensitive Areas (ESAs) model, based on the combination of indicators related to soil, climate, vegetation and anthropic stress. Such indicators were estimated by using the following data-sources: - Basilicata Region Geoportal to assess soil vulnerability; - DESERTNET2 project to evaluate potential vegetation vulnerability and climate vulnerability; - NDVI-MODIS satellite time series (2000-2010) with 250m resolution, available as 16-day composite from the NASA LP DAAC to characterize the dynamic component of vegetation; - Agricultural Census data 2010, Corine Land Cover 2006 and morphological information to assess
Developing new methodology for nuclear power plants vulnerability assessment
International Nuclear Information System (INIS)
Kostadinov, Venceslav
2011-01-01
Research highlights: → Paper presents new methodology for vulnerability assessment of nuclear power plants. → First universal quantitative risks assessment model for terrorist attack on a NPPs. → New model enhance security, reliability and safe operation of all energy infrastructure. → Significant research benefits: increased NPPs security, reliability and availability. → Useful new tool for PRA application to evaluation of terrorist threats on NPPs. - Abstract: The fundamental aim of an efficient regulatory emergency preparedness and response system is to provide sustained emergency readiness and to prevent emergency situations and accidents. But when an event occurs, the regulatory mission is to mitigate consequences and to protect people and the environment against nuclear and radiological damage. The regulatory emergency response system, which would be activated in the case of a nuclear and/or radiological emergency and release of radioactivity to the environment, is an important element of a comprehensive national regulatory system of nuclear and radiation safety. In the past, national emergency systems explicitly did not include vulnerability assessments of the critical nuclear infrastructure as an important part of a comprehensive preparedness framework. But after the huge terrorist attack on 11/09/2001, decision-makers became aware that critical nuclear infrastructure could also be an attractive target to terrorism, with the purpose of using the physical and radioactive properties of the nuclear material to cause mass casualties, property damage, and detrimental economic and/or environmental impacts. The necessity to evaluate critical nuclear infrastructure vulnerability to threats like human errors, terrorist attacks and natural disasters, as well as preparation of emergency response plans with estimation of optimized costs, are of vital importance for assurance of safe nuclear facilities operation and national security. In this paper presented
Intrinsic vulnerability assessment of Sette Comuni Plateau aquifer (Veneto Region, Italy).
Cucchi, Franco; Franceschini, Giuliana; Zini, Luca; Aurighi, Marina
2008-09-01
Maps illustrating the different degrees of vulnerability within a given area are integral to environmental protection and management policies. The assessment of the intrinsic vulnerability of karst areas is difficult since the type and stage of karst development and the related underground discharge behavior are difficult to determine and quantify. Geographic Information Systems techniques are applied to the evaluation of the vulnerability of an aquifer in the alpine karst area of the Sette Comuni Plateau, in the Veneto Region of northern Italy. The water resources of the studied aquifer are of particular importance to the local communities. This aquifer must therefore be protected from both inappropriate use as well as possible pollution. The SINTACS and SINTACS P(RO) K(ARST) vulnerability assessment methods have been utilized here to create the vulnerability map. SINTACS P(RO) K(ARST) is an adaptation of the parametric managerial model (SINTACS) to karst hydrostructures. The vulnerability map reveals vast zones (81% of the analyzed areas) with a high degree of vulnerability. The presence of well-developed karst structures in these highly vulnerable areas facilitate water percolation, thereby enhancing the groundwater vulnerability risk. Only 1.5 of the studied aquifer have extremely high-vulnerability levels, however these areas include all of the major springs utilized for human consumption. This vulnerability map of the Sette Comuni Plateau aquifer is an indispensable tool for both the effective management of water resources and as support to environmental planning in the Sette Comuni Plateau area.
Climate volatility deepens poverty vulnerability in developing countries
Ahmed, Syud A.; Diffenbaugh, Noah S.; Hertel, Thomas W.
2009-07-01
Extreme climate events could influence poverty by affecting agricultural productivity and raising prices of staple foods that are important to poor households in developing countries. With the frequency and intensity of extreme climate events predicted to change in the future, informed policy design and analysis requires an understanding of which countries and groups are going to be most vulnerable to increasing poverty. Using a novel economic-climate analysis framework, we assess the poverty impacts of climate volatility for seven socio-economic groups in 16 developing countries. We find that extremes under present climate volatility increase poverty across our developing country sample—particularly in Bangladesh, Mexico, Indonesia, and Africa—with urban wage earners the most vulnerable group. We also find that global warming exacerbates poverty vulnerability in many nations.
Climate volatility deepens poverty vulnerability in developing countries
International Nuclear Information System (INIS)
Ahmed, Syud A; Diffenbaugh, Noah S; Hertel, Thomas W
2009-01-01
Extreme climate events could influence poverty by affecting agricultural productivity and raising prices of staple foods that are important to poor households in developing countries. With the frequency and intensity of extreme climate events predicted to change in the future, informed policy design and analysis requires an understanding of which countries and groups are going to be most vulnerable to increasing poverty. Using a novel economic-climate analysis framework, we assess the poverty impacts of climate volatility for seven socio-economic groups in 16 developing countries. We find that extremes under present climate volatility increase poverty across our developing country sample-particularly in Bangladesh, Mexico, Indonesia, and Africa-with urban wage earners the most vulnerable group. We also find that global warming exacerbates poverty vulnerability in many nations.
Perez-Brumer, Amaya G; Reisner, Sari L; McLean, Sarah A; Silva-Santisteban, Alfonso; Huerta, Leyla; Mayer, Kenneth H; Sanchez, Jorge; Clark, Jesse L; Mimiaga, Matthew J; Lama, Javier R
2017-02-28
In Peru, transgender women (TW) experience unique vulnerabilities for HIV infection due to factors that limit access to, and quality of, HIV prevention, treatment and care services. Yet, despite recent advances in understanding factors associated with HIV vulnerability among TW globally, limited scholarship has examined how Peruvian TW cope with this reality and how existing community-level resilience strategies are enacted despite pervasive social and economic exclusion facing the community. Addressing this need, our study applies the understanding of social capital as a social determinant of health and examines its relationship to HIV vulnerabilities to TW in Peru. Using qualitative methodology to provide an in-depth portrait, we assessed (1) intersections between social marginalization, social capital and HIV vulnerabilities; and (2) community-level resilience strategies employed by TW to buffer against social marginalization and to link to needed HIV-related services in Peru. Between January and February 2015, 48 TW participated (mean age = 29, range = 18-44) in this study that included focus group discussions and demographic surveys. Analyses were guided by an immersion crystallization approach and all coding was conducted using Dedoose Version 6.1.18. Themes associated with HIV vulnerability included experiences of multilevel stigma and limited occupational opportunities that placed TW at risk for, and limited their engagement with, existing HIV services. Emergent resiliency-based strategies included peer-to-peer and intergenerational knowledge sharing, supportive clinical services (e.g. group-based clinic attendance) and emotional support through social cohesion (i.e. feeling part of a community). This study highlights the importance of TW communities as support structures that create and deploy social resiliency-based strategies aimed at deterring and mitigating the impact of social vulnerabilities to discrimination, marginalization and HIV risk for
Finding behavioral and network indicators of brain vulnerability
Directory of Open Access Journals (Sweden)
Nava eLevit Binnun
2012-02-01
Full Text Available Resilience research has usually focused on identifying protective factors associated with specific stress conditions (e.g., war, trauma or psychopathologies (e.g., post-traumatic stress disorder. Implicit in this research is the concept that resilience is a global construct, invariant to the unfavorable circumstances or the psychopathologies that may develop (i.e., the mechanisms underlying the resilience of an individual in all cases are expected to be similar. Here we contribute to the understanding of resilience—and its counterpart, vulnerability—by employing an approach that makes use of this invariant quality. We outline two main characteristics that we would expect from indicators of a vulnerable state: that they should appear across disorders regardless of specific circumstances, and that they should appear much before the disorder is evident. Next, we identify two sets of factors that exhibit this pattern of association with psychopathological states. The first was a set of low-level sensory, motor and regulatory irregularities that have been reported across the clinical literature; we suggest that these can serve as behavioral indicators of a vulnerable state. The second was the set of aberrations in network metrics that have been reported in the field of systems neuroscience; we suggest that these can serve as network indicators of a vulnerable state. Finally, we explore how behavioral indicators may be related to network indicators and discuss the clinical and research-related implications of our work.
Assessing infrastructure vulnerability to major floods
Energy Technology Data Exchange (ETDEWEB)
Jenssen, Lars
1998-12-31
This thesis proposes a method for assessing the direct effects of serious floods on a physical infrastructure or utility. This method should be useful in contingency planning and in the design of structures likely to be damaged by flooding. A review is given of (1) methods of floodplain management and strategies for mitigating floods, (2) methods of risk analysis that will become increasingly important in flood management, (3) methods for hydraulic computations, (4) a variety of scour assessment methods and (5) applications of geographic information systems (GIS) to the analysis of flood vulnerability. Three computer codes were developed: CULVCAP computes the headwater level for circular and box culverts, SCOUR for assessing riprap stability and scour depths, and FASTFLOOD prepares input rainfall series and input files for the rainfall-runoff model used in the case study. A road system in central Norway was chosen to study how to analyse the flood vulnerability of an infrastructure. Finally, the thesis proposes a method for analysing the flood vulnerability of physical infrastructure. The method involves a general stage that will provide data on which parts of the infrastructure are potentially vulnerable to flooding and how to analyse them, and a specific stage which is concerned with analysing one particular kind of physical infrastructure in a study area. 123 refs., 59 figs., 17 tabs= .
Assessing European wild fire vulnerability
Oehler, F.; Oliveira, S.; Barredo, J. I.; Camia, A.; Ayanz, J. San Miguel; Pettenella, D.; Mavsar, R.
2012-04-01
Wild fire vulnerability is a measure of potential socio-economic damage caused by a fire in a specific area. As such it is an important component of long-term fire risk management, helping policy-makers take informed decisions about adequate expenditures for fire prevention and suppression, and to target those regions at highest risk. This paper presents a first approach to assess wild fire vulnerability at the European level. A conservative approach was chosen that assesses the cost of restoring the previous land cover after a potential fire. Based on the CORINE Land Cover, a restoration cost was established for each land cover class at country level, and an average restoration time was assigned according to the recovery capacity of the land cover. The damage caused by fire was then assessed by discounting the cost of restoring the previous land cover over the restoration period. Three different vulnerability scenarios were considered assuming low, medium and high fire severity causing different levels of damage. Over Europe, the potential damage of wild land fires ranges from 10 - 13, 732 Euro*ha-1*yr-1 for low fire severity, 32 - 45,772 Euro*ha-1*yr-1 for medium fire severity and 54 - 77,812 Euro*ha-1*yr-1 for high fire severity. The least vulnerable are natural grasslands, moors and heathland and sclerophyllous vegetation, while the highest cost occurs for restoring broad-leaved forest. Preliminary validation comparing these estimates with official damage assessments for past fires shows reasonable results. The restoration cost approach allows for a straightforward, data extensive assessment of fire vulnerability at European level. A disadvantage is the inherent simplification of the evaluation procedure with the underestimation of non-markets goods and services. Thus, a second approach has been developed, valuing individual wild land goods and services and assessing their annual flow which is lost for a certain period of time in case of a fire event. However
Participatory flood vulnerability assessment: a multi-criteria approach
Madruga de Brito, Mariana; Evers, Mariele; Delos Santos Almoradie, Adrian
2018-01-01
This paper presents a participatory multi-criteria decision-making (MCDM) approach for flood vulnerability assessment while considering the relationships between vulnerability criteria. The applicability of the proposed framework is demonstrated in the municipalities of Lajeado and Estrela, Brazil. The model was co-constructed by 101 experts from governmental organizations, universities, research institutes, NGOs, and private companies. Participatory methods such as the Delphi survey, focus groups, and workshops were applied. A participatory problem structuration, in which the modellers work closely with end users, was used to establish the structure of the vulnerability index. The preferences of each participant regarding the criteria importance were spatially modelled through the analytical hierarchy process (AHP) and analytical network process (ANP) multi-criteria methods. Experts were also involved at the end of the modelling exercise for validation. The final product is a set of individual and group flood vulnerability maps. Both AHP and ANP proved to be effective for flood vulnerability assessment; however, ANP is preferred as it considers the dependences among criteria. The participatory approach enabled experts to learn from each other and acknowledge different perspectives towards social learning. The findings highlight that to enhance the credibility and deployment of model results, multiple viewpoints should be integrated without forcing consensus.
Vulnerability of damage-accumulating systems
International Nuclear Information System (INIS)
Lind, Niels C.
1996-01-01
Disastrous failures have shown that systems can be highly vulnerable. Quantified vulnerability can help designers and regulators to decide how much vulnerability is tolerable. Vulnerability of a system to a specified disturbance is defined as the ratio of the probability of failure of the disturbed system to the probability of failure of the undisturbed system. This vulnerability can be specialized to particular system types. It is adapted here to systems that are expected to deteriorate while in service due to processes such as fatigue, creep, corrosion, aging, neglect or insufficient maintenance. Application is illustrated by vulnerability to fatigue under constant and variable stress
Could cognitive vulnerability identify high-risk subjects for schizophrenia?
Sarfati, Yves; Hardy-Baylé, Marie-Christine
2002-12-08
This review puts into questions the possible role of cognitive vulnerability markers in prediction and prevention of schizophrenia. Until recently, none of the identified cognitive anomalies has been proved to be definitive. However, as new promising candidates are emerging (DS-CPT, CPT-IP, P suppression, Saccadic Eye Movements), the predictive value of these trait-type anomalies may be criticized regarding four issues, which are discussed: technical, metrological, theoretical, and clinical. As things stand, the existence of a cognitive vulnerability marker, which testify to a permanent pathological trait, does not constitute a sufficient factor to identify and treat subjects who are at risk for schizophrenia. Copyright 2002 Wiley-Liss, Inc.
Economic development and declining vulnerability to climate-related disasters in China
Wu, Jidong; Han, Guoyi; Zhou, Hongjian; Li, Ning
2018-03-01
Exposure and vulnerability are the main contributing factors of growing impact from climate-related disasters globally. Understanding the spatiotemporal dynamic patterns of vulnerability is important for designing effective disaster risk mitigation and adaptation measures. At national scale, most cross-country studies have suggested that economic vulnerability to disasters decreases as income increases, especially for developing countries. Research covering sub-national climate-related natural disasters is indispensable to obtaining a comprehensive understanding of the effect of regional economic growth on vulnerability reduction. Taking China as a case, this subnational scale study shows that economic development is correlated with the significant reduction in human fatalities but increase in direct economic losses (DELs) from climate-related disasters since 1949. The long-term trend in climate-related disaster vulnerability, reflected by mortality (1978-2015) and DELs (1990-2015) as a share of the total population and Gross Domestic Product, has seen significant decline among all economic regions in China. While notable differences remain among its West, Central and East economic regions, the temporal vulnerability change has been converging. The study further demonstrated that economic development level is correlated with human and economic vulnerability to climate-related disasters, and this vulnerability decreased with the increase of per-capita income. This study suggested that economic development can have nuanced effects on overall human and economic vulnerability to climate-related disasters. We argue that climate change science needs to acknowledge and examine the different pathways of vulnerability effects related to economic development.
Mangrove vulnerability index using GIS
Yunus, Mohd Zulkifli Mohd; Ahmad, Fatimah Shafinaz; Ibrahim, Nuremira
2018-02-01
Climate change, particularly its associated sea level rise, is major threat to mangrove coastal areas, and it is essential to develop ways to reduce vulnerability through strategic management planning. Environmental vulnerability can be understood as a function of exposure to impacts and the sensitivity and adaptive capacity of ecological systems towards environmental tensors. Mangrove vulnerability ranking using up to 14 parameters found in study area, which is in Pulau Kukup and Sg Pulai, where 1 is low vulnerability and 5 is very high vulnerability. Mangrove Vulnerability Index (MVI) is divided into 3 main categories Physical Mangrove Index (PMI), Biological Mangrove Index (BMI) and Hazard Mangrove Index (HMI).
Automated Software Vulnerability Analysis
Sezer, Emre C.; Kil, Chongkyung; Ning, Peng
Despite decades of research, software continues to have vulnerabilities. Successful exploitations of these vulnerabilities by attackers cost millions of dollars to businesses and individuals. Unfortunately, most effective defensive measures, such as patching and intrusion prevention systems, require an intimate knowledge of the vulnerabilities. Many systems for detecting attacks have been proposed. However, the analysis of the exploited vulnerabilities is left to security experts and programmers. Both the human effortinvolved and the slow analysis process are unfavorable for timely defensive measure to be deployed. The problem is exacerbated by zero-day attacks.
Parental Depression and Child Cognitive Vulnerability Predict Children’s Cortisol Reactivity
Hayden, Elizabeth P.; Hankin, Benjamin L.; Mackrell, Sarah V.M.; Sheikh, Haroon I.; Jordan, Patricia L.; Dozois, David J.A.; Singh, Shiva M.; Olino, Thomas M.; Badanes, Lisa S.
2015-01-01
Risk for depression is expressed across multiple levels of analysis. For example, parental depression and cognitive vulnerability are known markers of depression risk, but no study has examined their interactive effects on children’s cortisol reactivity, a likely mediator of early depression risk. We examined relations across these different levels of vulnerability using cross-sectional and longitudinal methods in two community samples of children. Children were assessed for cognitive vulnerability using self-reports (Study 1; n = 244) and tasks tapping memory and attentional bias (Study 2; n = 205), and their parents were assessed for depression history using structured clinical interviews. In both samples, children participated in standardized stress tasks and cortisol reactivity was assessed. Cross-sectionally and longitudinally, parental depression history and child cognitive vulnerability interacted to predict children’s cortisol reactivity; specifically, associations between parent depression and elevated child cortisol activity were found when children also showed elevated depressotypic attributions, as well as attentional and memory biases. Findings indicate that models of children’s emerging depression risk may benefit from the examination of the interactive effects of multiple sources of vulnerability across levels of analysis. PMID:25422972
Parley, Fiona F
2011-01-01
Protection of those deemed vulnerable has received increasing attention since 2000. This article reports on care staff views of vulnerability using original data from a research study (Parley. "Vulnerability and abuse: an exploration of views of care staff working with people who have learning disabilities," PhD Thesis, 2007) in which care staff…
A Comprehensive Assessment and Spatial Analysis of Vulnerability of China’s Provincial Economies
Directory of Open Access Journals (Sweden)
Chongqiang Ren
2018-04-01
Full Text Available Vulnerability theory is a fundamental scientific knowledge system in sustainable development, and vulnerability assessment is important in vulnerability studies. Economic vulnerability affects economic growth sustainability. Comprehensive assessment of economic vulnerability in the process of economic growth under the theoretical framework of vulnerability will provide a new perspective for vulnerability studies. Based on a vulnerability scoping diagram assessment model, this study selected 22 economic sensitivity indexes and 25 economic adaptability indexes from the economic, social, and nature–resource–environmental subsystems to comprehensively assess and spatially analyse the vulnerability of China’s provincial economies since the year 2000, while applying the entropy method, multilevel extension assessment, spatial measurement method, and geographic information system technology. The results showed the following: (1 There are great differences in the vulnerability of China’s provincial economies. Western China’s vulnerability is higher and the fluctuation range of economic vulnerability is larger. The vulnerability increased significantly based on spatial differential features; (2 Regional differences in economic vulnerability, mainly caused by differences within a region, increased gradually. Eastern and Western China showed the spatial pattern characteristics of prominent and reinforcing regional imbalance, while Central and Northeast China showed declining regional imbalance. The spatial structure evolution of economic vulnerability is characterized by a volatility curve, and regional separation and divergence are strengthened; (3 Growth of China’s provincial economies and economic vulnerability are related negatively. In Eastern, Central, and Northeast China, vulnerability of the provincial economies has a negative spillover effect on neighbouring provinces’ economic growth, while in Western China it has a slight positive
DEFF Research Database (Denmark)
Dworkin, R.H.; Turk, D.C.; Wyrwich, K.W.
2008-01-01
of 40 participants from universities, governmental agencies, a patient self-help organization, and the pharmaceutical industry considered methodologic issues and research results relevant to determining the clinical importance of changes in the specific outcome measures previously recommended by IMMPACT...
Redistributing vulnerabilities
DEFF Research Database (Denmark)
Seeberg, Jens; Padmawati, Retna Siwi
2015-01-01
It is widely accepted that the social distribution of vulnerability in a given society may turn hazardous events into disasters. This distributional approach draws attention to continuities that explain catastrophes by virtue of the workings of society prior to the event. In this paper, we draw...... attention to the social processes whereby vulnerability is modified and renegotiated during the post-disaster period where resources for disaster alleviation and reconstruction enter local communities. Specifically, we explore the social dynamics of house damage classification in the wake of the 2006...... Central Java earthquake, and we explore relations between citizens and the state during post-disaster house reconstruction. We argue that disastrous outcomes of catastrophic events do not follow pre-existing fault lines of vulnerability in a simple or predictable manner, and that the social process...
Directory of Open Access Journals (Sweden)
Luciana dos Santos Tirapani
2015-03-01
Full Text Available Introduction: Numerous studies examined the associations between socio-demographic, economic and individual factors and chronic kidney disease (CKD outcomes and observed that the associations were complex and multifactorial. Socioeconomic factors can be evaluated by a model of social vulnerability (SV. Objective: To analyze the impact of SV on the outcomes of predialysis patients. Methods: Demographic, clinical and laboratory data were collected from a cohort of patients with predialysis stage 3 to 5 who were treated by an interdisciplinary team (January 2002 and December 2009 in Minas Gerais, Brazil. Factor, cluster and discriminant analysis were performed in sequence to identify the most important variables and develop a model of SV that allowed for classification of the patients as vulnerable or non-vulnerable. Cox regression was performed to examine the impact of SV on the outcomes of mortality and need for renal replacement therapy (RRT. Results: Of the 209 patients examined, 29.4% were classified as vulnerable. No significance difference was found between the vulnerable and non-vulnerable groups regarding either mortality (log rank: 0.23 or need for RRT (log rank: 0.17. In the Cox regression model, the hazard ratios (HRs for the unadjusted and adjusted impact of SV on mortality were found to be 1.87 (confidence interval [CI]: 0.64-5.41 and 1.47 (CI: 0.35-6.0, respectively, and the unadjusted and adjusted impact of need for RRT to be 1.85 (CI: 0.71-4.8 and 2.19 (CI: 0.50-9.6, respectively. Conclusion: These findings indicate that SV did not influence the outcomes of patients with predialysis CKD treated in an interdisciplinary center.
When study participants are vulnerable: getting and keeping the right team.
Hill, Nikki L; Mogle, Jacqueline; Wion, Rachel; Kolanowski, Ann M; Fick, Donna; Behrens, Liza; Muhall, Paula; McDowell, Jane
2017-09-19
Research assistants (RAs) are critical members of all research teams. When a study involves vulnerable populations, it is particularly important to have the right team members. To describe the motivations, personal characteristics and team characteristics that promoted the job satisfaction of RAs who worked on two multi-year, randomised clinical trials involving older adults with dementia. A survey was conducted with 41 community members who worked as RAs for up to five years. Measures included demographics, work engagement, personality and characteristics of effective teams, as well as open-ended questions about respondents' experiences of the study. Quantitative analyses and coding of open-ended responses were used to summarise results. Almost all the RAs surveyed joined the team because of previous experiences of interacting with cognitively impaired older people. The RA respondents scored higher in 'dedication to work', 'extraversion', 'agreeableness' and 'conscientiousness' than average. An important aspect of their job satisfaction was team culture, including positive interpersonal interaction and the development of supportive team relationships. A positive work culture provides RAs with an opportunity to work with a study population that they are personally driven to help, and promotes motivation and satisfaction in team members. Results from this study can guide the recruitment, screening and retention of team members for studies that include vulnerable populations. ©2012 RCN Publishing Company Ltd. All rights reserved. Not to be copied, transmitted or recorded in any way, in whole or part, without prior permission of the publishers.
What constitutes a clinically important pain reduction in patients after third molar surgery?
Martin, W.J.J.M.; Ashton-James, C.E.; Skorpil, N.E.; Heymans, M.W.; Forouzanfar, T.
2013-01-01
BACKGROUND: For patients with surgical third molar removal, it is unknown what constitutes a clinically important change in patients’ visual analogue scale (VAS) reports of pain intensity. OBJECTIVES: To determine what constitutes a clinically important change in pain intensity on a VAS following
Poverty and Vulnerability - An Interdisciplinary Approach
Makoka, Donald; Kaplan, Marcus
2005-01-01
This paper describes the concepts of poverty and vulnerability as well as the interconnections and differences between them using an interdisciplinary approach. While poverty is a static concept, vulnerability has a forward-looking dimension. We, therefore, review the methodologies that different disciplines use to measure poverty and vulnerability. In particular, the differences between vulnerability to natural disasters, vulnerability to climate change, as well as vulnerability to poverty a...
Approaches for estimating minimal clinically important differences in systemic lupus erythematosus.
Rai, Sharan K; Yazdany, Jinoos; Fortin, Paul R; Aviña-Zubieta, J Antonio
2015-06-03
A minimal clinically important difference (MCID) is an important concept used to determine whether a medical intervention improves perceived outcomes in patients. Prior to the introduction of the concept in 1989, studies focused primarily on statistical significance. As most recent clinical trials in systemic lupus erythematosus (SLE) have failed to show significant effects, determining a clinically relevant threshold for outcome scores (that is, the MCID) of existing instruments may be critical for conducting and interpreting meaningful clinical trials as well as for facilitating the establishment of treatment recommendations for patients. To that effect, methods to determine the MCID can be divided into two well-defined categories: distribution-based and anchor-based approaches. Distribution-based approaches are based on statistical characteristics of the obtained samples. There are various methods within the distribution-based approach, including the standard error of measurement, the standard deviation, the effect size, the minimal detectable change, the reliable change index, and the standardized response mean. Anchor-based approaches compare the change in a patient-reported outcome to a second, external measure of change (that is, one that is more clearly understood, such as a global assessment), which serves as the anchor. Finally, the Delphi technique can be applied as an adjunct to defining a clinically important difference. Despite an abundance of methods reported in the literature, little work in MCID estimation has been done in the context of SLE. As the MCID can help determine the effect of a given therapy on a patient and add meaning to statistical inferences made in clinical research, we believe there ought to be renewed focus on this area. Here, we provide an update on the use of MCIDs in clinical research, review some of the work done in this area in SLE, and propose an agenda for future research.
Vulnerability of complex networks
Mishkovski, Igor; Biey, Mario; Kocarev, Ljupco
2011-01-01
We consider normalized average edge betweenness of a network as a metric of network vulnerability. We suggest that normalized average edge betweenness together with is relative difference when certain number of nodes and/or edges are removed from the network is a measure of network vulnerability, called vulnerability index. Vulnerability index is calculated for four synthetic networks: Erdős-Rényi (ER) random networks, Barabási-Albert (BA) model of scale-free networks, Watts-Strogatz (WS) model of small-world networks, and geometric random networks. Real-world networks for which vulnerability index is calculated include: two human brain networks, three urban networks, one collaboration network, and two power grid networks. We find that WS model of small-world networks and biological networks (human brain networks) are the most robust networks among all networks studied in the paper.
Coastal vulnerability index for the Tabasco State coast, Mexico
Directory of Open Access Journals (Sweden)
Juan Carlos Nuñez Gómez
2016-11-01
Full Text Available Sea level rise is one of the most serious events that will impact low-lying lands, as is the case of most of Tabasco State. Historically, the State of Tabasco has been repeatedly impacted by extreme floods, the most recent one occurring in 2007. However, recent studies have shown that coastal erosion is the effect that most directly has impacted the Tabasco’s coastline, as this has even modified soil strata; this is also related to extreme hydrometeorological events associated with environmental changes and changes in the salinity gradient off the coast. In such a situation, future changes in the coastline are almost certain. Tabasco’s coastline has been recognized as one of the most vulnerable zones in the country since Mexico’s first national communication to the UNFCCC in 1997. Therefore, it is important to evaluate the vulnerability of this zone. The purpose of this study was to estimate the vulnerability of the Tabasco’s coastline by applying the coastal vulnerability index method (IVM using a geographic information system (GIS. This method has been successfully applied in several different places around the world including Canada, the United State, Spain and Indonesia. This model is suitable for the local conditions of Tabasco coast, as the input variables it requires (including waves, tides, sea level, coastal slope, erosion rates and geomorphology are available for the study area, thus allowing the possibility of estimating the coast’s vulnerability based on local data. Results from map algebra operations showed that the zones of very high or high vulnerability encompass a six-kilometer stretch around the Sánchez Magallanes community, near the del Carmen lagoon in the municipality of H. Cárdenas, Tabasco. This is due to the high-waves regime and other conditions associated to the coastal dune geomorphology as well as the unconsolidated fine sediments prevailing therein. Other high vulnerability zones are found just in front
The Vulnerability Assessment Code for Physical Protection System
International Nuclear Information System (INIS)
Jang, Sung Soon; Yoo, Ho Sik
2007-01-01
To neutralize the increasing terror threats, nuclear facilities have strong physical protection system (PPS). PPS includes detectors, door locks, fences, regular guard patrols, and a hot line to a nearest military force. To design an efficient PPS and to fully operate it, vulnerability assessment process is required. Evaluating PPS of a nuclear facility is complicate process and, hence, several assessment codes have been developed. The estimation of adversary sequence interruption (EASI) code analyzes vulnerability along a single intrusion path. To evaluate many paths to a valuable asset in an actual facility, the systematic analysis of vulnerability to intrusion (SAVI) code was developed. KAERI improved SAVI and made the Korean analysis of vulnerability to intrusion (KAVI) code. Existing codes (SAVI and KAVI) have limitations in representing the distance of a facility because they use the simplified model of a PPS called adversary sequence diagram. In adversary sequence diagram the position of doors, sensors and fences is described just as the locating area. Thus, the distance between elements is inaccurate and we cannot reflect the range effect of sensors. In this abstract, we suggest accurate and intuitive vulnerability assessment based on raster map modeling of PPS. The raster map of PPS accurately represents the relative position of elements and, thus, the range effect of sensor can be easily incorporable. Most importantly, the raster map is easy to understand
Soil erosion vulnerability in the verde river basin, southern minas gerais
Directory of Open Access Journals (Sweden)
Vinícius Augusto de Oliveira
2014-06-01
Full Text Available Soil erosion is one of the most significant environmental degradation processes. Mapping and assessment of soil erosion vulnerability is an important tool for planning and management of the natural resources. The objective of the present study was to apply the Revised Universal Soil Loss Equation (RUSLE using GIS tools to the Verde River Basin (VRB, southern Minas Gerais, in order to assess soil erosion vulnerability. A annual rainfall erosivity map was derived from the geographical model adjusted for Southeastern Brazil, calculating an annual value for each pixel. The maps of soil erodibility (K, topographic factor (LS, and use and management of soils (C were developed from soils and their uses map and the digital elevation model (DEM developed for the basin. In a GIS environment, the layers of the factors were combined to create the soil erosion vulnerability map according to RUSLE. The results showed that, in general, the soils of the VRB present a very high vulnerability to water erosion, with 58.68% of soil losses classified as "High" and "Extremely High" classes. In the headwater region of VRB, the predominant classes were "Very High" and "Extremely High" where there is predominance of Cambisols associated with extensive pastures. Furthermore, the integration of RUSLE/GIS showed an efficient tool for spatial characterization of soil erosion vulnerability in this important basin of the Minas Gerais state.
A rainfall risk analysis thanks to an GIS based estimation of urban vulnerability
Renard, Florent; Pierre-Marie, Chapon
2010-05-01
The urban community of Lyon, situated in France in the north of the Rhône valley, comprises 1.2 million inhabitants within 515 km ². With such a concentration of issues, policy makers and local elected officials therefore attach great importance to the management of hydrological risks, particularly due to the inherent characteristics of the territory. If the hazards associated with these risks in the territory of Lyon have been the subject of numerous analyses, studies on the vulnerability of greater Lyon are rare and have common shortcomings that impair their validity. We recall that the risk is seen as the classic relationship between the probability of occurrence of hazards and vulnerability. In this article, this vulnerability will be composed of two parts. The first one is the sensitivity of the stakes facing hydrological hazards as urban runoff, that is to say, their propensity to suffer damage during a flood (Gleize and Reghezza, 2007). The second factor is their relative importance in the functioning of the community. Indeed, not all the stakes could provide the same role and contribution to the Greater Lyon. For example, damage to the urban furniture such as bus shelter seems less harmful to the activities of the urban area than that of transport infrastructure (Renard and Chapon, 2010). This communication proposes to assess the vulnerability of Lyon urban area facing to hydrological hazards. This territory is composed of human, environmental and material stakes. The first part of this work is to identify all these issues so as to completeness. Then, is it required to build a "vulnerability index" (Tixier et al, 2006). Thus, it is necessary to use methods of multicriteria decision aid to evaluate the two components of vulnerability: the sensitivity and the contribution to the functioning of the community. Finally, the results of the overall vulnerability are presented, and then coupled to various hazards related to water such as runoff associated with
Comparison and Evaluation of Global Scale Studies of Vulnerability and Risks to Climate Change
Muccione, Veruska; Allen, Simon K.; Huggel, Christian; Birkmann, Joern
2015-04-01
Understanding the present and future distribution of different climate change impacts and vulnerability to climate change is a central subject in the context of climate justice and international climate policy. Commonly, it is claimed that poor countries that contributed little to anthropogenic climate change are those most affected and most vulnerable to climate change. Such statements are backed by a number of global-scale vulnerability studies, which identified poor countries as most vulnerable. However, some studies have challenged this view, likewise highlighting the high vulnerability of richer countries. Overall, no consensus has been reached so far about which concept of vulnerability should be applied and what type of indicators should be considered. Furthermore, there is little agreement which specific countries are most vulnerable. This is a major concern in view of the need to inform international climate policy, all the more if such assessments should contribute to allocate climate adaptation funds as was invoked at some instances. We argue that next to the analysis of who is most vulnerable, it is also important to better understand and compare different vulnerability profiles assessed in present global studies. We perform a systematic literature review of global vulnerability assessments with the scope to highlight vulnerability distribution patterns. We then compare these distributions with global risk distributions in line with revised and adopted concepts by most recent IPCC reports. It emerges that improved differentiation of key drivers of risk and the understanding of different vulnerability profiles are important contributions, which can inform future adaptation policies at the regional and national level. This can change the perspective on, and basis for distributional issues in view of climate burden share, and therefore can have implications for UNFCCC financing instruments (e.g. Green Climate Fund). However, in order to better compare
Importance of Pharmaceutical Training and Clinical Research at Medical Facilities.
Myotoku, Michiaki
2017-01-01
To respond to advancements in medical techniques, and to address the separation of medical and dispensary practices, clinical professors are required to educate human resource staff to become highly-skilled pharmacists. For this purpose, it is extremely important for these professors to learn about cutting-edge practical skills and knowledge, as well as to advance their expertise. In addition, they need to conduct clinical research in cooperation with relevant facilities. As our university does not have its own hospital or pharmacy, it is important to provide training for clinical professors in clinical facilities. Such training mainly involves medical teams' in-hospital rounds and participation in conferences (nutrition support team; NST), operation of the pharmacy department, and intervention targeting improvement in the department's duties. We have conducted collaborative studies, provided research instructions, implemented studies aimed at improving the department's work (pharmacists appointed on wards at all times to ensure medical safety) as well as studies regarding team medical care (nutritional evaluation during outpatient chemotherapy), and resolved issues regarding this work (drug solution mixability in a hand-held constant infusion pump, and a safe pump-filling methods). Thus, it has become possible to keep track of the current state of a pharmacists' work within team medical care, to access information about novel drugs, to view clinical and prescription-claim data, to cooperate with other professionals (e.g., doctors and nurses), to promote pharmacists' self-awareness of their roles in cooperative medical practice, and to effectively maintain the hospital's clinical settings.
Assessing vulnerability to drought: identifying underlying factors across Europe
Urquijo, Julia; Gonzalez Tánago, Itziar; Ballesteros, Mario; De Stefano, Lucia
2015-04-01
Drought is considered one of the most severe and damaging natural hazards in terms of people and sectors affected and associated losses. Drought is a normal and recurrent climatic phenomenon that occurs worldwide, although its spatial and temporal characteristics vary significantly among climates. In the case of Europe, in the last thirty years, the region has suffered several drought events that have caused estimated economic damages over a €100 billion and have affected almost 20% of its territory and population. In recent years, there has been a growing awareness among experts and authorities of the need to shift from a reactive crisis approach to a drought risk management approach, as well as of the importance of designing and implementing policies, strategies and plans at country and river basin levels to deal with drought. The identification of whom and what is vulnerable to drought is a central aspect of drought risk mitigation and planning and several authors agree that societal vulnerability often determines drought risk more than the actual precipitation shortfalls. The final aim of a drought vulnerability assessment is to identify the underlying sources of drought impact, in order to develop policy options that help to enhance coping capacity and therefore to prevent drought impact. This study identifies and maps factors underlying vulnerability to drought across Europe. The identification of factors influencing vulnerability starts from the analysis of past drought impacts in four European socioeconomic sectors. This analysis, along with an extensive literature review, led to the selection of vulnerability factors that are both relevant and adequate for the European context. Adopting the IPCC model, vulnerability factors were grouped to describe exposure, sensitivity and adaptive capacity. The aggregation of these components has resulted in the mapping of vulnerability to drought across Europe at NUTS02 level. Final results have been compared with
Vulnerability of Europe and Its Economy to Energy Crises (Preliminary Executive Summary)
International Nuclear Information System (INIS)
World Energy Council
2007-01-01
The rapid change of the economic environment requires the energy sector to develop new concepts and policies to respond better to security requirements and energy supply. Energy security is defined as an uninterruptible supply of energy, in terms of quantities required to meet demand at affordable process. Energy security means: reduced vulnerability to transient or longer term physical disruptions to import supplies, and availability of local and imported resources to meet the growing demand for energy over a period of time and at affordable prices. The vulnerability of an energy system can be measured by its ability to cope with adverse events. This is defined in the context of the increasing energy imported to Europe and the increase of energy prices over recent years. The study tries to enhance the understanding of the conceptual viewpoint of vulnerability that the European energy markets mights face in an unpredictable future, characterised by uncertainty, difficulties, danger or anxiety
A Preliminary Tsunami Vulnerability Analysis for Yenikapi Region in Istanbul
Ceren Cankaya, Zeynep; Suzen, Lutfi; Cevdet Yalciner, Ahmet; Kolat, Cagil; Aytore, Betul; Zaytsev, Andrey
2015-04-01
One of the main requirements during post disaster recovery operations is to maintain proper transportation and fluent communication at the disaster areas. Ports and harbors are the main transportation hubs which must work with proper performance at all times especially after the disasters. Resilience of coastal utilities after earthquakes and tsunamis have major importance for efficient and proper rescue and recovery operations soon after the disasters. Istanbul is a mega city with its various coastal utilities located at the north coast of the Sea of Marmara. At Yenikapi region of Istanbul, there are critical coastal utilities and vulnerable coastal structures and critical activities occur daily. Fishery ports, commercial ports, small craft harbors, passenger terminals of intercity maritime transportation, water front commercial and/or recreational structures are some of the examples of coastal utilization which are vulnerable against marine disasters. Therefore their vulnerability under tsunami or any other marine hazard to Yenikapi region of Istanbul is an important issue. In this study, a methodology of vulnerability analysis under tsunami attack is proposed with the applications to Yenikapi region. In the study, high resolution (1m) GIS database of Istanbul Metropolitan Municipality (IMM) is used and analyzed by using GIS implementation. The bathymetry and topography database and the vector dataset containing all buildings/structures/infrastructures in the study area are obtained for tsunami numerical modeling for the study area. GIS based tsunami vulnerability assessment is conducted by applying the Multi-criteria Decision Making Analysis (MCDA). The tsunami parameters from deterministically defined worst case scenarios are computed from the simulations using tsunami numerical model NAMI DANCE. The vulnerability parameters in the region due to two different classifications i) vulnerability of buildings/structures and ii) vulnerability of (human) evacuation
Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem
Directory of Open Access Journals (Sweden)
Williams PAH
2015-07-01
Full Text Available Patricia AH Williams, Andrew J Woodward eHealth Research Group and Security Research Institute, Edith Cowan University, Perth, WA, Australia Abstract: The increased connectivity to existing computer networks has exposed medical devices to cybersecurity vulnerabilities from which they were previously shielded. For the prevention of cybersecurity incidents, it is important to recognize the complexity of the operational environment as well as to catalog the technical vulnerabilities. Cybersecurity protection is not just a technical issue; it is a richer and more intricate problem to solve. A review of the factors that contribute to such a potentially insecure environment, together with the identification of the vulnerabilities, is important for understanding why these vulnerabilities persist and what the solution space should look like. This multifaceted problem must be viewed from a systemic perspective if adequate protection is to be put in place and patient safety concerns addressed. This requires technical controls, governance, resilience measures, consolidated reporting, context expertise, regulation, and standards. It is evident that a coordinated, proactive approach to address this complex challenge is essential. In the interim, patient safety is under threat. Keywords: cybersecurity, security, safety, wireless, risk, medical devices
Chemical and radiological vulnerability assessment in urban areas
Directory of Open Access Journals (Sweden)
Stojanović Božidar
2006-01-01
Full Text Available Cities and towns are faced with various types of threat from the extraordinary events involving chemical and radiological materials as exemplified by major chemical accidents, radiological incidents, fires, explosions, traffic accidents, terrorist attacks, etc. On the other hand, many sensitive or vulnerable assets exist within cities, such as: settlements, infrastructures, hospitals, schools, churches, businesses, government, and others. Besides emergency planning, the land use planning also represents an important tool for prevention or reduction of damages on people and other assets due to unwanted events. This paper considers development of method for inclusion vulnerability assessment in land use planning with objective to assess and limit the consequences in cities of likely accidents involving hazardous materials. We made preliminary assessment of criticality and vulnerability of the assets within Belgrade city area in respect to chemical sites and transportation roads that can be exposed to chemical accidents, or terrorist attacks.
Enhancing protection for vulnerable waters
Creed, Irena F.; Lane, Charles R.; Serran, Jacqueline N.; Alexander, Laurie C.; Basu, Nandita B.; Calhoun, Aram J. K.; Christensen, Jay R.; Cohen, Matthew J.; Craft, Christopher; D'Amico, Ellen; Dekeyser, Edward; Fowler, Laurie; Golden, Heather E.; Jawitz, James W.; Kalla, Peter; Kirkman, L. Katherine; Lang, Megan; Leibowitz, Scott G.; Lewis, David B.; Marton, John; McLaughlin, Daniel L.; Raanan-Kiperwas, Hadas; Rains, Mark C.; Rains, Kai C.; Smith, Lora
2017-11-01
Governments worldwide do not adequately protect their limited freshwater systems and therefore place freshwater functions and attendant ecosystem services at risk. The best available scientific evidence compels enhanced protections for freshwater systems, especially for impermanent streams and wetlands outside of floodplains that are particularly vulnerable to alteration or destruction. New approaches to freshwater sustainability -- implemented through scientifically informed adaptive management -- are required to protect freshwater systems through periods of changing societal needs. One such approach introduced in the US in 2015 is the Clean Water Rule, which clarified the jurisdictional scope for federally protected waters. However, within hours of its implementation litigants convinced the US Court of Appeals for the Sixth Circuit to stay the rule, and the subsequently elected administration has now placed it under review for potential revision or rescission. Regardless of its outcome at the federal level, policy and management discussions initiated by the propagation of this rare rulemaking event have potential far-reaching implications at all levels of government across the US and worldwide. At this timely juncture, we provide a scientific rationale and three policy options for all levels of government to meaningfully enhance protection of these vulnerable waters. A fourth option, a 'do-nothing' approach, is wholly inconsistent with the well-established scientific evidence of the importance of these vulnerable waters.
Enhancement of global flood damage assessments using building material based vulnerability curves
Englhardt, Johanna; de Ruiter, Marleen; de Moel, Hans; Aerts, Jeroen
2017-04-01
This study discusses the development of an enhanced approach for flood damage and risk assessments using vulnerability curves that are based on building material information. The approach draws upon common practices in earthquake vulnerability assessments, and is an alternative for land-use or building occupancy approach in flood risk assessment models. The approach is of particular importance for studies where there is a large variation in building material, such as large scale studies or studies in developing countries. A case study of Ethiopia is used to demonstrate the impact of the different methodological approaches on direct damage assessments due to flooding. Generally, flood damage assessments use damage curves for different land-use or occupancy types (i.e. urban or residential and commercial classes). However, these categories do not necessarily relate directly to vulnerability of damage by flood waters. For this, the construction type and building material may be more important, as is used in earthquake risk assessments. For this study, we use building material classification data of the PAGER1 project to define new building material based vulnerability classes for flood damage. This approach will be compared to the widely applied land-use based vulnerability curves such as used by De Moel et al. (2011). The case of Ethiopia demonstrates and compares the feasibility of this novel flood vulnerability method on a country level which holds the potential to be scaled up to a global level. The study shows that flood vulnerability based on building material also allows for better differentiation between flood damage in urban and rural settings, opening doors to better link to poverty studies when such exposure data is available. Furthermore, this new approach paves the road to the enhancement of multi-risk assessments as the method enables the comparison of vulnerability across different natural hazard types that also use material-based vulnerability curves
Participatory flood vulnerability assessment: a multi-criteria approach
Directory of Open Access Journals (Sweden)
M. M. de Brito
2018-01-01
Full Text Available This paper presents a participatory multi-criteria decision-making (MCDM approach for flood vulnerability assessment while considering the relationships between vulnerability criteria. The applicability of the proposed framework is demonstrated in the municipalities of Lajeado and Estrela, Brazil. The model was co-constructed by 101 experts from governmental organizations, universities, research institutes, NGOs, and private companies. Participatory methods such as the Delphi survey, focus groups, and workshops were applied. A participatory problem structuration, in which the modellers work closely with end users, was used to establish the structure of the vulnerability index. The preferences of each participant regarding the criteria importance were spatially modelled through the analytical hierarchy process (AHP and analytical network process (ANP multi-criteria methods. Experts were also involved at the end of the modelling exercise for validation. The final product is a set of individual and group flood vulnerability maps. Both AHP and ANP proved to be effective for flood vulnerability assessment; however, ANP is preferred as it considers the dependences among criteria. The participatory approach enabled experts to learn from each other and acknowledge different perspectives towards social learning. The findings highlight that to enhance the credibility and deployment of model results, multiple viewpoints should be integrated without forcing consensus.
Ahmad, Rifandi Raditya; Fuad, Muhammad
2018-02-01
Some functions of mangrove areas in coastal ecosystems as a green belt, because mangrove serves as a protector of the beach from the sea waves, as a good habitat for coastal biota and for nutrition supply. Decreased condition or degradation of mangrove habitat caused by several oceanographic factors. Mangrove habitats have some specific characteristics such as salinity, tides, and muddy substrates. Considering the role of mangrove area is very important, it is necessary to study about the potential of mangrove habitat so that the habitat level of mangrove habitat in the east coast of Semarang city is known. The purpose of this research is to obtain an index and condition of habitat of mangrove habitat at location of research based on tidal, salinity, substrate type, coastline change. Observation by using purposive method and calculation of habitat index value of mangrove habitat using CVI (Coastal Vulnerability Index) method with scores divided into 3 groups namely low, medium and high. The results showed that there is a zone of research belonging to the medium vulnerability category with the most influential variables is because there is abrasion that sweeps the mangrove substrate. Trimulyo mangrove habitat has high vulnerable variable of tidal frequency, then based on value variable Salinity is categorized as low vulnerability, whereas for mangrove habitat vulnerability based on variable type of substrate belong to low and medium vulnerability category. The CVI values of mangrove habitats divided into zones 1; 2; and 3 were found to varying values of 1.54; 3.79; 1.09, it indicates that there is a zone with the vulnerability of mangrove habitat at the study site belonging to low and medium vulnerability category.
Current techniques for the investigation of vulnerable atherosclerotic plaques
International Nuclear Information System (INIS)
Riou, L.; Broisat, A.; Fagret, D.; Ghezzi, C.
2005-01-01
Atherosclerosis is the single most important contributor to cardiovascular diseases, the leading cause of death in industrialized countries. Atherosclerosis complications such as vulnerable coronary plaque rupture or erosion result in acute coronary events, i.e. myocardial infarction and sudden death. Vulnerable plaques initially develop eccentrically without impeding on the vessel lumen and are therefore not detectable using angiography. New techniques for the investigation of vulnerable plaques are needed to identify and treat vulnerable patients. Invasive techniques require the use of intracoronary probes and are thereby not applicable to large populations of patients. Intravascular ultrasound (IVUS) and optical coherence tomography (OCT) are the most promising invasive modalities. They provide morphological data that could potentially be associated with a more functional approach such as thermography, elasto-graphy, or spectroscopy, Non-invasive techniques are better suited for studying larger populations of patients. Computed tomography is currently used for calcium scoring, but the biological meaning and the prognostic value of this index remain to be fully determined. Non-invasive coronary magnetic resonance imaging (MRI) faces numerous technical challenges, and it essentially provides morphological data. Molecular nuclear imaging offers a great sensitivity and the ability to provide metabolic data about atherosclerotic lesions. New potential tracers of vulnerable plaques are currently being evaluated. Nuclear Medicine should therefore play a major role in the future as a non invasive imaging modality for the assessment of vulnerable atherosclerotic plaques. (author)
PORT SECURITY-Threats and Vulnerabilities
Kusi, Bernard
2015-01-01
The main objective of this thesis is to identify the threats and the vulnerabilities concerning Takoradi port, and finally recommend measure to overcome the identified threats and vul-nerabilities. Various categories of potential threats and vulnerabilities have been studied throughout the literature review. However, because each port presents a unique sets of threats and vulnerabilities, there was a need to look critically into how Takoradi port operations are being conducted in other to ide...
Directory of Open Access Journals (Sweden)
Mónica Cecilia De la Torre Ugarte Guanilo
2014-08-01
Full Text Available Objective To construct and validate markers of vulnerability of women to STDs/HIV, taking into consideration the importance of STDs/HIV. Method Methodological study carried out in three stages: 1 systematic review and identification of elements of vulnerability in the scientific production; 2 selection of elements of vulnerability, and development of markers; 3 establishment of the expert group and validation of the markers (content validity. Results Five markers were validated: no openness in the relationship to discuss aspects related to prevention of STDs/HIV; no perception of vulnerability to STDs/HIV; disregard of vulnerability to STDs/ HIV; not recognizing herself as the subject of sexual and reproductive rights; actions of health professionals that limit women’s access to prevention of STDs/HIV. Each marker contains three to eleven components. Conclusion The construction of such markers constituted an instrument, presented in another publication, which can contribute to support the identification of vulnerabilities of women in relation to STDs/HIV in the context of primary health care services. The markers constitute an important tool for the operationalization of the concept of vulnerability in primary health care and to promote inter/multidisciplinary and inter/multi-sectoral work processes.
Vulnerability analysis methods for road networks
Bíl, Michal; Vodák, Rostislav; Kubeček, Jan; Rebok, Tomáš; Svoboda, Tomáš
2014-05-01
Road networks rank among the most important lifelines of modern society. They can be damaged by either random or intentional events. Roads are also often affected by natural hazards, the impacts of which are both direct and indirect. Whereas direct impacts (e.g. roads damaged by a landslide or due to flooding) are localized in close proximity to the natural hazard occurrence, the indirect impacts can entail widespread service disabilities and considerable travel delays. The change in flows in the network may affect the population living far from the places originally impacted by the natural disaster. These effects are primarily possible due to the intrinsic nature of this system. The consequences and extent of the indirect costs also depend on the set of road links which were damaged, because the road links differ in terms of their importance. The more robust (interconnected) the road network is, the less time is usually needed to secure the serviceability of an area hit by a disaster. These kinds of networks also demonstrate a higher degree of resilience. Evaluating road network structures is therefore essential in any type of vulnerability and resilience analysis. There are a range of approaches used for evaluation of the vulnerability of a network and for identification of the weakest road links. Only few of them are, however, capable of simulating the impacts of the simultaneous closure of numerous links, which often occurs during a disaster. The primary problem is that in the case of a disaster, which usually has a large regional extent, the road network may remain disconnected. The majority of the commonly used indices use direct computation of the shortest paths or time between OD (origin - destination) pairs and therefore cannot be applied when the network breaks up into two or more components. Since extensive break-ups often occur in cases of major disasters, it is important to study the network vulnerability in these cases as well, so that appropriate
Analysis of Network Vulnerability Under Joint Node and Link Attacks
Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting
2018-03-01
The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.
Classification of vulnerability information
International Nuclear Information System (INIS)
Gibson, W.G.
1984-01-01
The current upgrading of security measures at sensitive Department of Energy (DOE) facilities reflects the continuing concern over possible terrorist and other criminal acts against these facilities. Security reviews are periodically conducted at DOE facilities, deficiencies are identified, and corrective actions are recommended. While security upgrades are initiated as soon as possible, the process of securing funding and the construction or other activities necessary to complete upgrades can cause delays in correcting security vulnerabilities. Details of security weaknesses at important DOE facilities are classified in order to deny valuable information to terrorists and other malefactors
International Nuclear Information System (INIS)
Bhattacharyya, Subhes C.
2009-01-01
This paper analyses the diversity of fuel mix for electricity generation in selected European countries and investigates how the fuel bill has changed as a share of GDP between 1995 and 2005. The drivers of fuel-dependence-related vulnerability are determined using Laspeyres index decomposition. A 'what-if' analysis is carried out to analyse the changes in the vulnerability index due to changes in the drivers and a scenario analysis is finally used to investigate the future vulnerability in the medium term. The paper finds that the British and the Dutch electricity systems are less diversified compared to three other countries analysed. The gas dependence of the Dutch and Italian systems made them vulnerable but the vulnerability increased in all countries in recent years. Gas price and the level of dependence on gas for power generation mainly influenced the gas vulnerability. The United Kingdom saw a substantial decline in its coal vulnerability due to a fall in coal price and coal dependence in electricity generation. The scenario analysis indicates that UK is likely to face greater gas vulnerability in the future due to increased gas dependence in electricity generation and higher import dependence.
The Minimal Clinically Important Difference for the Mayo-Portland Adaptability Inventory.
Malec, James F; Kean, Jacob; Monahan, Patrick O
To determine the Minimal Clinically Important Difference (MCID) and Robust Clinically Important Difference (RCID) of the Mayo-Portland Adaptability Inventory-4 (MPAI-4) as measures of response to intervention. Retrospective analysis of existing data. Both distribution- and anchor-based methods were used to triangulate on the MCID and to identify a moderate, that is, more robust, level of change (RCID) for the MPAI-4. These were further evaluated with respect to clinical provider ratings. Data for individuals with acquired brain injury in rehabilitation programs throughout the United States in the OutcomeInfo Database (n = 3087) with 2 MPAI-4 ratings. MPAI-4, Supervision Rating Scale, Clinician Rating of Global Clinical Improvement. Initial analyses suggested 5 T-score points (5T) as the MCID and 9T as the RCID. Eighty-one percent to 87% of clinical raters considered a 5T change and 99% considered a 9T change to indicate meaningful improvement. 5T represents the MCID for the MPAI-4 and 9T, the RCID. Both values are notably less than the Reliable Change Index (RCI). While the RCI indicates change with a high level of statistical confidence, it may be insensitive to change that is considered meaningful by providers and participants as indicated by the MCID.
Assessing and managing freshwater ecosystems vulnerable to global change
Angeler, David G.; Allen, Craig R.; Birge, Hannah E.; Drakare, Stina; McKie, Brendan G.; Johnson, Richard K.
2014-01-01
Freshwater ecosystems are important for global biodiversity and provide essential ecosystem services. There is consensus in the scientific literature that freshwater ecosystems are vulnerable to the impacts of environmental change, which may trigger irreversible regime shifts upon which biodiversity and ecosystem services may be lost. There are profound uncertainties regarding the management and assessment of the vulnerability of freshwater ecosystems to environmental change. Quantitative approaches are needed to reduce this uncertainty. We describe available statistical and modeling approaches along with case studies that demonstrate how resilience theory can be applied to aid decision-making in natural resources management. We highlight especially how long-term monitoring efforts combined with ecological theory can provide a novel nexus between ecological impact assessment and management, and the quantification of systemic vulnerability and thus the resilience of ecosystems to environmental change.
MARTIN–GRUBER ANASTOMOSIS AND ITS CLINICAL IMPORTANCE
Directory of Open Access Journals (Sweden)
I. G. Mikhaylyuk
2015-01-01
Full Text Available The communication between the median and ulnar nerves on the forearm, known as the Martin–Gruber anastomosis, is widespread in the general population. Despite the fact that this connection is described by anatomists in XVIII century, its importance has only recently been appreciated because of the widespread of the electrophysiological techniques in clinical practies. However, in the Russian literature aspects of its practical value described so far is not enough. This article deals with the prevalence of the anastomosis, its anatomical and electrophysiological classification, options innervation of muscles of the hand, is carried out through him, described electrophysiological methods and criteria for its diagnosis, including the collision technique, in healthy subjects and patients with lesions of the median and ulnar nerves, given its practical value. Such a course of nerve fibers through this anastomosis can have a significant impact on the clinical manifestations in patients with lesions of the median and ulnar nerves, as well as the results of an electrophysiological study. Martin–Gruber anastomosis provides variability innervation muscles of the hand, which can make it difficult topic diagnostic damage to the median and ulnar nerves, in addition, because of the connection between the nerves of the clinical presentation may not reflect the extent of their defeat: the hand muscles function can be preserved with full nerve damage or, conversely, significantly disrupted with minimal nerve lesions. Moreover, different electrophysiological findings on patients with pathology of the median or ulnar nerves in the conditions of functioning anastomosis may also complicate the interpretation of the clinical data. Thus, knowledge of the anatomy and physiology of the Martin–Gruber communication as necessary for the electrophysiologist for correct interpretation of the finding and the clinician to accurately diagnose the pathology of the median
CT and MR imaging of the liver. Clinical importance of nutritional status
International Nuclear Information System (INIS)
Leander, P.; Sjoeberg, S.; Hoeglund, P.
2000-01-01
Purpose: In an experimental study in rats a correlation between nutritional status and hepatic attenuation in CT and signal intensities in MR imaging was shown. Is physiological nutritional status of importance in clinical CT and MR imaging? Material and methods: In a cross-over study including 12 healthy volunteers (6 women and 6 men, mean age 34 years), CT and MR imaging of the liver were performed with nutritional status at three different levels, i.e., normal, fasting and after glycogen-rich meals. CT and MR were performed on clinical imaging systems and hepatic attenuation and signal intensity, respectively, were assessed. In MR, T1-weighted, proton density-weighted and T2-weighted pulse-sequences were used. Results: In CT there were significantly (p<0.01) higher liver attenuations in normal nutritional status and after glycogen rich-meals compared to the fasting condition. The difference between fasting and glycogen-rich meals were 10.5 HU for men, 7.4 for women and mean 8.8 HU for all 12 volunteers. In MR imaging the differences were small and non-significant. The results of this study are in accordance with an earlier experimental study in rats. Conclusion: In CT it may be of importance not to have patients in a fasting condition as it lowers the attenuation in normal liver tissue. The findings are important for planning of clinical studies where hepatic attenuation will be assessed and may be of some importance in clinical CT. In MR imaging the results indicate that the nutritional status is of less importance
International Nuclear Information System (INIS)
Fernández González, P.; Moreno, B.
2015-01-01
Highlights: • We propose and develop the LMDI approach to factorize changes in electricity bill vulnerability. • Spanish vulnerability (1995–2011) markedly grew mainly by increasing gas dependence. • Fuel price increase and growing importance of electricity damage energy security. • Energy intensity advances & fuel diversification: insufficient to drive vulnerability. • Main recommendation: enhance internal energy market and common external EU strategy. - Abstract: High energy dependence on fossil raises vulnerability concerns about security of supply and energy cost. This research examines the impact of high dependence of imported fuels for power generation in Spain through the quantification and analysis of the driving forces behind the change in its electricity bill. Following logarithmic mean Divisia indexes approach, we present and perform a new method that enables a complete decomposition of changes in electricity vulnerability into contributions from several drivers. In fact, we identify five predefined factors behind the variations in vulnerability in Spain during the 1998–2011 period: fuel price, average heat rate, fuel dependence, degree of electricity importance and energy intensity. The application of this approach reveals a significant increase in Spanish vulnerability in the last two decades, promoted by increments in fuel price and importance of electricity over the primary energy consumption, but especially by increasing fuel dependence (particularly gas dependence). Therefore, findings mainly advocate for those strategies aimed at reducing Spanish energy dependence. Also those improving thermal efficiency and energy intensity are indicated
In the Ethos of the Safety Net: An Expanded Role for Clinical Ethics Mediation.
McGreevy, Jolion
2015-01-01
Clinical ethics mediation is invaluable for resolving intractable disputes in the hospital. But it is also a critical day-to-day skill for clinicians, especially those who serve a disproportionate number of vulnerable patients. While mediation is typically reserved for intractable cases, there are two important opportunities to expand its use. First is preventative mediation, in which clinicians incorporate clinical ethics mediation into their daily routine in order to address value-laden conflicts before they reach the point at which outside consultation becomes necessary. Second is guided mediation, in which clinical teams resolve conflicts with patients or surrogates with guidance from an ethics consultant, who operates at some distance from the conflict and, rather than recommending a single action, counsels clinicians on the process they can use to resolve the conflict on their own. These approaches build the capacity of all clinicians to use clinical ethics mediation to improve the care of vulnerable patients. Copyright 2015 The Journal of Clinical Ethics. All rights reserved.
Rural Nevada and climate change: vulnerability, beliefs, and risk perception.
Safi, Ahmad Saleh; Smith, William James; Liu, Zhnongwei
2012-06-01
In this article, we present the results of a study investigating the influence of vulnerability to climate change as a function of physical vulnerability, sensitivity, and adaptive capacity on climate change risk perception. In 2008/2009, we surveyed Nevada ranchers and farmers to assess their climate change-related beliefs, and risk perceptions, political orientations, and socioeconomic characteristics. Ranchers' and farmers' sensitivity to climate change was measured through estimating the proportion of their household income originating from highly scarce water-dependent agriculture to the total income. Adaptive capacity was measured as a combination of the Social Status Index and the Poverty Index. Utilizing water availability and use, and population distribution GIS databases; we assessed water resource vulnerability in Nevada by zip code as an indicator of physical vulnerability to climate change. We performed correlation tests and multiple regression analyses to examine the impact of vulnerability and its three distinct components on risk perception. We find that vulnerability is not a significant determinant of risk perception. Physical vulnerability alone also does not impact risk perception. Both sensitivity and adaptive capacity increase risk perception. While age is not a significant determinant of it, gender plays an important role in shaping risk perception. Yet, general beliefs such as political orientations and climate change-specific beliefs such as believing in the anthropogenic causes of climate change and connecting the locally observed impacts (in this case drought) to climate change are the most prominent determinants of risk perception. © 2012 Society for Risk Analysis.
Principles of Security Vulnerability Analysis of stationary industrial installations
International Nuclear Information System (INIS)
Borysiewicz, M.
2006-01-01
Security and safety have been key priorities at facilities that manufacture, store, use, or handle hazardous chemicals, after the terrorist attacks on the United States of September 11, 2001. Security improvements may be needed, especially at sites that pose a more attractive target to terrorists due to their economic importance, perceived level of consequences, and other factors. The first step in the process of managing security risks is to identify and analyze the threats and the vulnerabilities facing a facility by conducting a Security Vulnerability Analysis (SVA). The SVA is a systematic process that evaluates the likelihood that a threat against a facility will be successful. It considers the potential severity of consequences to the facility itself, to the surrounding community and on the energy supply chain. The objective of conducting a SVA is to identify security hazards, threats, and vulnerabilities facing a facility, and to evaluate the countermeasures to provide for the protection of the public, workers, national interests, the environment, and the company. With this information security risks can be assessed and strategies can be formed to reduce vulnerabilities as required. SVA is a tool to assist management in making decisions on the need for countermeasures to address the threats and vulnerabilities. The paper provides an overview of fundamental steps of SVA for stationary industrial installations. (author)
Vulnerability Identification Errors in Security Risk Assessments
Taubenberger, Stefan
2014-01-01
At present, companies rely on information technology systems to achieve their business objectives, making them vulnerable to cybersecurity threats. Information security risk assessments help organisations to identify their risks and vulnerabilities. An accurate identification of risks and vulnerabilities is a challenge, because the input data is uncertain. So-called ’vulnerability identification errors‘ can occur if false positive vulnerabilities are identified, or if vulnerabilities remain u...
Assessment of Socioeconomic Vulnerability to Floods in the Bâsca Chiojdului Catchment Area
Directory of Open Access Journals (Sweden)
REMUS PRĂVĂLIE
2014-12-01
Full Text Available Hydrological risk phenomena such as floods are among the most costly natural disasters worldwide, effects consisting of socioeconomic damages and deaths. The Bâsca Chiojdului catchment area, by its morphometric and hydrographic peculiarities, is prone to generate these hydrological risk phenomena, so there is a high vulnerability in the socioeconomic elements. This paper is focused on the identification of the main socioeconomic elements vulnerable to hydrological risk phenomena such as floods, based on the assessment of their manifestation potential. Thus, following the delimitation of areas with the highest flood occurrence potential (susceptibility to floods, major socioeconomic factors existing in the basin, considering human settlements (constructions, transport infrastructure, and agricultural areas (the most important category, were superimposed. Results showed a high vulnerability for all three exposed socioeconomic elements especially in valley sectors, of which household structures were the most vulnerable, given both their importance and the high number of areas highly exposed to floods (approximately 2,500 houses and outbuildings, out of a total of about 10,250, intersect the most susceptible area to floods in the study area.
Fuzzing and Vulnerabilities Search
Stanislav Evgenyevich Kirillov; Nikolai Petrovich Lavrentiev
2013-01-01
Fuzzing for vulnerabilities can be very effective if we know the input data format. This work contains description of network message format recovery algorithm and the usage of restored data model in fuzzing and vulnerabilities search.
Aren't we all vulnerable: why do vulnerability analysis?
Energy Technology Data Exchange (ETDEWEB)
Moench, Marcus
2011-11-15
The idea of 'vulnerability' is widely-used shorthand for the disproportionate impacts that climate change will have on high-risk groups and fragile ecosystems. Decision makers increasingly want to target adaptation funding to those people and environments most affected by climate change. They must also be able to monitor the effectiveness of their investments. Vulnerability analysis is sometimes presented as the solution to these wants and needs — but existing approaches are often of little use: at best, they reiterate what we already know; at worst, they are used to justify entrenched agendas. To be truly useful as a basis for dialogue, action and accountability, the meaning of 'vulnerability' must be clarified and the methods for analysing it greatly strengthened. This means establishing standard, replicable approaches that differentiate between the roles and exposure of stakeholders, systems and institutions.
Optimizer convergence and local minima errors and their clinical importance
International Nuclear Information System (INIS)
Jeraj, Robert; Wu, Chuan; Mackie, Thomas R
2003-01-01
Two of the errors common in the inverse treatment planning optimization have been investigated. The first error is the optimizer convergence error, which appears because of non-perfect convergence to the global or local solution, usually caused by a non-zero stopping criterion. The second error is the local minima error, which occurs when the objective function is not convex and/or the feasible solution space is not convex. The magnitude of the errors, their relative importance in comparison to other errors as well as their clinical significance in terms of tumour control probability (TCP) and normal tissue complication probability (NTCP) were investigated. Two inherently different optimizers, a stochastic simulated annealing and deterministic gradient method were compared on a clinical example. It was found that for typical optimization the optimizer convergence errors are rather small, especially compared to other convergence errors, e.g., convergence errors due to inaccuracy of the current dose calculation algorithms. This indicates that stopping criteria could often be relaxed leading into optimization speed-ups. The local minima errors were also found to be relatively small and typically in the range of the dose calculation convergence errors. Even for the cases where significantly higher objective function scores were obtained the local minima errors were not significantly higher. Clinical evaluation of the optimizer convergence error showed good correlation between the convergence of the clinical TCP or NTCP measures and convergence of the physical dose distribution. On the other hand, the local minima errors resulted in significantly different TCP or NTCP values (up to a factor of 2) indicating clinical importance of the local minima produced by physical optimization
Graduate admissions in clinical neuropsychology: the importance of undergraduate training.
Karazsia, Bryan T; Stavnezer, Amy Jo; Reeves, Jonathan W
2013-11-01
Discussions of and recommendations for the training of clinical neuropsychologists exist at the doctoral, internship, and post-doctoral level. With few exceptions, the literature on undergraduate preparations in clinical neuropsychology is sparse and lacks empirical evidence. In the present study, graduate-level faculty and current trainees completed surveys about graduate school preparations. Faculty expectations of minimum and ideal undergraduate training were highest for research methods, statistics, and assessment. Preferences for "goodness of fit" also emerged as important admissions factors. These results offer evidence for desirable undergraduate preparations for advanced study in clinical neuropsychology. Although undergraduate training in psychology is intentionally broad, results from this study suggest that students who desire advanced study in clinical neuropsychology need to tailor their experiences to be competitive in the application process. The findings have implications for prospective graduate students, faculty who train and mentor undergraduates, and faculty who serve on admissions committees.
Sierevelt, Inger N.; van Oldenrijk, Jakob; Poolman, Rudolf W.
2007-01-01
In this paper we describe several issues that influence the reporting of statistical significance in relation to clinical importance, since misinterpretation of p values is a common issue in orthopaedic literature. Orthopaedic research is tormented by the risks of false-positive (type I error) and
Measuring vulnerability to disaster displacement
Brink, Susan A.; Khazai, Bijan; Power, Christopher; Wenzel, Friedemann
2015-04-01
Large scale disasters can cause devastating impacts in terms of population displacement. Between 2008 and 2013, on average 27 million people were displaced annually by disasters (Yonetani 2014). After large events such as hurricane Katrina or the Port-au-Prince earthquake, images of inadequate public shelter and concerns about large scale and often inequitable migration have been broadcast around the world. Population displacement can often be one of the most devastating and visible impacts of a natural disaster. Despite the importance of population displacement in disaster events, measures to understand the socio-economic vulnerability of a community often use broad metrics to estimate the total socio-economic risk of an event rather than focusing on the specific impacts that a community faces in a disaster. Population displacement is complex and multi-causal with the physical impact of a disaster interacting with vulnerability arising from the response, environmental issues (e.g., weather), cultural concerns (e.g., expectations of adequate shelter), and many individual factors (e.g., mobility, risk perception). In addition to the complexity of the causes, population displacement is difficult to measure because of the wide variety of different terms and definitions and its multi-dimensional nature. When we speak of severe population displacement, we may refer to a large number of displaced people, an extended length of displacement or associated difficulties such as poor shelter quality, risk of violence and crime in shelter communities, discrimination in aid, a lack of access to employment or other difficulties that can be associated with large scale population displacement. We have completed a thorough review of the literature on disaster population displacement. Research has been conducted on historic events to understand the types of negative impacts associated with population displacement and also the vulnerability of different groups to these impacts. We
spatially identifying vulnerable areas
African Journals Online (AJOL)
The model structure is aimed at understanding the critical vulnerable factors that ... This paper incorporates multiple criteria and rank risk factors. ..... In terms of quantifying vulnerable areas within the country, the analysis is done based on 9 ...
Disaster Vulnerability in South Korea under a Gender Perspective
Chung, Gunhui
2017-04-01
The most affected natural disaster has been flooding in South Korea, however, many unexpected natural disasters cause by snow or drought have become severe due to the climate change. Therefore it is very important to analyze disaster vulnerability under the unexpected climate condition. When the natural disaster happens, in many cases, female was more damaged than male because of the cultural and physical limitations. Disaster is never gender neutral. For example, four times as many female as male died in Indonesia tsunami. Therefore, it is very important to consider gender sensitivity in the disaster vulnerability to mitigate effects on the female. In this study, the current disaster management guideline in South Korea is investigated in the gender perspective and compared to the other countries. As a result, gender analysis in the disaster preparedness and response is not implemented in South Korea. Thus, the gender balanced disaster management guideline is newly proposed. Also, the disaster vulnerability considering gendered factors are evaluated and analyzed in the urban area. Acknowledgement This research was supported by Support Program for Women in Science, Engineering and Technology through the National Research Foundation of Korea(NRF) funded by the Ministry of Science, ICT and future Planning(No. 2016H1C3A1903202)
Fuzzing and Vulnerabilities Search
Directory of Open Access Journals (Sweden)
Stanislav Evgenyevich Kirillov
2013-02-01
Full Text Available Fuzzing for vulnerabilities can be very effective if we know the input data format. This work contains description of network message format recovery algorithm and the usage of restored data model in fuzzing and vulnerabilities search.
Determining Minimal Clinically Important Differences in Japanese Cedar/Cypress Pollinosis Patients
Takaya Higaki; Mitsuhiro Okano; Shin Kariya; Tazuko Fujiwara; Takenori Haruna; Haruka Hirai; Aya Murai; Minoru Gotoh; Kimihiro Okubo; Shuji Yonekura; Yoshitaka Okamoto; Kazunori Nishizaki
2013-01-01
Background: Statistically significant results of medical intervention trials are not always clinically meaningful. We sought to estimate the minimal clinically important difference (MCID) (the smallest change in a given endpoint that is meaningful to a patient) during seasonal alteration of Japanese cedar/cypress pollinosis (JCCP). Methods: Results of a double-blinded, placebo-controlled trial of JCCP patients conducted between 2008 and 2010 were analyzed using an anchor-based method in wh...
Selective vulnerability in brain hypoxia
DEFF Research Database (Denmark)
Cervos-Navarro, J.; Diemer, Nils Henrik
1991-01-01
Neuropathology, selective vulnerability, brain hypoxia, vascular factors, excitotoxicity, ion homeostasis......Neuropathology, selective vulnerability, brain hypoxia, vascular factors, excitotoxicity, ion homeostasis...
Late diagnosis and vulnerabilities of the elderly living with HIV/AIDS
Directory of Open Access Journals (Sweden)
Rúbia Aguiar Alencar
2015-04-01
Full Text Available OBJECTIVE To identify vulnerabilities of elderly people with HIV/AIDS and the trajectory that they follow until reaching the diagnosis of the disease. METHOD Qualitative research conducted in specialized clinics in the state of São Paulo, from January to June 2011. Semi-structured interviews were conducted with 11 elderly people who were found to be infected with the virus at the age of 60 years or older. The interviews were analyzed using content analysis. RESULTS In this process four categories emerged, then analyzed with reference to the theoretical framework of vulnerability. CONCLUSION Late diagnosis of HIV infection or AIDS among the elderly happens in the secondary or tertiary service. Issues related to sexual life of the elderly are only questioned by health professionals after the diagnosis, also the time that condom use becomes absolute. It is believed that the investigation of the vulnerability of the elderly to HIV/AIDS allows for carrying out appropriate interventions for this population.
A Mamdani Adaptive Neural Fuzzy Inference System for Improvement of Groundwater Vulnerability.
Agoubi, Belgacem; Dabbaghi, Radhia; Kharroubi, Adel
2018-01-23
Assessing groundwater vulnerability is an important procedure for sustainable water management. Various methods have been developed for effective assessment of groundwater vulnerability and protection. However, each method has its own conditions of use and, in practice; it is difficult to return the same results for the same site. The research conceptualized and developed an improved DRASTIC method using Mamdani Adaptive Neural Fuzzy Inference System (M-ANFIS-DRASTIC). DRASTIC and M-ANFIS-DRASTIC were applied in the Jorf aquifer, southeastern Tunisia, and results were compared. Results confirm that M-ANFIS-DRASTIC combined with geostatistical tools is more powerful, generated more precise vulnerability classes with very low estimation variance. Fuzzy logic has a power to produce more realistic aquifer vulnerability assessments and introduces new ways of modeling in hydrogeology using natural human language expressed by logic rules. © 2018, National Ground Water Association.
Vulnerabilities, Influences and Interaction Paths: Failure Data for Integrated System Risk Analysis
Malin, Jane T.; Fleming, Land
2006-01-01
We describe graph-based analysis methods for identifying and analyzing cross-subsystem interaction risks from subsystem connectivity information. By discovering external and remote influences that would be otherwise unexpected, these methods can support better communication among subsystem designers at points of potential conflict and to support design of more dependable and diagnosable systems. These methods identify hazard causes that can impact vulnerable functions or entities if propagated across interaction paths from the hazard source to the vulnerable target. The analysis can also assess combined impacts of And-Or trees of disabling influences. The analysis can use ratings of hazards and vulnerabilities to calculate cumulative measures of the severity and importance. Identification of cross-subsystem hazard-vulnerability pairs and propagation paths across subsystems will increase coverage of hazard and risk analysis and can indicate risk control and protection strategies.
Minimal clinically important difference on the Motor Examination part of MDS-UPDRS.
Horváth, Krisztina; Aschermann, Zsuzsanna; Ács, Péter; Deli, Gabriella; Janszky, József; Komoly, Sámuel; Balázs, Éva; Takács, Katalin; Karádi, Kázmér; Kovács, Norbert
2015-12-01
Recent studies increasingly utilize the Movement Disorders Society Sponsored Unified Parkinson's Disease Rating Scale (MDS-UPDRS). However, the minimal clinically important difference (MCID) has not been fully established for MDS-UPDRS yet. To assess the MCID thresholds for MDS-UPDRS Motor Examination (Part III). 728 paired investigations of 260 patients were included. At each visit both MDS-UPDRS and Clinician-reported Global Impression-Improvement (CGI-I) scales were assessed. MDS-UPDRS Motor Examination (ME) score changes associated with CGI-I score 4 (no change) were compared with MDS-UPDRS ME score changes associated with CGI-I score 3 (minimal improvement) and CGI-I score 5 (minimal worsening). Both anchor- and distribution-based techniques were utilized to determine the magnitude of MCID. The MCID estimates for MDS-UPDRS ME were asymmetric: -3.25 points for detecting minimal, but clinically pertinent, improvement and 4.63 points for observing minimal, but clinically pertinent, worsening. MCID is the smallest change of scores that are clinically meaningful to patients. These MCID estimates may allow the judgement of a numeric change in MDS-UPDRS ME on its clinical importance. Copyright © 2015 Elsevier Ltd. All rights reserved.
Web Application Vulnerabilities
Yadav, Bhanu
2014-01-01
Web application security has been a major issue in information technology since the evolvement of dynamic web application. The main objective of this project was to carry out a detailed study on the top three web application vulnerabilities such as injection, cross site scripting, broken authentication and session management, present the situation where an application can be vulnerable to these web threats and finally provide preventative measures against them. ...
A review of vulnerability and risks for schizophrenia: Beyond the two hit hypothesis
Davis, Justin; Eyre, Harris; Jacka, Felice N; Dodd, Seetal; Dean, Olivia; McEwen, Sarah; Debnath, Monojit; McGrath, John; Maes, Michael; Amminger, Paul; McGorry, Patrick D; Pantelis, Christos; Berk, Michael
2016-01-01
Schizophrenia risk has often been conceptualized using a model which requires two hits in order to generate the clinical phenotype—the first as an early priming in a genetically predisposed individual and the second a likely environmental insult. The aim of this paper was to review the literature and reformulate this binary risk-vulnerability model. We sourced the data for this narrative review from the electronic database PUBMED. Our search terms were not limited by language or date of publication. The development of schizophrenia may be driven by genetic vulnerability interacting with multiple vulnerability factors including lowered prenatal vitamin D exposure, viral infections, smoking intelligence quotient, social cognition cannabis use, social defeat, nutrition and childhood trauma. It is likely that these genetic risks, environmental risks and vulnerability factors are cumulative and interactive with each other and with critical periods of neurodevelopmental vulnerability. The development of schizophrenia is likely to be more complex and nuanced than the binary two hit model originally proposed nearly thirty years ago. Risk appears influenced by a more complex process involving genetic risk interfacing with multiple potentially interacting hits and vulnerability factors occurring at key periods of neurodevelopmental activity, which culminate in the expression of disease state. These risks are common across a number of neuropsychiatric and medical disorders, which might inform common preventive and intervention strategies across non-communicable disorders. PMID:27073049
Assessing the Agricultural Vulnerability for India under Changing Climate
Sharma, Tarul; Vardhan Murari, Harsha; Karmakar, Subhankar; Ghosh, Subimal; Singh, Jitendra
2016-04-01
Global climate change has proven to show majorly negative impacts for the far future. These negative impacts adversely affect almost all the fields including agriculture, water resources, tourism, and marine ecosystem. Among these, the effects on agriculture are considered to be of prime importance since its regional impacts can directly affect the global food security. Under such lines, it becomes essential to understand how climate change directs agricultural production for a region along with its vulnerability. In India, rice and wheat are considered as major staple diet and hence understanding its production loss/gain due to regional vulnerability to climate change becomes necessary. Here, an attempt has been made to understand the agricultural vulnerability for rice and wheat, considering yield as a function of temperature and precipitation during growing period. In order to accomplish this objective, the ratio of actual to potential evapo-transpiration has been considered which serves as a reliable indicator; with more this ratio towards unity, less vulnerable will be the region. The current objective needs an integration of climatic, hydrological and agricultural parameters; that can be achieved by simulating a climate data driven hydrologic (Variable Infiltration Capacity, VIC) model and a crop (Decision Support System for Agrotechnology Transfer, DSSAT) model. The proposed framework is an attempt to derive a crop vulnerability map that can facilitate in strategizing adaption practices which can reduce the adverse impacts of climate change in future.
Preventive practices in the elderly and vulnerability to HIV
Directory of Open Access Journals (Sweden)
Valéria Peixoto Bezerra
Full Text Available Objective: To know the vulnerability of the elderly to the HIV infection in the context of preventive practices. Method: Exploratory qualitative study, lead from December 2012 to May 2013, with 37 nursing Coexistence Groups in João Pessoa - Paraiba. The Focus Group was elected as the research technique, and the empirical material obtained was subjected to a Content Analysis Technique, thematic modality. Results: The elderly recognize the importance of preventive practices, but they face difficulties in its use when their emotional relationships with their partners do not favor preventive behavior, resulting in vulnerability. The elderly showed the population groups most vulnerable to HIV and do not recognize themselves as such. Conclusion: The complexity of the various contexts experienced by the elderlies of this study indicate the need for more research that allows advances in the understanding of subjectivity imposed in relations that underlie the aging process and the experience of sexuality in this age group.
Assessment of vulnerability of forest ecosystems to climate change and adaptation planning in Nepal
Matin, M. A.; Chitale, V. S.
2016-12-01
Understanding ecosystem level vulnerability of forests and dependence of local communities on these ecosystems is a first step towards developing effective adaptation strategies. As forests are important components of livelihoods system for a large percentage of the population in the Himalayan region, they offer an important basis for creating and safeguarding more climate-resilient communities. Increased frequency, duration, and/or severity of drought and heat stress, changes in winter ecology, and pest and fire outbreaksunder climate change scenarios could fundamentally alter the composition, productivity and biogeography of forests affecting the potential ecosystem services offered and forest-based livelihoods. Hence, forest ecosystem vulnerability assessment to climate change and the development of a knowledgebase to identify and support relevant adaptation strategies is identified as an urgent need. Climate change vulnerability is measured as a function of exposure, sensitivity and the adaptive capacity of the system towards climate variability and extreme events. Effective adaptation to climate change depends on the availability of two important prerequisites: a) information on what, where, and how to adapt, and b) availability of resources to implement the adaptation measures. In the present study, we introduce the concept of two way multitier approach, which can support effective identification and implementation of adaptation measures in Nepal and the framework can be replicated in other countries in the HKH region. The assessment of overall vulnerability of forests comprises of two components: 1) understanding the relationship between exposure and sensitivity and positive feedback from adaptive capacity of forests; 2) quantifying the dependence of local communities on these ecosystems. We use climate datasets from Bioclim and biophysical products from MODIS, alongwith field datasets. We report that most of the forests along the high altitude areas and few
Categorization of subjects in vulnerability condition: a review in the bioethics perspective
Directory of Open Access Journals (Sweden)
Ricardo de Amorim Cini
2017-10-01
Full Text Available The use of the term vulnerability in the discussion of bioethics, either as a concept or as a reality, has become increasingly recurrent. The first, and also most important use of this term is to protect subjects participating in experiments, but its use has been expanded to other situations. The aim of this research was to identify the subjects or realities that are classified as vulnerable. We used the descriptors “bioethics” and “vulnerability” to search for literature in Scielo.BR, Scielo.ORG and Lilacs, and analyzed 79 articles. Furthermore, in these articles we identified four categories of vulnerability that can be grouped as vulnerability in: [1] stages of life and gender; [2] health, disease and research; [3] socioeconomic and cultural exclusion; [4] and environment. This categorization demonstrates that the bioethical reflection on the vulnerability of life is still predominantly anthropocentric, which makes the protection of the dignity of life as a whole a challenge that is still to be faced by bioethical discussion.
Kerrigan, Deanna; Andrinopoulos, Katherine; Chung, Shang-en; Glass, Barbara; Ellen, Jonathan
2008-09-01
The importance of gender within HIV/STI prevention has become widely recognized. However, gender ideologies associated with vulnerability to HIV/STI are often examined and addressed without sufficient attention to the larger socioeconomic context within which they arise and evolve. We conducted a cross-sectional survey with 155 female, African-American adolescents recruited from two health clinics in Baltimore, Maryland. Multivariate logistic regression was utilized to assess the relationships between HIV/STI vulnerability resulting from male partner concurrency, adherence to traditional female gender norms, using a measure of hyperfemininity, and perceived socioeconomic opportunity structures. The likelihood of reported partner concurrency increased significantly among participants reporting higher levels of hyperfemininity (OR = 2.08; 95%CI = 1.01-4.30). Hyperfeminine thinking and behavior was significantly lower in the context of higher perceived socioeconomic opportunity structures (OR = 0.87; 95%CI = 0.79-0.95). Interventions seeking to promote gender equity and reduce HIV/STI may be more effective when the socioeconomic context of gender ideologies is assessed and addressed. Programs and policies to increase educational and professional opportunity structures, particularly among marginalized communities, should be actively integrated into HIV/STI prevention planning.
Identifying Vulnerable Nodes of Complex Networks in Cascading Failures Induced by Node-Based Attacks
Directory of Open Access Journals (Sweden)
Shudong Li
2013-01-01
Full Text Available In the research on network security, distinguishing the vulnerable components of networks is very important for protecting infrastructures systems. Here, we probe how to identify the vulnerable nodes of complex networks in cascading failures, which was ignored before. Concerned with random attack (RA and highest load attack (HL on nodes, we model cascading dynamics of complex networks. Then, we introduce four kinds of weighting methods to characterize the nodes of networks including Barabási-Albert scale-free networks (SF, Watts-Strogatz small-world networks (WS, Erdos-Renyi random networks (ER, and two real-world networks. The simulations show that, for SF networks under HL attack, the nodes with small value of the fourth kind of weight are the most vulnerable and the ones with small value of the third weight are also vulnerable. Also, the real-world autonomous system with power-law distribution verifies these findings. Moreover, for WS and ER networks under both RA and HL attack, when the nodes have low tolerant ability, the ones with small value of the fourth kind of weight are more vulnerable and also the ones with high degree are easier to break down. The results give us important theoretical basis for digging the potential safety loophole and making protection strategy.
Minimal clinically important difference in the fibromyalgia impact questionnaire.
Bennett, Robert M; Bushmakin, Andrew G; Cappelleri, Joseph C; Zlateva, Gergana; Sadosky, Alesia B
2009-06-01
The Fibromyalgia Impact Questionnaire (FIQ) is a disease-specific composite instrument that measures the effect of problems experienced by patients with fibromyalgia (FM). Utilization of the FIQ in measuring changes due to interventions in FM requires derivation of a clinically meaningful change for that instrument. Analyses were conducted to estimate the minimal clinically important difference (MCID), and to propose FIQ severity categories. Data from 3 similarly designed, 3-month placebo-controlled, clinical treatment trials of pregabalin 300, 450, and 600 mg/day in patients with FM were modeled to estimate the change in the mean FIQ total and stiffness items corresponding to each category on the Patient Global Impression of Change. FIQ severity categories were modeled and determined using established pain severity cutpoints as an anchor. A total of 2228 patients, mean age 49 years, 93% women, with a mean baseline FIQ total score of 62 were treated in the 3 studies. Estimated MCID on a given measure were similar across the studies. In a pooled analysis the estimated MCID (95% confidence interval) was 14% (13; 15) and for FIQ stiffness it was 13% (12; 14). In the severity analysis a FIQ total score from 0 to or= 39 to or=59 to 100 a severe effect. The analysis indicates that a 14% change in the FIQ total score is clinically relevant, and results of these analyses should enhance the clinical utility of the FIQ in research and practice.
Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2
Energy Technology Data Exchange (ETDEWEB)
Fesharaki, F.; Rizer, J.P.; Greer, L.S.
1994-05-01
The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.
Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2
International Nuclear Information System (INIS)
Fesharaki, F.; Rizer, J.P.; Greer, L.S.
1994-05-01
The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term
Vulnerability in the power network - a pre study
International Nuclear Information System (INIS)
Kjoelle, Gerd H.; Uhlen, Kjetil; Rolfseng, Lars; Stene, Birger
2006-02-01
Vulnerability in the power distribution network has been made a current topic because of various factors, from terror attacks to a strained power balance, large breakdowns in the power system in Europe and North America in recent time and an anticipated increase in climate-related challenges in the coming years; all related to the modern society's critical dependence on reliable power supply. Several questions are posed; whether there is a foundation to say that the vulnerability in the power network is increasing because of factors like cuts in staffing, reduced investments and increased exploitation of the capacity in the power systems, or increased average age on the air network. Different development features can indicate that the power network's ability to resist high stress is about to weaken. Examples of this is the slowly increasing trend in the number of non-reported interruptions, as well as an increase in the error frequency for power lines in the distribution network and for distribution transformers. In the pre-study there has not been found enough evidence to give a clear answer to whether the vulnerability in the power network is in fact on the rise. This is mainly due to the lack of good indicators, measuring methods and the foundation for documentation. Suggestions for methodology in order to identify unwanted incidents, estimate the probability and classify consequences for vulnerability analyses of power networks are presented. The methodology is concretised and exemplified in relation to a specific case: Power loss in the southern Norway affecting more than 250 000 people for 8-12 hours. Such a consequence is classified as critical. For four sub areas it has been exemplified which incidents may potentially cause such breaks. A summary is made of the most important challenges related to making vulnerability analyses of power networks. Comprised here are appropriate concepts, definitions, standards and measuring scales as well as data foundation
Directory of Open Access Journals (Sweden)
Chin-Cheng Wu
2016-12-01
Full Text Available The impact of climate change on the coastal zones of Taiwan not only affects the marine environment, ecology, and human communities whose economies rely heavily on marine activities, but also the sustainable development of national economics. The southwest coast is known as the area most vulnerable to climate change; therefore, this study aims to develop indicators to assess social vulnerability in this area of Taiwan using the three dimensions of susceptibility, resistance, and resilience. The modified Delphi method was used to develop nine criteria and 26 indexes in the evaluation, and the analytic hierarchy process method was employed to evaluate the weight of each indicator based on the perspectives of experts collected through questionnaire surveys. The results provide important information pertaining to the vulnerability of the most susceptive regions, the lowest-resistance areas, and the least resilient townships on the southwest coast. The most socially vulnerable areas are plotted based on the present analysis. Experts can consider the vulnerability map provided here when developing adaptation policies. It should be kept in mind that improving the capacities of resistance and resilience is more important than reducing susceptibility in Taiwan.
Open Source Vulnerability Database Project
Directory of Open Access Journals (Sweden)
Jake Kouns
2008-06-01
Full Text Available This article introduces the Open Source Vulnerability Database (OSVDB project which manages a global collection of computer security vulnerabilities, available for free use by the information security community. This collection contains information on known security weaknesses in operating systems, software products, protocols, hardware devices, and other infrastructure elements of information technology. The OSVDB project is intended to be the centralized global open source vulnerability collection on the Internet.
Thomasgard, M; Shonkoff, J P; Metz, W P; Edelbrock, C
1995-08-01
Parents who are excessively concerned about their child's health are often characterized as being overprotective. We hypothesized that parental overprotection is independent of parental perception of child vulnerability to illness or injury despite their presumed interchangeability. A community-based sample of 892 parents (92% white, 84% married, 88% middle-upper socioeconomic status, 90% mothers) completed a three-part protocol (clinical background data, the Child Vulnerability Scale, and the Parent Protection Scale). Correlates of high parental perception of child vulnerability included a medical condition in the child, a history of life-threatening illness or injury, and the child being seen for a sick visit. Correlates of high parental overprotection included younger age of child and parent. Only 20% of those parents who considered their child vulnerable were also considered overprotective.
Vulnerability assessment at a national level in Georgia
Tsereteli, N.; Arabidze, V.; Varazanashvili, O.; Gugeshashvili, T.
2012-04-01
Vulnerability assessment at a national level in Georgia Nino Tsereteli, Vakhtang Arabidze, Otar Varazanashvili, Tengiz Gugeshashvili The risk always exists when cities are built on. Population growth in cities and urbanization in natural hazard-prone zones leads to infrastructure expansion. The goal of the society is to construct natural hazards resistant infrastructure and minimize the expected losses. This is a complicated task as there is always knowledge deficiency on real seismic hazard and vulnerability. Assessment of vulnerability is vital in risk analysis, as vulnerability is defined in many different ways. Work presented here mostly deals with assessment of infrastructure's and population vulnerability at national level in Georgia. This work was initiated by NATO SFP project "seismic Hazard and Risk Assessment for Southern Caucasus - Eastern Turkey Energy Corridors" and the two work packages WP4 (seismic risk) and WP5 (city scenarios) of risk module of EMME (Earthquake Model of the Middle East Region) project. First step was creation databases (inventory) of elements at risk in GIS. Element at risk were the buildings, population, pipelines. The inventories was studied and Created in GIS for the following categories: Building material, number of stories, number of entrances, condition of building, building period. For pipelines pipe tipe (continous or segmented), material, pipe diameter. Very important is to estimate the initial cost of building for assessment of economic losses. From this purpose the attempt was done and the algorithm of this estimation were prepared taking into account obtained the inventory. Build quality, reliability and durability are of special importance to corresponding state agencies and include different aesthetic, engineering, practical, social, technological and economical aspects. The necessity that all of these aspects satisfy existing normative requirements becomes evident as the building and structures come into exploitation
Steckley, Marylynn; Doberstein, Brent
2011-07-01
This paper presents the results of primary research with 40 survivors of the 2004 Indian Ocean tsunami in two communities: Khao Lak (n=20) and Koh Phi Phi Don (n=20), Thailand. It traces tsunami survivors' perceptions of vulnerability, determines whether residents felt that the tsunami affected different communities differently, identifies the populations and sub-community groups that survivors distinguished as being more vulnerable than others, highlights community-generated ideas about vulnerability reduction, and pinpoints a range of additional vulnerability reduction actions. Tsunami survivors most consistently identified the 'most vulnerable' community sub-populations as women, children, the elderly, foreigners, and the poor. In Khao Lak, however, respondents added 'Burmese migrants' to this list, whereas in Koh Phi Phi Don, they added 'Thai Muslims'. Results suggest that the two case study communities, both small, coastal, tourism-dominated communities no more than 100 kilometres apart, have differing vulnerable sub-groups and environmental vulnerabilities, requiring different post-disaster vulnerability reduction efforts. © 2011 The Author(s). Disasters © Overseas Development Institute, 2011.
2012-11-07
...] Minimum Clinically Important Difference: An Outcome Metric in Orthopaedic Device Science and Regulation... Clinically Important Difference: An Outcome Metric in Orthopaedic Device Science and Regulation.'' FDA is co... (MCID) for patient-reported outcome (PRO) instruments used in orthopaedic extremity device-related...
Cotton genetic resources and crop vulnerability
A report on the genetic vulnerability of cotton was provided to the National Genetic Resources Advisory Council. The report discussed crop vulnerabilities associated with emerging diseases, emerging pests, and a narrowing genetic base. To address these crop vulnerabilities, the report discussed the ...
Andrews, Gail; Skinner, Donald; Zuma, Khangelani
2006-04-01
The HIV/AIDS epidemic in sub-Saharan Africa has already orphaned a generation of children, and it is projected that by 2010, 18 million African children under the age of 18 are likely to be orphans from this single cause (UNICEF, 2005, The state of the Worlds Children: Childhood under threat. New York: UNICEF). Results from a Kellogg funded OVC project (Skinner et al., 2004, Definition of orphaned and vulnerable children. Cape Town: HSRC) supported the construct that the loss of either or both parents would indicate a situation of likely vulnerability of children. A key problem in the literature on the impact of orphanhood on the well-being of children, families and communities, is that the focus of assertions and predictions is often on the negative impact on 'AIDS orphans', or households. There are hardly any studies that compare the experiences of orphans with non-orphans. This paper thus attempts to fill that gap. It uses epidemiological data to explore the epidemiology of health and vulnerability of children within the context of AIDS in sub-Saharan Africa. Because of data limitations, only the following aspects are examined: (i) orphan status; (ii) household structure (in particular, grandparent headedness and female-headedness); (iii) illness of parents; (iv) poverty; and (v) access to services, especially schooling, health, social services. While recognizing the limitations of the analysis, data presented in this paper indicates that orphans in sub-Saharan Africa are more vulnerable than non-orphans. The authors conclude with some suggestions for policy makers and programme implementers, highlighting the importance of focusing on interventions that will have maximum impact on the health and well-being of children.
Dalsgaard, Bo; Kennedy, Jonathan D; Simmons, Benno I; Baquero, Andrea C; Martín González, Ana M; Timmermann, Allan; Maruyama, Pietro K; McGuire, Jimmy A; Ollerton, Jeff; Sutherland, William J; Rahbek, Carsten
2018-03-28
Species traits are thought to predict feeding specialization and the vulnerability of a species to extinctions of interaction partners, but the context in which a species evolved and currently inhabits may also matter. Notably, the predictive power of traits may require that traits evolved to fit interaction partners. Furthermore, local abiotic and biotic conditions may be important. On islands, for instance, specialized and vulnerable species are predicted to be found mainly in mountains, whereas species in lowlands should be generalized and less vulnerable. We evaluated these predictions for hummingbirds and their nectar-food plants on Antillean islands. Our results suggest that the rates of hummingbird trait divergence were higher among ancestral mainland forms before the colonization of the Antilles. In correspondence with the limited trait evolution that occurred within the Antilles, local abiotic and biotic conditions-not species traits-correlate with hummingbird resource specialization and the vulnerability of hummingbirds to extinctions of their floral resources. Specifically, hummingbirds were more specialized and vulnerable in conditions with high topographical complexity, high rainfall, low temperatures and high floral resource richness, which characterize the Antillean Mountains. These findings show that resource specialization and species vulnerability to extinctions of interaction partners are highly context-dependent. © 2018 The Author(s).
Urban Heat Wave Vulnerability Analysis Considering Climate Change
JE, M.; KIM, H.; Jung, S.
2017-12-01
Much attention has been paid to thermal environments in Seoul City in South Korea since 2016 when the worst heatwave in 22 years. It is necessary to provide a selective measure by singling out vulnerable regions in advance to cope with the heat wave-related damage. This study aims to analyze and categorize vulnerable regions of thermal environments in the Seoul and analyzes and discusses the factors and risk factors for each type. To do this, this study conducted the following processes: first, based on the analyzed various literature reviews, indices that can evaluate vulnerable regions of thermal environment are collated. The indices were divided into climate exposure index related to temperature, sensitivity index including demographic, social, and economic indices, and adaptation index related to urban environment and climate adaptation policy status. Second, significant variables were derived to evaluate a vulnerable region of thermal environment based on the summarized indices in the above. this study analyzed a relationship between the number of heat-related patients in Seoul and variables that affected the number using multi-variate statistical analysis to derive significant variables. Third, the importance of each variable was calculated quantitatively by integrating the statistical analysis results and analytic hierarchy process (AHP) method. Fourth, a distribution of data for each index was identified based on the selected variables and indices were normalized and overlapped. Fifth, For the climate exposure index, evaluations were conducted as same as the current vulnerability evaluation method by selecting future temperature of Seoul predicted through the representative concentration pathways (RCPs) climate change scenarios as an evaluation variable. The results of this study can be utilized as foundational data to establish a countermeasure against heatwave in Seoul. Although it is limited to control heatwave occurrences itself completely, improvements
Urban foresters routinely emphasise the importance of taxonomic diversity to reduce the vulnerability of tree assemblages to invasive pests, but it is unclear to what extent diversity reduces vulnerability to polyphagous (i.e. generalist) pests. Drawing on field data from seven c...
Gardezi, Maaz; Arbuckle, J Gordon
2017-11-29
Potential climate-change-related impacts to agriculture in the upper Midwest pose serious economic and ecological risks to the U.S. and the global economy. On a local level, farmers are at the forefront of responding to the impacts of climate change. Hence, it is important to understand how farmers and their farm operations may be more or less vulnerable to changes in the climate. A vulnerability index is a tool commonly used by researchers and practitioners to represent the geographical distribution of vulnerability in response to global change. Most vulnerability assessments measure objective adaptive capacity using secondary data collected by governmental agencies. However, other scholarship on human behavior has noted that sociocultural and cognitive factors, such as risk perceptions and perceived capacity, are consequential for modulating people's actual vulnerability. Thus, traditional assessments can potentially overlook people's subjective perceptions of changes in climate and extreme weather events and the extent to which people feel prepared to take necessary steps to cope with and respond to the negative effects of climate change. This article addresses this knowledge gap by: (1) incorporating perceived adaptive capacity into a vulnerability assessment; (2) using spatial smoothing to aggregate individual-level vulnerabilities to the county level; and (3) evaluating the relationships among different dimensions of adaptive capacity to examine whether perceived capacity should be integrated into vulnerability assessments. The result suggests that vulnerability assessments that rely only on objective measures might miss important sociocognitive dimensions of capacity. Vulnerability indices and maps presented in this article can inform engagement strategies for improving environmental sustainability in the region. © 2017 Society for Risk Analysis.
Node vulnerability of water distribution networks under cascading failures
International Nuclear Information System (INIS)
Shuang, Qing; Zhang, Mingyuan; Yuan, Yongbo
2014-01-01
Water distribution networks (WDNs) are important in modern lifeline system. Its stability and reliability are critical for guaranteeing high living quality and continuous operation of urban functions. The aim of this paper is to evaluate the nodal vulnerability of WDNs under cascading failures. Vulnerability is defined to analyze the effects of the consequent failures. A cascading failure is a step-by-step process which is quantitatively investigated by numerical simulation with intentional attack. Monitored pressures in different nodes and flows in different pipes have been used to estimate the network topological structure and the consequences of nodal failure. Based on the connectivity loss of topological structure, the nodal vulnerability has been evaluated. A load variation function is established to record the nodal failure reason and describe the relative differences between the load and the capacity. The proposed method is validated by an illustrative example. The results revealed that the network vulnerability should be evaluated with the consideration of hydraulic analysis and network topology. In the case study, 70.59% of the node failures trigger the cascading failures with different failure processes. It is shown that the cascading failures result in severe consequences in WDNs. - Highlights: • The aim of this paper is to evaluate the nodal vulnerability of water distribution networks under cascading failures. • Monitored pressures and flows have been used to estimate the network topological structure and the consequences of nodal failure. • Based on the connectivity loss of topological structure, the nodal vulnerability has been evaluated. • A load variation function is established to record the failure reason and describe the relative differences between load and capacity. • The results show that 70.59% of the node failures trigger the cascading failures with different failure processes
VT - Vermont Social Vulnerability Index
Vermont Center for Geographic Information — Social vulnerability refers to the resilience of communities when responding to or recovering from threats to public health. The Vermont Social Vulnerability Index...
Animal models to study plaque vulnerability
Schapira, K.; Heeneman, S.; Daemen, M. J. A. P.
2007-01-01
The need to identify and characterize vulnerable atherosclerotic lesions in humans has lead to the development of various animal models of plaque vulnerability. In this review, current concepts of the vulnerable plaque as it leads to an acute coronary event are described, such as plaque rupture,
A Preliminary Tsunami vulnerability analysis for Bakirkoy district in Istanbul
Tufekci, Duygu; Lutfi Suzen, M.; Cevdet Yalciner, Ahmet; Zaytsev, Andrey
2016-04-01
Resilience of coastal utilities after earthquakes and tsunamis has major importance for efficient and proper rescue and recovery operations soon after the disasters. Vulnerability assessment of coastal areas under extreme events has major importance for preparedness and development of mitigation strategies. The Sea of Marmara has experienced numerous earthquakes as well as associated tsunamis. There are variety of coastal facilities such as ports, small craft harbors, and terminals for maritime transportation, water front roads and business centers mainly at North Coast of Marmara Sea in megacity Istanbul. A detailed vulnerability analysis for Yenikapi region and a detailed resilience analysis for Haydarpasa port in Istanbul have been studied in previously by Cankaya et al., (2015) and Aytore et al., (2015) in SATREPS project. In this study, the methodology of vulnerability analysis under tsunami attack given in Cankaya et al., (2015) is modified and applied to Bakirkoy district of Istanbul. Bakirkoy district is located at western part of Istanbul and faces to the North Coast of Marmara Sea from 28.77oE to 28.89oE. High resolution spatial dataset of Istanbul Metropolitan Municipality (IMM) is used and analyzed. The bathymetry and topography database and the spatial dataset containing all buildings/structures/infrastructures in the district are collated and utilized for tsunami numerical modeling and following vulnerability analysis. The tsunami parameters from deterministically defined worst case scenarios are computed from the simulations using tsunami numerical model NAMI DANCE. The vulnerability assessment parameters in the district according to vulnerability and resilience are defined; and scored by implementation of a GIS based TVA with appropriate MCDA methods. The risk level is computed using tsunami intensity (level of flow depth from simulations) and TVA results at every location in Bakirkoy district. The preliminary results are presented and discussed
Optical measurement of stem xylem vulnerability
Brodribb, Timothy J.; Carriqui, Marc; Delzon, Sylvain; Lucani, Christopher
2017-01-01
The vulnerability of plant water transport tissues to a loss of function by cavitation during water stress is a key indicator of the survival capabilities of plant species during drought. Quantifying this important metric has been greatly advanced by noninvasive techniques that allow embolisms to be viewed directly in the vascular system. Here, we present a new method for evaluating the spatial and temporal propagation of embolizing bubbles in the stem xylem during imposed water stress. We de...
The importance of clinical case reports in research
Directory of Open Access Journals (Sweden)
Ricardo Pineda-Leguízamo
2018-04-01
Full Text Available Clinical case reports correspond to articles that have the lowest level of evidence within different research trials. However, not only are they common and significant in the medical field, but they have often been the basis the generation of research. The purpose of their publication can be scientific or educational. In general terms, the discovery of new diseases, the presentation of rare diseases, unusual forms of common diseases, the complications of a common treatment, or the effect (beneficial or adverse of a treatment, among other things, are narrated in these documents. Clinical case reports continue to be one of the most important sources of knowledge. The advent of a standardized guideline for the creation of this type of reports allows homogenizing the form and content of the cases intended to be described in the near future and, furthermore, will enable authors to have a reference when preparing this type of publications. Case reports are valuable resources of new and unusual information that can encourage and serve to conduct future research studies with a higher level of evidence.
Understanding animal fears: a comparison of the cognitive vulnerability and harm-looming models
Directory of Open Access Journals (Sweden)
Armfield Jason M
2007-12-01
Full Text Available Abstract Background The Cognitive Vulnerability Model holds that both clinical and sub-clinical manifestations of animal fears are a result of how an animal is perceived, and can be used to explain both individual differences in fear acquisition and the uneven distribution of fears in the population. This study looked at the association between fear of a number of animals and perceptions of the animals as uncontrollable, unpredictable, dangerous and disgusting. Also assessed were the perceived loomingness, prior familiarity, and negative evaluation of the animals as well as possible conditioning experiences. Methods 162 first-year University students rated their fear and perceptions of four high-fear and four low-fear animals. Results Perceptions of the animals as dangerous, disgusting and uncontrollable were significantly associated with fear of both high- and low-fear animals while perceptions of unpredictability were significantly associated with fear of high-fear animals. Conditioning experiences were unrelated to fear of any animals. In multiple regression analyses, loomingness did not account for a significant amount of the variance in fear beyond that accounted for by the cognitive vulnerability variables. However, the vulnerability variables accounted for between 20% and 51% of the variance in all animals fears beyond that accounted for by perceptions of the animals as looming. Perceptions of dangerousness, uncontrollability and unpredictability were highly predictive of the uneven distribution of animal fears. Conclusion This study provides support for the Cognitive Vulnerability Model of the etiology of specific fears and phobias and brings into question the utility of the harm-looming model in explaining animal fear.
Questioning Complacency: Climate Change Impacts, Vulnerability, and Adaptation in Norway
International Nuclear Information System (INIS)
O'Brien, Karen; Eriksen, Siri; Sygna, Linda; Naess, Lars Otto
2006-01-01
Most European assessments of climate change impacts have been carried out on sectors and ecosystems, providing a narrow understanding of what climate change really means for society. Furthermore, the main focus has been on technological adaptations, with less attention paid to the process of climate change adaptation. In this article, we present and analyze findings from recent studies on climate change impacts, vulnerability, and adaptation in Norway, with the aim of identifying the wider social impacts of climate change. Three main lessons can be drawn. First, the potential thresholds and indirect effects may be more important than the direct, sectoral effects. Second, highly sensitive sectors, regions, and communities combine with differential social vulnerability to create both winners and losers. Third, high national levels of adaptive capacity mask the barriers and constraints to adaptation, particularly among those who are most vulnerable to climate change. Based on these results, we question complacency in Norway and other European countries regarding climate change impacts and adaptation. We argue that greater attention needs to be placed on the social context of climate change impacts and on the processes shaping vulnerability and adaptation
Application of Fuzzy Cognitive Mapping in Livelihood Vulnerability Analysis
Murungweni, C.; Wijk, van M.T.; Andersson, J.A.; Smaling, E.M.A.; Giller, K.E.
2011-01-01
Feedback mechanisms are important in the analysis of vulnerability and resilience of social-ecological systems, as well as in the analysis of livelihoods, but how to evaluate systems with direct feedbacks has been a great challenge. We applied fuzzy cognitive mapping, a tool that allows analysis of
Perceived vulnerability to aids among rural Black South African ...
African Journals Online (AJOL)
Almost a third (30%) worried about getting AIDS and even more (40%) thought they will get AIDS. There were important age- and gender-related differences regarding vulnerability and fears about AIDS, which have relevant implications for AIDS education addressing developmentally appropriate concerns. Journal of Child ...
Vulnerability of complex networks under intentional attack with incomplete information
International Nuclear Information System (INIS)
Wu, J; Deng, H Z; Tan, Y J; Zhu, D Z
2007-01-01
We study the vulnerability of complex networks under intentional attack with incomplete information, which means that one can only preferentially attack the most important nodes among a local region of a network. The known random failure and the intentional attack are two extreme cases of our study. Using the generating function method, we derive the exact value of the critical removal fraction f c of nodes for the disintegration of networks and the size of the giant component. To validate our model and method, we perform simulations of intentional attack with incomplete information in scale-free networks. We show that the attack information has an important effect on the vulnerability of scale-free networks. We also demonstrate that hiding a fraction of the nodes information is a cost-efficient strategy for enhancing the robustness of complex networks
Reversible left ventricular dysfunction - important clinical problem of contemporary cardiology
International Nuclear Information System (INIS)
Witkowski, A.
1994-01-01
An important clinical issue there is determination whether left ventricular damages are reversible or not single photon emission computed tomography and positron computed tomography techniques are shown to provide valuable data in this problem. Article describes basic syndromes connected with left ventricular dysfunction, namely: hibernating myocardium, stunned myocardium and ischemic myocardium preconditioning. (author). 18 refs
ICMPv6 RA Flooding Vulnerability Research
Directory of Open Access Journals (Sweden)
Linas Jočys
2016-06-01
Full Text Available ICMPv6 is the newest version of internet control message protocol, whose main purpose is to send error message indicating packet processing failure. It is know that ICMPv6 is technologically vulnerable. One of those vulnerabilities is the ICMPv6 RA flooding vulnerability, which can lead to systems in Local Area Network slow down or full stop. This paper will discuss Windows (XP, 7, 8.1 and Linux Ubuntu 14 operating systems resistance to RA flooding attack research and countermeasures to minimize this vulnerability.
Assessing vulnerability of urban African communities
DEFF Research Database (Denmark)
Karlsson Nyed, Patrik; Jean-Baptiste, Nathalie; Herslund, Lise Byskov
2014-01-01
East African cities are in the process of assessing their vulnerabilities to climate change, but face difficulties in capturing the complexity of the various facets of vulnerability. This holistic approach, captures four different dimensions of vulnerability to flooding - Assets, Institutions......, Attitudes and the Physical environment, with Dar es Salaam, Tanzania, as a case city. The methodology is actively involving the expertise of the stakeholders, and uses GIS to analyze and compile the data. The final output is presented as a comprehensible map, delineating the varying vulnerability...
A review of vulnerability and risks for schizophrenia: Beyond the two hit hypothesis.
Davis, Justin; Eyre, Harris; Jacka, Felice N; Dodd, Seetal; Dean, Olivia; McEwen, Sarah; Debnath, Monojit; McGrath, John; Maes, Michael; Amminger, Paul; McGorry, Patrick D; Pantelis, Christos; Berk, Michael
2016-06-01
Schizophrenia risk has often been conceptualized using a model which requires two hits in order to generate the clinical phenotype-the first as an early priming in a genetically predisposed individual and the second a likely environmental insult. The aim of this paper was to review the literature and reformulate this binary risk-vulnerability model. We sourced the data for this narrative review from the electronic database PUBMED. Our search terms were not limited by language or date of publication. The development of schizophrenia may be driven by genetic vulnerability interacting with multiple vulnerability factors including lowered prenatal vitamin D exposure, viral infections, smoking intelligence quotient, social cognition cannabis use, social defeat, nutrition and childhood trauma. It is likely that these genetic risks, environmental risks and vulnerability factors are cumulative and interactive with each other and with critical periods of neurodevelopmental vulnerability. The development of schizophrenia is likely to be more complex and nuanced than the binary two hit model originally proposed nearly thirty years ago. Risk appears influenced by a more complex process involving genetic risk interfacing with multiple potentially interacting hits and vulnerability factors occurring at key periods of neurodevelopmental activity, which culminate in the expression of disease state. These risks are common across a number of neuropsychiatric and medical disorders, which might inform common preventive and intervention strategies across non-communicable disorders. Copyright © 2016 Elsevier Ltd. All rights reserved.
Vulnerability assessment of storm surges in the coastal area of Guangdong Province
Directory of Open Access Journals (Sweden)
K. Li
2011-07-01
Full Text Available Being bordered by the South China Sea and with long coastline, the coastal zone of Guangdong Province is often under severe risk of storm surges, as one of a few regions in China which is seriously threatened by storm surges. This article systematically analyzes the vulnerability factors of storm surges in the coastal area of Guangdong (from Yangjing to Shanwei. Five vulnerability assessment indicators of hazard-bearing bodies are proposed, which are social economic index, land use index, eco-environmental index, coastal construction index, and disaster-bearing capability index. Then storm surge vulnerability assessment index system in the coastal area of Guangdong is established. Additionally, the international general mode about coastal vulnerability assessment is improved, and the vulnerability evolution model of storm surges in the coastal area of Guangdong is constructed. Using ArcGIS, the vulnerability zoning map of storm surges in the study region is drawn. Results show that there is the highest degree of storm surge vulnerability in Zhuhai, Panyu, and Taishan; second in Zhongshan, Dongguan, Huiyang, and Haifeng; third in Jiangmen, Shanwei, Yangjiang, and Yangdong; fourth in Baoan, Kaiping, and Enping; and lowest in Guangzhou, Shunde, Shenzhen, and Longgang. This study on the risk of storm surges in these coastal cities can guide the land use of coastal cities in the future, and provide scientific advice for the government to prevent and mitigate the storm surge disasters. It has important theoretical and practical significance.
Evaluation of Social Vulnerability to Natural Disasters on a County Scale in Henan Province
Institute of Scientific and Technical Information of China (English)
Shanfeng HE; Liping DU; Xiuhua GAO
2016-01-01
Social vulnerability evaluation is of important significance to analyzing risks of natural disasters to human society and economy. By using expert investigation and AHP method,12 indicators from four aspects( population,economy,infrastructure and disaster prevention and mitigation capacity) are selected to assess social vulnerability to natural disasters on a county scale in Henan Province. The results show that the population vulnerability and economic vulnerability to natural disasters in the eastern region is generally higher than in the western region,while the areas with high infrastructure vulnerability are mainly located in the northwest; the disaster prevention and mitigation capacity in northwest is higher than in east and south,and this capacity of various districts is obviously higher than that of counties; in terms of the spatial pattern,social vulnerability to natural disasters is roughly higher in a belt from northeast to southwest,and lower on both sides of the belt. The results can provide scientific basis for disaster risk management and disaster prevention and mitigation planning in Henan Province.
2012-12-21
... Registration; Fisher Clinical Services,Inc. By Notice dated September 20, 2012, and published in the Federal Register on October 2, 2012, 77 FR 60143, Fisher Clinical Services, Inc., 7554 Schantz Road, Allentown... that the registration of Fisher Clinical Services, Inc., to import the basic class of controlled...
2013-04-23
... Registration; Fisher Clinical Services, Inc. By Notice dated November 27, 2012, and published in the Federal Register on December 5, 2012, 77 FR 72409, Fisher Clinical Services, Inc., 7554 Schantz Road, Allentown... the registration of Fisher Clinical Services, Inc., to import the basic class of controlled substance...
2013-01-25
... Registration; Fisher Clinical Services, Inc. By Notice dated November 1, 2012, and published in the Federal Register on November 9, 2012, 77 FR 67396, Fisher Clinical Services, Inc., 7554 Schantz Road, Allentown... the registration of Fisher Clinical Services, Inc., to import the basic class of controlled substance...
Coastal vulnerability: climate change and natural hazards perspectives
Romieu, E.; Vinchon, C.
2009-04-01
. This concept is a great tool for policy makers to help managing their action and taking into account climate change (McFadden, et al. 2006). However, in those approaches, vulnerability is the output itself (cost of effective impacts, geomorphologic impacts…), but is not integrated it in a risk analysis. Furthermore, those studies emerged from a climatic perspective, which leads to consider climate change as a hazard or pressure whereas risk studies commonly consider hazards such as erosion and flooding, where climate change modifies the drivers of the hazard. 2) The natural hazards and socio economic perspectives In order to reduce impacts of natural hazards, decision makers need a complete risk assessment (probability of losses). Past studies on natural risks (landslide, earthquake...) highlighted the pertinence of defining risk as a combination of : (1)hazard occurrence and intensity, (2) exposition and (3)vulnerability of assets and population to this hazard (e.g. Douglas. 2007, Sarewitz, et al. 2003). Following the Renn and Klinke risk assessment frame, high uncertainties associated with coastal risks considering climatic and anthropic change highlights the importance of working on that concept of "vulnerability" (Klinke and Renn. 2002). Past studies on vulnerability assessment showed a frequently mentioned gap between "impact based" and "human based" points of view. It is nowadays a great issue for natural risk sciences. Many research efforts in FP7 projects such as MOVE and ENSURE focus on integrating the different dimensions of vulnerability (Turner, et al. 2003, Birkmann. 2006). Coastal risk studies highlight another issue of concern. We previously detailed the different use of the term "vulnerability" in the coastal context, quite different of the "natural risk's" use. Interaction of social, economic and physical sciences is considered within two french research projects (Vulsaco, Miseeva), in order to identify the vulnerability of a system to flooding or
Groundwater vulnerability mapping of Qatar aquifers
Baalousha, Husam Musa
2016-12-01
Qatar is one of the most arid countries in the world with limited water resources. With little rainfall and no surface water, groundwater is the only natural source of fresh water in the country. Whilst the country relies mainly on desalination of seawater to secure water supply, groundwater has extensively been used for irrigation over the last three decades, which caused adverse environmental impact. Vulnerability assessment is a widely used tool for groundwater protection and land-use management. Aquifers in Qatar are carbonate with lots of fractures, depressions and cavities. Karst aquifers are generally more vulnerable to contamination than other aquifers as any anthropogenic-sourced contaminant, especially above a highly fractured zone, can infiltrate quickly into the aquifer and spread over a wide area. The vulnerability assessment method presented in this study is based on two approaches: DRASTIC and EPIK, within the framework of Geographical Information System (GIS). Results of this study show that DRASTIC vulnerability method suits Qatar hydrogeological settings more than EPIK. The produced vulnerability map using DRASTIC shows coastal and karst areas have the highest vulnerability class. The southern part of the country is located in the low vulnerability class due to occurrence of shale formation within aquifer media, which averts downward movement of contaminants.
Not the usual suspects: addressing layers of vulnerability.
Luna, Florencia; Vanderpoel, Sheryl
2013-07-01
This paper challenges the traditional account of vulnerability in healthcare which conceptualizes vulnerability as a list of identifiable subpopulations. This list of 'usual suspects', focusing on groups from lower resource settings, is a narrow account of vulnerability. In this article we argue that in certain circumstances middle-class individuals can be also rendered vulnerable. We propose a relational and layered account of vulnerability and explore this concept using the case study of cord blood (CB) banking. In the first section, two different approaches to 'vulnerability' are contrasted: categorical versus layered. In the second section, we describe CB banking and present a case study of CB banking in Argentina. We examine the types of pressure that middle-class pregnant women feel when considering CB collection and storage. In section three, we use the CB banking case study to critique the categorical approach to vulnerability: this model is unable to account for the ways in which these women are vulnerable. A layered account of vulnerability identifies several ways in which middle-class women are vulnerable. Finally, by utilizing the layered approach, this paper suggests how public health policies could be designed to overcome vulnerabilities. © 2013 John Wiley & Sons Ltd.
Evaluating social and ecological vulnerability of coral reef fisheries to climate change.
Directory of Open Access Journals (Sweden)
Joshua E Cinner
Full Text Available There is an increasing need to evaluate the links between the social and ecological dimensions of human vulnerability to climate change. We use an empirical case study of 12 coastal communities and associated coral reefs in Kenya to assess and compare five key ecological and social components of the vulnerability of coastal social-ecological systems to temperature induced coral mortality [specifically: 1 environmental exposure; 2 ecological sensitivity; 3 ecological recovery potential; 4 social sensitivity; and 5 social adaptive capacity]. We examined whether ecological components of vulnerability varied between government operated no-take marine reserves, community-based reserves, and openly fished areas. Overall, fished sites were marginally more vulnerable than community-based and government marine reserves. Social sensitivity was indicated by the occupational composition of each community, including the importance of fishing relative to other occupations, as well as the susceptibility of different fishing gears to the effects of coral bleaching on target fish species. Key components of social adaptive capacity varied considerably between the communities. Together, these results show that different communities have relative strengths and weaknesses in terms of social-ecological vulnerability to climate change.
The Cannabis Pathway to Non-Affective Psychosis may Reflect Less Neurobiological Vulnerability
Løberg, Else-Marie; Helle, Siri; Nygård, Merethe; Berle, Jan Øystein; Kroken, Rune A.; Johnsen, Erik
2014-01-01
There is a high prevalence of cannabis use reported in non-affective psychosis. Early prospective longitudinal studies conclude that cannabis use is a risk factor for psychosis, and neurochemical studies on cannabis have suggested potential mechanisms for this effect. Recent advances in the field of neuroscience and genetics may have important implications for our understanding of this relationship. Importantly, we need to better understand the vulnerability × cannabis interaction to shed light on the mediators of cannabis as a risk factor for psychosis. Thus, the present study reviews recent literature on several variables relevant for understanding the relationship between cannabis and psychosis, including age of onset, cognition, brain functioning, family history, genetics, and neurological soft signs (NSS) in non-affective psychosis. Compared with non-using non-affective psychosis, the present review shows that there seem to be fewer stable cognitive deficits in patients with cannabis use and psychosis, in addition to fewer NSS and possibly more normalized brain functioning, indicating less neurobiological vulnerability for psychosis. There are, however, some familiar and genetic vulnerabilities present in the cannabis psychosis group, which may influence the cannabis pathway to psychosis by increasing sensitivity to cannabis. Furthermore, an earlier age of onset suggests a different pathway to psychosis in the cannabis-using patients. Two alternative vulnerability models are presented to integrate these seemingly paradoxical findings PMID:25477825
The cannabis pathway to non-affective psychosis may reflect less neurobiological vulnerability
Directory of Open Access Journals (Sweden)
Else-Marie eLøberg
2014-11-01
Full Text Available There is a high prevalence of cannabis use reported in non-affective psychosis. Early prospective longitudinal studies conclude that cannabis use is a risk factor for psychosis, and neurochemical studies on cannabis have suggested potential mechanisms for this effect. Recent advances in the field of neuroscience and genetics may have important implications for our understanding of this relationship. Importantly, we need to better understand the vulnerability x cannabis interaction to shed light on the mediators of cannabis as a risk factor for psychosis. Thus, the present study reviews recent literature on several variables relevant for understanding the relationship between cannabis and psychosis, including age of onset, cognition, brain functioning, family history, genetics and neurological soft signs (NSS in non-affective psychosis. Compared with non-using non-affective psychosis, the present review shows that there seem to be fewer stable cognitive deficits in patients with cannabis use and psychosis, in addition to fewer NSS and possibly more normalized brain functioning, indicating less neurobiological vulnerability for psychosis. There are, however, some familiar and genetic vulnerabilities present in the cannabis psychosis group which may influence the cannabis pathway to psychosis by increasing sensitivity to cannabis. Furthermore, an earlier age of onset suggests a different pathway to psychosis in the cannabis-using patients. Two alternative vulnerability models are presented to integrate these seemingly paradoxical findings.
Thompson, Kirrilly; Every, Danielle; Rainbird, Sophia; Cornell, Victoria; Smith, Bradley; Trigg, Joshua
2014-01-01
Simple Summary The potential for reconfiguring pet ownership from a risk factor to a protective factor for natural disaster survival has been recently proposed. But how might this resilience-building proposition apply to members of the community who are already considered vulnerable? This article addresses this important question by synthesizing information about what makes seven particular groups vulnerable, the challenges to increasing their resilience and how animals figure in their lives. It concludes that animal attachment could provide a novel conduit for accessing, communicating with and motivating vulnerable people to engage in resilience building behaviors that promote survival and facilitate recovery. Abstract Increased vulnerability to natural disasters has been associated with particular groups in the community. This includes those who are considered de facto vulnerable (children, older people, those with disabilities etc.) and those who own pets (not to mention pets themselves). The potential for reconfiguring pet ownership from a risk factor to a protective factor for natural disaster survival has been recently proposed. But how might this resilience-building proposition apply to vulnerable members of the community who own pets or other animals? This article addresses this important question by synthesizing information about what makes particular groups vulnerable, the challenges to increasing their resilience and how animals figure in their lives. Despite different vulnerabilities, animals were found to be important to the disaster resilience of seven vulnerable groups in Australia. Animal attachment and animal-related activities and networks are identified as underexplored devices for disseminating or ‘piggybacking’ disaster-related information and engaging vulnerable people in resilience building behaviors (in addition to including animals in disaster planning initiatives in general). Animals may provide the kind of innovative approach required
Clinical skill center: a review of present situation and importance in medical education curriculum
Directory of Open Access Journals (Sweden)
Haleh Talaei
2002-07-01
Full Text Available Clinical skill centers were designed in 1960, offers innovative, more effective clinical health care and treatment curriculum. Clinical skill center (CSC can provide a special facility for clinical and communication skills practice in a setting outside hospital wards in order to train students with enough confidence of confronting real patients. Learning clinical skills in these centers are not patient-dependent and by practicing on manikins and simulated models errors in real patients can be prevented. Moreover, possible feedback of this method can be used for evaluation and can improve quality and quantity of the education. This review intends to determine the purpose, undertaking, and structure of CSC. The study emphasizes the importance of integrating the clinical skill centers into the teaching curriculum of medical universities. Apparently, organizing clinical skill centers can play an important role for improving the quality and quantity of the educational system and consequently post-graduate performance. The authors recommend this program can be a solution for having both the knowledge and skill of diagnosis and treatment seasonal and rare diseases. Key words clinical skill center, medical education, curriculum
The attitudes of medical students in Europe toward the clinical importance of histology.
Moxham, Bernard John; Emmanouil-Nikoloussi, Elpida; Brenner, Erich; Plaisant, Odile; Brichova, Hana; Kucera, Tomas; Pais, Diogo; Stabile, Isobel; Borg, Jordy; Scholz, Michael; Paulsen, Friedrich; Luis Bueno-López, José; Alfonso Arraez Aybar, Luis; De Caro, Raffaele; Arsic, Stojanka; Lignier, Baptiste; Chirculescu, Andy
2017-07-01
Many studies have been undertaken to assess the attitudes of medical students to the clinical importance of gross anatomy. However, much less is known about their attitudes toward the clinical importance of histology. Using Thurstone and Chave methods to assess attitudes, over 2,000 early stage medical students across Europe provided responses to a survey that tested the hypothesis that the students have a high regard for histology's clinical relevance. Regardless of the university and country surveyed, and of the teaching methods employed for histology, our findings were not consistent with our hypotheses, students providing a more moderate assessment of histology's importance compared to gross anatomy but more positive than their attitudes toward embryology. Histology should play a significant role in medical education in terms of appreciating not just normal structure and function but also pathology. We conclude that teachers of histology should pay special attention to informing newly-recruited medical students of the significant role played by histology in attaining clinical competence and in underpinning their status as being learned members of a healthcare profession. This work was conducted under the auspices of the Trans-European Pedagogic Research Group (TEPARG). Clin. Anat. 30:635-643, 2017. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.
2013-07-31
... Register on April 19, 2013, 78 FR 23594, Almac Clinical Services, Inc., (ACSI), 25 Fretz Road, Souderton... registration of Almac Clinical Services, Inc., (ACSI) to import the basic classes of controlled substances is..., conventions, or protocols in effect on May 1, 1971. DEA has investigated Almac Clinical Services, Inc., (ACSI...
Intravascular photoacoustic imaging: a new tool for vulnerable plaque identification.
Jansen, Krista; van Soest, Gijs; van der Steen, Antonius F W
2014-06-01
The vulnerable atherosclerotic plaque is believed to be at the root of the majority of acute coronary events. Even though the exact origins of plaque vulnerability remain elusive, the thin-cap fibroatheroma, characterized by a lipid-rich necrotic core covered by a thin fibrous cap, is considered to be the most prominent type of vulnerable plaque. No clinically available imaging technique can characterize atherosclerotic lesions to the extent needed to determine plaque vulnerability prognostically. Intravascular photoacoustic imaging (IVPA) has the potential to take a significant step in that direction by imaging both plaque structure and composition. IVPA is a natural extension of intravascular ultrasound that adds tissue type specificity to the images. IVPA utilizes the optical contrast provided by the differences in the absorption spectra of plaque components to image composition. Its capability to image lipids in human coronary atherosclerosis has been shown extensively ex vivo and has recently been translated to an in vivo animal model. Other disease markers that have been successfully targeted are calcium and inflammatory markers, such as macrophages and matrix metalloproteinase; the latter two through application of exogenous contrast agents. By simultaneously displaying plaque morphology and composition, IVPA can provide a powerful prognostic marker for disease progression, and as such has the potential to transform the current practice in percutaneous coronary intervention. Copyright © 2014 World Federation for Ultrasound in Medicine & Biology. Published by Elsevier Inc. All rights reserved.
Is a clean river fun for all? Recognizing social vulnerability in watershed planning.
Cutts, Bethany B; Greenlee, Andrew J; Prochaska, Natalie K; Chantrill, Carolina V; Contractor, Annie B; Wilhoit, Juliana M; Abts, Nancy; Hornik, Kaitlyn
2018-01-01
Watershed planning can lead to policy innovation and action toward environmental protection. However, groups often suffer from low engagement with communities that experience disparate impacts from flooding and water pollution. This can limit the capacity of watershed efforts to dismantle pernicious forms of social inequality. As a result, the benefits of environmental changes often flow to more empowered residents, short-changing the power of watershed-based planning as a tool to transform ecological, economic, and social relationships. The objectives of this paper are to assess whether the worldview of watershed planning actors are sufficiently attuned to local patterns of social vulnerability and whether locally significant patterns of social vulnerability can be adequately differentiated using conventional data sources. Drawing from 35 in-depth interviews with watershed planners and community stakeholders in the Milwaukee River Basin (WI, USA), we identify five unique definitions of social vulnerability. Watershed planners in our sample articulate a narrower range of social vulnerability definitions than other participants. All five definitions emphasize spatial and demographic characteristics consistent with existing ways of measuring social vulnerability. However, existing measures do not adequately differentiate among the spatio-temporal dynamics used to distinguish definitions. In response, we develop two new social vulnerability measures. The combination of interviews and demographic analyses in this study provides an assessment technique that can help watershed planners (a) understand the limits of their own conceptualization of social vulnerability and (b) acknowledge the importance of place-based vulnerabilities that may otherwise be obscured. We conclude by discussing how our methods can be a useful tool for identifying opportunities to disrupt social vulnerability in a watershed by evaluating how issue frames, outreach messages, and engagement tactics
Is a clean river fun for all? Recognizing social vulnerability in watershed planning
Greenlee, Andrew J.; Prochaska, Natalie K.; Chantrill, Carolina V.; Contractor, Annie B.; Wilhoit, Juliana M.; Abts, Nancy; Hornik, Kaitlyn
2018-01-01
Watershed planning can lead to policy innovation and action toward environmental protection. However, groups often suffer from low engagement with communities that experience disparate impacts from flooding and water pollution. This can limit the capacity of watershed efforts to dismantle pernicious forms of social inequality. As a result, the benefits of environmental changes often flow to more empowered residents, short-changing the power of watershed-based planning as a tool to transform ecological, economic, and social relationships. The objectives of this paper are to assess whether the worldview of watershed planning actors are sufficiently attuned to local patterns of social vulnerability and whether locally significant patterns of social vulnerability can be adequately differentiated using conventional data sources. Drawing from 35 in-depth interviews with watershed planners and community stakeholders in the Milwaukee River Basin (WI, USA), we identify five unique definitions of social vulnerability. Watershed planners in our sample articulate a narrower range of social vulnerability definitions than other participants. All five definitions emphasize spatial and demographic characteristics consistent with existing ways of measuring social vulnerability. However, existing measures do not adequately differentiate among the spatio-temporal dynamics used to distinguish definitions. In response, we develop two new social vulnerability measures. The combination of interviews and demographic analyses in this study provides an assessment technique that can help watershed planners (a) understand the limits of their own conceptualization of social vulnerability and (b) acknowledge the importance of place-based vulnerabilities that may otherwise be obscured. We conclude by discussing how our methods can be a useful tool for identifying opportunities to disrupt social vulnerability in a watershed by evaluating how issue frames, outreach messages, and engagement tactics
Extending Vulnerability Assessment to Include Life Stages Considerations.
Hodgson, Emma E; Essington, Timothy E; Kaplan, Isaac C
2016-01-01
Species are experiencing a suite of novel stressors from anthropogenic activities that have impacts at multiple scales. Vulnerability assessment is one tool to evaluate the likely impacts that these stressors pose to species so that high-vulnerability cases can be identified and prioritized for monitoring, protection, or mitigation. Commonly used semi-quantitative methods lack a framework to explicitly account for differences in exposure to stressors and organism responses across life stages. Here we propose a modification to commonly used spatial vulnerability assessment methods that includes such an approach, using ocean acidification in the California Current as an illustrative case study. Life stage considerations were included by assessing vulnerability of each life stage to ocean acidification and were used to estimate population vulnerability in two ways. We set population vulnerability equal to: (1) the maximum stage vulnerability and (2) a weighted mean across all stages, with weights calculated using Lefkovitch matrix models. Vulnerability was found to vary across life stages for the six species explored in this case study: two krill-Euphausia pacifica and Thysanoessa spinifera, pteropod-Limacina helicina, pink shrimp-Pandalus jordani, Dungeness crab-Metacarcinus magister and Pacific hake-Merluccius productus. The maximum vulnerability estimates ranged from larval to subadult and adult stages with no consistent stage having maximum vulnerability across species. Similarly, integrated vulnerability metrics varied greatly across species. A comparison showed that some species had vulnerabilities that were similar between the two metrics, while other species' vulnerabilities varied substantially between the two metrics. These differences primarily resulted from cases where the most vulnerable stage had a low relative weight. We compare these methods and explore circumstances where each method may be appropriate.
Clinically important drug interactions with zopiclone, zolpidem and zaleplon.
Hesse, Leah M; von Moltke, Lisa L; Greenblatt, David J
2003-01-01
Insomnia, an inability to initiate or maintain sleep, affects approximately one-third of the American population. Conventional benzodiazepines, such as triazolam and midazolam, were the treatment of choice for short-term insomnia for many years but are associated with adverse effects such as rebound insomnia, withdrawal and dependency. The newer hypnosedatives include zolpidem, zaleplon and zopiclone. These agents may be preferred over conventional benzodiazepines to treat short-term insomnia because they may be less likely to cause significant rebound insomnia or tolerance and are as efficacious as the conventional benzodiazepines. This review aims to summarise the published clinical drug interaction studies involving zolpidem, zaleplon and zopiclone. The pharmacokinetic and pharmacodynamic interactions that may be clinically important are highlighted. Clinical trials have studied potential interactions of zaleplon, zolpidem and zopiclone with the following types of drugs: cytochrome P450 (CYP) inducers (rifampicin), CYP inhibitors (azoles, ritonavir and erythromycin), histamine H(2) receptor antagonists (cimetidine and ranitidine), antidepressants, antipsychotics, antagonists of benzodiazepines and drugs causing sedation. Rifampicin significantly induced the metabolism of the newer hypnosedatives and decreased their sedative effects, indicating that a dose increase of these agents may be necessary when they are administered with rifampicin. Ketoconazole, erythromycin and cimetidine inhibited the metabolism of the newer hypnosedatives and enhanced their sedative effects, suggesting that a dose reduction may be required. Addition of ethanol to treatment with the newer hypnosedatives resulted in additive sedative effects without altering the pharmacokinetic parameters of the drugs. Compared with some of the conventional benzodiazepines, fewer clinically important interactions appear to have been reported in the literature with zaleplon, zolpidem and zopiclone. The
Vulnerability analysis for a drought Early Warning System
Angeluccetti, Irene; Demarchi, Alessandro; Perez, Francesca
2014-05-01
Early Warning Systems (EWS) for drought are often based on risk models that do not, or marginally, take into account the vulnerability factor. The multifaceted nature of drought (hydrological, meteorological, and agricultural) is source of coexistence for different ways to measure this phenomenon and its effects. The latter, together with the complexity of impacts generated by this hazard, causes the current underdevelopment of drought EWS compared to other hazards. In Least Developed Countries, where drought events causes the highest numbers of affected people, the importance of correct monitoring and forecasting is considered essential. Existing early warning and monitoring systems for drought produced at different geographic levels, provide only in a few cases an actual spatial model that tries to describe the cause-effect link between where the hazard is detected and where impacts occur. Integrate vulnerability information in such systems would permit to better estimate affected zones and livelihoods, improving the effectiveness of produced hazard-related datasets and maps. In fact, the need of simplification and, in general, of a direct applicability of scientific outputs is still a matter of concern for field experts and early warning products end-users. Even if the surplus of hazard related information produced right after catastrophic events has, in some cases, led to the creation of specific data-sharing platforms, the conveyed meaning and usefulness of each product has not yet been addressed. The present work is an attempt to fill this gap which is still an open issue for the scientific community as well as for the humanitarian aid world. The study aims at conceiving a simplified vulnerability model to embed into an existing EWS for drought, which is based on the monitoring of vegetation phenological parameters and the Standardized Precipitation Index, both produced using free satellite derived datasets. The proposed vulnerability model includes (i) a
Ranebennur, Virupax; Gaikwad, Sanjeevsingh; Ramesh, Sowmya; Bhende, Amrita
2014-01-01
Background It is important for targeted interventions to consider vulnerabilities of female sex workers (FSWs) such as poverty, work-related mobility, and literacy, for effective human immunodeficiency virus (HIV) prevention. This paper describes and examines the association of the Aastha HIV/sexually transmitted infection (STI) prevention project in Mumbai and Thane, India, on the relationship between vulnerability and behavioral outcomes. Materials and methods Data were drawn from the Behavioural Tracking Survey, a cross-sectional behavioral study conducted in 2010 with 2,431 FSWs recruited in Mumbai and Thane. The key independent measures used were program exposure and “vulnerability index”, a composite index of literacy, factors of dependence (alternative livelihood options, current debt, and children), and aspects of sex work (mobility and duration in sex work). Dependent measures included service uptake, self-confidence, self-identity, and individual agency. Logistic regression analysis was used to examine the study objectives. Results Of the analytical sample of 2,431 FSWs, 1,295 (53.3%) were categorized as highly vulnerable. Highly vulnerable FSWs who were associated with the Aastha program for more than a year were more likely to have accessed crisis-response services in the past 6 months (adjusted odds ratio [AOR] 2.2, 95% confidence interval [CI] 1.4–3.6; P<0.001), to have visited a clinic to get a checkup for STI symptoms (AOR 2.4, 95% CI 1.2–4.8; P<0.015), not to be ashamed to disclose identity as an FSW to health workers (AOR 2.1, 95% CI 1.2–3.5; P<0.008), and to be confident in supporting a fellow FSW in crisis (AOR 1.7, 95% CI 1.0–2.8, P<0.033) compared to those less vulnerable with similar exposure to the Aastha program. Conclusion It is critical for HIV/STI interventions to consider vulnerabilities of FSWs at project inception and address them with focused strategies, including a segmented service-delivery model and community
Directory of Open Access Journals (Sweden)
Jacqueline L Holloway
2012-11-01
Full Text Available In classical conditioning, proactive interference may arise from experience with the conditioned stimulus (CS, the unconditional stimulus (US, or both, prior to their paired presentations. Interest in the application of proactive interference has extended to clinical populations as either a risk factor for disorders or as a secondary sign. Although the current literature is dense with comparisons of stimulus pre-exposure effects in animals, such comparisons are lacking in human subjects. As such, interpretation of proactive interference over studies as well as its generalization and utility in clinical research is limited. The present study was designed to assess eyeblink response acquisition after equal numbers of CS, US, and explicitly unpaired CS and US pre-exposures, as well as to evaluate how anxiety vulnerability might modulate proactive interference. In the current study, anxiety vulnerability was assessed using the State/Trait Anxiety Inventories as well as the adult and retrospective measures of behavioural inhibition (AMBI and RMBI, respectively. Participants were exposed to 1 of 4 possible pre-exposure contingencies: 30 CS, 30 US, 30 CS and 30 US explicitly unpaired pre-exposures, or context pre-exposure, immediately prior to standard delay training. Robust proactive interference was evident in all pre-exposure groups relative to context pre-exposure, independent of anxiety classification, with CR acquisition attenuated at similar rates. In addition, trait anxious individuals were found to have enhanced overall acquisition as well as greater proactive interference relative to non-vulnerable individuals. The findings suggest that anxiety vulnerable individuals learn implicit associations faster, an effect which persists after the introduction of new stimulus contingencies. This effect is not due to enhanced sensitivity to the US. Such differences would have implications for the development of anxiety psychopathology within a learning
Holloway, Jacqueline L; Trivedi, Payal; Myers, Catherine E; Servatius, Richard J
2012-01-01
In classical conditioning, proactive interference may arise from experience with the conditioned stimulus (CS), the unconditional stimulus (US), or both, prior to their paired presentations. Interest in the application of proactive interference has extended to clinical populations as either a risk factor for disorders or as a secondary sign. Although the current literature is dense with comparisons of stimulus pre-exposure effects in animals, such comparisons are lacking in human subjects. As such, interpretation of proactive interference over studies as well as its generalization and utility in clinical research is limited. The present study was designed to assess eyeblink response acquisition after equal numbers of CS, US, and explicitly unpaired CS and US pre-exposures, as well as to evaluate how anxiety vulnerability might modulate proactive interference. In the current study, anxiety vulnerability was assessed using the State/Trait Anxiety Inventories as well as the adult and retrospective measures of behavioral inhibition (AMBI and RMBI, respectively). Participants were exposed to 1 of 4 possible pre-exposure contingencies: 30 CS, 30 US, 30 CS, and 30 US explicitly unpaired pre-exposures, or Context pre-exposure, immediately prior to standard delay training. Robust proactive interference was evident in all pre-exposure groups relative to Context pre-exposure, independent of anxiety classification, with CR acquisition attenuated at similar rates. In addition, trait anxious individuals were found to have enhanced overall acquisition as well as greater proactive interference relative to non-vulnerable individuals. The findings suggest that anxiety vulnerable individuals learn implicit associations faster, an effect which persists after the introduction of new stimulus contingencies. This effect is not due to enhanced sensitivity to the US. Such differences would have implications for the development of anxiety psychopathology within a learning framework.
Social vulnerability assessment: a growing practice in Europe?
Tapsell, S.; McC arthy, S.
2012-04-01
This paper builds upon work on social vulnerability from the CapHaz-Net consortium, an ongoing research project funded by the European Commission in its 7th Framework Programme. The project focuses on the social dimensions of natural hazards, as well as on regional practices of risk prevention and management, and aims at improving the resilience of European societies to natural hazards, paying particular attention to social capacity building. The topic of social vulnerability is one of seven themes being addressed in the project. There are various rationales for examining the relevance of social vulnerability to natural hazards. Vulnerability assessment has now been accepted as a requirement for the effective development of emergency management capability, and assessment of social vulnerability has been recognised as being integral to understanding the risk to natural hazards. The aim of our research was to examine social vulnerability, how it might be understood in the context of natural hazards in Europe, and how social vulnerability can be addressed to increase social capacity. The work comprised a review of research on social vulnerability to different natural hazards within Europe and included concepts and definitions of social vulnerability (and related concepts), the purpose of vulnerability assessment and who decides who is vulnerable, different approaches to assessing or measuring social vulnerability (such as the use of 'classical' quantitative vulnerability indicators and qualitative community-based approaches, along with the advantages and disadvantages of both), conceptual frameworks for assessing social vulnerability and three case studies of social vulnerability studies within Europe: flash floods in the Italian Alps, fluvial flooding in Germany and heat waves in Spain. The review reveals variable application of social vulnerability analysis across Europe and there are indications why this might be the case. Reasons could range from the scale of
The concept of 'vulnerability' in research ethics: an in-depth analysis of policies and guidelines.
Bracken-Roche, Dearbhail; Bell, Emily; Macdonald, Mary Ellen; Racine, Eric
2017-02-07
The concept of vulnerability has held a central place in research ethics guidance since its introduction in the United States Belmont Report in 1979. It signals mindfulness for researchers and research ethics boards to the possibility that some participants may be at higher risk of harm or wrong. Despite its important intended purpose and widespread use, there is considerable disagreement in the scholarly literature about the meaning and delineation of vulnerability, stemming from a perceived lack of guidance within research ethics standards. The aim of this study was to assess the concept of vulnerability as it is employed in major national and international research ethics policies and guidelines. We conducted an in-depth analysis of 11 (five national and six international) research ethics policies and guidelines, exploring their discussions of the definition, application, normative justification and implications of vulnerability. Few policies and guidelines explicitly defined vulnerability, instead relying on implicit assumptions and the delineation of vulnerable groups and sources of vulnerability. On the whole, we found considerable richness in the content on vulnerability across policies, but note that this relies heavily on the structure imposed on the data through our analysis. Our results underscore a need for policymakers to revisit the guidance on vulnerability in research ethics, and we propose that a process of stakeholder engagement would well-support this effort.
Elahi, G.; Yu, E.; Zannone, N.
2010-01-01
Many security breaches occur because of exploitation of vulnerabilities within the system. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a methodological framework for security requirements
Schmidt, Mathias V; Trümbach, Dietrich; Weber, Peter; Wagner, Klaus; Scharf, Sebastian H; Liebl, Claudia; Datson, Nicole; Namendorf, Christian; Gerlach, Tamara; Kühne, Claudia; Uhr, Manfred; Deussing, Jan M; Wurst, Wolfgang; Binder, Elisabeth B; Holsboer, Florian; Müller, Marianne B
2010-12-15
Increased vulnerability to aversive experiences is one of the main risk factors for stress-related psychiatric disorders as major depression. However, the molecular bases of vulnerability, on the one hand, and stress resilience, on the other hand, are still not understood. Increasing clinical and preclinical evidence suggests a central involvement of the glutamatergic system in the pathogenesis of major depression. Using a mouse paradigm, modeling increased stress vulnerability and depression-like symptoms in a genetically diverse outbred strain, and we tested the hypothesis that differences in AMPA receptor function may be linked to individual variations in stress vulnerability. Vulnerable and resilient animals differed significantly in their dorsal hippocampal AMPA receptor expression and AMPA receptor binding. Treatment with an AMPA receptor potentiator during the stress exposure prevented the lasting effects of chronic social stress exposure on physiological, neuroendocrine, and behavioral parameters. In addition, spatial short-term memory, an AMPA receptor-dependent behavior, was found to be predictive of individual stress vulnerability and response to AMPA potentiator treatment. Finally, we provide evidence that genetic variations in the AMPA receptor subunit GluR1 are linked to the vulnerable phenotype. Therefore, we propose genetic variations in the AMPA receptor system to shape individual stress vulnerability. Those individual differences can be predicted by the assessment of short-term memory, thereby opening up the possibility for a specific treatment by enhancing AMPA receptor function.
Mazumdar, Jublee; Paul, Saikat
2015-04-01
Losses of life and property due to natural hazards have intensified in the past decade, motivating an alteration of disaster management away from simple post event resettlement and rehabilitation. The degree of exposure to hazard for a homogeneous population is not entirely reliant upon nearness to the source of hazard event. Socio-economic factors and infrastructural capability play an important role in determining the vulnerability of a place. This study investigates the vulnerability of eastern coastal states of India from tropical cyclones. The record of past hundred years shows that the physical vulnerability of eastern coastal states is four times as compared to the western coastal states in terms of frequency and intensity of tropical cyclones. Nevertheless, these physical factors played an imperative role in determining the vulnerability of eastern coast. However, the socio-economic and infrastructural factors influence the risk of exposure exponentially. Inclusion of these indicators would provide better insight regarding the preparedness and resilience of settlements to hazard events. In this regard, the present study is an effort to develop an Integrated Vulnerability Model (IVM) based on socio-economic and infrastructural factors for the districts of eastern coastal states of India. A method is proposed for quantifying the socio-economic and infrastructural vulnerability to tropical cyclone in these districts. The variables included in the study are extracted from Census of India, 2011 at district level administrative unit. In the analysis, a large number of variables are reduced to a smaller number of factors by using principal component analysis that represents the socio-economic and infrastructure vulnerability to tropical cyclone. Subsequently, the factor scores in socio-economic Vulnerability Index (SeVI) and Infrastructure Vulnerability Index (InVI) are standardized from 0 to 1, indicating the range from low to high vulnerability. The factor
Vulnerability to stress, anxiety and depressive symptoms and metabolic control in Type 2 diabetes
Directory of Open Access Journals (Sweden)
Gois Carlos
2012-06-01
Full Text Available Abstract Background Vulnerability to stress has been associated to distress, emotional distress symptoms and metabolic control in type 2 diabetes mellitus (T2DM patients as well. Furthermore some conflicting results were noticed. We aimed to evaluate the effect over metabolic control in what concerns vulnerability to stress beyond depressive and anxiety symptoms. Findings This cross-sectional study assessed 273 T2DM patients with depressive and anxiety symptoms using the Hospital Anxiety Depression Scale (HADS and the 23 Questions to assess Vulnerability to Stress (23QVS, along with demographic and clinical diabetes-related variables. Hierarchical logistic regression models were used to investigate predictors of poor glycemic control. The results showed an association of depressive symptoms (odds ratio = 1.12, 95%CI = 1.01-1.24, P = 0.030 with increased risk of poor glycemic control. Anxiety symptoms and vulnerability to stress on their own were not predictive of metabolic control, respectively (odds ratio = 0.92, 95%CI = 0.84-1.00, P = 0.187 and odds ratio = 0.98, 95%CI = 0.95-1.01, P = 0.282. Conclusions Our data suggested that vulnerability to stress was not predictive of poor glycemic control in T2DM, but depressive symptoms were.
Mobile Phones and Psychosocial Therapies with Vulnerable People: a First State of the Art.
Vázquez, Maria Yolanda García; Sexto, Carlos Ferrás; Rocha, Álvaro; Aguilera, Adrián
2016-06-01
Mobile phones are becoming a communication tool commonly used by people all over the world; and they are started to be adopted in psychosocial therapies involving vulnerable people. We are herein presenting the results of an academic literature review. We identified scientific papers published between 2006 and 2015 resorting to academic databases available on the Internet, applying a systematic selection method based on quality criteria. Secondly, we analysed contents, highlighting the scarcity of research involving vulnerable people. The available literature specialized in psychosocial therapies offers investigation results which involve mobile phones and patients in general, focusing particularly on the clinical psychology field and, to a lesser extent, on the social work field. Particularly significant are the investigation works developed in the United States. In the present paper we introduce a first "state of the art", identifying opportunities and also the limitations surrounding the use of mobile phones in psychosocial therapies targeting the vulnerable. Issues concerning privacy and data confidentiality, and the access of vulnerable people to mobile phones and how they use them, pose significant challenges; but they offer the opportunity to reach isolated or impoverished populations, or even to facilitate access to social and healthcare services. We close this paper formulating possible orientations, hypotheses and goals to design new investigation works involving vulnerable populations.
Directory of Open Access Journals (Sweden)
Kirrilly Thompson
2014-05-01
Full Text Available Increased vulnerability to natural disasters has been associated with particular groups in the community. This includes those who are considered de facto vulnerable (children, older people, those with disabilities etc. and those who own pets (not to mention pets themselves. The potential for reconfiguring pet ownership from a risk factor to a protective factor for natural disaster survival has been recently proposed. But how might this resilience-building proposition apply to vulnerable members of the community who own pets or other animals? This article addresses this important question by synthesizing information about what makes particular groups vulnerable, the challenges to increasing their resilience and how animals figure in their lives. Despite different vulnerabilities, animals were found to be important to the disaster resilience of seven vulnerable groups in Australia. Animal attachment and animal-related activities and networks are identified as underexplored devices for disseminating or ‘piggybacking’ disaster-related information and engaging vulnerable people in resilience building behaviors (in addition to including animals in disaster planning initiatives in general. Animals may provide the kind of innovative approach required to overcome the challenges in accessing and engaging vulnerable groups. As the survival of humans and animals are so often intertwined, the benefits of increasing the resilience of vulnerable communities through animal attachment is twofold: human and animal lives can be saved together.
Thompson, Kirrilly; Every, Danielle; Rainbird, Sophia; Cornell, Victoria; Smith, Bradley; Trigg, Joshua
2014-05-07
Increased vulnerability to natural disasters has been associated with particular groups in the community. This includes those who are considered de facto vulnerable (children, older people, those with disabilities etc.) and those who own pets (not to mention pets themselves). The potential for reconfiguring pet ownership from a risk factor to a protective factor for natural disaster survival has been recently proposed. But how might this resilience-building proposition apply to vulnerable members of the community who own pets or other animals? This article addresses this important question by synthesizing information about what makes particular groups vulnerable, the challenges to increasing their resilience and how animals figure in their lives. Despite different vulnerabilities, animals were found to be important to the disaster resilience of seven vulnerable groups in Australia. Animal attachment and animal-related activities and networks are identified as underexplored devices for disseminating or 'piggybacking' disaster-related information and engaging vulnerable people in resilience building behaviors (in addition to including animals in disaster planning initiatives in general). Animals may provide the kind of innovative approach required to overcome the challenges in accessing and engaging vulnerable groups. As the survival of humans and animals are so often intertwined, the benefits of increasing the resilience of vulnerable communities through animal attachment is twofold: human and animal lives can be saved together.
Vulnerability to drought-induced cavitation in poplars: synthesis and future opportunities.
Fichot, Régis; Brignolas, Franck; Cochard, Hervé; Ceulemans, Reinhart
2015-07-01
Vulnerability to drought-induced cavitation is a key trait of plant water relations. Here, we summarize the available literature on vulnerability to drought-induced cavitation in poplars (Populus spp.), a genus of agronomic, ecological and scientific importance. Vulnerability curves and vulnerability parameters (including the water potential inducing 50% loss in hydraulic conductivity, P50) were collected from 37 studies published between 1991 and 2014, covering a range of 10 species and 12 interspecific hybrid crosses. Results of our meta-analysis confirm that poplars are among the most vulnerable woody species to drought-induced cavitation (mean P50 = -1.44 and -1.55 MPa across pure species and hybrids, respectively). Yet, significant variation occurs among species (P50 range: 1.43 MPa) and among hybrid crosses (P50 range: 1.12 MPa), within species and hybrid crosses (max. P50 range reported: 0.8 MPa) as well as in response to environmental factors including nitrogen fertilization, irradiance, temperature and drought (max. P50 range reported: 0.75 MPa). Potential implications and gaps in knowledge are discussed in the context of poplar cultivation, species adaptation and climate modifications. We suggest that poplars represent a valuable model for studies on drought-induced cavitation, especially to elucidate the genetic and molecular basis of cavitation resistance in Angiosperms. © 2014 John Wiley & Sons Ltd.
Willroth, P.; Massmann, F.; Wehrhahn, R.; Revilla Diez, J.
2012-08-01
The tsunami of December 2004 impacted large areas of Thailand's coastline and caused severe human and economic losses. The recovery period revealed differences in the vulnerabilities of communities affected. An understanding of the causal factors of vulnerability is crucial for minimising the negative effects of future threats and developing adaptive capacities. This paper analyses the vulnerabilities and the development of adaptation strategies in the booming tourist area of Khao Lak and in the predominantly fishing and agricultural area of Ban Nam Khem through a comprehensive vulnerability framework. The results show that social networks played a crucial role in coping with the disaster. Social cohesion is important for strengthening the community and developing successful adaptation strategies. The development of tourism and the turning away from traditional activities have a significant positive influence on the income situation, but create a dependency on a single business sector. It could be shown that households generating their income in the tourism sector were vulnerable unless they had diversified their income previously. Income diversification decreased the vulnerability in the study areas. Adaptation strategies and processes developed in the aftermath clearly address these issues.
A measure of vulnerability and damage tolerance
International Nuclear Information System (INIS)
Lind, Niels C.
1995-01-01
The purpose of the paper is to present probabilistic definitions of 'vulnerability' and 'damage tolerance'. A new measure of damage is also proposed. Disastrous failures, such as of the Titanic or the Chernobyl reactor, have revealed that some systems can be highly vulnerable. A seemingly insignificant damage can reduce such a system's resistance severely. Attempts to write design code requirements for damage tolerance or structural integrity have not been successful so far. One reason is that these ideas have not been defined with the necessary precision. The suggested definitions aim to be general, applicable to all engineered systems, and readily specializable to particular system types. Vulnerability is defined as the ratio of the failure probability of the damaged system to the failure probability of the undamaged system. It is argued that 'vulnerability' and 'damage tolerance' are complementary concepts. Damage tolerance is defined as the reciprocal of vulnerability. Vulnerability and damage tolerance both concern hypothetical future damage. A damage factor, applicable for the analysis of an existing structure in an assessed state of damage, is defined analogous to vulnerability. Application is illustrated by examples
The importance of Clinical Research
Directory of Open Access Journals (Sweden)
Frank Lizaraso Caparó
2016-01-01
Full Text Available Objetives: to describe the clinical and epidemiological characteristics, evolution and to identify mortality factors associated in patients with snp.Material and methods: descriptive study of a serie of cases of the intensive care unit (icu of a general hospital. medical records of patients which received medical attention and who meet the selection criteria were reviewed. Results: forty-one clinical records were evaluated. the average age was 69 old, predominantly male (68,3%. snp was the reason of admission in 60.9% and 95.1% required mechanical ventilation. hospital stay prior to diagnosis was 10 days, 65% of patients had some risk factor for multi resistence organisms, cpis of entry was 9.3, cultures were positive in 39% of the cases and of these, 48.8% received proper antibiotic according to culture results. the days of stay in icu were 20.6 days and 20 of the 41 medical records were for death patients. the clinical and epidemiological characteristics were similar between death and alive patients. an analysis of factors that could be associated with mortality snp was made and it was found that for an age ≥ 70 years, the presence of any risk factor for multidrug resistence organism and control cpis ≥ 6 were associated with higher mortality; while acquisition of the icu was associated to lower mortality. Conclusions: the clinical, epidemiological characteristics and evolution of patients with snp in our icu were similar to those describe in the literature. three factors associated with mortality in the icu were identified.
Assessing the Security Vulnerabilities of Correctional Facilities
Energy Technology Data Exchange (ETDEWEB)
Morrison, G.S.; Spencer, D.S.
1998-10-27
The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.
Drug abuse: vulnerability and transition to addiction.
Le Moal, M
2009-05-01
Intrinsic vulnerability is central to the transition of recreational drug use to misuse. Several factors contribute to vulnerability, inherent or acquired, and they account for the huge individual differences observed concerning the propensity to enter in the addiction process. Some of the multifactional causes for a vulnerable phenotype will be examined: genetic factors, age and gender influences, various comorbidities and epidemiological observations. Stress-induced vulnerability will be particularly reviewed because it provides a good model for a pathophysiological research and for relating environmental events to biological consequences of drug vulnerability, namely through the striato-cortical dopamine system. Experimental studies are generally blind concerning these historical factors that contribute vulnerability and a critical evaluation of current animal models is needed. The transition of the last stage of the process, addiction, is conceptualized as a progression from homeostasis to allostasis and then, to pathology.
Vulnerability of social-ecological system to climate change in Mongolia
Kakinuma, K.; Yanagawa, A.; Sasaki, T.; Kanae, S.
2017-12-01
Coping with future climate changes are one of the most important issues in the world. IPCC (2014) suggested that vulnerability and exposure of social-ecological systems to extreme climatic events (hazard) determine the impact of climate changes. Although the schematic framework is widely accepted, there are high uncertainty of vulnerability of social and ecological systems and it makes difficult to examine it in empirical researches. Our objective is to assess the climate change impact on the social-ecological system in Mongolia. We review researches about trends of climate (Hazard), vegetation, pastoral mobility (Vulnerability) and livestock distribution (Exposure) across Mongolia Climate trends are critical for last several decades and thus hazard may be increasing in Mongolia. Temperature is increasing with high confidence in all regions. Precipitation are slightly decreasing with medium confidence across the country, especially in northern and central regions. Exposure would also be increasing especially in northern, central and western regions, because livestock population are concentrating these regions after 1990. Generally, less productive ecosystems (e.g. few plant productivity and less species richness) are vulnerable to extreme climatic events such as drought. In that sense, southern region may be more vulnerable to climate changes than other regions. However, if we focus on pastoral mobility forms for drought, we get contractive conclusions. Pastoralists in southern region keep mobility to variable and scarce vegetation while pastoralists in northern region less mobile because of stable and much vegetation. Exclusive managements in northern region is able to maximized the number of livestock only under stable precipitation regimes. But at the same time, it is difficult to escape from hazardous areas when it is drought. Thus, in term of rangeland management, northern region would be more vulnerable to increase of drought intensity. Although northern and
Eckerle, I; Briciu, V T; Ergönül, Ö; Lupşe, M; Papa, A; Radulescu, A; Tsiodras, S; Tsitou, C; Drosten, C; Nussenblatt, V R; Reusken, C B; Sigfrid, L A; Beeching, N J
2018-03-01
Arboviruses are an emerging group of viruses that are causing increasing health concerns globally, including in Europe. Clinical presentation usually consists of a nonspecific febrile illness that may be accompanied by rash, arthralgia and arthritis, with or without neurological or haemorrhagic syndromes. The range of differential diagnoses of other infectious and noninfectious aetiologies is broad, presenting a challenge for physicians. While knowledge of the geographical distribution of pathogens and the current epidemiological situation, incubation periods, exposure risk factors and vaccination history can help guide the diagnostic approach, the nonspecific and variable clinical presentation can delay final diagnosis. This narrative review aims to summarize the main clinical and laboratory-based findings of the three most common imported arboviruses in Europe. Evidence is extracted from published literature and clinical expertise of European arbovirus experts. We present three cases that highlight similarities and differences between some of the most common travel-related arboviruses imported to Europe. These include a patient with chikungunya virus infection presenting in Greece, a case of dengue fever in Turkey and a travel-related case of Zika virus infection in Romania. Early diagnosis of travel-imported cases is important to reduce the risk of localized outbreaks of tropical arboviruses such as dengue and chikungunya and the risk of local transmission from body fluids or vertical transmission. Given the global relevance of arboviruses and the continuous risk of (re)emerging arbovirus events, clinicians should be aware of the clinical syndromes of arbovirus fevers and the potential pitfalls in diagnosis. Copyright © 2018. Published by Elsevier Ltd.
International Nuclear Information System (INIS)
Hong, Liu; Yan, Yongze; Ouyang, Min; Tian, Hui; He, Xiaozheng
2017-01-01
The vulnerability studies on urban public transportation systems have attracted growing attentions in recent years, due to their important role in the economy development of a city and the well-beings of its citizens. This paper proposes a vulnerability model of complementary urban public transportation systems (CUPTSs) composed of bus systems and subway systems, with the consideration of passengers’ intermodal transfer distance preference (PITDP) to capture different levels of complementary strength between the two systems. Based on the model, this paper further introduces a CUPTSs-aimed vulnerability analysis method from two specific aspects: (a) vulnerability effects of different PITDP values, which facilitate the design of policies to change PITDP to reduce system vulnerability; (b) vulnerability effects of different subway expansion plans, which facilitate the vulnerability investigation of current expansion plan and the identification of the optimal expansion plan from the system vulnerability perspective. The proposed CUPTSs-aimed vulnerability analysis method is applied to investigate the complementary bus and subway systems in the city of Wuhan, China. The insights from this study are helpful to analyze other CUPTSs for valuable planning suggestions from the vulnerability perspective. - Highlights: • We model complementary urban public transportation systems’ (CUPTSs) vulnerability. • We use a PITDP metric to capture different levels of complementary relationship. • We study vulnerability under different PITDP and different subway expansion plans. • We analyze dynamic vulnerability of CUPTSs during their expansion process.
The Vulnerability of Rice Value Chains in Sub-Saharan Africa: A Review
Directory of Open Access Journals (Sweden)
Fanen Terdoo
2016-09-01
Full Text Available Rice is one of the most important food crops in sub-Saharan Africa. Climate change, variability, and economic globalization threatens to disrupt rice value chains across the subcontinent, undermining their important role in economic development, food security, and poverty reduction. This paper maps existing research on the vulnerability of rice value chains, synthesizes the evidence and the risks posed by climate change and economic globalization, and discusses agriculture and rural development policies and their relevance for the vulnerability of rice value chains in sub-Saharan Africa. Important avenues for future research are identified. These include the impacts of multiple, simultaneous pressures on rice value chains, the effects of climate change and variability on parts of the value chain other than production, and the forms and extent to which different development policies hinder or enhance the resilience of rice value chains in the face of climatic and other pressures.
Dependence and Vulnerability in the moral philosophy of Alasdair MacIntyre
Directory of Open Access Journals (Sweden)
Javier de la Torre Díaz
2017-10-01
Full Text Available We are all dependent persons and from this limitation and human condition we can find some deep insights to better understand vulnerability as a principle of bioethics. This article introduces the concept of dependence as outlined by the Scottish philosopher, settled in the United States since 1971, Alasdair MacIntyre in his work Dependent Rational Animals. From this work, we want to rehabilitate the importance of dependency in the life of every living being and we want to propose some basic ideas so as to gain a better understanding of the principle of vulnerability.
National and Local Vulnerability to Climate-Related Disasters in Latin America
DEFF Research Database (Denmark)
Rubin, Olivier; Rossing, Tine
2012-01-01
are main determinants of natural disaster mortality in Latin America. Locally, the region's poor are particularly susceptible to climate-related natural hazards. As a result of their limited access to capital, adaptation based on social assets constitutes an effective coping strategy. Evidence from Bolivia......The Latin American region is particularly prone to climate-related natural hazards. However, this article argues that natural hazards are only partly to blame for the region's vulnerability to natural disasters with quantitative evidence suggesting instead that income per capita and inequality...... and Belize illustrates the importance of social assets in protecting the most vulnerable against natural disasters....
Ferguson, Christopher J; Olson, Cheryl K
2014-01-01
The issue of children's exposure to violent video games has been a source of considerable debate for several decades. Questions persist whether children with pre-existing mental health problems may be influenced adversely by exposure to violent games, even if other children are not. We explored this issue with 377 children (62 % female, mixed ethnicity, mean age = 12.93) displaying clinically elevated attention deficit or depressive symptoms on the Pediatric Symptom Checklist. Results from our study found no evidence for increased bullying or delinquent behaviors among youth with clinically elevated mental health symptoms who also played violent video games. Our results did not support the hypothesis that children with elevated mental health symptoms constitute a "vulnerable" population for video game violence effects. Implications and suggestions for further research are provided.
Modelling social vulnerability in sub-Saharan West Africa using a geographical information system
Directory of Open Access Journals (Sweden)
Olanrewaju Lawal
2015-05-01
Full Text Available In recent times, disasters and risk management have gained significant attention, especially with increasing awareness of the risks and increasing impact of natural and other hazards especially in the developing world. Vulnerability, the potential for loss of life or property from disaster, has biophysical or social dimensions. Social vulnerability relates to societal attributes which has negative impacts on disaster outcomes. This study sought to develop a spatially explicit index of social vulnerability, thus addressing the dearth of research in this area in sub-Saharan Africa. Nineteen variables were identified covering various aspects. Descriptive analysis of these variables revealed high heterogeneity across the South West region of Nigeria for both the state and the local government areas (LGAs. Feature identification using correlation analysis identified six important variables. Factor analysis identified two dimensions, namely accessibility and socioeconomic conditions, from this subset. A social vulnerability index (SoVI showed that Ondo and Ekiti have more vulnerable LGAs than other states in the region. About 50% of the LGAs in Osun and Ogun have a relatively low social vulnerability. Distribution of the SoVI shows that there are great differences within states as well as across regions. Scores of population density, disability and poverty have a high margin of error in relation to mean state scores. The study showed that with a geographical information system there are opportunities to model social vulnerability and monitor its evolution and dynamics across the continent.
Safeguard Vulnerability Analysis Program (SVAP)
International Nuclear Information System (INIS)
Gilman, F.M.; Dittmore, M.H.; Orvis, W.J.; Wahler, P.S.
1980-01-01
This report gives an overview of the Safeguard Vulnerability Analysis Program (SVAP) developed at Lawrence Livermore National Laboratory. SVAP was designed as an automated method of analyzing the safeguard systems at nuclear facilities for vulnerabilities relating to the theft or diversion of nuclear materials. SVAP addresses one class of safeguard threat: theft or diversion of nuclear materials by nonviolent insiders, acting individually or in collusion. SVAP is a user-oriented tool which uses an interactive input medium for preprocessing the large amounts of safeguards data. Its output includes concise summary data as well as detailed vulnerability information
Vulnerability of multiple-barrier systems
International Nuclear Information System (INIS)
Lind, N.C.
1996-01-01
'Vulnerability' is defined as the ratio of the probability of failure of a damaged system to the probability of failure of the undamaged system. This definition applies to all engineered systems and can be specialized to particular system types. Some disastrous failures (e.g., Chernobyl) have shown that systems can be highly vulnerable. open-quotes Defense in depthclose quotes is a powerful design principle, reducing vulnerability when the consequences of failure can be catastrophic. In the nuclear industry, defense in depth is widely used in radiation protection, reactor control, and shutdown systems. A multiple-barrier system is a simple example of a system that has defense in depth. The idea is that the system is not vulnerable. It cannot fail if one barrier fails because there is another to take its place. This idea is untenable in waste management, but a quantified vulnerability of a system can help owners, designers, and regulators decide how much defense in depth is desirable or enough. Many multiple-barrier systems can be modeled as systems of components physically in a series, each individually able to prevent failure. Components typically have bimodal distributions of the service time to failure, as illustrated by an example of application to a hypothetical nuclear fuel waste repository
Full Text Available ... as gene therapy) or vulnerable patients (such as children). A DSMB's role is to review data from a clinical trial for safety problems or differences in results among different groups. The DSMB also reviews research results ...
The assessment of vulnerability to natural disasters in China by using the DEA method
International Nuclear Information System (INIS)
Wei Yiming; Fan Ying; Lu Cong; Tsai, H.-T.
2004-01-01
China has been greatly affected by natural disasters, so that it is of great importance to analyze the impact of natural disasters on national economy. Usually, the frequency of disasters or absolute loss inflicted by disasters is the first priority to be considered, while the capability of regions to overcome disasters is ignored. The concept of vulnerability is used to measure the capability to overcome disasters in different regions with distinctive economies. Traditional methods for vulnerability analysis calculate sub-indices based on disaster frequency, loss, the economic impact and the population of each region, and then add the sub-indices to get a composite index for regional vulnerability. But those methods are sensitive to the weights selected for sub-indices when multi-indexes are added up to get an index of total vulnerability. The analytic results are less convincing because of the subjectivity of different weighting methods. A data envelopment analysis (DEA)-based model for analysis of regional vulnerability to natural disasters is presented here to improve upon the traditional method. This paper systematically describes the DEA method to evaluate the relative severity of disasters in each region. A model for regional vulnerability analysis is developed, based on the annual governmental statistics from 1989 to 2000. The regional vulnerabilities in China's mainland are illustrated as a case study, and a new method for the classification of regional vulnerability to natural disasters in China is proposed
Climate Vulnerability and Human Migration in Global Perspective
Grecequet, Martina; DeWaard, Jack; Hellmann, Jessica J.; Abel, Guy J.
2018-01-01
The relationship between climate change and human migration is not homogenous and depends critically on the differential vulnerability of population and places. If places and populations are not vulnerable, or susceptible, to climate change, then the climate–migration relationship may not materialize. The key to understanding and, from a policy perspective, planning for whether and how climate change will impact future migration patterns is therefore knowledge of the link between climate vulnerability and migration. However, beyond specific case studies, little is known about this association in global perspective. We therefore provide a descriptive, country-level portrait of this relationship. We show that the negative association between climate vulnerability and international migration holds only for countries least vulnerable to climate change, which suggests the potential for trapped populations in more vulnerable countries. However, when analyzed separately by life supporting sector (food, water, health, ecosystem services, human habitat, and infrastructure) and vulnerability dimension (exposure, sensitivity, and adaptive capacity), we detect evidence of a relationship among more, but not the most, vulnerable countries. The bilateral (i.e., country-to-country) migration show that, on average, people move from countries of higher vulnerability to lower vulnerability, reducing global risk by 15%. This finding is consistent with the idea that migration is a climate adaptation strategy. Still, ~6% of bilateral migration is maladaptive with respect to climate change, with some movement toward countries with greater climate change vulnerability. PMID:29707262
Climate Vulnerability and Human Migration in Global Perspective.
Grecequet, Martina; DeWaard, Jack; Hellmann, Jessica J; Abel, Guy J
2017-05-01
The relationship between climate change and human migration is not homogenous and depends critically on the differential vulnerability of population and places. If places and populations are not vulnerable, or susceptible, to climate change, then the climate-migration relationship may not materialize. The key to understanding and, from a policy perspective, planning for whether and how climate change will impact future migration patterns is therefore knowledge of the link between climate vulnerability and migration. However, beyond specific case studies, little is known about this association in global perspective. We therefore provide a descriptive, country-level portrait of this relationship. We show that the negative association between climate vulnerability and international migration holds only for countries least vulnerable to climate change, which suggests the potential for trapped populations in more vulnerable countries. However, when analyzed separately by life supporting sector (food, water, health, ecosystem services, human habitat, and infrastructure) and vulnerability dimension (exposure, sensitivity, and adaptive capacity), we detect evidence of a relationship among more, but not the most, vulnerable countries. The bilateral (i.e., country-to-country) migration show that, on average, people move from countries of higher vulnerability to lower vulnerability, reducing global risk by 15%. This finding is consistent with the idea that migration is a climate adaptation strategy. Still, ~6% of bilateral migration is maladaptive with respect to climate change, with some movement toward countries with greater climate change vulnerability.
Methods to Secure Databases Against Vulnerabilities
2015-12-01
for several languages such as C, C++, PHP, Java and Python [16]. MySQL will work well with very large databases. The documentation references...using Eclipse and connected to each database management system using Python and Java drivers provided by MySQL , MongoDB, and Datastax (for Cassandra...tiers in Python and Java . Problem MySQL MongoDB Cassandra 1. Injection a. Tautologies Vulnerable Vulnerable Not Vulnerable b. Illegal query
Can friends protect genetically vulnerable children from depression?
Brendgen, Mara; Vitaro, Frank; Bukowski, William M; Dionne, Ginette; Tremblay, Richard E; Boivin, Michel
2013-05-01
The study examined whether reciprocal friendship quantity or quality can mitigate genetic vulnerability for depression symptoms in children. The sample comprised 168 monozygotic twin pairs and 126 same-sex dizygotic twin pairs assessed in Grade 4 (mean age = 10.04 years). Friendship participation was measured via reciprocal nominations of close friendships within the classroom. Friendship quality was measured through self-reports. Depression symptoms were measured through teacher and peer reports. Genetic vulnerability for depression symptoms was unrelated to friendship participation or the number of reciprocal friends, but it was negatively related to positive friendship quality. In line with gene-environment interaction, genetic risk effects on depression symptoms were mitigated in girls who had at least one close reciprocal friend. In boys, only moderate main effects of genetic vulnerability and friendship participation were found but no interaction between them. However, among boys with at least one reciprocal friend, a greater number of friends was related to fewer depression symptoms whereas no cumulative effect of friendship was found for girls. Finally, positive friendship quality was related to fewer depression symptoms in girls and boys even when controlling for genetic risk. The findings emphasize the importance of teaching social interactional skills that promote high-quality friendship relations to help prevent the development of depression symptoms in children.
Vulnerability of children: More than a question of age
International Nuclear Information System (INIS)
Hutton, D.
2010-01-01
The vulnerability of children in disasters is well-established. Children are at greater risk of the impacts of disasters because of both their age and level of physiological, anatomical, cognitive and emotional development. Frequently overlooked, however, is the influence of other social and health determinants. This article highlights the importance of family and household income in determining the ability of children to withstand the shocks of catastrophic events. Children raised in lower income families are made disadvantaged in multiple ways; by poor living and neighbourhood conditions, less stable home environments, as well as lower levels of education and health care. During disasters, lower income families and children suffer disproportionately, both because they are frequently the hardest hit but also because they have fewer resources with which to cope. The article emphasises not only the importance of understanding the vulnerability of children within a broader family context, but a continuing requirement for public health and emergency planners to integrate more fully the diverse needs of children and families into emergency preparedness policies and plans. (authors)
[Clinical analysis of two cases of imported children Zika virus infection in China].
Zheng, C G; Xu, Y; Jiang, H Q; Yin, Y X; Zhang, J H; Zhu, W J; Liang, X J; Chen, M X; Ye, J W; Tan, L M; Luo, D; Gong, S T
2016-05-01
To analyze the clinical characteristics, outcome and diagnosis of two cases of imported children Zika virus infection in China. A retrospective analysis was performed on clinical characteristics, treatment and outcome of two cases of imported children with Zika virus infection in February 2016 in Enping People's Hospital of Guangdong. Two cases of children with imported Zika virus infection resided in an affected area of Venezuela, 8-year-old girl and her 6 year-old brother. The main findings on physical examination included the following manifestations: fever, rash, and conjunctivitis. The rash was first limited to the abdomen, but extended to the torso, neck and face, and faded after 3-4 d. The total number of white blood cells was not high and liver function was normal. The diagnosis of two cases of Zika virus infection was confirmed by the expert group of Guangdong Provincial Center for Disease Control and Prevention, according to the epidemiological history, clinical manifestations and Zika virus nucleic acid detection results.Treatment of Zika virus infection involves supportive care. Two Zika virus infection children had a relatively benign outcome. At present, Zika virus infection in children is an imported disease in China. No specific therapy is available for this disease. Information on long-term outcomes among infants and children with Zika virus disease is limited, routine pediatric care is advised for these infants and children.
Vulnerability and risk of deltaic social-ecological systems exposed to multiple hazards.
Hagenlocher, Michael; Renaud, Fabrice G; Haas, Susanne; Sebesvari, Zita
2018-08-01
Coastal river deltas are hotspots of global change impacts. Sustainable delta futures are increasingly threatened due to rising hazard exposure combined with high vulnerabilities of deltaic social-ecological systems. While the need for integrated multi-hazard approaches has been clearly articulated, studies on vulnerability and risk in deltas either focus on local case studies or single hazards and do not apply a social-ecological systems perspective. As a result, vulnerabilities and risks in areas with strong social and ecological coupling, such as coastal deltas, are not fully understood and the identification of risk reduction and adaptation strategies are often based on incomplete assumptions. To overcome these limitations, we propose an innovative modular indicator library-based approach for the assessment of multi-hazard risk of social-ecological systems across and within coastal deltas globally, and apply it to the Amazon, Ganges-Brahmaputra-Meghna (GBM), and Mekong deltas. Results show that multi-hazard risk is highest in the GBM delta and lowest in the Amazon delta. The analysis reveals major differences between social and environmental vulnerability across the three deltas, notably in the Mekong and the GBM deltas where environmental vulnerability is significantly higher than social vulnerability. Hotspots and drivers of risk vary spatially, thus calling for spatially targeted risk reduction and adaptation strategies within the deltas. Ecosystems have been identified as both an important element at risk as well as an entry point for risk reduction and adaptation strategies. Copyright © 2018. Published by Elsevier B.V.
Analysis of Zero-Day Vulnerabilities in Java
Marius Popa
2013-01-01
The zero-day vulnerability is a security lack of the computer system that is unknown to software vendor. This kind of vulnerability permits building attack strategies for gaining the access to the resources and data of a computer system. The main issue of the topic is how a computer system can be protected by zero-day vulnerabilities using the actual security procedures and tools for identifying the potential attacks that exploit the vulnerabilities unknown to computer users and software prov...
International Nuclear Information System (INIS)
Kvaerner, Jens; Swensen, Grete; Erikstad, Lars
2006-01-01
In the traditional EIA procedure environmental vulnerability is only considered to a minor extent in the early stages when project alternatives are worked out. In Norway, an alternative approach to EIA, an integrated vulnerability model (IVM), emphasising environmental vulnerability and alternatives development in the early stages of EIA, has been tried out in a few pilot cases. This paper examines the content and use of the vulnerability concept in the IVM approach, and discusses the concept in an EIA context. The vulnerability concept is best suited to overview analyses and large scale spatial considerations. The concept is particularly useful in the early stages of EIA when alternatives are designed and screened. By introducing analyses of environmental vulnerability at the start of the EIA process, the environment can be a more decisive issue for the creation of project alternatives as well as improving the basis for scoping. Vulnerability and value aspects should be considered as separate dimensions. There is a need to operate with a specification between general and specific vulnerability. The concept of environmental vulnerability has proven useful in a wide range of disciplines. Different disciplines have different lengths of experience regarding vulnerability. In disciplines such as landscape planning and hydrogeology we find elements suitable as cornerstones in the further development of an interdisciplinary methodology. Further development of vulnerability criteria in different disciplines and increased public involvement in the early stages of EIA are recommended
Vulnerability mapping as a tool to manage the environmental impacts of oil and gas extraction.
Esterhuyse, Surina; Sokolic, Frank; Redelinghuys, Nola; Avenant, Marinda; Kijko, Andrzej; Glazewski, Jan; Plit, Lisa; Kemp, Marthie; Smit, Ansie; Vos, A Tascha; von Maltitz, Michael J
2017-11-01
Various biophysical and socio-economic impacts may be associated with unconventional oil and gas (UOG) extraction. A vulnerability map may assist governments during environmental assessments, spatial planning and the regulation of UOG extraction, as well as decision-making around UOG extraction in fragile areas. A regional interactive vulnerability map was developed for UOG extraction in South Africa. This map covers groundwater, surface water, vegetation, socio-economics and seismicity as mapping themes, based on impacts that may emanate from UOG extraction. The mapping themes were developed using a normative approach, where expert input during the identification and classification of vulnerability indicators may increase the acceptability of the resultant map. This article describes the development of the interactive vulnerability map for South Africa, where UOG extraction is not yet allowed and where regulations are still being developed to manage this activity. The importance and policy implications of using vulnerability maps for managing UOG extraction impacts in countries where UOG extraction is planned are highlighted in this article.
Kamali, Bahareh; Abbaspour, Karim C.; Wehrli, Bernhard; Yang, Hong
2018-03-01
Drought as a slow-onset phenomenon inflicts important losses to agriculture where the degree of vulnerability depends not only on physical variables such as precipitation and temperature, but also on societal preparedness. While the scopes of physical and social vulnerability are very different in nature, studies distinguishing these two aspects have been lacking. In this study we address the physical and social aspects of drought vulnerability of maize (CDVIphy and CDVIsoc) in Sub-Saharan Africa (SSA). To quantify vulnerability, we applied a probabilistic framework combining a Drought Exposure Index (DEI) with a physical or social Crop Failure Index, CFIphy or CFIsoc, respectively. DEI was derived from the exceedance probability of precipitation. Maize yields, simulated using the Environmental Policy Integrated Climate (EPIC) model, were used to build CFIphy, whereas the residual of simulated and FAO recorded yields were used to construct CFIsoc. The results showed that southern and partially central Africa are more vulnerable to physical drought as compared to other regions. Central and western Africa, however, are socially highly vulnerable. Comparison of CDVIphy and CDVIsoc revealed that societal factors cause more vulnerability than physical variables in almost all SSA countries except Nigeria and South Africa. We conclude that quantification of both drought vulnerabilities help a better characterization of droughts and identify regions where more investments in drought preparedness are required.
Social vulnerability indicators as a sustainable planning tool
International Nuclear Information System (INIS)
Lee, Yung-Jaan
2014-01-01
In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts
Social vulnerability indicators as a sustainable planning tool
Energy Technology Data Exchange (ETDEWEB)
Lee, Yung-Jaan, E-mail: yungjaanlee@gmail.com
2014-01-15
In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study
The vulnerability to schizophrenia mainstream research paradigms and phenomenological directions.
Stanghellini, Giovanni; Fusar-Poli, Paolo
2012-01-01
Early psychopathological attempts to characterize the vulnerability to schizophrenia were based on the phenomenological method. From the beginning, phenomenologically-oriented psychopathologists have searched the basic vulnerability underlying schizophrenic phenomena in two main domains: depersonalization and derealisation/desocialization. Schizophrenic persons undergo a special kind of depersonalisation: the living body becomes a functioning body, a thing-like mechanism in which feelings, perceptions, and actions take place as if they happened in an outer space. They also endure a special kind of derealisation/de-socialization: the interpersonal scene becomes like a theatre stage, pervaded with a sense of unreality, on which the main actor is unaware of the plot, out of touch with the role he is acting and unable to make sense of the objects he encounters and of what the other people are doing. Many years later, the mainstream research paradigms employed to investigate the vulnerability concept in schizophrenic psychosis have included genetic studies, birth cohort studies, psychosis proneness, and clinical high risk. We will review these studies and conclude with an outline of future research directions focusing on three main features of the psychopathology of early schizophrenia: anomalies of the pre-reflexive self and of the social self (intersubjectivity), and existential re-orientation.
Children of Darfur: a vulnerable population.
Chaikin, Jennifer
2008-02-01
Four years of intense war in Darfur has created an entire generation of children who might never recover. Children in this region are particularly vulnerable and suffer from issues including physical and psychological illness, malnutrition, rape and unlawful military recruitment. This international crisis is among the most important public health issues in the world. The responsibility of the international community to these children is significant and required to break this cycle. This paper will discuss the concerns surrounding these children, how current strategies are failing and proposed public health nursing interventions.
Determination of minimal clinically important change in early and advanced Parkinson's disease.
Hauser, Robert A; Auinger, Peggy
2011-04-01
Two common primary efficacy outcome measures in Parkinson's disease (PD) are change in Unified Parkinson's Disease Rating Scale (UPDRS) scores in early PD and change in "off" time in patients with motor fluctuations. Defining the minimal clinically important change (MCIC) in these outcome measures is important to interpret the clinical relevance of changes observed in clinical trials and other situations. We analyzed data from 2 multicenter, placebo-controlled, randomized clinical trials of rasagiline; TEMPO studied 404 early PD subjects, and PRESTO studied 472 levodopa-treated subjects with motor fluctuations. An anchor-based approach using clinical global impression of improvement (CGI-I) was used to determine MCIC for UPDRS scores and daily "off" time. MCIC was defined as mean change in actively treated subjects rated minimally improved on CGI-I. Receiver operating characteristic (ROC) curves defined optimal cutoffs discriminating between changed and unchanged subjects. MCIC for improvement in total UPDRS score (parts I-III) in early PD was determined to be -3.5 points based on mean scores and -3.0 points based on ROC curves. In addition, we found an MCIC for reduction in "off" time of 1.0 hours as defined by mean reduction in "off" time in active treated subjects self-rated as minimally improved on CGI-I minus mean reduction in "off" time in placebo-treated subjects self-rated as unchanged (1.9-0.9 hours). We hypothesize that many methodological factors can influence determination of the MCIC, and a range of values is likely to emerge from multiple studies. Copyright © 2011 Movement Disorder Society.
Pediatric clinical drug trials in low-income countries: key ethical issues.
MacLeod, S M; Knoppert, D C; Stanton-Jean, M; Avard, D
2015-02-01
Potential child participants in clinical research trials in low-income countries are often vulnerable because of poverty, high morbidity and mortality, inadequate education, and varied local cultural norms. However, vulnerability by itself must not be accepted as an obstacle blocking children from the health benefits that may accrue as an outcome of sound clinical research. As greater emphasis is placed on evidence-based treatment of children, it should be anticipated that there will be a growing call for agreement on principles to guide clinical investigations in low-income countries. There is now general acceptance of the view that children must be protected from non-evidence-based interventions and from substandard treatments. The questions remaining relate to how best to stimulate clinical research activity that will serve the needs of infants, children, and youth in developing countries and how best to assign priority to ethically sound research that will meet their clinical requirements. In low-income countries, 39 % of citizens are 13 years of age or younger, and consequently it is certain that clinical investigations of some new therapeutic products will be conducted there more frequently. This review offers some suggestions for approaches that will help to achieve more effective ethical consideration, including (1) improving the quality of research ethics boards; (2) fostering collaborative partnerships among important stakeholders; (3) making concerted efforts to build capacity; (4) improving the quality of the consent and waiver process; and (5) developing improved governance for harmonized ethics platforms. Continuing support by international organizations is required to sustain the establishment and maintenance of stronger research ethics boards to protect children enrolled in clinical trials. This review underscores the importance of developing a culture of solidarity and true partnership between developed and low-income country organizations, which
DEFF Research Database (Denmark)
Andersson, Lars; Andreasen, Jens O
2011-01-01
The purpose of this article is to suggest important considerations for epidemiologic and clinical studies in the field of dental traumatology. The article is based on the authors' experiences from research in this field and editorial board work for the scientific journal Dental Traumatology....... Examples are given of issues where development is important. The importance of planning ahead of the study and consulting with experts in other fields is emphasized....
Juvenile Pen Shells (Pinna nobilis) Tolerate Acidification but Are Vulnerable to Warming
Basso, Lorena; Hendriks, Iris E.; Duarte, Carlos M.
2015-01-01
effects of both stressors on marine invertebrates, particularly on early life stages considered more vulnerable. Disparate responses of their singular and combined effects were reported, highlighting the importance of extending the studies to different
2012-11-09
... DEPARTMENT OF JUSTICE Drug Enforcement Administration Importer of Controlled Substances; Notice of Application, Fisher Clinical Services, Inc. Pursuant to Title 21 Code of Federal Regulations 1301.34(a), this is notice that on August 20, 2012, Fisher Clinical Services, Inc., 7554 Schantz Road, [[Page 67397...
2012-10-02
... DEPARTMENT OF JUSTICE Drug Enforcement Administration Importer of Controlled Substances; Notice of Application; Fisher Clinical Services, Inc. Pursuant to Title 21 Code of Federal Regulations 1301.34(a), this is notice that on July 18, 2012, Fisher Clinical Services, Inc., 7554 Schantz Road, Allentown...
2012-12-05
... DEPARTMENT OF JUSTICE Drug Enforcement Administration Importer of Controlled Substances; Notice of Application; Fisher Clinical Services, Inc. Pursuant to Title 21 Code of Federal Regulations 1301.34 (a), this is notice that on October 16, 2012, Fisher Clinical Services, Inc., 7554 Schantz Road, Allentown...
2013-09-25
... DEPARTMENT OF JUSTICE Drug Enforcement Administration Importer of Controlled Substances; Notice of Application; Fisher Clinical Services, Inc. Pursuant to Title 21 Code of Federal Regulations (CFR) 1301.34 (a), this is notice that on June 21, 2013, Fisher Clinical Services, Inc., 7554 Schantz Road, Allentown...
The use of whey or skimmed milk powder in fortified blended foods for vulnerable groups
DEFF Research Database (Denmark)
Hoppe, Camilla Francis; Andersen, Gregers Stig; Jacobsen, Anne Stine
2008-01-01
of antinutrients has not been examined. Different lines of evidence suggest that dairy proteins have beneficial effects on vulnerable groups. Here we review the evidence on the effects of adding whey or skimmed milk powder to FBF used for malnourished infants and young children or people living with HIV or AIDS....... Adding whey or skimmed milk powder to FBF improves the protein quality, allowing a reduction in total amount of protein, which could have potential metabolic advantages. It also allows for a reduced content of soy and cereal and thereby a reduction of potential antinutrients. It is possible that adding...... is important for acceptability in vulnerable groups. The most important disadvantage is a considerable increase in price. Adding 10-15% milk powder would double the price, which means that such a product should be used only in well-defined vulnerable groups with special needs. The potential beneficial effects...
Vulnerabilities of national parks in the American Midwest to climate and land use changes
Stroh, Esther D.; Struckhoff, Matthew A.; Shaver, David; Karstensen, Krista A.
2016-06-08
Many national parks in the American Midwest are surrounded by agricultural or urban areas or are in highly fragmented or rapidly changing landscapes. An environmental stressor is a physical, chemical, or biological condition that affects the functioning or productivity of species or ecosystems. Climate change is just one of many stressors on park natural resources; others include urbanization, land use change, air and water pollution, and so on. Understanding and comparing the relative vulnerability of a suite of parks to projected climate and land use changes is important for region-wide planning. A vulnerability assessment of 60 units in the 13-state U.S. National Park Service Midwestern administrative region to climate and land use change used existing data from multiple sources. Assessment included three components: individual park exposure (5 metrics), sensitivity (5 metrics), and constraints to adaptive capacity (8 metrics) under 2 future climate scenarios. The three components were combined into an overall vulnerability score. Metrics were measures of existing or projected conditions within park boundaries, within 10-kilometer buffers surrounding parks, and within ecoregions that contain or intersect them. Data were normalized within the range of values for all assessed parks, resulting in high, medium, and low relative rankings for exposure, sensitivity, constraints to adaptive capacity, and overall vulnerability. Results are consistent with assessments regarding patterns and rates of climate change nationwide but provide greater detail and relative risk for Midwestern parks. Park overall relative vulnerability did not differ between climate scenarios. Rankings for exposure, sensitivity, and constraints to adaptive capacity varied geographically and indicate regional conservation planning opportunities. The most important stressors for the most vulnerable Midwestern parks are those related to sensitivity (intrinsic characteristics of the park) and
Investigating vulnerability to eating disorders: biases in emotional processing.
Pringle, A; Harmer, C J; Cooper, M J
2010-04-01
Biases in emotional processing and cognitions about the self are thought to play a role in the maintenance of eating disorders (EDs). However, little is known about whether these difficulties exist pre-morbidly and how they might contribute to risk. Female dieters (n=82) completed a battery of tasks designed to assess the processing of social cues (facial emotion recognition), cognitions about the self [Self-Schema Processing Task (SSPT)] and ED-specific cognitions about eating, weight and shape (emotional Stroop). The 26-item Eating Attitudes Test (EAT-26; Garner et al. 1982) was used to assess subclinical ED symptoms; this was used as an index of vulnerability within this at-risk group. Regression analyses showed that biases in the processing of both neutral and angry faces were predictive of our measure of vulnerability (EAT-26). In the self-schema task, biases in the processing of negative self descriptors previously found to be common in EDs predicted vulnerability. Biases in the processing of shape-related words on the Stroop task were also predictive; however, these biases were more important in dieters who also displayed biases in the self-schema task. We were also able to demonstrate that these biases are specific and separable from more general negative biases that could be attributed to depressive symptoms. These results suggest that specific biases in the processing of social cues, cognitions about the self, and also about eating, weight and shape information, may be important in understanding risk and preventing relapse in EDs.
Global analysis of urban surface water supply vulnerability
International Nuclear Information System (INIS)
Padowski, Julie C; Gorelick, Steven M
2014-01-01
This study presents a global analysis of urban water supply vulnerability in 71 surface-water supplied cities, with populations exceeding 750 000 and lacking source water diversity. Vulnerability represents the failure of an urban supply-basin to simultaneously meet demands from human, environmental and agricultural users. We assess a baseline (2010) condition and a future scenario (2040) that considers increased demand from urban population growth and projected agricultural demand. We do not account for climate change, which can potentially exacerbate or reduce urban supply vulnerability. In 2010, 35% of large cities are vulnerable as they compete with agricultural users. By 2040, without additional measures 45% of cities are vulnerable due to increased agricultural and urban demands. Of the vulnerable cities in 2040, the majority are river-supplied with mean flows so low (1200 liters per person per day, l/p/d) that the cities experience ‘chronic water scarcity’ (1370 l/p/d). Reservoirs supply the majority of cities facing individual future threats, revealing that constructed storage potentially provides tenuous water security. In 2040, of the 32 vulnerable cities, 14 would reduce their vulnerability via reallocating water by reducing environmental flows, and 16 would similarly benefit by transferring water from irrigated agriculture. Approximately half remain vulnerable under either potential remedy. (letter)
Richard G. Erskine
2013-01-01
The Philosophical principles of a relationally focused Integrative Psychotherapy are described through the concepts of vulnerability, authenticity, and inter-subjective contact. Eight principles or therapist attitudes are outlined with clinical examples that illustrate the philosophy. These philosophical principles provide the foundation for a theory of methods. This article is based on a keynote address given at the 6th International Integrative Psychotherapy Association Conference, Granth...
Mobile health clinics in the era of reform.
Hill, Caterina F; Powers, Brian W; Jain, Sachin H; Bennet, Jennifer; Vavasis, Anthony; Oriol, Nancy E
2014-03-01
Despite the role of mobile clinics in delivering care to the full spectrum of at-risk populations, the collective impact of mobile clinics has never been assessed. This study characterizes the scope of the mobile clinic sector and its impact on access, costs, and quality. It explores the role of mobile clinics in the era of delivery reform and expanded insurance coverage. A synthesis of observational data collected through Mobile Health Map and published literature related to mobile clinics. Analysis of data from the Mobile Health Map Project, an online platform that aggregates data on mobile health clinics in the United States, supplemented by a comprehensive literature review. Mobile clinics represent an integral component of the healthcare system that serves vulnerable populations and promotes high-quality care at low cost. There are an estimated 1500 mobile clinics receiving 5 million visits nationwide per year. Mobile clinics improve access for vulnerable populations, bolster prevention and chronic disease management, and reduce costs. Expanded coverage and delivery reform increase opportunities for mobile clinics to partner with hospitals, health systems, and insurers to improve care and lower costs. Mobile clinics have a critical role to play in providing high-quality, low-cost care to vulnerable populations. The postreform environment, with increasing accountability for population health management and expanded access among historically underserved populations, should strengthen the ability for mobile clinics to partner with hospitals, health systems, and payers to improve care and lower costs.
Vulnerability Assessment of Rural Households to Urmia Lake Drying (the Case of Shabestar Region
Directory of Open Access Journals (Sweden)
Rasoul Maleki
2018-06-01
Full Text Available One of the most important environmental problems in Iran is the destruction and drying of Urmia Lake (UL. UL is one of the main causes of suitable weather for agricultural boom and tourist attraction and it should be considered that the villagers exposed to UL drying have a strong dependence on vulnerable resources such as water, air, soil and plants for their livelihoods and have low adaptive capacity with this crisis for reasons such as poverty, lack of awareness and lack of infrastructure. This study was designed to evaluate the vulnerability of rural households to UL drying in the Shabestar region. The vulnerability was calculated based on Intergovernmental Panel on Climate Change (IPCC definition and using vulnerability index (VI. Research population included rural households of Shabestar region (N = 19,249 and about 347 households were selected as the research sample using multistage cluster sampling technique. Results showed that the average score of respondents was 0.455 (moderate in exposure, 0.359 (moderate to low in sensitivity, 0.404 (moderate to low in adaptive capacity and finally, the vulnerability index (VI was 0.470 (range of 0 to 1. 12.8% of households had low, 70.5% had medium and 16.7% had high vulnerability towards UL drying.
Vleuten, van der E.B.A.; Lagendijk, V.C.
2009-01-01
The so-called "European Blackout" of 4 November 2006 counts as a key example of present day transnational infrastructure vulnerability and an important reference in current debates on transnational electricity infrastructure governance. This is best examplified by the debate itself, where proponents
Sim, Sunhui
2017-10-01
The purpose of the article is evaluating spatial patterns of social vulnerability to heat in Greater Atlanta in 2015. The social vulnerability to heat is an index of socioeconomic status, household composition, land surface temperature and normalized differential vegetation index (NDVI). Land surface temperature and NDVI were derived from the red, NIR and thermal infrared (TIR) of a Landsat OLI/TIRS images collected on September 14, 2015. The research focus is on the variation of heat vulnerability in Greater Atlanta. The study found that heat vulnerability is highly clustered spatially, resulting in "hot spots" and "cool spots". The results show significant health disparities. The hotspots of social vulnerability to heat occurred in neighborhoods with lower socioeconomic status as measured by low education, low income and more poverty, greater proportion of elderly people and young children. The findings of this study are important for identifying clusters of heat vulnerability and the relationships with social factors. These significant results provide a basis for heat intervention services.
Groundwater vulnerability map for South Africa
African Journals Online (AJOL)
Chiedza Musekiwa
Coastal vulnerability is the degree to which a coastal system is susceptible to, ... methods, indicator-based approaches, GIS-based decision support systems and ..... E 2005, 'Coastal Vulnerability and Risk Parameters', European Water, vol.
Energy Technology Data Exchange (ETDEWEB)
Wang, Ming-Liang; Wei, Xiao-Er [School of Medicine, Department of Radiology, Shanghai Jiao Tong University Affiliated Sixth People' s Hospital, Shanghai (China); Lu, Li-Yan [Nanjing Medical University, Department of Radiology, Nanjing First Hospital, Nanjing (China); Li, Wen-Bin [School of Medicine, Department of Radiology, Shanghai Jiao Tong University Affiliated Sixth People' s Hospital, Shanghai (China); Kashgar Prefecture Second People' s Hospital, Imaging Center, Kashgar (China)
2017-03-15
This study aims to elucidate the frequency, nondetection rate, and clinical importance of incidental extracerebral findings (IECFs) on brain nonenhanced magnetic resonance imaging (MRI). A total of 8284 brain MRIs performed between January 1, 2015 and December 31, 2015 were evaluated for the presence of IECFs and the distribution of IECFs was analyzed. IECFs were categorized as E1 (clinically unimportant, e.g., sinus mucosal thickening); E2 (likely unimportant, e.g., pharyngeal mucosal symmetrical thickening); and E3 (potentially important, e.g., pharyngeal mucosal asymmetrical thickening). The nondetection rate was determined by comparing the results of the structured approach with the initial MRI reports. The medical records were examined for patients with E3 IECFs to assess clinical importance and outcome of these lesions. A total of 5992 IECFs were found in 4469 of the 8284 patients (54.0%). E1 findings constituted 82.2% (4924/5992) of all IECFs; E2 constituted 16.6% (995/5992) and E3 constituted 1.2% (73/5992). Overall IECFs and E1 findings were significantly more common in male patients (P < 0.05). Statistically significant difference was also seen between the different age groups (P < 0.001). The nondetection rate was 56.9% (3409/5992) for overall IECFs and 32.9% (24/73) for E3 IECFs. Of the 73 patients with E3 IECFs, 34 (46.6%) received final diagnosis and appropriate treatment during the study period. IECFs are prevalent in clinical patients on brain MR images with a nondetection rate of 32.9% for potentially important (E3) findings. The reporting of IECFs according to clinical importance is helpful for patients' management. (orig.)
Both Whistleblowers and the Scientists They Accuse Are Vulnerable and Deserve Protection
Bouter, Lex M.; Hendrix, Sven
2017-01-01
Whistleblowers play an important role diagnosing research misconduct, but often experience severe negative consequences. That is also true for incorrectly accused scientists. Both categories are vulnerable and deserve protection. Whistleblowers must proceed carefully and cautiously. Anonymous
2012-08-20
... Register on April 26, 2012, 77 FR 24985, Almac Clinical Services, Inc., (ACSI), 25 Fretz Road, Souderton... that the registration of Almac Clinical Services, Inc. (ACSI) to import the basic classes of controlled..., Inc. (ACSI) to ensure that the company's registration is consistent with the public interest. The...
Lee King, Patricia A; Duan, Lei; Amaro, Hortensia
2015-01-01
We investigated social vulnerability and behavioral health clinical profiles (symptom severity) of pregnant women with co-occurring disorders, defined as substance abuse, mental illness, and trauma at treatment entry compared to their nonpregnant counterparts and the role of interpersonal abuse in clinical presentation among pregnant women. Our objective was to provide primary health care providers with insight into the needs of pregnant patients with high behavioral health risks to serve them better during the critical window of opportunity for long-term impact. We conducted cross-sectional secondary analysis of baseline data from women enrolled in treatment programs in the Women, Co-occurring Disorders and Violence Study from nine sites across the United States. We used analysis of variance and Cochran-Mantel-Haenszel statistical analyses to compare means and frequencies of social vulnerability indicators and baseline Addiction Severity Index, Brief Symptom Inventory of mental health, and Posttraumatic Stress Diagnostic Scale scores between 152 pregnant and 2,577 nonpregnant women, and between pregnant women with and without current interpersonal abuse. Compared to nonpregnant women, pregnant women evidenced more social vulnerability but better behavioral health clinical profiles at treatment entry. Current interpersonal abuse was associated with increased mental health and trauma symptomatology but not with alcohol or drug abuse severity among pregnant women. The prenatal period is an important time for screening and intervention for factors such as social vulnerability and co-occurring disorders, known to affect pregnancy and infant outcomes; social and behavioral health services are particularly essential among pregnant women with co-occurring disorders.
Pharmacologic studies in vulnerable populations: Using the pediatric experience.
Zimmerman, Kanecia; Gonzalez, Daniel; Swamy, Geeta K; Cohen-Wolkowiez, Michael
2015-11-01
Historically, few data exist to guide dosing in children and pregnant women. Multiple barriers to inclusion of these vulnerable populations in clinical trials have led to this paucity of data. However, federal legislation targeted at pediatric therapeutics, innovative clinical trial design, use of quantitative clinical pharmacology methods, pediatric thought leadership, and collaboration have successfully overcome many existing barriers. This success has resulted in improved knowledge on pharmacokinetics, safety, and efficacy of therapeutics in children. To date, research in pregnant women has not been characterized by similar success. Wide gaps in knowledge remain despite the common use of therapeutics in pregnancy. Given the similar barriers to drug research and development in pediatric and pregnant populations, the route toward success in children may serve as a model for the advancement of drug development and appropriate drug administration in pregnant women. Copyright © 2015 Elsevier Inc. All rights reserved.
Water availability and vulnerability of 225 large cities in the United States
Padowski, Julie C.; Jawitz, James W.
2012-12-01
This study presents a quantitative national assessment of urban water availability and vulnerability for 225 U.S. cities with population greater than 100,000. Here, the urban assessments account for not only renewable water flows, but also the extracted, imported, and stored water that urban systems access through constructed infrastructure. These sources represent important hydraulic components of the urban water supply, yet are typically excluded from water scarcity assessments. Results from this hydraulic-based assessment were compared to those obtained using a more conventional method that estimates scarcity solely based on local renewable flows. The inclusion of hydraulic components increased the mean availability to cities, leading to a significantly lower portion of the total U.S. population considered "at risk" for water scarcity (17%) than that obtained from the runoff method (47%). Water vulnerability was determined based on low-flow conditions, and smaller differences were found for this metric between at-risk populations using the runoff (66%) and hydraulic-based (54%) methods. The large increase in the susceptible population between the scarcity measures evaluated using the hydraulic method may better reconcile the seeming contradiction in the United States between perceptions of natural water abundance and widespread water scarcity. Additionally, urban vulnerability measures developed here were validated using a media text analysis. Vulnerability assessments that included hydraulic components were found to correlate with the frequency of urban water scarcity reports in the popular press while runoff-based measures showed no significant correlation, suggesting that hydraulic-based assessments provide better context for understanding the nature and severity of urban water scarcity issues.
Detecting C Program Vulnerabilities
Anton, Ermakov; Natalia, Kushik
2011-01-01
C/C++ language is widely used for developing tools in various applications, in particular, software tools for critical systems are often written in C language. Therefore, the security of such software should be thoroughly tested, i.e., the absence of vulnerabilities has to be confirmed. When detecting C program vulnerabilities static source code analysis can be used. In this paper, we present a short survey of existing software tools for such analysis and show that for some kinds of C code vu...
Mental vulnerability as a risk factor for depression
DEFF Research Database (Denmark)
Østergaard, Ditte; Dalton, Susanne Oksbjerg; Bidstrup, Pernille Envold
2012-01-01
Mental vulnerability (i.e. a tendency to experience psychosomatic symptoms, mental symptoms or interpersonal problems) is associated with various diseases. This study investigated whether mental vulnerability is associated with hospitalization for depression.......Mental vulnerability (i.e. a tendency to experience psychosomatic symptoms, mental symptoms or interpersonal problems) is associated with various diseases. This study investigated whether mental vulnerability is associated with hospitalization for depression....
Information security challenges - vulnerabilities brought by ERP applications and cloud platforms
Directory of Open Access Journals (Sweden)
Sinziana-Maria Rindasu
2018-02-01
This article aims to provide an overview of ERP applications and cloud computing platforms that are currently used in the financial and accounting field, focusing on the main technical vulnerabilities and the human factor, which is one of the most important aspects of data security.
Vulnerable Populations Perceive Their Health as at Risk from Climate Change.
Akerlof, Karen L; Delamater, Paul L; Boules, Caroline R; Upperman, Crystal R; Mitchell, Clifford S
2015-12-04
Climate change is already taking a toll on human health, a toll that is likely to increase in coming decades. The relationship between risk perceptions and vulnerability to climate change's health threats has received little attention, even though an understanding of the dynamics of adaptation among particularly susceptible populations is becoming increasingly important. We demonstrate that some people whose health will suffer the greatest harms from climate change-due to social vulnerability, health susceptibility, and exposure to hazards-already feel they are at risk. In a 2013 survey we measured Maryland residents' climate beliefs, health risk perceptions, and household social vulnerability characteristics, including medical conditions (n = 2126). We paired survey responses with secondary data sources for residence in a floodplain and/or urban heat island to predict perceptions of personal and household climate health risk. General health risk perceptions, political ideology, and climate beliefs are the strongest predictors. Yet, people in households with the following characteristics also see themselves at higher risk: members with one or more medical conditions or disabilities; low income; racial/ethnic minorities; and residence in a floodplain. In light of these results, climate health communication among vulnerable populations should emphasize protective actions instead of risk messages.
Vulnerable Populations Perceive Their Health as at Risk from Climate Change
Directory of Open Access Journals (Sweden)
Karen L. Akerlof
2015-12-01
Full Text Available Climate change is already taking a toll on human health, a toll that is likely to increase in coming decades. The relationship between risk perceptions and vulnerability to climate change’s health threats has received little attention, even though an understanding of the dynamics of adaptation among particularly susceptible populations is becoming increasingly important. We demonstrate that some people whose health will suffer the greatest harms from climate change—due to social vulnerability, health susceptibility, and exposure to hazards—already feel they are at risk. In a 2013 survey we measured Maryland residents’ climate beliefs, health risk perceptions, and household social vulnerability characteristics, including medical conditions (n = 2126. We paired survey responses with secondary data sources for residence in a floodplain and/or urban heat island to predict perceptions of personal and household climate health risk. General health risk perceptions, political ideology, and climate beliefs are the strongest predictors. Yet, people in households with the following characteristics also see themselves at higher risk: members with one or more medical conditions or disabilities; low income; racial/ethnic minorities; and residence in a floodplain. In light of these results, climate health communication among vulnerable populations should emphasize protective actions instead of risk messages.
Vulnerable Populations Perceive Their Health as at Risk from Climate Change
Akerlof, Karen L.; Delamater, Paul L.; Boules, Caroline R.; Upperman, Crystal R.; Mitchell, Clifford S.
2015-01-01
Climate change is already taking a toll on human health, a toll that is likely to increase in coming decades. The relationship between risk perceptions and vulnerability to climate change’s health threats has received little attention, even though an understanding of the dynamics of adaptation among particularly susceptible populations is becoming increasingly important. We demonstrate that some people whose health will suffer the greatest harms from climate change—due to social vulnerability, health susceptibility, and exposure to hazards—already feel they are at risk. In a 2013 survey we measured Maryland residents’ climate beliefs, health risk perceptions, and household social vulnerability characteristics, including medical conditions (n = 2126). We paired survey responses with secondary data sources for residence in a floodplain and/or urban heat island to predict perceptions of personal and household climate health risk. General health risk perceptions, political ideology, and climate beliefs are the strongest predictors. Yet, people in households with the following characteristics also see themselves at higher risk: members with one or more medical conditions or disabilities; low income; racial/ethnic minorities; and residence in a floodplain. In light of these results, climate health communication among vulnerable populations should emphasize protective actions instead of risk messages. PMID:26690184
Andersson, Lars; Andreasen, Jens O
2011-08-01
The purpose of this article is to suggest important considerations for epidemiologic and clinical studies in the field of dental traumatology. The article is based on the authors' experiences from research in this field and editorial board work for the scientific journal Dental Traumatology. Examples are given of issues where development is important. The importance of planning ahead of the study and consulting with experts in other fields is emphasized. © 2011 John Wiley & Sons A/S.
[Vulnerability assessment on the coastal wetlands in the Yangtze Estuary under sea-level rise].
Cui, Li-Fang; Wang, Ning; Ge, Zhen-Ming; Zhang, Li-Quan
2014-02-01
To study the response of coastal wetlands to climate change, assess the impacts of climate change on the coastal wetlands and formulate feasible and practical mitigation strategies are the important prerequisite for securing coastal ecosystems. In this paper, the possible impacts of sea level rise caused by climate change on the coastal wetlands in the Yangtze Estuary were analyzed by the Source-Pathway-Receptor-Consequence (SPRC) model and IPCC definition on the vulnerability. An indicator system for vulnerability assessment was established, in which sea-level rise rate, subsidence rate, habitat elevation, inundation threshold of habitat and sedimentation rate were selected as the key indicators. A quantitatively spatial assessment method based on the GIS platform was established by quantifying each indicator, calculating the vulnerability index and grading the vulnerability index for the assessment of coastal wetlands in the Yangtze Estuary under the scenarios of sea-level rise. The vulnerability assessments on the coastal wetlands in the Yangtze Estuary in 2030 and 2050 were performed under two sea-level rise scenarios (the present sea-level rise trend over recent 30 years and IPCC A1F1 scenario). The results showed that with the projection in 2030 under the present trend of sea-level rise (0.26 cm x a(-1)), 6.6% and 0.1% of the coastal wetlands were in the low and moderate vulnerabilities, respectively; and in 2050, 9.8% and 0.2% of the coastal wetlands were in low and moderate vulnerabilities, respectively. With the projection in 2030 under the A1F1 scenario (0.59 cm x a(-1)), 9.0% and 0.1% of the coastal wetlands were in the low and moderate vulnerabilities, respectively; and in 2050, 9.5%, 1.0% and 0.3% of the coastal wetlands were in the low, moderate and high vulnerabilities, respectively.
International Nuclear Information System (INIS)
Baron, Jorge H.; Rivera, S.S.
2000-01-01
The so-called vulnerability matrix is used in the evaluation part of the probabilistic safety assessment for a nuclear power plant, during the containment event trees calculations. This matrix is established from what is knows as Numerical Categories for Engineering Judgement. This matrix is usually established with numerical values obtained with traditional arithmetic using the set theory. The representation of this matrix with fuzzy numbers is much more adequate, due to the fact that the Numerical Categories for Engineering Judgement are better represented with linguistic variables, such as 'highly probable', 'probable', 'impossible', etc. In the present paper a methodology to obtain a Fuzzy Vulnerability Matrix is presented, starting from the recommendations on the Numerical Categories for Engineering Judgement. (author)
Vulnerability, Health Agency and Capability to Health.
Straehle, Christine
2016-01-01
One of the defining features of the capability approach (CA) to health, as developed in Venkatapuram's book Health Justice, is its aim to enable individual health agency. Furthermore, the CA to health hopes to provide a strong guideline for assessing the health-enabling content of social and political conditions. In this article, I employ the recent literature on the liberal concept of vulnerability to assess the CA. I distinguish two kinds of vulnerability. Considering circumstantial vulnerability, I argue that liberal accounts of vulnerability concerned with individual autonomy, align with the CA to health. Individuals should, as far as possible, be able to make health-enabling decisions about their lives, and their capability to do so should certainly not be hindered by public policy. The CA to health and a vulnerability-based analysis then work alongside to define moral responsibilities and designate those who hold them. Both approaches demand social policy to address circumstances that hinder individuals from taking health-enabling decisions. A background condition of vulnerability, on the other hand, even though it hampers the capability for health, does not warrant the strong moral claim proposed by the CA to health to define health as a meta-capability that should guide social policy. Nothing in our designing social policy could change the challenge to health agency when we deal with background conditions of vulnerability. © 2016 John Wiley & Sons Ltd.
Simanjuntak, Andrean V. H.; Muksin, Umar; Rahmayani, Febrina
2018-05-01
The Seulimeum Fault has generated inland earthquake with magnitude larger than M 6.5 that destroyed houses in the Lamteuba and Krueng Raya Villages. Earthquakes along the Seulimeum Fault are mostly right lateral strike-slip characterizing the Fault. The understanding of the seismic vulnerability around the highly populated Banda Aceh City and the villages in Aceh Besar is therefore very important since the city, and the villages are very close to the Seulimeum Fault. A microtremor survey has been conducted to investigate seismic vulnerability in the area closed to the Seulimeum Fault. The waveforms of the microtremor have been recorded in Lamteuba and Kreung Raya villages, Aceh Besar at 20 sites for 7 days from August 14, 2017 with the interval of measurement of 1 km. The waveforms recorded for 30 minutes at each site by using one Taurus Seismometer in miniseed format. The data has been analyzing by using Geopsy to obtain the Horizontal-Vertical Spectral Ratio for each site. The seismic vulnerability is considered to be high if the value of the Horizontal-Vertical Spectral Ratio is high. The HVSR values are then interpolated to obtain the seismic vulnerability map. The preliminary result shows high seismic vulnerability in the area around the first site.
Vulnerability Analysis of Physical Protection System at Hypothetical Facility
International Nuclear Information System (INIS)
Jung, Won Moog; Lee, Ho Jin; Yu, Dong Han; Min, Gyung Sik
2006-01-01
Since the 9/11 event in the U.S.A, International terror possibilities has been increasing for nuclear facilities including nuclear power plants(NPPs). It is necessary to evaluate the performance of an existing physical protection system(PPS) at nuclear facilities based on such malevolent acts. A PPS is a complex configuration of detection, delay, and response elements. Detection, delay, and response elements are all important to the analysis and evaluation of a PPS and its effectiveness. Methods are available to analyze a PPS and evaluate its effectiveness. Sandia National Laboratory(SNL) in the U.S.A was developed a System Analysis of Vulnerability to Intrusion (SAVI) computer code for evaluating the effectiveness of PPS against outsider threats. This study presents the vulnerability analysis of the PPS at hypothetical facility using SAVI code that the basic input parameters are from PPS of Hanaro Research Reactor at Korea Atomic Energy Research Institution. It is understand that PPS of research reactor and critical assemblies are deficient that that of NPP and nuclear materials of RRCAS are compact to transport For analysis, first, the site-specific Adversary Sequence Diagrams(ASDs) of the PPS is constructed. It helps to understand the functions of the existing PPS composed of physical areas and Protection Elements(PEs). Then, the most vulnerable path of an ASD as a measure of effectiveness is determined. The results in the analysis can used to suggest the possible PPS upgrades to the most vulnerable paths for the system like research reactor
Vulnerability of Forests in India: A National Scale Assessment.
Sharma, Jagmohan; Upgupta, Sujata; Jayaraman, Mathangi; Chaturvedi, Rajiv Kumar; Bala, Govindswamy; Ravindranath, N H
2017-09-01
Forests are subjected to stress from climatic and non-climatic sources. In this study, we have reported the results of inherent, as well as climate change driven vulnerability assessments for Indian forests. To assess inherent vulnerability of forests under current climate, we have used four indicators, namely biological richness, disturbance index, canopy cover, and slope. The assessment is presented as spatial profile of inherent vulnerability in low, medium, high and very high vulnerability classes. Fourty percent forest grid points in India show high or very high inherent vulnerability. Plantation forests show higher inherent vulnerability than natural forests. We assess the climate change driven vulnerability by combining the results of inherent vulnerability assessment with the climate change impact projections simulated by the Integrated Biosphere Simulator dynamic global vegetation model. While 46% forest grid points show high, very high, or extremely high vulnerability under future climate in the short term (2030s) under both representative concentration pathways 4.5 and 8.5, such grid points are 49 and 54%, respectively, in the long term (2080s). Generally, forests in the higher rainfall zones show lower vulnerability as compared to drier forests under future climate. Minimizing anthropogenic disturbance and conserving biodiversity can potentially reduce forest vulnerability under climate change. For disturbed forests and plantations, adaptive management aimed at forest restoration is necessary to build long-term resilience.
Unknowing Researcher’s Vulnerability: Re-searching Inequality on an Uneven Playing Field
Directory of Open Access Journals (Sweden)
Siew Fang Law
2016-08-01
Full Text Available This article engages in critical reflexivity to investigate the researcher’s own sense of vulnerability when conducting research on social inequality. Using a disruptive experience in an immersive theatrical storytelling performance as a catalyst to deconstruct and raise consciousness about the author’s privilege and her own role in research, this article seeks to unpack the politics at play in qualitative research in social and political psychology. The extent to which our privileged role and our identity as researchers are nested in history, in systems, and in structures is explored, and the risk that this shields us from being able to truly understand the reality, or epistemology, of the vulnerable groups we are seeking to investigate, is examined. The notion of unknowing the researcher’s vulnerability in research is discussed, along with the ways in which systems and structures have allowed researchers to maintain emotional control and dominance in knowledge production. Moreover, through othering vulnerable emotions and legitimising a researcher’s position as emotion-free, value-free, neutral, and objective, we may continue to engender epistemological injustice. Finally, the author emphasizes the importance of reflexivity and re-searching researchers’ humility as ways to address this challenge.
What Constitutes a Clinically Important Pain Reduction in Patients after Third Molar Surgery?
Directory of Open Access Journals (Sweden)
Wilhelmus JJM Martin
2013-01-01
Full Text Available BACKGROUND: For patients with surgical third molar removal, it is unknown what constitutes a clinically important change in patients’ visual analogue scale (VAS reports of pain intensity.
Ten steps for promoting and protecting breastfeeding for vulnerable infants.
Spatz, Diane L
2004-01-01
Human milk is the preferred food for infants, including ill and preterm infants. Ensuring skilled and comprehensive breastfeeding support for these vulnerable infants requires a specialized approach. The author outlines 10 steps for promoting and protecting breastfeeding in vulnerable infants. The steps include providing the parents with information necessary to make an informed decision to breastfeed; assisting the mother with the establishment and maintenance of a milk supply; ensuring correct breast milk management (storage and handling) techniques; developing procedures and approaches to feeding the infant breast milk; providing skin-to-skin care (kangaroo care) and opportunities for non-nutritive sucking at the breast; managing the transition to the breast; measuring milk transfer; preparing the infant and the family for infant hospital discharge; and providing appropriate follow-up care. Material and examples are drawn from the author's research and clinical work at the Children's Hospital of Philadelphia. Current research is utilized, and the role of the nurse is emphasized throughout.
Alonso-Coello, Pablo; Cook, Deborah; Xu, Shou Chun; Sigamani, Alben; Berwanger, Otavio; Sivakumaran, Soori; Yang, Homer; Xavier, Denis; Martinez, Luz Ximena; Ibarra, Pedro; Rao-Melacini, Purnima; Pogue, Janice; Zarnke, Kelly; Paniagua, Pilar; Ostrander, Jack; Yusuf, Salim; Devereaux, P J
2017-07-01
Despite the frequency of new clinically important atrial fibrillation (AF) after noncardiac surgery and its increased association with the risk of stroke at 30 days, there are limited data informing their prediction, association with outcomes, and management. We used the data from the PeriOperative ISchemic Evaluation trial to determine, in patients undergoing noncardiac surgery, the association of new clinically important AF with 30-day outcomes, and to assess management of these patients. We also aimed to derive a clinical prediction rule for new clinically important AF in this population. We defined new clinically important AF as new AF that resulted in symptoms or required treatment. We recorded an electrocardiogram 6 to 12 hours postoperatively and on the 1st, 2nd, and 30th days after surgery. A total of 211 (2.5% [8351 patients]; 95% confidence interval, 2.2%-2.9%) patients developed new clinically important AF within 30 days of randomization (8140 did not develop new AF). AF was independently associated with an increased length of hospital stay by 6.0 days (95% confidence interval, 3.5-8.5 days) and vascular complications (eg, stroke or congestive heart failure). The usage of an oral anticoagulant at the time of hospital discharge among patients with new AF and a CHADS2 score of 0, 1, 2, 3, and ≥4 was 6.9%, 10.2%, 23.0%, 9.4%, and 33.3%, respectively. Two independent predictors of patients developing new clinically important AF were identified (ie, age and surgery). The prediction rule included the following factors and assigned weights: age ≥85 years (4 points), age 75 to 84 years (3 points), age 65 to 74 years (2 points), intrathoracic surgery (3 points), major vascular surgery (2 points), and intra-abdominal surgery (1 point). The incidence of new AF based on scores of 0 to 1, 2, 3 to 4, and 5 to 6 was 0.5%, 1.0%, 3.1%, and 5.3%, respectively. Age and surgery are independent predictors of new clinically important AF in the perioperative setting. A
Climate Change Vulnerability Analysis of Baluran National Park
Directory of Open Access Journals (Sweden)
Beny Harjadi
2016-12-01
Full Text Available Every ecosystem has a different level of susceptibility to environmental disturbances it receives, both from natural factors or anthropogenic disturbance. National Park (NP Baluran is one national park that has a representation of a complete ecosystem that includes upland forest ecosystems, lowland forests, coastal forests, mangroves, savanna and evergreen forest. The objective of this study is to get a formula calculation of vulnerability analysis of constant and dynamic factors. Baluran NP vulnerability assessment to climate change done by looking at the dynamic and fixed factors. Vulnerability remains a vulnerability factor to the condition of the original (control, whereas vulnerability is the vulnerability of the dynamic change factors which affected the condition from the outside. Constant Vulnerability (CV in Baluran NP dominated resistant conditions (61%, meaning that the geomorphology and other fixed factors (slope and slope direction/aspect, then the condition in Baluran NP sufficiently resilient to climate change. Dynamic Vulnerability (DV is the vulnerability of an area or areas that change because of pressure from external factors. DV is influenced by climatic factors (WI = Wetness Index, soil (SBI = Soil Brightness Index, and vegetation (GI = Greenness Index. DV in Baluran NP from 1999 to 2010 shifted from the original category of being (84.76% and shifted to the susceptible (59.88%. The role of remote sensing for the analysis of raster digital system, while the geographic information system to display the results of cartographic maps.
Directory of Open Access Journals (Sweden)
Inês Motta de Morais
2010-12-01
Full Text Available A autonomia é um conceito ético e individual, ao passo que a vulnerabilidade pressupõe a existência de relações desiguais entre indivíduos ou grupos. Tal desigualdade pode estar relacionada a questões sócio-econômicas. Muitas vezes os desprivilegiados têm dificuldades ou, mesmo impossibilidade de decidir. Portanto, é importante o reconhecimento dessa vulnerabilidade para garantir o direito à autonomia e respeito à dignidade de indivíduos, principalmente quando se trata de pesquisas na área da saúde. Este estudo procura analisar a importância do conceito de vulnerabilidade e seu alcance na relação com a autonomia individual. O estudo conclui que a consciência de vulnerabilidade é importante para alimentar a razão crítica que fundamenta a autonomia. Não pretende de forma alguma propor mais uma definição de autonomia individual e vulnerabilidade do doente, e sim apresentar os resultados do levantamento bibliográfico sobre o tema demonstrando os pontos convergentes e divergentes de diversos expoentes literários.Autonomy is and ethical and individual concept, while vulnerability presupposes the existence of unequal relations between individuals or groups. Such inequality may be related to socio-economic issues. The underprivileged often have difficulty in making decisions or find it impossible to do so. It is, therefore, important to recognize this vulnerability in order to ensure the right to autonomy and respect for the dignity of the individual, especially in the case of health research. This study investigates the importance of the concept of vulnerability and the extent to which it is related to individual autonomy. The study concludes that awareness of vulnerability is important in fuelling the critical reason that is the foundation of autonomy. The intention here is certainly not to put forward yet another definition of individual autonomy and patient vulnerability, but rather to present the results of a
Directory of Open Access Journals (Sweden)
Wiwandari Handayani
2017-12-01
Full Text Available Considering the importance of connecting urbanization phenomena and vulnerability assessments, this paper aims to explore vulnerability assessment in three different city sizes in the northern coast of Central Java province of Indonesia. It compares the vulnerability levels of the three cities based on their sizes (that is, levels of urbanization. It uses the most current secondary data from the lowest administrative levels, called as kelurahan (urban village, for its assessment. There are two indexes used to indicate their vulnerability levels, namely exposure and sensitivity index (ESI and adaptive capacity index (ACI. By combining the ESI and ACI, the study found that the kelurahans in Tegal (the medium sized city have similar vulnerability levels. The kelurahans in Semarang (as the big city have more combination of vulnerability levels—indicating that the city has various sensitivity, exposure, as well as adaptive capacity among its kelurahans. In Lasem (the small sized city, due to limitations imposed by adaptation—mostly because of lack of public services and high dependency on primary economic sectors—all of its kelurahans were found to be vulnerable. The study therefore concluded that the bigger a city is, the more the different areas of that city will have varying levels of vulnerability, leading to a high propensity of vulnerability among its inhabitants. On the other hand, the smaller a city is, the less capacity it will have in reducing its emerging vulnerability challenges.
The SAVI vulnerability assessment model
International Nuclear Information System (INIS)
Winblad, A.E.
1987-01-01
The assessment model ''Systematic Analysis of Vulnerability to Intrusion'' (SAVI) presented in this report is a PC-based path analysis model. It can provide estimates of protection system effectiveness (or vulnerability) against a spectrum of outsider threats including collusion with an insider adversary. It calculates one measure of system effectiveness, the probability of interruption P(I), for all potential adversary paths. SAVI can perform both theft and sabotage vulnerability analyses. For theft, the analysis is based on the assumption that adversaries should be interrupted either before they can accomplish removal of the target material from its normal location or removal from the site boundary. For sabotage, the analysis is based on the assumption that adversaries should be interrupted before completion of their sabotage task
The Unfair Commercial Practices Directive and Vulnerable Consumers
DEFF Research Database (Denmark)
Trzaskowski, Jan
the economic behaviour of consumers ‘below 1 average’ even though the practice does not meet the requirements of professional diligence. The Directive’s adoption of the European Court of Justice’s ‘average consumer’ entails that protection is generally provided only for those who are far from vulnerable......Consumer protection is deeply anchored in EU law, including the Treaty and the Charter of Fundamental Rights. This article discusses the concept of consumer vulnerability and how vulnerable consumers are protected in the context of commercial practices which is fully harmonised by the Unfair....... The Directive’s Article 5(3) concerning vulnerable consumers protects only—and to a limited extent—groups who are vulnerable due to mental or physical infirmity, age or credulity. Even though consumers make many good choices, all consumers are vulnerable in certain situations—often due to time constraints...
Directory of Open Access Journals (Sweden)
Brian A. Ferguson
2018-01-01
Full Text Available Objective. Early childhood development (ECD programs have demonstrated drastic improvements in survival, growth, health, and social productivity. An ECD pilot intervention was delivered to vulnerable populations of a Women, Infants, and Children (WIC clinic in Des Moines, Iowa, to assess ECD outcomes and parental receivability in this setting. Study Design. In a randomized, single blinded control initiative, WIC group sessions of mothers (children aged 2 years and younger were selected for pilot ECD intervention (37 participants or control (36. Care for Child Development ECD course material was supplemented to intervention groups. Survey results were assessed with paired samples T-testing and by an ANOVA. Results. Pilot session receivability demonstrated significance in all areas relative to control: enjoyment, p=0.008; learning capacity, p=0.011; and participant sharing, p=0.023. Furthermore, the previously validated ECD intervention demonstrated significantly improved cumulative 1 month behavior outcomes following the intervention: p=0.006. Conclusions. The WIC setting provides an ideal environment for delivering ECD education beyond traditional counseling in nutrition. High receivability indices among parents demonstrate remarkable capacity for improvement and growth. The significance in receivability, as well as 1 month behavior outcomes, represents parents’ overall readiness to enhance the home environment for their child if merely educated how.
Vitamin D binding protein: a multifunctional protein of clinical importance.
Speeckaert, Marijn M; Speeckaert, Reinhart; van Geel, Nanja; Delanghe, Joris R
2014-01-01
Since the discovery of group-specific component and its polymorphism by Hirschfeld in 1959, research has put spotlight on this multifunctional transport protein (vitamin D binding protein, DBP). Besides the transport of vitamin D metabolites, DBP is a plasma glycoprotein with many important functions, including sequestration of actin, modulation of immune and inflammatory responses, binding of fatty acids, and control of bone development. A considerable DBP polymorphism has been described with a specific allele distribution in different geographic area. Multiple studies have shed light on the interesting relationship between polymorphisms of the DBP gene and the susceptibility to diseases. In this review, we give an overview of the multifunctional character of DBP and describe the clinical importance of DBP and its polymorphisms. Finally, we discuss the possibilities to use DBP as a novel therapeutic agent.
Vulnerability maps for Druzba crude oil pipeline
International Nuclear Information System (INIS)
Hladik, P.; Hosnedl, P.; Buresova, H.; Corbet, J.
2012-01-01
Maps of risk for individual environmental aspects within the protection zone of the Czech part of the Druzba crude oil pipeline (505.7 km) were developed based on a modified 'H and V index' method. Risk data were added into a GIS of the Druzba pipeline so that the system could be used as conceptual material in the field of environmental protection (a base for the new SCADA system). Considered environmental aspects were assessed in terms of their vulnerability. The criteria were defined as the vulnerability of the aquatic environment (surface waters and ground waters), the vulnerability of soil environment and the vulnerability of biotic components of the environment. (authors)
Directory of Open Access Journals (Sweden)
Görün ARUN
2010-01-01
Full Text Available Many settled areas in Turkey and across the globe suffer economical and social losses resulting from natural disasters such as earthquakes, floods, hurricanes and landslides. In this study, a vulnerability assessment model has been developed for earthquake prone areas in Turkey. The vulnerability assessment model includes ground factors, a building’s physical conditions, building evacuation and social (demographic and socioeconomic aspects of the settlement. The ground vulnerability factor is calculated using factors such as the earthquake zone, soil classification, land sliding and liquefaction threats. The physical vulnerability factor depends on the structural and non-structural threats of the building; the building evacuation vulnerability factor includes the position and structural system of the staircase, the width and natural illumination of the evacuation route, the size and opening of the building exit doors to the street and the distance of the building to the closest open area. The social vulnerability factor considers the age group, gender, family type, education, ownership, income etc of the building users. This vulnerability assessment model is applied to a case study - that of the Avcılar district of Istanbul. Forty different reinforced concrete residential buildings (349 apartments of 1225 people are assessed using the develop checklist. In order to evaluate the checklist and to assess the importance (relevance of vulnerability factors, a questionnaire is forwarded to various related professional groups (architecture, urban planning and civil engineering. The results of the questionnaire are examined using SPSS software with factor analysis. According to the results, most of the samples in the case study area can be classified as high vulnerable.
What is clinical leadership and why might it be important in dentistry?
Brocklehurst, P; Ferguson, J; Taylor, N; Tickle, M
2013-03-01
The concept of leadership means different things to different people. At present there is no single definition of leadership nor an established theoretical approach. Despite this, leadership in the clinical environment is becoming increasingly cited as an important component in the transition of the National Health Service (NHS) and in the development of clinician led services. In medicine, clinical commissioning groups (CCGs) will soon be operational and the Department of Health (DH) seeks to establish a similar approach in dentistry, where local clinicians drive forward a quality agenda with a focus on patient outcomes. To facilitate this, the NHS Commissioning Board (NHSCB) are in the process of developing Local Professional Networks (LPNs) for dentistry. Given this shift towards localism and clinician led services it would appear that leadership will have a significant role in both medicine and dentistry. This paper explores what leadership is, before determining why it might be important in providing a clinician-led, patient-based and outcomes-focused service.
The politics of vulnerability and resilience
Frerks, G.E.; Warner, J.F.; Weijs, B.
2011-01-01
Much conceptual confusion exists over the concepts of vulnerability and (social) resilience, reinforced by the different paradigms (the article identifies four) and disciplinary traditions underlying their use. While since the 1980s the social construction of "vulnerability" as a driver for disaster
Trophic redundancy reduces vulnerability to extinction cascades.
Sanders, Dirk; Thébault, Elisa; Kehoe, Rachel; Frank van Veen, F J
2018-03-06
Current species extinction rates are at unprecedentedly high levels. While human activities can be the direct cause of some extinctions, it is becoming increasingly clear that species extinctions themselves can be the cause of further extinctions, since species affect each other through the network of ecological interactions among them. There is concern that the simplification of ecosystems, due to the loss of species and ecological interactions, increases their vulnerability to such secondary extinctions. It is predicted that more complex food webs will be less vulnerable to secondary extinctions due to greater trophic redundancy that can buffer against the effects of species loss. Here, we demonstrate in a field experiment with replicated plant-insect communities, that the probability of secondary extinctions is indeed smaller in food webs that include trophic redundancy. Harvesting one species of parasitoid wasp led to secondary extinctions of other, indirectly linked, species at the same trophic level. This effect was markedly stronger in simple communities than for the same species within a more complex food web. We show that this is due to functional redundancy in the more complex food webs and confirm this mechanism with a food web simulation model by highlighting the importance of the presence and strength of trophic links providing redundancy to those links that were lost. Our results demonstrate that biodiversity loss, leading to a reduction in redundant interactions, can increase the vulnerability of ecosystems to secondary extinctions, which, when they occur, can then lead to further simplification and run-away extinction cascades. Copyright © 2018 the Author(s). Published by PNAS.
Durant, Thomas J., Jr.
2011-01-01
The definition of a disaster is followed by an explanation of vulnerability and social capital theories. The importance of using a sound theoretical framework and the utility and efficacy of vulnerability and social capital theories in studying the impact of natural disasters on the elderly population are emphasized and discussed. The conclusion…
Vulnerabilities to climate change of Massachusetts animal species of greatest conservation need
Galbraith, Hector; Morelli, Toni L.
2017-01-01
Over the last decade, the Commonwealth of Massachusetts has addressed the potential and actual impacts of climate change on state flora and fauna. The state’s involvement began in 2007 when, led by the Division of Fisheries and Wildlife (DFW) and assisted by Manomet Center for Con-servation Research, it carried out one of the first habitat vulnerability assessments in North America (Manomet, 2010). The new methods and processes that resulted were later applied to vulnerability assessments in North America and elsewhere. In 2011, the state assisted the North-eastern Association of Fish and Wildlife Agencies (NEAFWA) in organizing and leading a pio-neering three-year, thirteen-state research effort to evaluate the vulnerabilities of fish and wild-life habitats to climate change in the northeast, from Maine south to West Virginia (NEAFWA, 2012). This focus on climate change vulnerabilities led to three important early realizations: (1) simply categorizing and scoring vulnerabilities might not lead to better conservation outcomes. It was vital to also understand why some resources were more or less vulnerable to climate change in order to identify potential intervention points on which conservation actions and strategies could be based. (2) simply producing research results was not enough; these results had to be cast as specific conservation actions. Moreover (3), these actions needed to be communicated in a useful form to conservation “actors”, such as state agencies, land trusts, land managers, etc. These real-izations led to the next step on the Commonwealth’s journey to effective conservation in an age of climate change - the Massachusetts Wildlife Climate Action Tool (CAT).
Vulnerability of schools to floods in Nyando River catchment, Kenya.
Ochola, Samuel O; Eitel, Bernhard; Olago, Daniel O
2010-07-01
This paper assesses the vulnerability of schools to floods in the Nyando River catchment (3,600 km(2)) in western Kenya and identifies measures needed to reduce this vulnerability. It surveys 130 schools in the lower reaches, where flooding is a recurrent phenomenon. Of the primary schools assessed, 40% were vulnerable, 48% were marginally vulnerable and 12% were not vulnerable. Of the secondary schools, 8% were vulnerable, 73% were marginally vulnerable and 19% were not vulnerable. Vulnerability to floods is due to a lack of funds, poor building standards, local topography, soil types and inadequate drainage. The Constituencies Development Fund (CDF), established in 2003, provides financial support to cover school construction and reconstruction costs; CDF Committees are expected to adopt school building standards. In an effort to promote safe and resilient construction and retrofitting to withstand floods, this paper presents vulnerability reduction strategies and recommendations for incorporating minimum standards in the on-going Primary School Infrastructure Programme Design.
International Nuclear Information System (INIS)
Wang, Bing; Liang, Xiao-Jie; Zhang, Hao; Wang, Lu; Wei, Yi-Ming
2014-01-01
This paper analyzes the long-term relationships between hydropower generation and climate factors (precipitation), hydropower generation capacity (installed capacity of hydropower station) to quantify the vulnerability of renewable energy production in China for the case of hydropower generation. Furthermore, this study applies Grey forecasting model to forecast precipitation in different provinces, and then sets up different scenarios for precipitation based on the IPCC Special Report on Emission Scenarios and results from PRECIS (Providing Regional Climate projections for Impacts Studies) model. The most important result found in this research is the increasing hydropower vulnerability of the poorest regions and the main hydropower generation provinces of China to climate change. Other main empirical results reveal that the impacts of climate change on the supply of hydropower generation in China will be noteworthy for the society. Different scenarios have different effects on hydropower generation, of which A2 scenario (pessimistic, high emission) has the largest. Meanwhile, the impacts of climate change on hydropower generation of every province are distinctly different, of which the Southwest part has the higher vulnerability than the average level while the central part lower. - Highlights: • The hydropower vulnerability will be enlarged with the rapid increase of hydropower capacity. • Modeling the vulnerability of hydropower in different scenarios and different provinces. • The increasing hydropower vulnerability of the poorest regions to climate change. • The increasing hydropower vulnerability of the main hydropower generation provinces. • Rainfall pattern caused by climate change would be the reason for the increasing vulnerability
Egervari, Gabor; Ciccocioppo, Roberto; Jentsch, J David; Hurd, Yasmin L
2018-02-01
Substance use disorders continue to impose increasing medical, financial and emotional burdens on society in the form of morbidity and overdose, family disintegration, loss of employment and crime, while advances in prevention and treatment options remain limited. Importantly, not all individuals exposed to abused substances effectively develop the disease. Genetic factors play a significant role in determining addiction vulnerability and interactions between innate predisposition, environmental factors and personal experiences are also critical. Thus, understanding individual differences that contribute to the initiation of substance use as well as on long-term maladaptations driving compulsive drug use and relapse propensity is of critical importance to reduce this devastating disorder. In this paper, we discuss current topics in the field of addiction regarding individual vulnerability related to behavioral endophenotypes, neural circuits, as well as genetics and epigenetic mechanisms. Expanded knowledge of these factors is of importance to improve and personalize prevention and treatment interventions in the future. Copyright © 2017 Elsevier Ltd. All rights reserved.
Vulnerabilities Classification for Safe Development on Android
Directory of Open Access Journals (Sweden)
Ricardo Luis D. M. Ferreira
2016-06-01
Full Text Available The global sales market is currently led by devices with the Android operating system. In 2015, more than 1 billion smartphones were sold, of which 81.5% were operated by the Android platform. In 2017, it is estimated that 267.78 billion applications will be downloaded from Google Play. According to Qian, 90% of applications are vulnerable, despite the recommendations of rules and standards for the safe software development. This study presents a classification of vulnerabilities, indicating the vulnerability, the safety aspect defined by the Brazilian Association of Technical Standards (Associação Brasileira de Normas Técnicas - ABNT norm NBR ISO/IEC 27002 which will be violated, which lines of code generate the vulnerability and what should be done to avoid it, and the threat agent used by each of them. This classification allows the identification of possible points of vulnerability, allowing the developer to correct the identified gaps.
Clinical importance of voluntary and induced Bennett movement.
Tupac, R G
1978-07-01
A total of 136 dentulous patients were divided into three groups for purposes of quantitative pantographic comparison of voluntary and induced Bennett movement. The effects of patient age and operator experience on recording the Bennett movement were also studied. The results indicates that for patients studied with Bennett movement iduced in the manner described: 1. Experienced operators can obtain more induced Bennett movement that inexperienced operators. 2. Inducing Bennett movement has a greater effect on the immediate side shift component than it has on the progressive side shift component. 3. For older individuals the amount and direction of induced immediate side shift is greater than for younger patients, statistically highly significant, and therefore clinically important. In conclusion, if the objective of a pantographic survey is to record the complete capacity of the joint to move, *lateral jaw movements must be induced.
Groundwater Vulnerability Map for South Africa | Musekiwa | South ...
African Journals Online (AJOL)
Vulnerability of groundwater is a relative, non-measurable and dimensionless property which is based on the concept that some land areas are more vulnerable to groundwater contamination than others. Maps showing groundwater vulnerability assist with the identification of areas more susceptible to contamination than ...
6 CFR 27.400 - Chemical-terrorism vulnerability information.
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Chemical-terrorism vulnerability information. 27... FACILITY ANTI-TERRORISM STANDARDS Other § 27.400 Chemical-terrorism vulnerability information. (a... that constitute Chemical-terrorism Vulnerability Information (CVI), as defined in § 27.400(b). The...
DEFF Research Database (Denmark)
Pedersen, Birgith; Sivonen, K
Aim The aim of this paper is to deepen our understanding of how nursing students’ ethical formation is affected by their meeting with vulnerability and suffering in clinical practice. Background In clinical practice the students can learn authentic, caring, and respectful nursing adjusted to the ...... to attain authenticity and moral integrity by cultivating their own ethical ideals. Nevertheless, clinical practice may expose them to the risk of ethical decline and becoming non-caring nurses.......Aim The aim of this paper is to deepen our understanding of how nursing students’ ethical formation is affected by their meeting with vulnerability and suffering in clinical practice. Background In clinical practice the students can learn authentic, caring, and respectful nursing adjusted...... to the patients’ situation and the practice of distant and general nursing. Reflective processes can support the ethical dimension of nursing, but there is a lack of knowledge concerning the source of students’ ability to maintain and develop their moral integrity. Methods Twenty-four students were interviewed...
International Nuclear Information System (INIS)
Gárfias, J.; Llanos, H.; Franco, R.; Martel, R.
2017-01-01
Groundwater vulnerability assessment is an important task in water resources and land management. Depending on the availability of data and the complexity of the hydrogeological conditions, different approaches can be adopted. As an alternative, this study involves the use of a combined approach based on vulnerability methods and advective particle tracking to better understand the susceptibility to contamination in the Toluca valley aquifer. An intrinsic vulnerability map (DRASTIC) was used to identify areas that are more susceptible to ground water contamination. To estimate advective particle tracking, we developed a 3D flow model using VisualModflow and MODPATH to describe the regional flow of groundwater. The vulnerability map demonstrates the problematic application and interpretation of qualitative the vulnerability method of the parametric system group, which indicates a difference of approximately 23% when compared with the modified vulnerability map. Potential contamination sources based on landfill sites were comparatively high; approximately 76% are located in areas that could be susceptible to contamination through vertical infiltration, especially those that are located along the Lerma system of wells. Industrial parks located in the centre of the valley (83%), where continuous extraction of groundwater and land subsidence occurs, have been classified as high vulnerability zones, increasing the risk of contaminants from surface sources reaching the groundwater. In order to understand the susceptibility to contamination in the aquifer, various delineation approaches should be adopted and all the results that validate each other should be considered, thus making a good strategy for implementing different degrees of protection measures. [es
International Nuclear Information System (INIS)
Ouyang, Min; Pan, ZheZhe; Hong, Liu; He, Yue
2015-01-01
Most of existing studies on vulnerability analysis of multiple infrastructure systems mainly focus on negative effects of interdependencies, which mean that failures in one system can propagate to other systems and aggravate the initial damage. In reality, there also exist positive effects of interdependencies, which are shown in complementary systems and mean that if one system fails another system can provide alternative services to satisfy customers' demands. Different types of transportation systems in a city or country are typical complementary systems. Taking railway and airline systems in China as an example, this paper proposes a network-based approach to model the vulnerability of complementary transportation systems, and based on this model, this paper further introduces a dynamic complementary strength metric, which can help decision makers design or select better complementary topologies from the vulnerability perspective. Also, based on a simple genetic algorithm, this paper analyzes whether critical components for single systems are still important when taking two systems as a whole for analysis. Results show that a protection strategy of hardening a few critical components is also good strategy for the combined system. In addition, the findings and several assumptions are further discussed to close the gap between theory and practice. - Highlights: • We propose a method to model and analyze complementary system vulnerability. • We study vulnerability of complementary railway and airline systems in China. • We propose an approach to quantify dynamic complementary strength. • A few critical components for single systems are important for combined system
Nuclear material production cycle vulnerability analysis
International Nuclear Information System (INIS)
Bott, T.F.
1996-01-01
This paper discusses a method for rapidly and systematically identifying vulnerable equipment in a nuclear material or similar production process and ranking that equipment according to its attractiveness to a malevolent attacker. A multistep approach was used in the analysis. First, the entire production cycle was modeled as a flow diagram. This flow diagram was analyzed using graph theoretical methods to identify processes in the production cycle and their locations. Models of processes that were judged to be particularly vulnerable based on the cycle analysis then were developed in greater detail to identify equipment in that process that is vulnerable to intentional damage
Directory of Open Access Journals (Sweden)
Raquel Batista Dantas
Full Text Available ABSTRACT OBJECTIVE Adapt and evaluate the psychometric properties of the Vulnerability to Abuse Screening Scale to identify risk of domestic violence against older adults in Brazil. METHODS The instrument was adapted and validated in a sample of 151 older adults from a geriatric reference center in the municipality of Belo Horizonte, State of Minas Gerais, in 2014. We collected sociodemographic, clinical, and abuse-related information, and verified reliability by reproducibility in a sample of 55 older people, who underwent re-testing of the instrument seven days after the first application. Descriptive and comparative analyses were performed for all variables, with a significance level of 5%. The construct validity was analyzed by the principal components method with a tetrachoric correlation matrix, the reliability of the scale by the weighted Kappa (Kp statistic, and the internal consistency by the Kuder-Richardson estimator formula 20 (KR-20. RESULTS The average age of the participants was 72.1 years (DP = 6.96; 95%CI 70.94–73.17, with a maximum of 92 years, and they were predominantly female (76.2%; 95%CI 69.82–83.03. When analyzing the relationship between the scores of the Vulnerability to Abuse Screening Scale, categorized by presence (score > 3 or absence (score < 3 of vulnerability to abuse, with clinical and health conditions, we found statistically significant differences for self-perception of health (p = 0.002, depressive symptoms (p = 0.000, and presence of rheumatism (p = 0.003. There were no statistically significant differences between sexes. The Vulnerability to Abuse Screening Scale acceptably evaluated validity in the transcultural adaptation process, demonstrating dimensionality coherent with the original proposal (four factors. In the internal consistency analysis, the instrument presented good results (KR-20 = 0.69 and the reliability via reproducibility was considered excellent for the global scale (Kp = 0
Comparative studies of groundwater vulnerability assessment
Maria, Rizka
2018-02-01
Pollution of groundwater is a primary issue because aquifers are susceptible to contamination from land use and anthropogenic impacts. Groundwater susceptibility is intrinsic and specific. Intrinsic vulnerability refers to an aquifer that is susceptible to pollution and to the geological and hydrogeological features. Vulnerability assessment is an essential step in assessing groundwater contamination. This approach provides a visual analysis for helping planners and decision makers to achieve the sustainable management of water resources. Comparative studies are applying different methodologies to result in the basic evaluation of the groundwater vulnerability. Based on the comparison of methods, there are several advantages and disadvantages. SI can be overlaid on DRASTIC and Pesticide DRASTIC to extract the divergence in sensitivity. DRASTIC identifies low susceptibility and underestimates the pollution risk while Pesticide DRASTIC and SI represents better risk and is recommended for the future. SINTACS method generates very high vulnerability zones with surface waters and aquifer interactions. GOD method could be adequate for vulnerability mapping in karstified carbonate aquifers at small-moderate scales, and EPIK method can be used for large scale. GOD method is suitable for designing large area such as land management while DRASTIC has good accuracy and more real use in geoenvironmental detailed studies.
Hellmuth, M.; Kabat, P.
2003-01-01
It is in the shantytowns and rural villages of the Third World that floods and droughts strike hardest and deepest. Vulnerability to the vagaries of climate depends not only on location, but, crucially, on the capacity of the victims to cope with the impacts of extreme weather. So, where are the
Dohrenwend, Bruce P; Yager, Thomas J; Wall, Melanie M; Adams, Ben G
2013-07-01
The diagnosis, Posttraumatic Stress Disorder, was introduced in 1980 amidst debate about the psychiatric toll of the Vietnam War. There is controversy, however, about its central assumption that potentially traumatic stressors are more important than personal vulnerability in causing the disorder. We tested this assumption with data from a rigorously diagnosed male subsample (n = 260) from the National Vietnam Veterans Readjustment Study. Combat exposure, pre-war vulnerability, and involvement in harming civilians or prisoners were examined, with only combat exposure proving necessary for disorder onset. While none of the three factors proved sufficient, estimated onset reached 97% for veterans high on all three, with harm to civilians or prisoners showing the largest independent contribution. Severity of combat exposure proved more important than pre-war vulnerability in onset; pre-war vulnerability at least as important in long-term persistence. Implications for the primacy of the stressor assumption, further research, and policy are discussed.
Directory of Open Access Journals (Sweden)
van den Berg JWK
2006-04-01
Full Text Available Abstract Background Patient-reported outcomes (PRO questionnaires are being increasingly used in COPD clinical studies. The challenge facing investigators is to determine what change is significant, ie what is the minimal clinically important difference (MCID. This study aimed to identify the MCID for the clinical COPD questionnaire (CCQ in terms of patient referencing, criterion referencing, and by the standard error of measurement (SEM. Methods Patients were ≥40 years of age, diagnosed with COPD, had a smoking history of >10 pack-years, and were participating in a randomized, controlled clinical trial comparing intravenous and oral prednisolone in patients admitted with an acute exacerbation of COPD. The CCQ was completed on Days 1–7 and 42. A Global Rating of Change (GRC assessment was taken to establish the MCID by patient referencing. For criterion referencing, health events during a period of 1 year after Day 42 were included in this analysis. Results 210 patients were recruited, 168 completed the CCQ questionnaire on Day42. The MCID of the CCQ total score, as indicated by patient referencing in terms of the GRC, was 0.44. The MCID of the CCQ in terms of criterion referencing for the major outcomes was 0.39, and calculation of the SEM resulted in a value of 0.21. Conclusion This investigation, which is the first to determine the MCID of a PRO questionnaire via more than one approach, indicates that the MCID of the CCQ total score is 0.4.
Directory of Open Access Journals (Sweden)
Richard G. Erskine
2013-11-01
Full Text Available The Philosophical principles of a relationally focused Integrative Psychotherapy are described through the concepts of vulnerability, authenticity, and inter-subjective contact. Eight principles or therapist attitudes are outlined with clinical examples that illustrate the philosophy. These philosophical principles provide the foundation for a theory of methods. This article is based on a keynote address given at the 6th International Integrative Psychotherapy Association Conference, Grantham, UK, July 11-14, 2013.
Reconceptualizing Vulnerability in Personal Narrative Writing with Youths
Johnson, Elisabeth
2014-01-01
Through a student/teacher classroom conflict, the author explores ways adults produce student writers as vulnerable. Drawing on post-structural concepts of adolescence, identity production, interrogation, and vulnerability, the author details how an English teacher invited students to perform vulnerability in personal narratives about issues like…
Working up a Debt: Students as Vulnerable Consumers
Robson, Julie; Farquhar, Jillian Dawes; Hindle, Christopher
2017-01-01
Students are recognized as vulnerable consumers where financial matters are concerned, particularly with reference to indebtedness. This study examines student indebtedness in order to initiate wider debate about student vulnerability. We consider vulnerability as dynamic and temporal, linked to an event that renders the consumer susceptible to…
An approach for modelling interdependent infrastructures in the context of vulnerability analysis
International Nuclear Information System (INIS)
Johansson, Jonas; Hassel, Henrik
2010-01-01
Technical infrastructures of the society are becoming more and more interconnected and interdependent, i.e. the function of an infrastructure influences the function of other infrastructures. Disturbances in one infrastructure therefore often traverse to other dependent infrastructures and possibly even back to the infrastructure where the failure originated. It is becoming increasingly important to take these interdependencies into account when assessing the vulnerability of technical infrastructures. In the present paper, an approach for modelling interdependent technical infrastructures is proposed. The modelling approach considers structural properties, as employed in graph theory, as well as functional properties to increase its fidelity and usefulness. By modelling a fictional electrified railway network that consists of five systems and interdependencies between the systems, it is shown how the model can be employed in a vulnerability analysis. The model aims to capture both functional and geographic interdependencies. It is concluded that the proposed modelling approach is promising and suitable in the context of vulnerability analyses of interdependent systems.
The comparative importance of books: clinical psychology in the health sciences library.
Wehmeyer, J M; Wehmeyer, S
1999-01-01
Clinical psychology has received little attention as a subject in health sciences library collections. This study seeks to demonstrate the relative importance of the monographic literature to clinical psychology through the examination of citations in graduate student theses and dissertations at the Fordham Health Sciences Library, Wright State University. Dissertations and theses were sampled randomly; citations were classified by format, counted, and subjected to statistical analysis. Books and book chapters together account for 35% of the citations in clinical psychology dissertations, 25% in nursing theses, and 8% in biomedical sciences theses and dissertations. Analysis of variance indicates that the citations in dissertations and theses in the three areas differ significantly (F = 162.2 with 2 and 253 degrees of freedom, P = 0.0001). Dissertations and theses in biomedical sciences and nursing theses both cite significantly more journals per book than the dissertations in clinical psychology. These results support the hypothesis that users of clinical psychology literature rely more heavily on books than many other users of a health sciences library. Problems with using citation analyses in a single subject to determine a serials to monographs ratio for a health sciences library are pointed out. PMID:10219478
Áreas vulnerables en el centro de Madrid
Directory of Open Access Journals (Sweden)
Agustín Hernández Aja
2007-07-01
This document shows an vulnerability analysis of the central area of Madrid taken it as the field of APE-00.01. Its objective is to delimit “vulnerable areas” so there can be evaluated the opportunities for interve trough them and then define the best tools in detriment of their vulnerability reasons. To determinate those areas we have developed a sociodemographic analysis where we have found those units of population with vulnerable values. Once determinated, we have synthetize them to define them as easy drafts that makes understandable the work area for later on establish a vulnerable areas catalogue with spatial homogeneity and significant size. The basic nucleus of the análisis has been the sociodemographic fact, based on homogeneus data sources for all the area so they could be referenced to specific spacial areas. In each case has been advised other possible indicators of vulnerability including a signifier selection of thrm on the fifth chapter.
Statistics of software vulnerability detection in certification testing
Barabanov, A. V.; Markov, A. S.; Tsirlov, V. L.
2018-05-01
The paper discusses practical aspects of introduction of the methods to detect software vulnerability in the day-to-day activities of the accredited testing laboratory. It presents the approval results of the vulnerability detection methods as part of the study of the open source software and the software that is a test object of the certification tests under information security requirements, including software for communication networks. Results of the study showing the allocation of identified vulnerabilities by types of attacks, country of origin, programming languages used in the development, methods for detecting vulnerability, etc. are given. The experience of foreign information security certification systems related to the detection of certified software vulnerabilities is analyzed. The main conclusion based on the study is the need to implement practices for developing secure software in the development life cycle processes. The conclusions and recommendations for the testing laboratories on the implementation of the vulnerability analysis methods are laid down.
2012-04-26
... DEPARTMENT OF JUSTICE Drug Enforcement Administration Importer of Controlled Substances; Notice of Application; Almac Clinical Services, Inc., (ACSI) Pursuant to 21 U.S.C. 958(i), the Attorney General shall... on March 5, 2012, Almac Clinical Services, Inc., (ACSI), 25 Fretz Road, Souderton, Pennsylvania 18964...
The mollusks in zootherapy: traditional medicine and clinical-pharmacological importance
Directory of Open Access Journals (Sweden)
Eraldo Medeiros Costa Neto
2006-09-01
Full Text Available The use of animals as sources of medicines is a cross-cultural phenomenon that is historically ancient and geographically widespread. This article reviews the use of mollusks in traditional medicine and discusses the clinical and pharmacological importance of these invertebrates. The roles that mollusks play in folk practices related to the healing and/or prevention of illnesses have been recorded in different social-cultural contexts worldwide. The clinical and therapeutic use of compounds coming from different species of mollusks is recorded in the literature. The chemistry of natural products provided by oysters, mussels, clams, sluggards, and snails has been substantially investigated, but the majority of these studies have focused on the subclasses Opistobranchia and Prosobranchia. Research into the knowledge and practices of folk medicine makes possible a better understanding of the interaction between human beings and the environment, in addition to allowing the elaboration of suitable strategies for the conservation of natural resources.
STRUCTURAL VULNERABILITY ASSESSMENT OF MASONRY BUILDINGS IN TURKEY
KORKMAZ, Kasım Armagan; CARHOGLU, Asuman Isıl
2011-01-01
Turkey is located in an active seismic zone. Mid to high rise R/C building and low rise masonry buildings are very common construction type in Turkey. In recent earthquakes, lots of existing buildings got damage including masonry buildings. Masonry building history in Turkey goes long years back. For sure, it is an important structure type for Turkey. Therefore, earthquake behavior and structural vulnerability of masonry buildings are crucial issues for Turkey as a earthquake prone country. I...
Automated realtime data import for the i2b2 clinical data warehouse: introducing the HL7 ETL cell.
Majeed, Raphael W; Röhrig, Rainer
2012-01-01
Clinical data warehouses are used to consolidate all available clinical data from one or multiple organizations. They represent an important source for clinical research, quality management and controlling. Since its introduction, the data warehouse i2b2 gathered a large user base in the research community. Yet, little work has been done on the process of importing clinical data into data warehouses using existing standards. In this article, we present a novel approach of utilizing the clinical integration server as data source, commonly available in most hospitals. As information is transmitted through the integration server, the standardized HL7 message is immediately parsed and inserted into the data warehouse. Evaluation of import speeds suggest feasibility of the provided solution for real-time processing of HL7 messages. By using the presented approach of standardized data import, i2b2 can be used as a plug and play data warehouse, without the hurdle of customized import for every clinical information system or electronic medical record. The provided solution is available for download at http://sourceforge.net/projects/histream/.
Dynamic vulnerability assessment and intelligent control for sustainable power systems
Gonzalez-Longatt, Francisco
2018-01-01
Identifying, assessing, and mitigating electric power grid vulnerabilities is a growing focus in short-term operational planning of power systems. Through illustrated application, this important guide surveys state-of-the-art methodologies for the assessment and enhancement of power system security in short-term operational planning and real-time operation. The methodologies employ advanced methods from probabilistic theory, data mining, artificial intelligence, and optimization, to provide knowledge-based support for monitoring, control (preventive and corrective), and decision making tasks. Key features: Introduces behavioural recognition in wide-area monitoring and security constrained optimal power flow for intelligent control and protection and optimal grid management. Provides in-depth understanding of risk-based reliability and security assessment, dynamic vulnerability as essment methods, supported by the underpinning mathematics. Develops expertise in mitigation techniques using intelligent protect...
Intrinsic vulnerability assessment of the aquifer in the Rižana spring chatcment by method SINTACS
Directory of Open Access Journals (Sweden)
2002-12-01
Full Text Available In this paper is presented intrinsic vulnerability assessment of the aquifer in the Rižana spring chatcment by the method SINTACS. It is parametric method that takes into consideration seven parameters (depth to ground water, effective infiltration action, unsaturatedzone attenuation capacity, soil/overburden attenuation capacity, hydrogeological characteristics of the aquifer, hydraulic conductivity range of aquifer, hydrologic role of the topographic slope. Parameters are presented in grid information layers that wereelaborated on the basis of interpretation and GIS processing of geological, hydrogeological,speleological, topographical, meteorological and pedological data. According to the parametersimportance for vulnerability assessment, a multiplier (importance weight was assigned to each parameter. Final map of vulnerability is a result of overlaying (summing of weighted information layers (parameters and shows the catchment area of the Rižanaspring subdivided into six vulnerability classes.
[Aged woman's vulnerability related to AIDS].
Silva, Carla Marins; Lopes, Fernanda Maria do Valle Martins; Vargens, Octavio Muniz da Costa
2010-09-01
This article is a systhematic literature review including the period from 1994 to 2009, whose objective was to discuss the aged woman's vulnerability in relation to Acquired Imunodeficiency Syndrome (Aids). The search for scientific texts was accomplished in the following databases: Biblioteca Virtual em Saúde, Scientific Eletronic Library Online (SciELO), Literatura Latino-Americana e do Caribe em Ciências da Saúde (LILACS) and Medical Literature Analysis and Retrieval System Online (MEDLINE). The descriptors used were vulnerability, woman and Aids. Eighteen texts were analyzed, including articles in scientific journals, thesis and dissertations. As a conclusion, it was noted that aged women and vulnerability to Aids are directly related, through gender characteristics including submission and that were built historical and socially. We consider as fundamental the development of studies which may generate publications accessible to women, in order to help them see themselves as persons vulnerable to Aids contagion just for being women.
Extinction vulnerability of coral reef fishes.
Graham, Nicholas A J; Chabanet, Pascale; Evans, Richard D; Jennings, Simon; Letourneur, Yves; Aaron Macneil, M; McClanahan, Tim R; Ohman, Marcus C; Polunin, Nicholas V C; Wilson, Shaun K
2011-04-01
With rapidly increasing rates of contemporary extinction, predicting extinction vulnerability and identifying how multiple stressors drive non-random species loss have become key challenges in ecology. These assessments are crucial for avoiding the loss of key functional groups that sustain ecosystem processes and services. We developed a novel predictive framework of species extinction vulnerability and applied it to coral reef fishes. Although relatively few coral reef fishes are at risk of global extinction from climate disturbances, a negative convex relationship between fish species locally vulnerable to climate change vs. fisheries exploitation indicates that the entire community is vulnerable on the many reefs where both stressors co-occur. Fishes involved in maintaining key ecosystem functions are more at risk from fishing than climate disturbances. This finding is encouraging as local and regional commitment to fisheries management action can maintain reef ecosystem functions pending progress towards the more complex global problem of stabilizing the climate. © 2011 Blackwell Publishing Ltd/CNRS.
Nelson, R.; Kokic, P.; Crimp, S.; Meinke, H.B.; Howden, S.M.
2010-01-01
Vulnerability is a term frequently used to describe the potential threat to rural communities posed by climate variability and change. Despite growing use of the term, analytical measures of vulnerability that are useful for prioritising and evaluating policy responses are yet to evolve. Demand for
Directory of Open Access Journals (Sweden)
Despina Minos-Minopoulos
2017-07-01
Full Text Available Across the world, numerous sites of cultural heritage value are at risk from a variety of human-induced and natural hazards such as war and earthquakes. Here we present and test a novel indicator-based method for assessing the vulnerability of archaeological sites to earthquakes. Vulnerability is approached as a dynamic element assessed through a combination of spatial and temporal parameters. The spatial parameters examine the susceptibility of the sites to the secondary Earthquake Environmental Effects of ground liquefaction, landslides and tsunami and are expressed through the Spatial Susceptibility Index (SSi. Parameters of physical vulnerability, economic importance and visitors density examine the temporal vulnerability of the sites expressed through the Temporal Vulnerability Index (TVi. The equally weighted sum of the spatial and temporal indexes represents the total Archaeological Site Vulnerability Index (A.S.V.I.. The A.S.V.I method is applied at 16 archaeological sites across Greece, allowing an assessment of their vulnerability. This then allows the establishment of a regional and national priority list for considering future risk mitigation. Results indicate that i the majority of the sites have low to moderate vulnerability to earthquake hazard, ii Neratzia Fortress on Kos and Heraion on Samos are characterised as highly vulnerable and should be prioritised for further studies and mitigation measures, and iii the majority of the sites are susceptible to at least one Earthquake Environmental Effect and present relatively high physical vulnerability attributed to the existing limited conservation works. This approach highlights the necessity for an effective vulnerability assessment methodology within the existing framework of disaster risk management for cultural heritage.
Selective vulnerabilities and biomarkers in neurocognitive aging [version 1; referees: 4 approved
Directory of Open Access Journals (Sweden)
Zachariah Reagh
2017-04-01
Full Text Available As the world’s population continues to age, an understanding of the aging brain becomes increasingly crucial. This review focuses on several recent ideas and findings in the study of neurocognitive aging, specifically focusing on episodic memory, and discusses how they can be considered and used to guide us moving forward. Topics include dysfunction in neural circuits, the roles of neurogenesis and inhibitory signaling, vulnerability in the entorhinal cortex, individual differences, and comorbidities. These avenues of study provide a brief overview of promising themes in the field and together provide a snapshot of what we believe will be important emerging topics in selective vulnerabilities in the aging brain.
Exclusion as a Criterion for Selecting Socially Vulnerable Population Groups
Directory of Open Access Journals (Sweden)
Aleksandra Anatol’evna Shabunova
2016-05-01
Full Text Available The article considers theoretical aspects of a scientific research “The Mechanisms for Overcoming Mental Barriers of Inclusion of Socially Vulnerable Categories of the Population for the Purpose of Intensifying Modernization in the Regional Community” (RSF grant No. 16-18-00078. The authors analyze the essence of the category of “socially vulnerable groups” from the legal, economic and sociological perspectives. The paper shows that the economic approach that uses the criterion “the level of income and accumulated assets” when defining vulnerable population groups prevails in public administration practice. The legal field of the category based on the economic approach is defined by the concept of “the poor and socially unprotected categories of citizens”. With the help of the analysis of theoretical and methodological aspects of this issue, the authors show that these criteria are a necessary but not sufficient condition for classifying the population as being socially vulnerable. Foreign literature associates the phenomenon of vulnerability with the concept of risks, with the possibility of households responding to them and with the likelihood of losing the well-being (poverty theory; research areas related to the means of subsistence, etc.. The asset-based approaches relate vulnerability to the poverty that arises due to lack of access to tangible and intangible assets. Sociological theories presented by the concept of social exclusion pay much attention to the breakdown of social ties as a source of vulnerability. The essence of social exclusion consists in the inability of people to participate in important aspects of social life (in politics, labor markets, education and healthcare, cultural life, etc. though they have all the rights to do so. The difference between the concepts of exclusion and poverty is manifested in the displacement of emphasis from income inequality to limited access to rights. Social exclusion is
Directory of Open Access Journals (Sweden)
Tigere Chagutah
2013-02-01
Full Text Available Land tenure is an important variable impacting on vulnerability to climate-related disaster. Land tenure insecurity is widespread in southern Africa and manifests itself in a number of ways that accentuate vulnerability to climate change impacts. Insecure tenure is seen to heighten vulnerability against growing demand for land for residential purposes and working space in urban areas while in the rural areas insecure tenure militates against diversified livelihoods and hinders investment in appropriate technologies and uptake of sound environmental management practices. Using the focused synthesis method, this article (1 maps the intersections between land tenure insecurity and vulnerability to climate-induced disaster in southern Africa; and (2 identifies the opportunities tenure reforms hold for vulnerability reduction in a region predicted to suffer widespread impacts from climate change. The paper contends that land tenure is a critical component of the milieu of factors – economic, social, cultural, institutional, political and even psychological – that are known to shape vulnerability and determine the environment that people live in. The study finds that land tenure reforms can help to reduce vulnerability and enhance community resilience to climate change. In this regard, the article outlines how tenure reforms can help build diverse household livelihoods, improve environmental management, particularly in the rural areas, and encourage investment in robust housing and safe neighbourhoods among the urban poor – all of which are integral to the region’s response to climate change.
Mental Vulnerability as a Predictor of Early Mortality
DEFF Research Database (Denmark)
Eplov, Lene F.; Jørgensen, Torben; Segel, S.
2005-01-01
BACKGROUND: Studies have demonstrated that mental vulnerability (ie, a tendency to experience psychosomatic symptoms or inadequate interpersonal interactions) is associated with various diseases. The objective of our study is to evaluate whether mental vulnerability is a risk factor for early...... mortality. METHODS: We conducted a prospective cohort study of 3 random samples of the population in Copenhagen County, Denmark selected in 1976, 1982-1984, and 1991 (n = 6435). Baseline data collection included measures of mental vulnerability, social factors, comorbidity, biologic risk markers (eg, blood...... of mortality as the result of natural causes. The association between mental vulnerability and survival was examined using Kaplan-Meir plots and Cox proportional-hazard models adjusting for possible confounding factors. RESULTS: With respect to mental vulnerability, 79% of the sample was classified...
Exploring the Dynamics of Globalization: Supply Chain Vulnerability to Natural Disasters
Kalafsky, Ronald V.; Conner, Neil
2015-01-01
Global supply chains play an increasingly important role in the economy and should therefore be addressed within geography coursework, especially given concerns that geographers have not fully explored various angles of globalization. This article explores the use of an online case study on supply chains and their vulnerability to natural…
A Preliminary Assessment of Social Vulnerability in Ganga-Brahmaputra-Meghna Delta
Hazra, Sugata; Islam, Nabiul
2017-04-01
The Ganga-Brahmaputra-Meghna (GBM) Delta has a high population density and is exposed to rapid environmental changes making it one of the most stressed deltas in the world. The low-lying coastal areas of the Ganga-Brahmaputra-Meghna (GBM) Delta comprise 19 coastal districts of Bangladesh and two districts in India with significant land areas within 5 meters of sea level has a population of more than 50 million people at an average population density of 1100 people/km2. This population is exposed to a range of hazards such as severe cyclones, coastal erosion, and salinization, exacerbated by climate change and subsidence which imply severe stress on the resource dependent community of this region. This situation is further complicated by poverty and limited social well-being such as poor access to education/ health/ drinking water/ sanitation facilities, and lack of food and energy security. Thus assessing social vulnerability can help to understand which communities are susceptible to environmental change and guide adaptation actions to address these threats. This preliminary study aims to construct a socio-economic index by assessing the social vulnerability of coastal communities of GBM Delta taking consistent and common secondary data from the Census of India and the Bangladesh Bureau of Statisticsand applyinga Principle Component Analysis(PCA) methodology. Several statistical tests like Kaiser-Meyer-Olkin (KMO) have also been used to assess the appropriateness of using PCA. Among the selected common indicators, five major components are found to explain majority of the total variation of social vulnerability across the delta: (1) poverty, (2) dependency ratio, (3) agriculture dependency, (4) lack of sanitation and (5) existence of mud houses. The most important observation is the existence of a social vulnerability gradient across the coast. In other words, socially marginalised and vulnerable communities are found on the Delta margin in both India and
Vulnerability and adaptation of US shellfisheries to ocean acidification
Ekstrom, Julia A.; Suatoni, Lisa; Cooley, Sarah R.; Pendleton, Linwood H.; Waldbusser, George G.; Cinner, Josh E.; Ritter, Jessica; Langdon, Chris; van Hooidonk, Ruben; Gledhill, Dwight; Wellman, Katharine; Beck, Michael W.; Brander, Luke M.; Rittschof, Dan; Doherty, Carolyn; Edwards, Peter E. T.; Portela, Rosimeiry
2015-03-01
Ocean acidification is a global, long-term problem whose ultimate solution requires carbon dioxide reduction at a scope and scale that will take decades to accomplish successfully. Until that is achieved, feasible and locally relevant adaptation and mitigation measures are needed. To help to prioritize societal responses to ocean acidification, we present a spatially explicit, multidisciplinary vulnerability analysis of coastal human communities in the United States. We focus our analysis on shelled mollusc harvests, which are likely to be harmed by ocean acidification. Our results highlight US regions most vulnerable to ocean acidification (and why), important knowledge and information gaps, and opportunities to adapt through local actions. The research illustrates the benefits of integrating natural and social sciences to identify actions and other opportunities while policy, stakeholders and scientists are still in relatively early stages of developing research plans and responses to ocean acidification.
Caring for vulnerable ostomists: learning disabilities and stoma care.
Parker, Michaela
It is without doubt that people with learning difficulties are considered vulnerable and meeting the healthcare needs of this group in society is now recognised as a challenging task. This case study examines the implications of life with a stoma for one particular man with learning difficulties and reflects on the key issues that have influenced his care: stigma and isolation, general healthcare needs for people with learning disabilities and the association with stoma care, and the provision of care and whose role it is. Key findings include inconsistencies between primary, secondary and social care, resulting in lack of integration and flexibility in provision of care; lack of responsibility for care, with a 'pass the buck' response; lack of knowledge about stoma care in most care settings; and, as a stoma care nurse, the importance of personal instinct, along with persistence in advocating appropriate levels of care for vulnerable ostomists.
2013-04-19
... DEPARTMENT OF JUSTICE Drug Enforcement Administration Importer of Controlled Substances, Notice of Application, Almac Clinical Services, Inc., (ACSI) Pursuant to Title 21 Code of Federal Regulations 1301.34(a), this is notice that on March 5, 2013, Almac Clinical Services, Inc., (ACSI), 25 Fretz Road, Souderton...
Douglas, Steven; Dixon, Barnali; Griffin, Dale W.
2018-01-01
With continued population growth and increasing use of fresh groundwater resources, protection of this valuable resource is critical. A cost effective means to assess risk of groundwater contamination potential will provide a useful tool to protect these resources. Integrating geospatial methods offers a means to quantify the risk of contaminant potential in cost effective and spatially explicit ways. This research was designed to compare the ability of intrinsic (DRASTIC) and specific (Attenuation Factor; AF) vulnerability models to indicate groundwater vulnerability areas by comparing model results to the presence of pesticides from groundwater sample datasets. A logistic regression was used to assess the relationship between the environmental variables and the presence or absence of pesticides within regions of varying vulnerability. According to the DRASTIC model, more than 20% of the study area is very highly vulnerable. Approximately 30% is very highly vulnerable according to the AF model. When groundwater concentrations of individual pesticides were compared to model predictions, the results were mixed. Model predictability improved when concentrations of the group of similar pesticides were compared to model results. Compared to the DRASTIC model, the AF model more accurately predicts the distribution of the number of contaminated wells within each vulnerability class.
Assessing local vulnerability to climate change in Ecuador.
Fernandez, Mario Andres; Bucaram, Santiago J; Renteria, Willington
2015-01-01
Vulnerability assessments have become necessary to increase the understanding of climate-sensitive systems and inform resource allocation in developing countries. Challenges arise when poor economic and social development combines with heterogeneous climatic conditions. Thus, finding and harmonizing good-quality data at local scale may be a significant hurdle for vulnerability research. In this paper we assess vulnerability to climate change at a local level in Ecuador. We take Ecuador as a case study as socioeconomic data are readily available. To incorporate the spatial and temporal pattern of the climatic variables we use reanalysis datasets and empirical orthogonal functions. Our assessment strategy relies on the statistical behavior of climatic and socioeconomic indicators for the weighting and aggregation mechanism into a composite vulnerability indicator. Rather than assuming equal contribution to the formation of the composite indicator, we assume that the weights of the indicators vary inversely as the variance over the cantons (administrative division of Ecuador). This approach captures the multi-dimensionality of vulnerability in a comprehensive form. We find that the least vulnerable cantons concentrate around Ecuador's largest cities (e.g. Quito and Guayaquil); however, approximately 20 % of the national population lives in other cantons that are categorized as highly and very highly vulnerable to climate change. Results also show that the main determinants of high vulnerability are the lack of land tenure in agricultural areas and the nonexistence of government-funded programs directed to environmental and climate change management.
Plutonium Vulnerability Management Plan
International Nuclear Information System (INIS)
1995-03-01
This Plutonium Vulnerability Management Plan describes the Department of Energy's response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department's Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B
VuWiki: An Ontology-Based Semantic Wiki for Vulnerability Assessments
Khazai, Bijan; Kunz-Plapp, Tina; Büscher, Christian; Wegner, Antje
2014-05-01
The concept of vulnerability, as well as its implementation in vulnerability assessments, is used in various disciplines and contexts ranging from disaster management and reduction to ecology, public health or climate change and adaptation, and a corresponding multitude of ideas about how to conceptualize and measure vulnerability exists. Three decades of research in vulnerability have generated a complex and growing body of knowledge that challenges newcomers, practitioners and even experienced researchers. To provide a structured representation of the knowledge field "vulnerability assessment", we have set up an ontology-based semantic wiki for reviewing and representing vulnerability assessments: VuWiki, www.vuwiki.org. Based on a survey of 55 vulnerability assessment studies, we first developed an ontology as an explicit reference system for describing vulnerability assessments. We developed the ontology in a theoretically controlled manner based on general systems theory and guided by principles for ontology development in the field of earth and environment (Raskin and Pan 2005). Four key questions form the first level "branches" or categories of the developed ontology: (1) Vulnerability of what? (2) Vulnerability to what? (3) What reference framework was used in the vulnerability assessment?, and (4) What methodological approach was used in the vulnerability assessment? These questions correspond to the basic, abstract structure of the knowledge domain of vulnerability assessments and have been deduced from theories and concepts of various disciplines. The ontology was then implemented in a semantic wiki which allows for the classification and annotation of vulnerability assessments. As a semantic wiki, VuWiki does not aim at "synthesizing" a holistic and overarching model of vulnerability. Instead, it provides both scientists and practitioners with a uniform ontology as a reference system and offers easy and structured access to the knowledge field of
Kattaa, Bassam; Al-Fares, Walid; Al Charideh, Abdul Rahman
2010-05-01
Vulnerability assessment to delineate areas that are more susceptible to contamination from anthropogenic sources has become an important element for sensible resource management and landuse planning. This contribution aims at estimating aquifer vulnerability by applying the RISKE model in Banyas Catchment Area (BCA), Tartous Prefecture, west Syria. An additional objective is to demonstrate the combined use of the RISKE model and a geographical information system (GIS) as an effective method for groundwater pollution risk assessment. The RISKE model uses five environmental parameters (Rock of aquifer media, Infiltration, Soil media, Karst, and Epikarst) to characterize the hydro-geological setting and evaluate aquifer vulnerability. The elevated eastern and low western part of the study area was dominated by high vulnerability classes, while the middle part was characterized by moderate vulnerability classes. Based on the vulnerability analysis, it was found that 2% and 39% of BCA is under low and high vulnerability to groundwater contamination, respectively, while more than 52% and 5% of the area of BCA can be designated as an area of moderate and very high vulnerability to groundwater contamination, respectively. The GIS technique has provided an efficient environment for analyses and high capabilities of handling a large amount of spatial data. Copyright 2009 Elsevier Ltd. All rights reserved.
Your Resilience is My Vulnerability: ‘Rules in Use’ in a Local Water Conflict
Directory of Open Access Journals (Sweden)
Frank Sondershaus
2014-03-01
Full Text Available This paper uses an empirical analysis of a water conflict in the German state of Brandenburg to explore diverse constructions of vulnerability to water scarcity by local stakeholders. It demonstrates how, in the absence of effective formal institutions, these constructions are getting translated into conflictual resilience strategies practiced by these stakeholders, creating situations in which “your resilience is my vulnerability”. The novel contribution of the paper to resilience research is threefold. Firstly, it illustrates how the vulnerability and resilience of a socio-ecological system—such as small catchment—are socially constructed; that is, how they are not given but rather the product of stakeholders’ perceptions of threats and suitable responses to them. Secondly, the paper emphasizes the role of institutions—both formal and informal—in framing these vulnerability constructions and resilience strategies. Particular attention is paid to the importance of informal ‘rules in use’ emerging in the wake of (formal ‘institutional voids’ and how they work against collective solutions. Thirdly, by choosing a small-scale, commonplace dispute to study vulnerability and resilience, the paper seeks to redress the imbalance of resilience research (and policy on dramatic disaster events by revealing the relevance of everyday vulnerabilities, which may be less eye-catching but are far more widespread.
Ravinetto, Raffaella M; Afolabi, Muhammed O; Okebe, Joseph; Van Nuil, Jennifer Ilo; Lutumba, Pascal; Mavoko, Hypolite Muhindo; Nahum, Alain; Tinto, Halidou; Addissie, Adamu; D'Alessandro, Umberto; Grietens, Koen Peeters
2015-01-01
The freedom to consent to participate in medical research is a complex subject, particularly in socio-economically vulnerable communities, where numerous factors may limit the efficacy of the informed consent process. Informal consultation among members of the Switching the Poles Clinical Research Network coming from various sub-Saharan African countries, that is Burkina Faso, The Gambia, Rwanda, Ethiopia, the Democratic Republic of Congo (DRC) and Benin, seems to support the hypothesis that in socio-economical vulnerable communities with inadequate access to health care, the decision to participate in research is often taken irrespectively of the contents of the informed consent interview, and it is largely driven by the opportunity to access free or better quality care and other indirect benefits. Populations' vulnerability due to poverty and/or social exclusion should obviously not lead to exclusion from medical research, which is most often crucially needed to address their health problems. Nonetheless, to reduce the possibility of exploitation, there is the need to further investigate the complex links between socio-economical vulnerability, access to health care and individual freedom to decide on participation in medical research. This needs bringing together clinical researchers, social scientists and bioethicists in transdisciplinary collaborative research efforts that require the collective input from researchers, research sponsors and funders. © 2014 John Wiley & Sons Ltd.
Debernardi, Laura; de Luca, Domenico Antonio; Lasagna, Manuela
2008-08-01
This paper is the result of a study which was carried out in order to verify if the traditional methods to evaluate the intrinsic vulnerability or vulnerability related parameters, are able to clarify the problem of nitrate pollution in groundwater. In particular, the aim was to evaluate limitations and problems connected to aquifer vulnerability methods applied to nitrate contamination prevision in groundwater. The investigation was carried out by comparing NO3 - concentrations, measured in March and November 2004 in the shallow aquifer, and the vulnerability classes, obtained by using GOD and TOT methods. Moreover, it deals with a comparison between NO3 - concentrations and single parameters (depth to water table, land use and nitrogen input). The study area is the plain sector of Piemonte (Northern Italy), where an unconfined aquifer nitrate contamination exists. In this area the anthropogenic presence is remarkable and the input of N-fertilizers and zootechnical effluents to the soil cause a growing amount of nitrates in groundwater. This approach, used in a large area (about 10,000 km2) and in several monitoring wells (about 500), allowed to compare the efficiency of different vulnerability methods and to verify the importance of every parameter on the nitrate concentrations in the aquifer. Furthermore it allowed to obtain interesting correlations in different hydrogeological situations. Correlations between depth to water table, land use and nitrogen input to the soil with nitrate concentrations in groundwater show unclear situations: in fact these comparisons describe the phenomenon trend and highlight the maximum nitrate concentrations for each circumstance but often show wide ranges of possible nitrate concentrations. The same situation could be observed by comparing vulnerability indexes and nitrate concentrations in groundwater. These results suggest that neither single parameters nor vulnerability methods (GOD and TOT) are able to describe individually
Climate change & extreme weather vulnerability assessment framework.
2012-12-01
The Federal Highway Administrations (FHWAs) Climate Change and Extreme Weather Vulnerability : Assessment Framework is a guide for transportation agencies interested in assessing their vulnerability : to climate change and extreme weather event...
County Population Vulnerability
City and County of Durham, North Carolina — This layer summarizes the social vulnerability index for populations within each county in the United States at scales 1:3m and below. It answers the question...
Barbarich-Marsteller, Nicole C; Underwood, Mark D; Foltin, Richard W; Myers, Michael M; Walsh, B Timothy; Barrett, Jeffrey S; Marsteller, Douglas A
2013-11-01
Activity-based anorexia is a translational rodent model that results in severe weight loss, hyperactivity, and voluntary self-starvation. The goal of our investigation was to identify vulnerable and resistant phenotypes of activity-based anorexia in adolescent female rats. Sprague-Dawley rats were maintained under conditions of restricted access to food (N = 64; or unlimited access, N = 16) until experimental exit, predefined as a target weight loss of 30-35% or meeting predefined criteria for animal health. Nonlinear mixed effects statistical modeling was used to describe wheel running behavior, time to event analysis was used to assess experimental exit, and a regressive partitioning algorithm was used to classify phenotypes. Objective criteria were identified for distinguishing novel phenotypes of activity-based anorexia, including a vulnerable phenotype that conferred maximal hyperactivity, minimal food intake, and the shortest time to experimental exit, and a resistant phenotype that conferred minimal activity and the longest time to experimental exit. The identification of objective criteria for defining vulnerable and resistant phenotypes of activity-based anorexia in adolescent female rats provides an important framework for studying the neural mechanisms that promote vulnerability to or protection against the development of self-starvation and hyperactivity during adolescence. Ultimately, future studies using these novel phenotypes may provide important translational insights into the mechanisms that promote these maladaptive behaviors characteristic of anorexia nervosa. Copyright © 2013 Wiley Periodicals, Inc.
Directory of Open Access Journals (Sweden)
Emmanuel K. Derbile
2016-04-01
Full Text Available This article analysed vulnerability of smallholder agriculture to climate variability, particularly the alternating incidences of drought and heavy precipitation events in Ghana. Although there is an unmet need for understanding the linkages between climate change and livelihoods, the urgent need for climate change adaptation planning (CCAP in response to climate change makes vulnerability assessment even more compelling in development research. The data for analysis were collected from two complementary studies. These included a regional survey in the Upper West Region and an in-depth study in three selected communities in the Sissala East District. The results showed that smallholder agriculture is significantly vulnerable to climate variability in the region and that three layers of vulnerability can be identified in a ladder of vulnerability. Firstly, farmers are confronted with the double tragedy of droughts and heavy precipitation events, which adversely affect both crops and livestock. Secondly, farmers have to decide on crops for adaptation, but each option – whether indigenous crops, new early-maturing crops or genetically modified crops – predisposes farmers to a different set of risks. Finally, the overall impact is a higher-level vulnerability, namely the risk of total livelihood failure and food insecurity. The article recommended CCAP and an endogenous development (ED approach to addressing agriculture vulnerability to climate variability within the framework of decentralisation and local governance in Ghana. Keywords: Climate variability; agriculture; vulnerability; endogenous development; Ghana
Paveglio, Travis B; Edgeley, Catrin M; Stasiewicz, Amanda M
2018-05-01
A growing body of research focuses on identifying patterns among human populations most at risk from hazards such as wildfire and the factors that help explain performance of mitigations that can help reduce that risk. Emerging policy surrounding wildfire management emphasizes the need to better understand such social vulnerability-or human populations' potential exposure to and sensitivity from wildfire-related impacts, including their ability to reduce negative impacts from the hazard. Studies of social vulnerability to wildfire often pair secondary demographic data with a variety of vegetation and wildfire simulation models to map potential risk. However, many of the assumptions made by those researchers about the demographic, spatial or perceptual factors that influence social vulnerability to wildfire have not been fully evaluated or tested against objective measures of potential wildfire risk. The research presented here utilizes self-reported surveys, GIS data, and wildfire simulations to test the relationships between select perceptual, demographic, and property characteristics of property owners against empirically simulated metrics for potential wildfire related damages or exposure. We also evaluate how those characteristics relate to property owners' performance of mitigations or support for fire management. Our results suggest that parcel characteristics provide the most significant explanation of variability in wildfire exposure, sensitivity and overall wildfire risk, while the positive relationship between income or property values and components of social vulnerability stands in contrast to typical assumptions from existing literature. Respondents' views about agency or government management helped explain a significant amount of variance in wildfire sensitivity, while the importance of wildfire risk in selecting a residence was an important influence on mitigation action. We use these and other results from our effort to discuss updated
Integrated flash flood vulnerability assessment: Insights from East Attica, Greece
Karagiorgos, Konstantinos; Thaler, Thomas; Heiser, Micha; Hübl, Johannes; Fuchs, Sven
2016-10-01
In the framework of flood risk assessment, vulnerability is a key concept to assess the susceptibility of elements at risk. Besides the increasing amount of studies on flash floods available, in-depth information on vulnerability in Mediterranean countries was missing so far. Moreover, current approaches in vulnerability research are driven by a divide between social scientists who tend to view vulnerability as representing a set of socio-economic factors, and natural scientists who view vulnerability in terms of the degree of loss to an element at risk. Further, vulnerability studies in response to flash flood processes are rarely answered in the literature. In order to close this gap, this paper implemented an integrated vulnerability approach focusing on residential buildings exposed to flash floods in Greece. In general, both physical and social vulnerability was comparable low, which is interpreted as a result from (a) specific building regulations in Greece as well as general design principles leading to less structural susceptibility of elements at risk exposed, and (b) relatively low economic losses leading to less social vulnerability of citizens exposed. The population show high risk awareness and coping capacity to response to natural hazards event and in the same time the impact of the events are quite low, because of the already high use of local protection measures. The low vulnerability score for East Attica can be attributed especially to the low physical vulnerability and the moderate socio-economic well-being of the area. The consequence is to focus risk management strategies mainly in the reduction of the social vulnerability. By analysing both physical and social vulnerability an attempt was made to bridge the gap between scholars from sciences and humanities, and to integrate the results of the analysis into the broader vulnerability context.
Vulnerable to HIV / AIDS. Migration.
Fernandez, I
1998-01-01
This special report discusses the impact of globalization, patterns of migration in Southeast Asia, gender issues in migration, the links between migration and HIV/AIDS, and spatial mobility and social networks. Migrants are particularly marginalized in countries that blame migrants for transmission of infectious and communicable diseases and other social ills. Effective control of HIV/AIDS among migrant and native populations requires a multisectoral approach. Programs should critically review the privatization of health care services and challenge economic models that polarize the rich and the poor, men and women, North and South, and migrant and native. Programs should recognize the equality between locals and migrants in receipt of health services. Countermeasures should have input from migrants in order to reduce the conditions that increase vulnerability to HIV/AIDS. Gender-oriented research is needed to understand women's role in migration. Rapid assessment has obscured the human dimension of migrants' vulnerability to HIV. Condom promotion is not enough. Migration is a major consequence of globalization, which holds the promise, real or imagined, of prosperity for all. Mass migration can be fueled by explosive regional developments. In Southeast Asia, migration has been part of the process of economic development. The potential to emigrate increases with greater per capita income. "Tiger" economies have been labor importers. Safe sex is not practiced in many Asian countries because risk is not taken seriously. Migrants tend to be used as economic tools, without consideration of social adjustment and sex behavior among singles.
Perspectives on contextual vulnerability in discourses of climate conflict
Okpara, U. T.; Stringer, L. C.; Dougill, A. J.
2016-02-01
The science of climate security and conflict is replete with controversies. Yet the increasing vulnerability of politically fragile countries to the security consequences of climate change is widely acknowledged. Although climate conflict reflects a continuum of conditional forces that coalesce around the notion of vulnerability, how different portrayals of vulnerability influence the discursive formation of climate conflict relations remains an exceptional but under-researched issue. This paper combines a systematic discourse analysis with a vulnerability interpretation diagnostic tool to explore (i) how discourses of climate conflict are constructed and represented, (ii) how vulnerability is communicated across discourse lines, and (iii) the strength of contextual vulnerability against a deterministic narrative of scarcity-induced conflict, such as that pertaining to land. Systematically characterising climate conflict discourses based on the central issues constructed, assumptions about mechanistic relationships, implicit normative judgements and vulnerability portrayals, provides a useful way of understanding where discourses differ. While discourses show a wide range of opinions "for" and "against" climate conflict relations, engagement with vulnerability has been less pronounced - except for the dominant context centrism discourse concerned about human security (particularly in Africa). In exploring this discourse, we observe an increasing sense of contextual vulnerability that is oriented towards a concern for complexity rather than predictability. The article concludes by illustrating that a turn towards contextual vulnerability thinking will help advance a constructivist theory-informed climate conflict scholarship that recognises historicity, specificity, and variability as crucial elements of contextual totalities of any area affected by climate conflict.
Narrative self-constitution and vulnerability to co-authoring.
McConnell, Doug
2016-02-01
All people are vulnerable to having their self-concepts shaped by others. This article investigates that vulnerability using a theory of narrative self-constitution. According to narrative self-constitution, people depend on others to develop and maintain skills of self-narration and they are vulnerable to having the content of their self-narratives co-authored by others. This theoretical framework highlights how vulnerability to co-authoring is essential to developing a self-narrative and, thus, the possibility of autonomy. However, this vulnerability equally entails that co-authors can undermine autonomy by contributing disvalued content to the agent's self-narrative and undermining her authorial skills. I illustrate these processes with the first-hand reports of several women who survived sexual abuse as children. Their narratives of survival and healing reveal the challenges involved in (re)developing the skills required to manage vulnerability to co-authoring and how others can help in this process. Finally, I discuss some of the implications of co-authoring for the healthcare professional and the therapeutic relationship.
Vulnerabilities to misinformation in online pharmaceutical marketing.
De Freitas, Julian; Falls, Brian A; Haque, Omar S; Bursztajn, Harold J
2013-05-01
Given the large percentage of Internet users who search for health information online, pharmaceutical companies have invested significantly in online marketing of their products. Although online pharmaceutical marketing can potentially benefit both physicians and patients, it can also harm these groups by misleading them. Indeed, some pharmaceutical companies have been guilty of undue influence, which has threatened public health and trust. We conducted a review of the available literature on online pharmaceutical marketing, undue influence and the psychology of decision-making, in order to identify factors that contribute to Internet users' vulnerability to online pharmaceutical misinformation. We find five converging factors: Internet dependence, excessive trust in the veracity of online information, unawareness of pharmaceutical company influence, social isolation and detail fixation. As the Internet continues to change, it is important that regulators keep in mind not only misinformation that surrounds new web technologies and their contents, but also the factors that make Internet users vulnerable to misinformation in the first place. Psychological components are a critical, although often neglected, risk factor for Internet users becoming misinformed upon exposure to online pharmaceutical marketing. Awareness of these psychological factors may help Internet users attentively and safely navigate an evolving web terrain.
FINANCING POLICY OF FIRMS IN THE CONTEXT OF CRISIS-INDUCED VULNERABILITIES
Directory of Open Access Journals (Sweden)
Mihaela Brindusa Tudose
2017-07-01
Full Text Available Our study analyses the changes in the financial structure of the firms in the context of the vulnerabilities induced by the financial crisis. The study show that there have been registered a reconfiguration of firms’ financial structure which has triggered an increase in their financial fragility and vulnerability to crises. The results obtained confirm that the effects of financing differ depending on the economic conditions in particular period (normal periods and crisis periods. In tranquil times solvency is more important for the firms than liquidity. After crisis, the firms became more cautious regarding liquidity, solvency and the prospect of securing long-term financial balance. These firms have abandoned the objective of maximizing the positive effects of debt financing adopting a more prudent financing.
Modeling groundwater vulnerability to pollution using Optimized DRASTIC model
International Nuclear Information System (INIS)
Mogaji, Kehinde Anthony; Lim, Hwee San; Abdullar, Khiruddin
2014-01-01
The prediction accuracy of the conventional DRASTIC model (CDM) algorithm for groundwater vulnerability assessment is severely limited by the inherent subjectivity and uncertainty in the integration of data obtained from various sources. This study attempts to overcome these problems by exploring the potential of the analytic hierarchy process (AHP) technique as a decision support model to optimize the CDM algorithm. The AHP technique was utilized to compute the normalized weights for the seven parameters of the CDM to generate an optimized DRASTIC model (ODM) algorithm. The DRASTIC parameters integrated with the ODM algorithm predicted which among the study areas is more likely to become contaminated as a result of activities at or near the land surface potential. Five vulnerability zones, namely: no vulnerable(NV), very low vulnerable (VLV), low vulnerable (LV), moderate vulnerable (MV) and high vulnerable (HV) were identified based on the vulnerability index values estimated with the ODM algorithm. Results show that more than 50% of the area belongs to both moderate and high vulnerable zones on the account of the spatial analysis of the produced ODM-based groundwater vulnerability prediction map (GVPM).The prediction accuracy of the ODM-based – GVPM with the groundwater pH and manganese (Mn) concentrations established correlation factors (CRs) result of 90 % and 86 % compared to the CRs result of 62 % and 50 % obtained for the validation accuracy of the CDM – based GVPM. The comparative results, indicated that the ODM-based produced GVPM is more reliable than the CDM – based produced GVPM in the study area. The study established the efficacy of AHP as a spatial decision support technique in enhancing environmental decision making with particular reference to future groundwater vulnerability assessment
A knowledge integration approach to flood vulnerability
Mazzorana, Bruno; Fuchs, Sven
2014-05-01
Understanding, qualifying and quantifying vulnerability is an essential need for implementing effective and efficient flood risk mitigation strategies; in particular if possible synergies between different mitigation alternatives, such as active and passive measures, should be achieved. In order to combine different risk management options it is necessary to take an interdisciplinary approach to vulnerability reduction, and as a result the affected society may be willing to accept a certain degree of self-responsibility. However, due to differing mono-disciplinary approaches and regional foci undertaken until now, different aspects of vulnerability to natural hazards in general and to floods in particular remain uncovered and as a result the developed management options remain sub-optimal. Taking an even more fundamental viewpoint, the empirical vulnerability functions used in risk assessment specifically fail to capture physical principles of the damage-generating mechanisms to the build environment. The aim of this paper is to partially close this gap by discussing a balanced knowledge integration approach which can be used to resolve the multidisciplinary disorder in flood vulnerability research. Modelling techniques such as mathematical-physical modelling of the flood hazard impact to and response from the building envelope affected, and formative scenario analyses of possible consequences in terms of damage and loss are used in synergy to provide an enhanced understanding of vulnerability and to render the derived knowledge into interdisciplinary mitigation strategies. The outlined formal procedure allows for a convincing knowledge alignment of quantified, but partial, information about vulnerability as a result of the application of physical and engineering notions and valuable, but often underspecified, qualitative argumentation strings emerging from the adopted socio-economic viewpoint.
Social vulnerability to climate-induced natural disasters
DEFF Research Database (Denmark)
Rubin, Olivier
2014-01-01
This paper conducts an analysis of the socioeconomic determinants of Vietnam's cross-provincial variations in natural disaster vulnerability. The purpose is twofold: (i) to capture disaggregated vulnerability variations normally obscured by national statistics, thereby providing more nuanced...... insights into Vietnam's vulnerability to natural disasters; and (ii) to take advantage of the fact that the overall political system and key institutional structures to a large extent are constant across Vietnam's provinces, which makes the analysis a novel addition to the many disaster studies based...
Fatemi, Farin; Ardalan, Ali; Aguirre, Benigno; Mansouri, Nabiollah; Mohammadfam, Iraj
2017-04-10
Industrial chemical accidents have been increased in developing countries. Assessing the human vulnerability in the residents of industrial areas is necessary for reducing the injuries and causalities of chemical hazards. The aim of this study was to explore the key indicators for the assessment of human vulnerability in the residents living near chemical installations. The indicators were established in the present study based on the Fuzzy Delphi method (FDM) and Fuzzy Analytic Hierarchy Process (FAHP). The reliability of FDM and FAHP was calculated. The indicators of human vulnerability were explored in two sets of social and physical domains. Thirty-five relevant experts participated in this study during March-July 2015. According to experts, the top three indicators of human vulnerability according to the FDM and FAHP were vulnerable groups, population density, and awareness. Detailed sub-vulnerable groups and awareness were developed based on age, chronic or severe diseases, disability, first responders, and residents, respectively. Each indicator and sub-indicator was weighted and ranked and had an acceptable consistency ratio. The importance of social vulnerability indicators are about 7 times more than physical vulnerability indicators. Among the extracted indicators, vulnerable groups had the highest weight and the greatest impact on human vulnerability. however, further research is needed to investigate the applicability of established indicators and generalizability of the results to other studies. Fuzzy Delphi; Fuzzy AHP; Human vulnerability; Chemical hazards.
Attentional bias mediates the effect of neurostimulation on emotional vulnerability.
Chen, Nigel T M; Basanovic, Julian; Notebaert, Lies; MacLeod, Colin; Clarke, Patrick J F
2017-10-01
Transcranial direct current stimulation (tDCS) is a neuromodulatory technique which has garnered recent interest in the potential treatment for emotion-based psychopathology. While accumulating evidence suggests that tDCS may attenuate emotional vulnerability, critically, little is known about underlying mechanisms of this effect. The present study sought to clarify this by examining the possibility that tDCS may affect emotional vulnerability via its capacity to modulate attentional bias towards threatening information. Fifty healthy participants were randomly assigned to receive either anodal tDCS (2 mA/min) stimulation to the left dorsolateral prefrontal cortex (DLPFC), or sham. Participants were then eye tracked during a dual-video stressor task designed to elicit emotional reactivity, while providing a concurrent in-vivo measure of attentional bias. Greater attentional bias towards threatening information was associated with greater emotional reactivity to the stressor task. Furthermore, the active tDCS group showed reduced attentional bias to threat, compared to the sham group. Importantly, attentional bias was found to statistically mediate the effect of tDCS on emotional reactivity, while no direct effect of tDCS on emotional reactivity was observed. The findings are consistent with the notion that the effect of tDCS on emotional vulnerability may be mediated by changes in attentional bias, holding implications for the application of tDCS in emotion-based psychopathology. The findings also highlight the utility of in-vivo eye tracking measures in the examination of the mechanisms associated with DLPFC neuromodulation in emotional vulnerability. Copyright © 2017 Elsevier Ltd. All rights reserved.
Vulnerability Situations associated with Flash Flood Casualties in the United States
Terti, G.; Ruin, I.; Anquetin, S.; Gourley, J. J.
2015-12-01
In the United States (U.S.) flash flooding (FF hereafter) is one of the leading cause of weather-related deaths. Because FF events can be distinguished from riverine floods by their fast response to rainfall and resulting impacts signature, analyzing FF-specific impact datasets seems a good way to identify the juxtaposition of social and physical circumstances leading to those impacts. This communication focuses on conceptual and methodological developments allowing testing hypotheses on FF-specific vulnerability factors through the analysis of human impact datasets. We hypothesize that the intersection of the spatio-temporal context of the FF phenomena with the distribution of people and their characteristics across space and time reveals various paths of vulnerability through the expression of different accidents' circumstances (i.e., vehicle-related, inside buildings, open-air, campsites). We argue that vulnerability and the resulting impacts vary dynamically throughout the day according to the location/situation under concern. In order to test FF-specific contextual vulnerability factors at the scale of the continental US, 1075 fatalities reported between 1996 and 2014 in the Storm Data publication of the U.S. National Climatic Data Center (NCDC) are analyzed to statistically explore the timing, the duration and the location of the FF event, and the age and gender of the victims and the circumstance (i.e. location/activity) of their death. In this objective, a re-classification of the individual fatality circumstances and a discretization of the time in qualitative time-steps are performed to obtain possible trends and patterns in the occurrence of fatalities in certain circumstances and time (e.g., day vs night). The findings highlight the importance of situation-specific assessment of FF fatalities to guide the development of FF-specific vulnerability and impacts prediction modeling. Such analysis can provide valuable knowledge when the National Weather
Directory of Open Access Journals (Sweden)
Evi Buelens
2015-06-01
Full Text Available A considerable number of young Europeans live or risk ending up in socially vulnerable situations. Different social channels (e.g., education, on the job training, leisure exist through which youths can enhance their chances to improve their social position. There is a growing belief that sports in particular can help personal and social development of socially vulnerable youths. Nevertheless, there is little understanding of the mechanisms through which sports can foster development. In addition to participating in sports, volunteering in sports is also regarded as providing developmental opportunities for socially vulnerable youths. Today, however, there is an underrepresentation of socially vulnerable youths in volunteering and volunteer training programs. A case study in Brussels was set up within a volunteer soccer training program focused on socially vulnerable youths. A qualitative research design was used to analyze developmental experiences of participants (n = 11 and program organizers (n = 3. The study also aimed to gain more insight into the mechanisms underlying the program. Participating youths indicated development in both technical and key competences. It is concluded that a systematic approach of the volunteer training program can play an important role in the development of competences of socially vulnerable youths both as a volunteer and an individual.
Vulnerability Assessments in Ethical Hacking
Ashiqur Rahman ,; Md. SarwarAlam Rasel; Asaduzzaman Noman; Shakh Md. Alimuzjaman Alim
2016-01-01
Ethical hackers use the same methods and techniques to test and bypass a system's defenses as their less-principled counterparts, but rather than taking advantage of any vulnerabilities found, they document them and provide actionable advice on how to fix them so the organization can improve its overall security. The purpose of ethical hacking is to evaluate the security of a network or system's infrastructure. It entails finding and attempting to exploit any vulnerabilities to de...
Software Design Level Security Vulnerabilities
S. Rehman; K. Mustafa
2011-01-01
Several thousand software design vulnerabilities have been reported through established databases. But they need to be structured and classified to be optimally usable in the pursuit of minimal and effective mitigation mechanism. In order we developed a criterion set for a communicative description of the same to serve the purpose as a taxonomic description of security vulnerabilities, arising in the design phase of Software development lifecycle. This description is a part of an effort to id...
AVQS: Attack Route-Based Vulnerability Quantification Scheme for Smart Grid
Directory of Open Access Journals (Sweden)
Jongbin Ko
2014-01-01
Full Text Available A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification.
AVQS: attack route-based vulnerability quantification scheme for smart grid.
Ko, Jongbin; Lim, Hyunwoo; Lee, Seokjun; Shon, Taeshik
2014-01-01
A smart grid is a large, consolidated electrical grid system that includes heterogeneous networks and systems. Based on the data, a smart grid system has a potential security threat in its network connectivity. To solve this problem, we develop and apply a novel scheme to measure the vulnerability in a smart grid domain. Vulnerability quantification can be the first step in security analysis because it can help prioritize the security problems. However, existing vulnerability quantification schemes are not suitable for smart grid because they do not consider network vulnerabilities. We propose a novel attack route-based vulnerability quantification scheme using a network vulnerability score and an end-to-end security score, depending on the specific smart grid network environment to calculate the vulnerability score for a particular attack route. To evaluate the proposed approach, we derive several attack scenarios from the advanced metering infrastructure domain. The experimental results of the proposed approach and the existing common vulnerability scoring system clearly show that we need to consider network connectivity for more optimized vulnerability quantification.
International Nuclear Information System (INIS)
Goo, Hyun Woo; Seo, Dong-Man; Yun, Tae-Jin; Park, Jeong-Jun; Park, In-Sook; Ko, Jae Kon; Kim, Young Hwee
2009-01-01
In patients with congenital heart disease, coronary artery anomalies are common and have different clinical importance from individuals with structurally normal hearts. Visibility of the coronary arteries by CT has markedly improved due to high temporal resolution and ECG-synchronized data acquisition. In this article we describe current multislice CT techniques for coronary artery imaging and illustrate coronary artery anomalies and clinically important coronary artery anatomy from the point of view of congenital heart disease. (orig.)
Energy Technology Data Exchange (ETDEWEB)
Goo, Hyun Woo [University of Ulsan College of Medicine, Department of Radiology and Research Institute of Radiology, Asan Medical Center, Seoul (Korea); Seo, Dong-Man; Yun, Tae-Jin; Park, Jeong-Jun [University of Ulsan College of Medicine, Department of Pediatric Cardiac Surgery, Asan Medical Center, Seoul (Korea); Park, In-Sook; Ko, Jae Kon; Kim, Young Hwee [University of Ulsan College of Medicine, Department of Pediatric Cardiology, Asan Medical Center, Seoul (Korea)
2009-03-15
In patients with congenital heart disease, coronary artery anomalies are common and have different clinical importance from individuals with structurally normal hearts. Visibility of the coronary arteries by CT has markedly improved due to high temporal resolution and ECG-synchronized data acquisition. In this article we describe current multislice CT techniques for coronary artery imaging and illustrate coronary artery anomalies and clinically important coronary artery anatomy from the point of view of congenital heart disease. (orig.)
New approach to analyzing vulnerability
International Nuclear Information System (INIS)
O'Callaghan, P.B.; Carlson, R.L.; Riedeman, G.W.
1986-01-01
The Westinghouse Hanford Company (WHC) has recently completed construction of the Fuel Cycle Plant (FCP) at Richland, Washington. At start-up the facility will fabricate driver fuel for the Fast Flux Test Facility in the Secure Automated Fabrication line. After construction completion, but before facility certification, the Department of Energy (DOE) Richland Operation Office requested that a vulnerability analysis be performed which assumed multiple insiders as a threat to the security system. A unique method of analyzing facility vulnerabilities was developed at the Security Applications Center (SAC), which is managed by WHC for DOE. The method that was developed verifies a previous vulnerability assessment, as well as introducing a modeling technique which analyzes security alarms in relation to delaying factors and possible insider activities. With this information it is possible to assess the relative strength or weakness of various possible routes to and from a target within a facility
Climate change: are we all vulnerable?: Reconsidering inequalities
International Nuclear Information System (INIS)
Magnan, Alexandre
2013-01-01
This bibliographical note presents a book in which the author reviews two generally accepted ideas: first, the poorest communities would be the most vulnerable to climate change due to their weak adaptation capacities, and second, such an adaptation would only be an issue of projection on a long term. Based on his works on coastal areas and on his experience on issues of vulnerability and adaptation to climate change he shows that all societies are potentially vulnerable. He uses the notion of 'impact chains', introduces three global parameters for these chains (temperatures, sea level, and precipitation regime), and outlines the always increasing complexity of causes-consequences relationships. He discusses two key concepts: vulnerability as the degree at which a system might be affected by climate changes, and the adaptation capacity which is developed by societies to reduce their vulnerability to environmental changes
Susceptibility to mountain hazards in Austria - paradigms of vulnerability revisited
Fuchs, Sven
2010-05-01
The concept of vulnerability is pillared by multiple disciplinary theories underpinning either a technical or a social origin of the concept and resulting in a range of paradigms for either a qualitative or quantitative assessment of vulnerability. However, efforts to reduce susceptibility to hazards and to create disaster-resilient communities require intersections among these theories, since human activity cannot be seen independently from the environmental setting. Acknowledging different roots of disciplinary paradigms, issues determining structural, economic, institutional and social vulnerability are discussed with respect to mountain hazards in Austria. The underlying idea of taking such an integrative viewpoint was the cognition that human action in mountain environments affects the state of vulnerability, and the state of vulnerability in turn shapes the possibilities of human action. It is argued that structural vulnerability as originator results in considerable economic vulnerability, generated by the institutional settings of dealing with natural hazards and shaped by the overall societal framework. Hence, the vulnerability of a specific location and within a considered point of time is triggered by the hazardous event and the related physical susceptibility of structures, such as buildings located on a torrent fan. Depending on the specific institutional settings, economic vulnerability of individuals or of the society results, above all with respect to imperfect loss compensation mechanisms in the areas under investigation. While this potential for harm can be addressed as social vulnerability, the concept of institutional vulnerability has been developed with respect to the overall political settings of governmental risk management. As a result, the concept of vulnerability, as being used in natural sciences, can be extended by integration of possible reasons why such physical susceptibility of structures exists, and by integration of compensation
Identification of vulnerability within a child and family health service.
Kimla, Katarina; Nathanson, Dania; Woolfenden, Susan; Zwi, Karen
2017-11-21
Objective The aims of the present study were to describe the prevalence of vulnerability in a cohort of newborns, identify the factors that increase the risk of vulnerability and examine whether those who are most vulnerable are receiving home visits. Methods A prospective cross-sectional study was performed using data collected from questionnaires completed by child and family health nurses and obstetric discharge summaries for each mother-baby dyad. Descriptive frequencies and percentages are used to describe the proportions of children who were vulnerable, offered services and had risk factors for vulnerability. Categorical data were compared using Pearson's Chi-squared analysis. Results In all, 1517 newborns were included in the present study. Of these, 40.5% were identified as vulnerable and 13.9% had two or more risk factors for vulnerability (95% confidence interval (CI) 12-16%). The most common risk factors were biological. Across all newborns, 33.7% were visited at home, and 74.6% of vulnerable newborns were offered a home visit. Children identified as vulnerable were more likely to have a home visit than those who were not (z for 95% CI=1.96; Pvulnerability allowed the offer of home visiting to be directed towards those most likely to benefit. What is known about the topic? Of the Australian child population, 10-20% are vulnerable to adverse health, developmental and wellbeing outcomes. Vulnerable infants are at a greater risk of becoming vulnerable children, adolescents and adults over the life course. Biological and psychosocial risk factors for vulnerability are well described. Families with the greatest need are often the least likely to access or receive support, and have lower utilisation of preventative health services despite evidence that support in the first few years of life can significantly improve long-term outcomes. What does this paper add? This paper provides a detailed description of vulnerabilities in a cohort of newborns and
Yorulmaz, Orçun; Gençöz, Tülin; Woody, Sheila
2010-01-01
Recent findings have suggested some potential psychological vulnerability factors for development of obsessive-compulsive (OC) symptoms, including cognitive factors of appraisal and thought control, religiosity, self-esteem and personality characteristics such as neuroticism. Studies demonstrating these associations usually come from Western cultures, but there may be cultural differences relevant to these vulnerability factors and OC symptoms. The present study examined the relationship between putative vulnerability factors and OC symptoms by comparing non-clinical samples from Turkey and Canada, two countries with quite different cultural characteristics. The findings revealed some common correlates such as neuroticism and certain types of metacognition, including appraisals of responsibility/threat estimation and perfectionism/need for certainty, as well as thought-action fusion. However, culture-specific factors were also indicated in the type of thought control participants used. For OC disorder symptoms, Turkish participants were more likely to utilize worry and thought suppression, while Canadian participants tended to use self-punishment more frequently. The association with common factors supports the cross-cultural validity of some factors, whereas unique factors suggest cultural features that may be operative in cognitive processes relevant to OC symptoms.
A Methodology for Assessing the Seismic Vulnerability of Highway Systems
International Nuclear Information System (INIS)
Cirianni, Francis; Leonardi, Giovanni; Scopelliti, Francesco
2008-01-01
Modern society is totally dependent on a complex and articulated infrastructure network of vital importance for the existence of the urban settlements scattered on the territory. On these infrastructure systems, usually indicated with the term lifelines, are entrusted numerous services and indispensable functions of the normal urban and human activity.The systems of the lifelines represent an essential element in all the urbanised areas which are subject to seismic risk. It is important that, in these zones, they are planned according to opportune criteria based on two fundamental assumptions: a) determination of the best territorial localization, avoiding, within limits, the places of higher dangerousness; b) application of constructive technologies finalized to the reduction of the vulnerability.Therefore it is indispensable that in any modern process of seismic risk assessment the study of the networks is taken in the rightful consideration, to be integrated with the traditional analyses of the buildings.The present paper moves in this direction, dedicating particular attention to one kind of lifeline: the highway system, proposing a methodology of analysis finalized to the assessment of the seismic vulnerability of the system
Transplant recipients are vulnerable to coverage denial under Medicare Part D.
Potter, Lisa M; Maldonado, Angela Q; Lentine, Krista L; Schnitzler, Mark A; Zhang, Zidong; Hess, Gregory P; Garrity, Edward; Kasiske, Bertram L; Axelrod, David A
2018-02-15
Transplant immunosuppressants are often used off-label because of insufficient randomized prospective trial data to achieve organ-specific US Food and Drug Administration (FDA) approval. Transplant recipients who rely on Medicare Part D for immunosuppressant drug coverage are vulnerable to coverage denial for off-label prescriptions, unless use is supported by Centers for Medicare & Medicaid Services (CMS)-approved compendia. An integrated dataset including national transplant registry data and 3 years of dispensed pharmacy records was used to identify the prevalence of immunosuppression use that is both off-label and not supported by CMS-approved compendia. Numbers of potentially vulnerable transplant recipients were identified. Off-label and off-compendia immunosuppression regimens are frequently prescribed (3-year mean: lung 66.5%, intestine 34.2%, pancreas 33.4%, heart 21.8%, liver 16.5%, kidney 0%). The annual retail cost of these at-risk medications exceeds $30 million. This population-based study of transplant immunosuppressants vulnerable to claim denials under Medicare Part D coverage demonstrates a substantial gap between clinical practice, current FDA approval processes, and policy mandates for pharmaceutical coverage. This coverage barrier reduces access to life-saving medications for patients without alternative resources and may increase the risk of graft loss and death from medication nonadherence. © 2018 The American Society of Transplantation and the American Society of Transplant Surgeons.
Vulnerability of particularly valuable areas. Summary
Energy Technology Data Exchange (ETDEWEB)
NONE
2012-07-01
This report is part of the scientific basis for the management plan for the North Sea and Skagerrak. The report focuses on the vulnerability of particularly valuable areas to petroleum activities, maritime transport, fisheries, land-based and coastal activities and long-range transboundary pollution. A working group with representatives from many different government agencies, headed by the Institute of Marine Research and the Directorate for Nature Management, has been responsible for drawing up the present report on behalf of the Expert Group for the North Sea and Skagerrak. The present report considers the 12 areas that were identified as particularly valuable during an earlier stage of the management plan process on the environment, natural resources and pollution. There are nine areas along the coast and three open sea areas in the North Sea that were identified according to the same predefined criteria as used for the management plans for the Barents Sea: Lofoten area and the Norwegian Sea. The most important criteria for particularly valuable areas are importance for biological production and importance for biodiversity.(Author)
Vulnerability of particularly valuable areas. Summary
International Nuclear Information System (INIS)
2012-01-01
This report is part of the scientific basis for the management plan for the North Sea and Skagerrak. The report focuses on the vulnerability of particularly valuable areas to petroleum activities, maritime transport, fisheries, land-based and coastal activities and long-range transboundary pollution. A working group with representatives from many different government agencies, headed by the Institute of Marine Research and the Directorate for Nature Management, has been responsible for drawing up the present report on behalf of the Expert Group for the North Sea and Skagerrak. The present report considers the 12 areas that were identified as particularly valuable during an earlier stage of the management plan process on the environment, natural resources and pollution. There are nine areas along the coast and three open sea areas in the North Sea that were identified according to the same predefined criteria as used for the management plans for the Barents Sea: Lofoten area and the Norwegian Sea. The most important criteria for particularly valuable areas are importance for biological production and importance for biodiversity.(Author)
Directory of Open Access Journals (Sweden)
Dixis Figueroa Pedraza
2005-09-01
Full Text Available Los grupos más expuestos a la Inseguridad Alimentaria y Nutricional son los que figuran en cualquier lista de "desposeídos". Las familias más afectadas son aquellas más vulnerables a la degradación del medio ambiente, que viven en malas condiciones sanitarias, de contaminación y superpoblación; cuando esto se asocia al grupo materno infantil la vulnerabilidad queda reforzada. Si importante es la cantidad de personas con subnutrición y desnutrición, también lo es definir: quiénes son, dónde están, los alimentos que suelen consumir y las causas del problema - soluciones. Nuestra caracterización de los posibles grupos vulnerables en Brasil sigue dos perspectivas: datos relacionados con la pobreza y los criterios para la clasificación de grupos vulnerables de la FAO (perspectiva que refiere criterios personales, pues no existen abordajes de este tipo en la literatura científica. La alta concentración de renta de Brasil hace que los pobres tengan escasos recursos para comprar una cesta básica de alimentos, implicando mayor vulnerabilidad. Se pueden observar diferencias entre: áreas urbanas y rurales, áreas no-metropolitanas y metropolitanas, y entre las regiones nordeste y norte en relación con las demás. Cabe destacar las importantes influencias étnicas, culturales y migratorias que sobre estos grupos de personas pesan y que los hacen vulnerables.The more exposed people to Food and Nutritional Insecurity comprise the list of the "dispossessed". The most affected families are the ones more vulnerable to environment degradation, living in bad sanitary conditions, contamination and high demographic rates; when this is associated to the maternal and children group vulnerability becomes more accentuated. The quantification of malnourished and undernourished people is as important as determining who they are, where they are, their food habits and the causes and solutions for the problem. Our definition of possible vulnerable groups
Wei, Yanqiang; Wang, Shijin; Fang, Yiping; Nawaz, Zain
2017-10-01
Animal husbandry is a dominant and traditional source of livelihood and income in the Qinghai-Tibetan Plateau. The Qinghai-Tibetan Plateau is the third largest snow covered area in China and is one of the main snow disaster regions in the world. It is thus imperative to urgently address the issue of vulnerability of the animal husbandry sector to snow disasters for disaster mitigation and adaptation under growing risk of these disasters as a result of future climate change. However, there is very few literature reported on the vulnerability of animal husbandry in the Qinghai-Tibetan Plateau. This assessment aims at identifying vulnerability of animal husbandry at spatial scale and to identify the reasons for vulnerability for adaptive planning and disaster mitigation. First, historical snow disaster characteristics have been analyzed and used for the spatial weight for vulnerability assessment. Second, indicator-based vulnerability assessment model and indicator system have been established. We combined risk of snow hazard, sensitivity of livestock to disaster, physical exposure to disaster, and community capacity to adapt to snow disaster in an integrated vulnerability index. Lastly, vulnerability of animal husbandry to snow disaster on the Qinghai-Tibetan Plateau has been evaluated. Results indicate that high vulnerabilities are mainly concentrated in the eastern and central plateau and that vulnerability decreases gradually from the east to the west. Due to global warming, the vulnerability trend has eased to some extent during the last few decades. High livestock density exposure to blizzard-prone regions and shortages of livestock barn and forage are the main reasons of high vulnerability. The conclusion emphasizes the important role of the local government and community to help local pastoralists for reducing vulnerability to snow disaster and frozen hazard. The approaches presented in this paper can be used for snow disaster mitigation, resilience
Climate change vulnerability assessment in Georgia
Binita KC; J. Marshall Shepherd; Cassandra Johnson Gaither
2015-01-01
Climate change is occurring in the Southeastern United States, and one manifestation is changes in frequency and intensity of extreme events. A vulnerability assessment is performed in the state of Georgia (United States) at the county level from 1975 to 2012 in decadal increments. Climate change vulnerability is typically measured as a function of exposure to physical...
Predicting Vulnerability Risks Using Software Characteristics
Roumani, Yaman
2012-01-01
Software vulnerabilities have been regarded as one of the key reasons for computer security breaches that have resulted in billions of dollars in losses per year (Telang and Wattal 2005). With the growth of the software industry and the Internet, the number of vulnerability attacks and the ease with which an attack can be made have increased. From…
Evaluation on island ecological vulnerability and its spatial heterogeneity.
Chi, Yuan; Shi, Honghua; Wang, Yuanyuan; Guo, Zhen; Wang, Enkang
2017-12-15
The evaluation on island ecological vulnerability (IEV) can help reveal the comprehensive characteristics of the island ecosystem and provide reference for controlling human activities on islands. An IEV evaluation model which reflects the land-sea dual features, natural and anthropogenic attributes, and spatial heterogeneity of the island ecosystem was established, and the southern islands of Miaodao Archipelago in North China were taken as the study area. The IEV, its spatial heterogeneity, and its sensitivities to the evaluation elements were analyzed. Results indicated that the IEV was in status of mild vulnerability in the archipelago scale, and population pressure, ecosystem productivity, environmental quality, landscape pattern, and economic development were the sensitive elements. The IEV showed significant spatial heterogeneities both in land and surrounding waters sub-ecosystems. Construction scale control, optimization of development allocation, improvement of exploitation methods, and reasonable ecological construction are important measures to control the IEV. Copyright © 2017 Elsevier Ltd. All rights reserved.
Mental vulnerability--a risk factor for ischemic heart disease
DEFF Research Database (Denmark)
Eplov, Lene Falgaard; Jørgensen, Torben; Birket-Smith, Morten
2006-01-01
OBJECTIVE: The purpose of this study is to examine whether mental vulnerability is a risk factor for the development of ischemic heart disease (IHD) after adjustment for well-established risk factors. METHODS: In three prospective cohort studies in Copenhagen County, Denmark, we recorded the level...... of mental vulnerability and possible risk factors to IHD at baseline. For follow-up, the sample was linked to relevant registries to identify all cases of fatal and nonfatal IHD. The relationship between mental vulnerability and IHD was examined using both Kaplan-Meir and Cox proportional hazard models...... adjusting for possible confounding factors. RESULTS: Mental vulnerability was significantly associated with the risk for IHD (medium mental vulnerability: hazard ratio 1.41, 95% confidence interval 1.04-1.91; and high mental vulnerability: hazard ratio 2.05; 95% confidence interval 1.46-2.88), after...
Identification of lightning vulnerability points on complex grounded structures
Becerra Garcia, Marley; Cooray, Vernon; Hartono, Z.A
2007-01-01
The identification of the most vulnerable points on a given structure to be struck by lightning is an important issue on the design of areliable lightning protection system. Traditionally, these lightning strike points are identified using the rolling sphere method, through anempirical correlation with the prospective peak return stroke current. However, field observations in Kuala Lumpur and Singapore haveshown that the points where lightning flashes strike buildings also depend on the heigh...
A closed form solution for vulnerable options with Heston’s stochastic volatility
International Nuclear Information System (INIS)
Lee, Min-Ku; Yang, Sung-Jin; Kim, Jeong-Hoon
2016-01-01
Over-the-counter stock markets in the world have been growing rapidly and vulnerability to default risks of option holders traded in the over-the-counter markets became an important issue, in particular, since the global finance crisis and Eurozone crisis. This paper studies the pricing of European-type vulnerable options when the underlying asset follows the Heston dynamics. In this paper, we obtain a closed form analytic formula of the option price as a stochastic volatility extension of the classical Heston formula and find how the stochastic volatility effect on the Black–Scholes price as well as on the decreasing speed of the option price with credit risk depends on moneyness.
Development of a heat vulnerability index for New York State.
Nayak, S G; Shrestha, S; Kinney, P L; Ross, Z; Sheridan, S C; Pantea, C I; Hsu, W H; Muscatiello, N; Hwang, S A
2017-12-01
The frequency and intensity of extreme heat events are increasing in New York State (NYS) and have been linked with increased heat-related morbidity and mortality. But these effects are not uniform across the state and can vary across large regions due to regional sociodemographic and environmental factors which impact an individual's response or adaptive capacity to heat and in turn contribute to vulnerability among certain populations. We developed a heat vulnerability index (HVI) to identify heat-vulnerable populations and regions in NYS. Census tract level environmental and sociodemographic heat-vulnerability variables were used to develop the HVI to identify heat-vulnerable populations and areas. Variables were identified from a comprehensive literature review and climate-health research in NYS. We obtained data from 2010 US Census Bureau and 2011 National Land Cover Database. We used principal component analysis to reduce correlated variables to fewer uncorrelated components, and then calculated the cumulative HVI for each census tract by summing up the scores across the components. The HVI was then mapped across NYS (excluding New York City) to display spatial vulnerability. The prevalence rates of heat stress were compared across HVI score categories. Thirteen variables were reduced to four meaningful components representing 1) social/language vulnerability; 2) socioeconomic vulnerability; 3) environmental/urban vulnerability; and 4) elderly/ social isolation. Vulnerability to heat varied spatially in NYS with the HVI showing that metropolitan areas were most vulnerable, with language barriers and socioeconomic disadvantage contributing to the most vulnerability. Reliability of the HVI was supported by preliminary results where higher rates of heat stress were collocated in the regions with the highest HVI. The NYS HVI showed spatial variability in heat vulnerability across the state. Mapping the HVI allows quick identification of regions in NYS that could
Aircraft vulnerability analysis by modelling and simulation
CSIR Research Space (South Africa)
Willers, CJ
2014-09-01
Full Text Available attributable to misuse of the weapon or to missile performance restrictions. This paper analyses some of the factors affecting aircraft vulnerability and demonstrates a structured analysis of the risk and aircraft vulnerability problem. The aircraft...
Helping air quality managers identify vulnerable communities
CSIR Research Space (South Africa)
Wright, C
2008-10-01
Full Text Available population exposure and vulnerability risk prioritisation model is proposed for potential use by air quality managers in conjunction with their air quality management plans. The model includes factors such as vulnerability caused by poverty, respiratory...
Vulnerabilities in snakebites in Sao Paulo, Brazil
Directory of Open Access Journals (Sweden)
Maria Rita Bertolozzi
2015-01-01
Full Text Available ABSTRACTOBJECTIVE To describe elements of vulnerability of victims of snakebite.METHODS This qualitative, descriptive, cross-sectional study had, as theoretical framework, the concept of vulnerability in individual, social, and programmatic dimensions. We interviewed 21 patients admitted into a hospital specialized in the care of accidents caused by venomous animals. The interviews were analyzed according to a discourse analysis technique.RESULTS Patients were mainly young men, living in remote countryside areas, where health services frequently have limited resources. We found social and individual conditions of vulnerability, such as precarious schooling, low professional qualification, housing without access to piped water, no sewage treated, and no regular garbage collection, and lack of knowledge on this health problem. Regarding the programmatic dimension, we found limited accessibility to the health services that could affect the prognosis and the frequency of sequelae and deaths.CONCLUSIONS Considering such vulnerabilities evoke the need to improve the program for control the Accidents by Venomous Animals and the training of health workers, we highlight the potential use of the concept of vulnerability, which may amplify the understanding and the recommendations for the practice and education related to snakebites.
Chen, Ying; Wu, Zhong; Yang, Cuiwei; Shao, Jun; Wong, Kelvin Kian Loong; Abbott, Derek
2012-09-01
Atrial fibrillation (AF) can result in life-threatening arrhythmia, and a clinically convenient means for detecting vulnerability remains elusive. We investigated atrial vulnerability by analyzing the sinus electrogram (EG) from AF animal models using a phase synchronization method. Using acetylcholine (ACh)-induced acute canine AF models (n= 4), a total of 128 electrical leads were attached to the surface of the anterior and posterior atria, and the pulmonary veins to form an electrocardiological mapping system. ACh was injected at varying concentrations with ladder-type adjustments. Sinus EGs and induced AF EGs that pertain to specific ACh concentrations were recorded.We hypothesize that the atrial vulnerability may be correlated with the Shannon entropy (SE) of the phase difference matrix that is extracted from the sinus EG. Our research suggests that the combination of SE with the synchronization method enables the sinus node EG to be analyzed and used to estimate atrial vulnerability.
Assessing the social vulnerability to malaria in Rwanda.
Bizimana, Jean-Pierre; Twarabamenye, Emmanuel; Kienberger, Stefan
2015-01-07
Since 2004, malaria interventions in Rwanda have resulted in substantial decline of malaria incidence. However, this achievement is fragile as potentials for local malaria transmissions remain. The risk of getting malaria infection is partially explained by social conditions of vulnerable populations. Since vulnerability to malaria is both influenced by social and environmental factors, its complexity cannot be measured by a single value. The aim of this paper is, therefore, to apply a composite indicator approach for assessing social vulnerability to malaria in Rwanda. This assessment informs the decision-makers in targeting malaria interventions and allocating limited resources to reduce malaria burden in Rwanda. A literature review was used to conceptualize the social vulnerability to malaria and to select the appropriate vulnerability indicators. Indicators used in the index creation were classified into susceptibility and lack of resilience vulnerability domains. The main steps followed include selection of indicators and datasets, imputation of missing values, descriptive statistics, normalization and weighting of indicators, local sensitivity analysis and indicators aggregation. Correlation analysis helped to empirically evidence the association between the indicators and malaria incidence. The high values of social vulnerability to malaria are found in Gicumbi, Rusizi, Nyaruguru and Gisagara, and low values in Muhanga, Nyarugenge, Kicukiro and Nyanza. The most influential susceptibility indicators to increase malaria are population change (r = 0.729), average number of persons per bedroom (r = 0.531), number of households affected by droughts and famines (r = 0.591), and area used for irrigation (r = 0.611). The bed net ownership (r = -0.398) and poor housing wall materials (0.378) are the lack of resilience indicators that significantly correlate with malaria incidence. The developed composite index social vulnerability to malaria
Directory of Open Access Journals (Sweden)
Amélie Christelle Lootvoet
Full Text Available Behavioral traits are likely to influence species vulnerability to anthropogenic threats and in consequence, their risk of extinction. Several studies have addressed this question and have highlighted a correlation between reproductive strategies and different viability proxies, such as introduction success and local extinction risk. Yet, very few studies have investigated the effective impact of social behaviour, and evidence regarding global extinction risk remains scant. Here we examined the effects of three main behavioral factors: the group size, the social and reproductive system, and the strength of sexual selection on global extinction risk. Using Primates as biological model, we performed comparative analysis on 93 species. The conservation status as described by the IUCN Red List was considered as a proxy for extinction risk. In addition, we added previously identified intrinsic factors of vulnerability to extinction, and a measure of the strength of the human impact for each species, described by the human footprint. Our analysis highlighted a significant effect of two of the three studied behavioral traits, group size and social and reproductive system. Extinction risk is negatively correlated with mean group size, which may be due to an Allee effect resulting from the difficulties for solitary and monogamous species to find a partner at low densities. Our results also indicate that species with a flexible mating system are less vulnerable. Taking into account these behavioral variables is thus of high importance when establishing conservation plans, particularly when assessing species relative vulnerability.
International Nuclear Information System (INIS)
Almoghathawi, Yasser; Barker, Kash; Rocco, Claudio M.; Nicholson, Charles D.
2017-01-01
Analyzing network vulnerability is a key element of network planning in order to be prepared for any disruptive event that might impact the performance of the network. Hence, many importance measures have been proposed to identify the important components in a network with respect to vulnerability and rank them accordingly based on individual importance measure. However, in this paper, we propose a new approach to identify the most important network components based on multiple importance measures using a multi criteria decision making (MCDM) method, namely the technique for order performance by similarity to ideal solution (TOPSIS), able to take into account the preferences of decision-makers. We consider multiple edge-specific flow-based importance measures provided as the multiple criteria of a network where the alternatives are the edges. Accordingly, TOPSIS is used to rank the edges of the network based on their importance considering multiple different importance measures. The proposed approach is illustrated through different networks with different densities along with the effects of weighs. - Highlights: • We integrate several perspectives on network vulnerability to generate a component importance ranking. • We apply these measures to determine the importance of edges after disruptions. • Networks of varying size and density are explored.
Assessing the vulnerability of infrastructure to climate change on the Islands of Samoa
Fakhruddin, S. H. M.; Babel, M. S.; Kawasaki, A.
2015-06-01
Pacific Islanders have been exposed to risks associated with climate change. Samoa, as one of the Pacific Islands, is prone to climatic hazards that will likely increase in the coming decades, affecting coastal communities and infrastructure around the islands. Climate models do not predict a reduction of such disaster events in the future in Samoa; indeed, most predict an increase. This paper identifies key infrastructure and their functions and status in order to provide an overall picture of relative vulnerability to climate-related stresses of such infrastructure on the island. By reviewing existing reports as well as holding a series of consultation meetings, a list of critical infrastructure was developed and shared with stakeholders for their consideration. An indicator-based vulnerability model (SIVM) was developed in collaboration with stakeholders to assess the vulnerability of selected infrastructure systems on the Samoan Islands. Damage costs were extracted from the Cyclone Evan recovery needs document. Additionally, data on criticality and capacity to repair damage were collected from stakeholders. Having stakeholder perspectives on these two issues was important because (a) criticality of a given infrastructure could be viewed differently among different stakeholders, and (b) stakeholders were the best available source (in this study) to estimate the capacity to repair non-physical damage to such infrastructure. Analysis of the results suggested a ranking of sectors from the most vulnerable to least vulnerable are: the transportation sector, the power sector, the water supply sector and the sewerage system.
International Nuclear Information System (INIS)
Ahmed, M.A.
2012-01-01
Intrinsic vulnerability assessment to delineate areas that are more susceptible to contamination from anthropogenic sources has become an important element for sensible resource management and land use planning. The vulnerability for the alluvial aquifer in El-Fayoum depression was assessed by applying the Drastic model as well as utilizing sensitivity analyses to evaluate the reliability of this model. This method uses seven parameters including climatic, geological, and hydrogeological conditions controlling the seepage of pollutant substances to groundwater. Vulnerability maps were produced by applying the Generic and Agricultural models according to the Drastic charter. The resulting agricultural Drastic vulnerability map indicates that 23.3%, 22.7% and 12.4% of El-Fayoum depression is under low, low-moderate and moderately high vulnerability of groundwater contamination, respectively, while 41.6% of the area of study can be designated as an area of moderate vulnerability of groundwater contamination. Resulting maps revealed that the potential for polluting groundwater with agricultural chemicals is greater than with Generic Drastic index pollutants. Depth to water table parameter inflicted the largest impact on the intrinsic vulnerability of the alluvial aquifer in El-Fayoum depression. Both the map removal and single-parameter sensitivity analyses indicated that the vulnerability index is the least sensitive to the removal of the recharge and hydraulic conductivity parameters but is highly sensitive to the removal of depth to water parameter.
Chen, Tian-Mu; Zhang, Shao-Sen; Feng, Jun; Xia, Zhi-Gui; Luo, Chun-Hai; Zeng, Xu-Can; Guo, Xiang-Rui; Lin, Zu-Rui; Zhou, Hong-Ning; Zhou, Shui-Sen
2018-04-29
The China-Myanmar border region presents a great challenge in malaria elimination in China, and it is essential to understand the relationship between malaria vulnerability and population mobility in this region. A community-based, cross-sectional survey was performed in five villages of Yingjiang county during September 2016. Finger-prick blood samples were obtained to identify asymptomatic infections, and imported cases were identified in each village (between January 2013 and September 2016). A stochastic simulation model (SSM) was used to test the relationship between population mobility and malaria vulnerability, according to the mechanisms of malaria importation. Thirty-two imported cases were identified in the five villages, with a 4-year average of 1 case/year (range: 0-5 cases/year). No parasites were detected in the 353 blood samples from 2016. The median density of malaria vulnerability was 0.012 (range: 0.000-0.033). The average proportion of mobile members of the study population was 32.56% (range: 28.38-71.95%). Most mobile individuals lived indoors at night with mosquito protection. The SSM model fit the investigated data (χ 2 = 0.487, P = 0.485). The average probability of infection in the members of the population that moved to Myanmar was 0.011 (range: 0.0048-0.1585). The values for simulated vulnerability increased with greater population mobility in each village. A high proportion of population mobility was associated with greater malaria vulnerability in the China-Myanmar border region. Mobile population-specific measures should be used to decrease the risk of malaria re-establishment in China.
Tripartite Governance: Enabling Successful Implementations with Vulnerable Populations.
Kennedy, Margaret Ann
2016-01-01
Vulnerable populations are often at a distinct disadvantage when it comes to the implementation of health information systems in an equitable, appropriate, and timely manner. The disadvantages experienced by vulnerable populations are innumerable and include lack of representation, lack of appropriate levels of funding, lack of resources and capacity, and lack of representation. Increasingly, models of representation for complex implementations involve a tripartite project governance model. This tripartite partnership distributes accountability across all partners, and ensures that vulnerable populations have an equitable contribution to the direction of implementation according to their needs. This article shares lessons learned and best practices from complex tripartite partnerships supporting implementations with vulnerable populations in Canada.
Ciurean, R. L.; Glade, T.
2012-04-01
Decision under uncertainty is a constant of everyday life and an important component of risk management and governance. Recently, experts have emphasized the importance of quantifying uncertainty in all phases of landslide risk analysis. Due to its multi-dimensional and dynamic nature, (physical) vulnerability is inherently complex and the "degree of loss" estimates imprecise and to some extent even subjective. Uncertainty analysis introduces quantitative modeling approaches that allow for a more explicitly objective output, improving the risk management process as well as enhancing communication between various stakeholders for better risk governance. This study presents a review of concepts for uncertainty analysis in vulnerability of elements at risk to landslides. Different semi-quantitative and quantitative methods are compared based on their feasibility in real-world situations, hazard dependency, process stage in vulnerability assessment (i.e. input data, model, output), and applicability within an integrated landslide hazard and risk framework. The resulted observations will help to identify current gaps and future needs in vulnerability assessment, including estimation of uncertainty propagation, transferability of the methods, development of visualization tools, but also address basic questions like what is uncertainty and how uncertainty can be quantified or treated in a reliable and reproducible way.
Current diagnostic modalities for vulnerable plaque detection
J.A. Schaar (Johannes); F. Mastik (Frits); E.S. Regar (Eveline); C.A. den Uil (Corstiaan); F.J.H. Gijsen (Frank); J.J. Wentzel (Jolanda); P.W.J.C. Serruys (Patrick); A.F.W. van der Steen (Ton)
2007-01-01
textabstractRupture of vulnerable plaques is the main cause of acute coronary syndrome and myocardial infarction. Identification of vulnerable plaques is therefore essential to enable the development of treatment modalities to stabilize such plaques. Several diagnostic methods are currently tested
Childhood physical abuse and aggression: Shame and narcissistic vulnerability.
Keene, Amanda C; Epps, James
2016-01-01
This study examined narcissistic vulnerability and shame-proneness as potential mediators between childhood physical abuse (CPA) and adult anger and aggression. Participants were 400 undergraduate students, 134 of whom had a history of CPA. All participants completed self-report questionnaires assessing history of CPA, shame-proneness, narcissistic vulnerability, physical aggression, trait anger, and hostility. Results indicated abused participants were more angry and aggressive and experienced higher levels of shame-proneness and narcissistic vulnerability than nonabused participants. Multiple mediation analyses showed that narcissistic vulnerability, but not shame-proneness, partially mediated the relation between abuse and physical aggression. However, narcissistic vulnerability and shame-proneness both emerged as partial mediators between abuse and the anger and hostility variables. These findings suggest that narcissistic vulnerability and shame-proneness may function as mediators of adjustment following childhood maltreatment. Study limitations and recommendations for future research are discussed. Copyright © 2015 Elsevier Ltd. All rights reserved.
Effect of clustering on attack vulnerability of interdependent scale-free networks
International Nuclear Information System (INIS)
Li, Rui-qi; Sun, Shi-wen; Ma, Yi-lin; Wang, Li; Xia, Cheng-yi
2015-01-01
In order to deeply understand the complex interdependent systems, it is of great concern to take clustering coefficient, which is an important feature of many real-world systems, into account. Previous study mainly focused on the impact of clustering on interdependent networks under random attacks, while we extend the study to the case of the more realistic attacking strategy, targeted attack. A system composed of two interdependent scale-free networks with tunable clustering is provided. The effects of coupling strength and coupling preference on attack vulnerability are explored. Numerical simulation results demonstrate that interdependent links between two networks make the entire system much more fragile to attacks. Also, it is found that clustering significantly increases the vulnerability of interdependent scale-free networks. Moreover, for fully coupled network, disassortative coupling is found to be most vulnerable to random attacks, while the random and assortative coupling have little difference. Additionally, enhancing coupling strength can greatly enhance the fragility of interdependent networks against targeted attacks. These results can not only improve the deep understanding of structural complexity of complex systems, but also provide insights into the guidance of designing resilient infrastructures.
Hovens, Iris B; Schoemaker, Regien G; van der Zee, Eddy A; Heineman, Erik; Izaks, Gerbrand J; van Leeuwen, Barbara L
2012-10-01
Following surgery, patients may experience cognitive decline, which can seriously reduce quality of life. This postoperative cognitive dysfunction (POCD) is mainly seen in the elderly and is thought to be mediated by surgery-induced inflammatory reactions. Clinical studies tend to define POCD as a persisting, generalised decline in cognition, without specifying which cognitive functions are impaired. Pre-clinical research mainly describes early hippocampal dysfunction as a consequence of surgery-induced neuroinflammation. These different approaches to study POCD impede translation between clinical and pre-clinical research outcomes and may hamper the development of appropriate interventions. This article analyses which cognitive domains deteriorate after surgery and which brain areas might be involved. The most important outcomes are: (1) POCD encompasses a wide range of cognitive impairments; (2) POCD affects larger areas of the brain; and (3) individual variation in the vulnerability of neuronal networks to neuroinflammatory mechanisms may determine if and how POCD manifests itself. We argue that, for pre-clinical and clinical research of POCD to advance, the effects of surgery on various cognitive functions and brain areas should be studied. Moreover, in addition to general characteristics, research should take inter-relationships between cognitive complaints and physical and mental characteristics into account. Copyright © 2012 Elsevier Inc. All rights reserved.
Han, Kyu-Tae; Kim, Sun Jung; Lee, Seo Yoon; Park, Eun-Cheol
2014-01-01
After the WHO recommended HPV vaccination of the general population in 2009, government support of HPV vaccination programs was increased in many countries. However, this policy was not implemented in Korea due to perceived low cost-effectiveness. Thus, the aim of this study was to analyze the cost-utility of HPV vaccination programs targeted to high risk populations as compared to vaccination programs for the general population. Each study population was set to 100,000 people in a simulation study to determine the incremental cost-utility ratio (ICUR), then standard prevalence rates, cost, vaccination rates, vaccine efficacy, and the Quality-Adjusted Life-Years (QALYs) were applied to the analysis. In addition, sensitivity analysis was performed by assuming discounted vaccination cost. In the socially vulnerable population, QALYs gained through HPV vaccination were higher than that of the general population (General population: 1,019, Socially vulnerable population: 5,582). The results of ICUR showed that the cost of HPV vaccination was higher for the general population than the socially vulnerable population. (General population: 52,279,255 KRW, Socially vulnerable population: 9,547,347 KRW). Compared with 24 million KRW/QALYs as the social threshold, vaccination of the general population was not cost-effective. In contrast, vaccination of the socially vulnerable population was strongly cost-effective. The results suggest the importance and necessity of government support of HPV vaccination programs targeted to socially vulnerable populations because a targeted approach is much more cost-effective. The implementation of government support for such vaccination programs is a critical strategy for decreasing the burden of HPV infection in Korea.
A framework for the selection and ensemble development of flood vulnerability models
Figueiredo, Rui; Schröter, Kai; Kreibich, Heidi; Martina, Mario
2017-04-01
Effective understanding and management of flood risk requires comprehensive risk assessment studies that consider not only the hazard component, but also the impacts that the phenomena may have on the built environment, economy and society. This integrated approach has gained importance over recent decades, and with it so has the scientific attention given to flood vulnerability models describing the relationships between flood intensity metrics and damage to physical assets, also known as flood loss models. Despite considerable progress in this field, many challenges persist. Flood damage mechanisms are complex and depend on multiple variables, which can have different degrees of importance depending on the application setting. In addition, data required for the development and validation of such models tend to be scarce, particularly in data poor regions. These issues are reflected in the large amount of flood vulnerability models that are available in the literature today, as well as in their high heterogeneity: they are built with different modelling approaches, in different geographic contexts, utilizing different explanatory variables, and with varying levels of complexity. Notwithstanding recent developments in this area, uncertainty remains high, and large disparities exist among models. For these reasons, identifying which model or models, given their properties, are appropriate for a given context is not straightforward. In the present study, we propose a framework that guides the structured selection of flood vulnerability models and enables ranking them according to their suitability for a certain application, based on expert judgement. The approach takes advantage of current state of the art and most up-to-date knowledge on flood vulnerability processes. Given the heterogeneity and uncertainty currently present in flood vulnerability models, we propose the use of a model ensemble. With this in mind, the proposed approach is based on a weighting scheme
Ivanova, Olena; Dræbel, Tania; Tellier, Siri
2015-08-12
Health policies are important instruments for improving population health. However, experience suggests that policies designed for the whole population do not always benefit the most vulnerable. Participation of vulnerable groups in the policy-making process provides an opportunity for them to influence decisions related to their health, and also to exercise their rights. This paper presents the findings from a study that explored how vulnerable groups and principles of human rights are incorporated into national sexual and reproductive health (SRH) policies of 4 selected countries (Spain, Scotland, Republic of Moldova, and Ukraine). It also aimed at discussing the involvement of vulnerable groups in SRH policy development from the perspective of policy-makers. Literature review, health policy analysis and 5 semi-structured interviews with policy-makers were carried out in this study. Content analysis of SRH policies was performed using the EquiFrame analytical framework. The study revealed that vulnerable groups and core principles of human rights are differently addressed in SRH policies within 4 studied countries. The opinions of policy-makers on the importance of mentioning vulnerable groups in policy documents and the way they ought to be mentioned varied, but they agreed that a clear definition of vulnerability, practical examples, and evidences on health status of these groups have to be included. In addition, different approaches to vulnerable group's involvement in policy development were identified during the interviews and the range of obstacles to this process was discussed by respondents. Incorporation of vulnerable groups in the SRH policies and their involvement in policy development were found to be important in addressing SRH of these groups and providing an opportunity for them to advocate for equal access to healthcare and exercise their rights. Future research on this topic should include representatives of vulnerable communities which could
Directory of Open Access Journals (Sweden)
Olena Ivanova
2015-10-01
Full Text Available Background Health policies are important instruments for improving population health. However, experience suggests that policies designed for the whole population do not always benefit the most vulnerable. Participation of vulnerable groups in the policy-making process provides an opportunity for them to influence decisions related to their health, and also to exercise their rights. This paper presents the findings from a study that explored how vulnerable groups and principles of human rights are incorporated into national sexual and reproductive health (SRH policies of 4 selected countries (Spain, Scotland, Republic of Moldova, and Ukraine. It also aimed at discussing the involvement of vulnerable groups in SRH policy development from the perspective of policymakers. Methods Literature review, health policy analysis and 5 semi-structured interviews with policy-makers were carried out in this study. Content analysis of SRH policies was performed using the EquiFrame analytical framework. Results The study revealed that vulnerable groups and core principles of human rights are differently addressed in SRH policies within 4 studied countries. The opinions of policy-makers on the importance of mentioning vulnerable groups in policy documents and the way they ought to be mentioned varied, but they agreed that a clear definition of vulnerability, practical examples, and evidences on health status of these groups have to be included. In addition, different approaches to vulnerable group’s involvement in policy development were identified during the interviews and the range of obstacles to this process was discussed by respondents. Conclusion Incorporation of vulnerable groups in the SRH policies and their involvement in policy development were found to be important in addressing SRH of these groups and providing an opportunity for them to advocate for equal access to healthcare and exercise their rights. Future research on this topic should include
Drought vulnerability assesssment and mapping in Morocco
Imani, Yasmina; Lahlou, Ouiam; Bennasser Alaoui, Si; Naumann, Gustavo; Barbosa, Paulo; Vogt, Juergen
2014-05-01
Drought vulnerability assessment and mapping in Morocco Authors: Yasmina Imani 1, Ouiam Lahlou 1, Si Bennasser Alaoui 1 Paulo Barbosa 2, Jurgen Vogt 2, Gustavo Naumann 2 1: Institut Agronomique et Vétérinaire Hassan II (IAV Hassan II), Rabat Morocco. 2: European Commission, Joint Research Centre (JRC), Institute for Environment and Sustainability (IES), Ispra, Italy. In Morocco, nearly 50% of the population lives in rural areas. They are mostly small subsistent farmers whose production depends almost entirely on rainfall. They are therefore very sensitive to drought episodes that may dramatically affect their incomes. Although, as a consequence of the increasing frequency, length and severity of drought episodes in the late 90's, the Moroccan government decided, to move on from a crisis to a risk management approach, drought management remains in practice mainly reactive and often ineffective. The lack of effectiveness of public policy is in part a consequence of the poor understanding of drought vulnerability at the rural community level, which prevents the development of efficient mitigation actions and adaptation strategies, tailored to the needs and specificities of each rural community. Thus, the aim of this study is to assess and map drought vulnerability at the rural commune level in the Oum Er-Rbia basin which is a very heterogeneous basin, showing a big variability of climates, landscapes, cropping systems and social habits. Agricultural data collected from the provincial and local administrations of Agriculture and socio-economic data from the National Department of Statistics were used to compute a composite vulnerability index (DVI) integrating four different components: (i) the renewable natural capacity, (ii) the economic capacity, (iii) human and civic resources, and (iv) infrastructure and technology. The drought vulnerability maps that were derived from the computation of the DVI shows that except very specific areas, most of the Oum er Rbia
Vulnerability assessment and mitigation for the Chinese railway system under floods
International Nuclear Information System (INIS)
Hong, Liu; Ouyang, Min; Peeta, Srinivas; He, Xiaozheng; Yan, Yongze
2015-01-01
The economy of China and the travel needs of its citizens depend significantly on the continuous and reliable services provided by its railway system. However, this system is subject to frequent natural hazards, such as floods, earthquakes, and debris flow. A mechanism to assess the railway system vulnerability under these hazards and the design of effective vulnerability mitigation strategies are essential to the reliable functioning of the railway system. This article proposes a comprehensive methodology to quantitatively assess the railway system vulnerability under floods using historical data and GIS technology. The proposed methodology includes a network representation of the railway system, the generation of flood event scenarios, a method to estimate railway link vulnerability, and a quantitative vulnerability value computation approach. The railway system vulnerability is evaluated in terms of its service disruption related to the number of interrupted trains and the durations of interruption. A maintenance strategy to mitigate vulnerability is proposed that simultaneously considers link vulnerability and number of trains using it. Numerical experiments show that the flood-induced vulnerability of the proposed representation of the Chinese railway system reaches its maximum monthly value in July, and the proposed vulnerability mitigation strategy is more effective compared to other strategies. - Highlights: • We propose a methodology to assess flood-induced railway system vulnerability. • Railway system vulnerability is evaluated in terms of its service disruption. • Chinese railway system reaches its maximum monthly vulnerability in July. • We propose an effective maintenance strategy considering link vulnerability and burden
Race differences in depression vulnerability following Hurricane Katrina.
Ali, Jeanelle S; Farrell, Amy S; Alexander, Adam C; Forde, David R; Stockton, Michelle; Ward, Kenneth D
2017-05-01
This study investigated whether racial disparities in depression were present after Hurricane Katrina. Data were gathered from 932 New Orleans residents who were present when Hurricane Katrina struck, and who returned to New Orleans the following year. Multiple logistic regression models evaluated racial differences in screening positive for depression (a score ≥16 on the Center for Epidemiologic Studies Depression Scale), and explored whether differential vulnerability (prehurricane physical and mental health functioning and education level), differential exposure to hurricane-related stressors, and loss of social support moderated and/or reduced the association of race with depression. A univariate logistic regression analysis showed the odds for screening positive for depression were 86% higher for African Americans than for Caucasians (odds ratio [OR] = 1.86 [1.28-2.71], p = .0012). However, after controlling simultaneously for sociodemographic characteristics, preexisting vulnerabilities, social support, and trauma-specific factors, race was no longer a significant correlate for screening positive for depression (OR = 1.54 [0.95-2.48], p = .0771). The racial disparity in postdisaster depression seems to be confounded by sociodemographic characteristics, preexisting vulnerabilities, social support, and trauma-specific factors. Nonetheless, even after adjusting for these factors, there was a nonsignificant trend effect for race, which could suggest race played an important role in depression outcomes following Hurricane Katrina. Future studies should examine these associations prospectively, using stronger assessments for depression, and incorporate measures for discrimination and segregation, to further understand possible racial disparities in depression after Hurricane Katrina. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Identifying Vulnerabilities and Hardening Attack Graphs for Networked Systems
Energy Technology Data Exchange (ETDEWEB)
Saha, Sudip; Vullinati, Anil K.; Halappanavar, Mahantesh; Chatterjee, Samrat
2016-09-15
We investigate efficient security control methods for protecting against vulnerabilities in networked systems. A large number of interdependent vulnerabilities typically exist in the computing nodes of a cyber-system; as vulnerabilities get exploited, starting from low level ones, they open up the doors to more critical vulnerabilities. These cannot be understood just by a topological analysis of the network, and we use the attack graph abstraction of Dewri et al. to study these problems. In contrast to earlier approaches based on heuristics and evolutionary algorithms, we study rigorous methods for quantifying the inherent vulnerability and hardening cost for the system. We develop algorithms with provable approximation guarantees, and evaluate them for real and synthetic attack graphs.
Vulnerability in north- central Vietnam
DEFF Research Database (Denmark)
Casse, Thorkil; Milhøj, Anders; Nguyen, Thao Phuong
2015-01-01
This article examines changes in livelihood strategies in response to flooding. It does so on the basis of a household survey which was undertaken in three provinces in north central Vietnam. All households in the survey were regularly affected by flooding, but only poor households experience a l...... the impact of flooding in the provinces. The article ends by looking at the vulnerability-resilience debate concluding that the poorer households could enter a vulnerability loop, unless new strategies to cope with natural hazards are suggested....
Managing a network vulnerability assessment
Peltier, Thomas R; Blackley, John A
2003-01-01
Managing a Network Vulnerability Assessment provides a formal framework for finding and eliminating network security threats, ensuring that no vulnerabilities are overlooked. This thorough overview focuses on the steps necessary to successfully manage an assessment, including the development of a scope statement, the understanding and proper use of assessment methodology, the creation of an expert assessment team, and the production of a valuable response report. The book also details what commercial, freeware, and shareware tools are available, how they work, and how to use them.
Radhakrishnan, A.; Gupta, J.; R, D.
2016-12-01
In recent years climate variability has threatened the sustainability of dairy animals and dairy farming in India. The study aims at assessing the vulnerability and tradeoffs of Dairy Based Livelihoods to Climate Variability and Change in the Western Ghat ecosystem and for this purpose; data were aggregated to an overall Livelihood Vulnerability Index (LVI) to Climate Change underlying the principles of IPCC, using 28 indicators and trade-off between vulnerability and milk production was calculated. Data were collected through Participatory Rural Appraisal and personal interviews from 360 randomly selected dairy farmers of three states of Western Ghat region, complemented by thirty years of gridded weather data and livestock data. The index score of dairy based livelihoods of many regions were negative. Lanja taluka of Maharashtra has highest level of vulnerability with overall LVI value -4.17 with 48% farmers falling in highly vulnerable category. There is also significant tradeoff between milk production and components of LVI. Thus our research will provide an important basis for policy makers to develop appropriate adaptation strategies for alarming situation and decision making for farmers to minimize the risk of dairy sector to climate variability.
6 CFR 27.215 - Security vulnerability assessments.
2010-01-01
... 6 Domestic Security 1 2010-01-01 2010-01-01 false Security vulnerability assessments. 27.215 Section 27.215 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY CHEMICAL FACILITY ANTI-TERRORISM STANDARDS Chemical Facility Security Program § 27.215 Security vulnerability...
Vulnerability of families with children with intestinal stomas
Directory of Open Access Journals (Sweden)
Clara Ferraz Lazarini Zacarin
2014-06-01
Full Text Available Intestinal stomas cause transformations in the body and create specific and continuous needs for care that imply in hospitalization and surgeries. In this context, we applied the concept of family vulnerability in order to identify the vulnerability of the family living with a child who has intestinal stoma. It is a qualitative study which interviewed the mothers of children with this chronic condition. We used narrative analysis based on the concept of family vulnerability. The results display that the family has gone through previous noteworthy experiences associated with the child’s condition. The family cares for the child on their own and seeks ways to control the situation and regain autonomy, hoping for stoma reversal. Based on the concept of vulnerability, we observed that these families can be considered vulnerable, for they experience threats to their autonomy, but are moved by the hope of reversal and intestinal tract reconstruction. doi: 10.5216/ree.v16i2.26639.
Tsunami vulnerability assessment in the western coastal belt in Sri Lanka
Ranagalage, M. M.
2017-12-01
26th December 2004 tsunami disaster has caused massive loss of life, damage to coastal infrastructures and disruption to economic activities in the coastal belt of Sri Lanka. Tsunami vulnerability assessment is a requirement for disaster risk and vulnerability reduction. It plays a major role in identifying the extent and level of vulnerabilities to disasters within the communities. There is a need for a clearer understanding of the disaster risk patterns and factors contributing to it in different parts of the coastal belt. The main objective of this study is to investigate tsunami vulnerability assessment of Moratuwa Municipal council area in Sri Lanka. We have selected Moratuwa area due to considering urbanization pattern and Tsunami hazards of the country. Different data sets such as one-meter resolution LiDAR data, orthophoto, population, housing data and road layer were employed in this study. We employed tsunami vulnerability model for 1796 housing units located there, for a tsunami scenario with a maximum run-up 8 meters. 86% of the total land area affected by the tsunami in 8 meters scenarios. Additionally, building population has been used to estimate population in different vulnerability levels. The result shows that 32% of the buildings have extremely critical vulnerability level, 46% have critical vulnerability level, 22% have high vulnerability level, and 1% have a moderate vulnerability. According to the population estimation model results, 18% reside building with extremely critical vulnerability, 43% with critical vulnerability, 36% with high vulnerability and 3% belong to moderate vulnerability level. The results of the study provide a clear picture of tsunami vulnerability. Outcomes of this analysis can use as a valuable tool for urban planners to assess the risk and extent of disaster risk reduction which could be achieved via suitable mitigation measures to manage the coastal belt in Sri Lanka.
Perspectives on plant vulnerabilities ampersand other plant and containment improvements
International Nuclear Information System (INIS)
LaChance, J.; Kolaczkowski, A.; Kahn, J.
1996-01-01
The primary goal of the Individual Plant Examination (IPE) Program was for licensees to identify plant-unique vulnerabilities and actions to address these vulnerabilities. A review of these vulnerabilities and plant improvements that were identified in the IPEs was performed as part of the IPE Insights Program sponsored by the U.S. Nuclear Regulatory Commission (NRC). The purpose of this effort was to characterize the identified vulnerabilities and the impact of suggested plant improvements. No specific definition for open-quotes vulnerabilityclose quotes was provided in NRC Generic Letter 88-20 or in the subsequent NRC IPE submittal guidance documented in NUREG-1335. Thus licensees were left to use their own definitions. Only 20% of the plants explicitly stated that they had vulnerabilities. However, most licensees identified other plant improvements to address issues not explicitly classified as vulnerabilities, but pertaining to areas in which overall plant safety could potentially be increased. The various definitions of open-quotes vulnerabilityclose quotes used by the licensees, explicitly identified vulnerabilities, proposed plant improvements to address these vulnerabilities, and other plant improvements are summarized and discussed
The ethics of conducting a co-operative inquiry with vulnerable people.
Tee, Stephen R; Lathlean, Judith A
2004-09-01
Mental health services users have been calling for greater participation in clinical research. Participation in this context means research 'with' rather than 'on' groups of people. Conducting a co-operative inquiry involving the participation of vulnerable individuals as co-researchers, in particular those with a history of mental health problems, places an obligation on researchers to articulate and justify sound ethical procedures. The aim of this paper is to consider how the ethical issues encountered when conducting participative research with vulnerable people can be addressed in the implementation of a co-operative inquiry with users of mental health services. The study was based on personal reflection and a critical review of associated literature obtained from a database search using Boolean logic. The findings, presented under the headings of the four prima facie moral principles, suggest the need for researchers using participative approaches to demonstrate the humanistic attributes required for engaging and working with people over a period of time. These include building and maintaining trusting relationships, assessing competence to participate, managing interpersonal and group dynamics and making complex collaborative decisions about participants' continued participation in a study. When using a co-operative inquiry approach involving vulnerable individuals, researchers need to demonstrate clearly how a balance between autonomy and paternalism will be achieved, how risks will be anticipated and managed and how fairness will be maintained throughout all procedures. Researchers using participative approaches need to have developed a level of personal insight and self-awareness through access to supervision which focuses on sources of unintended manipulation and interpersonal dynamics that may arise at the inception of a study and throughout its course. Researchers and ethics committees have a shared responsibility to ensure that vulnerable people are
Macroeconomic Vulnerability in Developing Countries: Approaches and Issues
Anuradha Seth; Amr Ragab
2012-01-01
Economic vulnerability is approached from micro- and macroeconomic perspectives. While the microeconomic perspective is concerned with the impact of shocks on the well-being of individual households, the macroeconomic perspective focuses on the impact of these shocks on economic growth. This paper reviews the literature on macroeconomic vulnerability and finds that there is no single approach to understanding macroeconomic vulnerability in the context of financial and economic crises in devel...
Directory of Open Access Journals (Sweden)
Zuleima Cogollo
2007-06-01
Full Text Available Background: Some studies show a strongassociation between depressive symptoms andacademic achievement in the adolescent population.However, there are few Colombian publicationsabout this topic.Objective: To establish the association betweenclinically important depressive symptoms and academic achievement among low socioeconomicstatus adolescent students.Method: A group of 13 to 17 year-aged adolescentswas studied. Meaningful clinically depressivesymptoms were measured with Zung’self-rating depression scale (40/80. Academicachievement was evaluated according to Colombianqualitative model.Results: A total of 43.5% of students reportedclinically important depressive symptoms and30.7% accomplished a poor academic achievement,according to teacher report. The academicachievement was independent of meaningfulclinically depressive symptoms, after controllingother variables.Conclusion: Meaningful clinically depressivesymptoms are frequent in low socioeconomic statusadolescent students. But, meaningful clinicallydepressive symptoms are not associatedwith academic performance. Further investigationsare needed.
Miller, Joshua D; Widiger, Thomas A; Campbell, W Keith
2014-10-01
Comments on the articles by A. E. Skodol et al. (see record 2013-24395-001), E. Ronningstam (see record 2014-42878-005), D. Diamond et al. (see record 2014-42878-004), and A. L. Pincus et al. (see record 2014-01439-001). The tie that binds these four articles together is the respective authors' emphasis on the vulnerability- emotional, self-esteem/ego, interpersonal- that they consider to be central to pathological narcissism. The current authors agree that it is important that the field acknowledge both grandiose and vulnerable aspects of narcissism (e.g., Miller & Campbell, 2008), but they wonder whether the pendulum is now swinging too far back in the direction of vulnerability. (PsycINFO Database Record (c) 2014 APA, all rights reserved).
The principle of vulnerability and its potential applications in bioethics
Directory of Open Access Journals (Sweden)
Demény Enikő
2016-12-01
Full Text Available The principle of vulnerability is a specific principle within European Bioethics. On the one hand, vulnerability expresses human limits and frailty on the other hand it represents moral and ethical action principles. In this paper a discussion on the relationship between the concepts of autonomy, vulnerability and responsibility is proposed and presentation of some possible applications of the principle of vulnerability within bioethics. In conclusion, some potential benefits of applying the principle of vulnerability as well as possible difficulties in its application are highlighted.
Vulnerability of ecological systems for nuclear war climatic consequences
International Nuclear Information System (INIS)
Kharuehll, M.; Khatchinson, T.; Kropper, U.; Kharuehll, K.
1988-01-01
Vulnerability of ecological systems of Northern hemisphere (terrestrial, aquatic and tropical) as well as Southern one in relation to climatic changes following large nuclear war is considered. When analyzing potential sensitivity of ecological systems to climatic changes, possible consequences are considered for different stress categories under various war scenarios. The above-mentioned stresses correspond to those adopted in published work by Pittok and others. To estimate the less important climatic disturbances a few additional computer-simulated models are developed
African Journals Online (AJOL)
Ehab
Age groups vulnerable to serious attacks of anaphylaxis include infants, teenagers, pregnant women, and the elderly. Concomitant diseases, such as severe or uncontrolled asthma, cardiovascular disease, mastocytosis or clonal mast cell disorders and the concurrent use of some medications such as beta adrenergic ...
Ecosystem vulnerability to climate change in the southeastern United States
Cartwright, Jennifer M.; Costanza, Jennifer
2016-08-11
Two recent investigations of climate-change vulnerability for 19 terrestrial, aquatic, riparian, and coastal ecosystems of the southeastern United States have identified a number of important considerations, including potential for changes in hydrology, disturbance regimes, and interspecies interactions. Complementary approaches using geospatial analysis and literature synthesis integrated information on ecosystem biogeography and biodiversity, climate projections, vegetation dynamics, soil and water characteristics, anthropogenic threats, conservation status, sea-level rise, and coastal flooding impacts. Across a diverse set of ecosystems—ranging in size from dozens of square meters to thousands of square kilometers—quantitative and qualitative assessments identified types of climate-change exposure, evaluated sensitivity, and explored potential adaptive capacity. These analyses highlighted key gaps in scientific understanding and suggested priorities for future research. Together, these studies help create a foundation for ecosystem-level analysis of climate-change vulnerability to support effective biodiversity conservation in the southeastern United States.
A data mining approach to derive flood-related economic vulnerability of companies
Sieg, Tobias; Kreibich, Heidi; Vogel, Kristin; Merz, Bruno
2017-04-01
The assessment of vulnerability gained more and more attention in flood risk research during the recent years. However, there is still not much knowledge available about flood vulnerability of companies and its influencing factors. This study follows the natural sciences concept which defines vulnerability as the degree of loss to a given element at risk resulting from flooding of a given magnitude. Machine learning algorithms like Random Forests (RFs) are promising approaches, since they consider many influencing variables and as such allow for a detailed assessment of flood vulnerability. Only these variables which are meaningful for the differentiation of a certain target variable are used by the derived models. This allows for an identification of relevant damage influencing variables and hence for a more detailed picture of flood vulnerability of companies. This study aims to identify relevant damage influencing variables by means of the variable importance provided by Random Forests. The data sets used are taken from two surveys conducted after the floods in the Elbe and Danube catchments in the years 2002 and 2013 in Germany. Damage to buildings (n = 430), equipment (n = 651) as well as goods and stock (n = 530) are taken into account. The analysis is done for the entire data set as well as for four groups of different company sectors and the corresponding data subsets. Relevant damage influencing variables separated by sector and assets are identified as, for example, the degree of contamination or precautionary measures undertaken before the flood event. The results provide insight into the damage processes and improve data-acquisition in future surveys by, for instance, asking specific questions for company sectors and assets.
CSIR Research Space (South Africa)
Colvin, C
2007-08-01
Full Text Available for Aquifer Vulnerability Assessments and Protocols (AVAP) for producing vulnerability maps, taking into account information on soils Groundwater resources are increas- ingly threatened by pollution. The AVAP project was initiated to develop improved... characteristics. Both intrinsic and specific vulnerability are taken into account. The approach used to determine the vulnerability of the in- termediate zone involved the descrip- tion and quantification of the factors that influence vulnerability (unsatu...
Directory of Open Access Journals (Sweden)
Eleonora Giovene di Girasole
2017-11-01
Full Text Available The concept of risk has become increasingly complex, and has been used not only in relation to the natural features of a region, but also to its socio-economic context. In this conceptualization, the latter directly influences the capacity of a community to cope with, recover from, and adapt to natural hazards. Conceiving vulnerability as a measure of a socio-ecological system’s resilience, and at the same time, as a multidimensional variable that changes in space and time, makes the study of the different ways in which natural hazards impact on society all the more urgent. This is particularly true for developing countries, where risk related to natural hazards affects populations and areas that must deal with stress conditions, such as humanitarian, social and military emergencies. This article presents a methodology for the analysis of social vulnerability, defined and experimented in the context of the international cooperation project “Estudio de la amenaza sísmica y vulnerabilidad física del Gran Santo Domingo”. The methodology, implemented through the employment of a Geographic Information System, led to the elaboration of a “Social Vulnerability Index” and a “Social Vulnerability Map”. These seek to describe the current condition of vulnerability of the city of Santo Domingo de Guzmán (Distrito Nacional in the Dominican Republic (DR, and are used to define context-related vulnerability scenarios, as well as to indicate the adequate set of mitigation objectives and actions. The results highlight the importance of using social vulnerability study as the point of departure for defining seismic-risk mitigation policies, emergency management, and territorial planning in order to reduce the impacts of disasters.
Antibacterial effect of bioactive glasses on clinically important anaerobic bacteria in vitro.
Leppäranta, Outi; Vaahtio, Minna; Peltola, Timo; Zhang, Di; Hupa, Leena; Hupa, Mikko; Ylänen, Heimo; Salonen, Jukka I; Viljanen, Matti K; Eerola, Erkki
2008-02-01
Bioactive glasses (BAGs) of different compositions have been studied for decades for clinical use and they have found many dental and orthopaedic applications. Particulate BAGs have also been shown to have antibacterial properties. This large-scale study shows that two bioactive glass powders (S53P4 and 13-93) and a sol-gel derived material (CaPSiO II) have an antibacterial effect on 17 clinically important anaerobic bacterial species. All the materials tested demonstrated growth inhibition, although the concentration and time needed for the effect varied depending on the BAG. Glass S53P4 had a strong growth-inhibitory effect on all pathogens tested. Glass 13-93 and sol-gel derived material CaPSiO II showed moderate antibacterial properties.